[Cite as State v. Mahan, 2011-Ohio-5154.]
Court of Appeals of Ohio
EIGHTH APPELLATE DISTRICT
COUNTY OF CUYAHOGA
JOURNAL ENTRY AND OPINION
No. 95696
STATE OF OHIO
PLAINTIFF-APPELLEE
vs.
JAMES MAHAN
DEFENDANT-APPELLANT
JUDGMENT:
AFFIRMED AND REMANDED
Criminal Appeal from the
Cuyahoga County Court of Common Pleas
Case No. CR-525553
BEFORE: Sweeney, J., Stewart, P.J., and Celebrezze, J.
RELEASED AND JOURNALIZED: October 6, 2011
2
ATTORNEY FOR APPELLANT
Ronald L. Frey, Esq.
Ian N. Friedman & Associates, L.L.C.
1304 West Sixth Street
Cleveland, Ohio 44113
ATTORNEYS FOR APPELLEE
William D. Mason, Esq.
Cuyahoga County Prosecutor
By: T. Allan Regas, Esq.
Francine B. Goldberg, Esq.
Assistant County Prosecutors
The Justice Center, 9th Floor
1200 Ontario Street
Cleveland, Ohio 44113
JAMES J. SWEENEY, J.:
{¶ 1} Defendant-Appellant, James Mahan, appeals from the trial court’s denial of
his motion to suppress and his motion to compel. Appellant also appeals the sentence
imposed upon him. For the reasons that follow, we affirm but remand with instructions
to reclassify defendant as a Tier II sex offender as both parties conceded at oral argument
defendant was improperly classified as a Tier III sex offender.1
1
The sentencing transcript reflects that the court informed defendant he
would be labeled a Tier II sex offender. Accordingly, the sentencing journal entry
contains an obvious clerical error to the extent it provides that “defendant is a Tier
III sex offender.”
3
{¶ 2} In this case, defendant was indicted with 95 counts, including pandering
sexually-oriented matter involving a minor, illegal use of a minor in nudity-oriented
material or performance, and possessing criminal tools. The charges stemmed from the
presence of certain files found on defendant’s home computer as a result of an
investigation conducted by Rick McGinnis (“McGinnis”). McGinnis is an investigator
assigned to Ohio’s Internet Crimes Against Children Task Force (“ICAC”). McGinnis
utilized software known as “Peer Spectre,” which identified an internet protocol (“IP”)
address associated with three files that he recognized from his experience as being child
pornography. McGinnis prepared an affidavit and obtained a search warrant for
defendant’s residence.
{¶ 3} During the course of the proceedings, defendant filed a motion to compel
certain information from the state, including a mirror image forensic copy of Peer Spectre
and any and all instruction/operation and/or training manuals associated with Peer
Spectre, and the software’s source code. Defendant believed the information would
reveal the functionality and calibration of the software, and asserted it was material to his
defense in order to challenge the software’s reliability and methodology.
{¶ 4} In opposition, the state maintained the requested discovery was not subject
to disclosure by the state pursuant to Crim.R. 16. Specifically, the state indicated that
Peer Spectre is maintained under the strict control and ownership of William Wiltse and
is restricted to use by law enforcement. Wiltse supplied an affidavit wherein he averred
4
that “without the source code, it is not possible to authenticate the function of the
application or validate its ‘calibration.’” Wiltse averred that the source code is not
distributed. Officers are trained how to validate the findings of Peer Spectre by
“conducting similar searches on the Gnutella network using freely available software
applications.” The state confirmed that it did not own or have in its possession a copy of
the source code and maintained that it could not produce what it did not have. The trial
court denied the motion to compel discovery from the state and instructed that defendant
could contact the software company regarding issues pertaining to programming.
{¶ 5} The trial court conducted a hearing on defendant’s motion to suppress and
the motion was denied. Defendant then entered a plea of no contest and was found
guilty. The trial court imposed an aggregate prison sentence of 16 years comprised of the
following: eight year concurrent prison terms on 11 counts to be served consecutively
with eight year concurrent prison terms on 70 other counts; all concurrent with four and
one year prison terms on the remaining counts.
{¶ 6} Defendant’s appeal presents four assignments of error for our review:
{¶ 7} “I. The trial court erred when it denied the defendant-appellant’s motion to
suppress.”
{¶ 8} “Appellate review of a trial court’s ruling on a motion to suppress presents
mixed questions of law and fact. An appellate court is to accept the trial court’s factual
findings unless they are clearly erroneous. We are therefore required to accept the factual
5
determinations of a trial court if they are supported by competent and credible evidence.
The application of the law to those facts, however, is subject to de novo review.” State v.
Polk, (Internal citations omitted) Cuyahoga App. No. 84361, 2005-Ohio-774, at ¶2.
{¶ 9} Under this asserted error, defendant raises multiple issues that allege that:
(1) the trial court erred in its findings of fact and conclusions of law; (2) the warrantless
use of Peer Spectre constituted an unlawful search in violation of his constitutional rights;
(3) the search warrant was issued without probable cause because it relied on information
obtained from use of Peer Spectre; and (4) the probable cause finding for the search
warrant was based upon an affidavit that contained substantive inaccuracies and
omissions.
{¶ 10} The trial court conducted an evidentiary hearing on defendant’s motion to
suppress at which McGinnis was the only witness.
{¶ 11} McGinnis testified as follows: He obtained training on internet
investigations of child pornography from Fox Valley Technical College, and the training
included peer-to-peer network searches. As part of his training, he was instructed on the
use of Peer Spectre, which is exclusively restricted to law enforcement. Peer Spectre is a
search program that operates on the Gnutella network, which is a public peer-to-peer
network where people share their computer files back and forth. The Gnutella network
enables people to log onto the internet to search, find, retrieve, and download shared files
from other computers, including child pornography. The search will reveal an IP address
6
and SHA1 values,2 and from this information the user can download the desired file from
the computer(s) that offered to share it.
{¶ 12} McGinnis repeatedly testified that all the information he obtained from
using Peer Spectre he could have obtained using other publicly available software, such
as LimeWire or Phex, the only difference being that with the other software he would
have to manually enter the data to keep searching. McGinnis stated that Peer Spectre
saves time.
{¶ 13} In short, Peer Spectre conducts an automated search that identifies file
sharing of known or suspected child pornography associated with a specific IP address.
While McGinnis acknowledged that he did not create Peer Spectre and was unaware of
the technical aspects of it, he testified that he was trained how to operate it and
understood that it reads publicly available advertisements from computers that are sharing
files over the Gnutella peer-to-peer network.
{¶ 14} Each time that Peer Spectre is used by a law enforcement agency anywhere
in the world, the results are compiled in a centralized server. The information that is
logged into the central database includes the IP address, the port that it came from, and
SHA1 stands for Secure Hash Algorithm 1, which consists of 32 digits and
2
functions as a file’s digital signature or unique identifier, which cannot be altered.
McGinnis testified that SHA1 values are accurate in identifying a file to the 160th
degree, which is “better than DNA.” There is a certainty exceeding 99.99 percent
that two or more files with the same SHA1 value are identical copies of the same
file regardless of the file name.
7
the date and time of the search. Law enforcement agencies are then enabled to query the
information that Peer Spectre recorded into the central server.
{¶ 15} On May 23, 2008, McGinnis used this technology to search for IP addresses
that were active in Ohio in May of 2008 and had been recorded as sharing known or
suspected child pornography. McGinnis retrieved a “hit list” for the IP addresses at
issue, which identified each file’s SHA1 value, the date and time the file was made
available for sharing, and the file’s size, geographical location, and description. The
records identified a particular IP address as a computer that made available for sharing
known or suspected child pornography on May 12, 2008. From his experience,
McGinnis recognized some of the SHA1 values as known child pornography. McGinnis
nonetheless personally reviewed each file just to ensure that it was what he believed it to
be. Portions of these files were played during defendant’s suppression hearing and
corroborated McGinnis’s testimony as to their content of child pornography.
{¶ 16} Each IP address is unique to a certain computer at a given time. McGinnis
subpoenaed the internet service provider (“ISP”) for the subscriber associated with that IP
address at that time. He received the customer name and account holder, which was
defendant, however, this information does not identify who was actually using the
computer at the relevant time. Therefore, McGinnis was not targeting defendant but
instead he sought and obtained a search warrant for the residential address based upon his
belief that a computer at that address contained the suspected contraband.
8
{¶ 17} McGinnis prepared a lengthy affidavit setting forth the basis upon which he
was seeking the search warrant, which the court subsequently issued. McGinnis stated
that this search warrant was executed in conjunction with approximately 60 other similar
search warrants as part of Operation Safety Net. During the search, the known child
pornography files that had been identified by Peer Spectre were found on defendant’s
computer.
{¶ 18} McGinnis testified that this was the first time he had used information
gained from Peer Spectre to obtain search warrants, however, he was aware of Peer
Spectre’s accuracy from other law enforcement agencies. By the suppression hearing, it
had become McGinnis’s experience that whenever they located a computer through the
use of Peer Spectre, they found child pornography on the computer unless the hard drive
had been wiped clean. Under cross-examination, McGinnis stated that he could not testify
to the technological processes Peer Spectre uses when it is functioning. However, he
knew that Peer Spectre logs onto the same peer-to-peer network as any other publicly
available software in order to perform its functions. The defense elicited an admission
from McGinnis that he did not know if the files were located in a “shared folder.”
{¶ 19} While McGinnis more than once testified that he did not know if Peer
Spectre went beyond shared folders of a computer, he consistently confirmed that the
information recorded by Peer Spectre is “identical to the information that you would get
from running a search in LimeWire if you were running it at that time that the IP address
9
had a computer sharing file.” Peer Spectre simply automated the process. There was no
evidence introduced that these publicly available software programs search beyond shared
files on the network; in fact, McGinnis testified that he was unaware of that ever
happening.
{¶ 20} With regard to defendant’s assignment of error, it is well settled that “the
protections of the Fourth Amendment only extend to places where ‘the defendant can
claim a reasonable expectation of privacy.’” United States v. Norman (Sept. 24, 2010),
M.D. Ala. No. 2:09-CR-118-WKW, quoting Katz v. United States (1967), 389 U.S. 347,
360, 88 S.Ct. 507, 9 L.Ed.2d, 576, other citations omitted. “‘What a person knowingly
exposes to the public, even in his own home or office, is not a subject of Fourth
Amendment protection.’” Id., quoting Katz, 389 U.S. at 351.
{¶ 21} The state maintains that the use of Peer Spectre without a warrant did not
violate defendant’s constitutional right to be free from unreasonable searches and seizures
because it simply automated the ability to search information that had been placed in the
public domain. In other words, the program searches those files that have been placed in
a public file-sharing network. Therefore, the first issue becomes whether defendant had
a reasonable expectation of privacy in the subject files.
{¶ 22} At least one federal court that has confronted this issue concluded there is
no reasonable expectation of privacy over files searched using Peer Spectre. Norman,
supra (finding “a ‘search’ is not at issue unless the defendant first establishes that he or
10
she had a reasonable expectation of privacy in the area(s) searched. In other words, Mr.
Norman must establish that he has standing to assert a Fourth Amendment violation in the
first place. This he cannot do”).
{¶ 23} In Norman, the court observed, “courts addressing this issue have uniformly
held that there is no reasonable expectation of privacy in files made available to the
public through peer-to-peer file-sharing networks.” Id., citing United States v. Stults
(C.A.8, 2009), 575 F.3d 834, 842-843; United States v. Ganoe (C.A.9, 2008), 538 F.3d
1117, 1127; United States v. Perrine (C.A.10, 2008), 518 F.3d 1196, 1205; United States
v. Laduea (Apr. 7, 2010), D.Mass. No. 09-40021-FDS; United States v. Brese (Apr. 9,
2008), W.D.Okla. No. CR-08-52-D.
{¶ 24} Defendant asserts that McGinnis’s inability to testify as to the specific
functionality of Peer Spectre wrongly placed the burden of proof on him. However,
defendant has not challenged or refuted the evidence that indicated the files from an IP
address assigned to his computer were being shared over a peer-to-peer network on May
12, 2008, and therefore he has not established a reasonable expectation of privacy. Where
there is no reasonable expectation of privacy over the shared files, the technical aspects of
the law enforcement software are not at issue. Norman, supra.
{¶ 25} Next we address defendant’s argument that, as a means of establishing
probable cause, McGinnis’s affidavit could not be based on information he obtained
through Peer Spectre in the absence of testimony concerning the technical functionality of
11
the software. However, “probable cause is a fluid concept — turning on the assessment
of probabilities in particular factual contexts — not readily, or even usefully, reduced to a
neat set of legal rules.” Illinois v. Gates (1983), 462 U.S. 213, 232, 103 S.Ct. 2317, 76
L.Ed.2d 527; State v. Akers, Butler App. No. CA2007-07-163, 2008-Ohio-4164.
{¶ 26} Crim.R. 41(C) provides in part:
{¶ 27} “(1) A warrant shall issue on either an affidavit or affidavits sworn to
before a judge of a court of record or an affidavit or affidavits communicated to the judge
by reliable electronic means establishing the grounds for issuing the warrant. The
affidavit shall name or describe the person to be searched or particularly describe the
place to be searched, name or describe the property to be searched for and seized, state
substantially the offense in relation thereto, and state the factual basis for the affiant’s
belief that such property is there located. * * *
{¶ 28} “(2) * * * The finding of probable cause may be based upon hearsay in
whole or in part, provided there is a substantial basis for believing the source of the
hearsay to be credible and for believing that there is a factual basis for the information
furnished. * * *.”
{¶ 29} The gravamen of defendant’s position is that probable cause was lacking
because McGinnis was unable to testify as to the technical functionality of Peer Spectre
and whether it was somehow able to search beyond what is shared, because he did not
know Peer Spectre’s standard of error. Defendant has not provided us with a single
12
authority, in Ohio or otherwise, that found suppression was warranted where law
enforcement obtained a search warrant based on the use of technology that searches open
peer-to-peer networks. Instead, defendant equates information gathered from Peer
Spectre to information gathered from a confidential informant. As such, defendant
maintains, McGinnis was required to set forth underlying circumstances from which he
concluded that the software was credible or reliable.
{¶ 30} Assuming without deciding that the use of computer software is equivalent
to obtaining information from a confidential informant, the affidavit supplied a probable
cause basis to believe that the software was credible and reliable.
{¶ 31} In Gates v. Illinois (1983), 462 U.S. 213, 217, 103 S.Ct. 2317, 76 L.Ed.2d
527, the United States Supreme Court considered “the application of the Fourth
Amendment to a magistrate’s issuance of a search warrant on the basis of a partially
corroborated anonymous informant’s tip.” In Gates, the Court reasoned, “[a]n informant’s
‘veracity,’ ‘reliability,’ and ‘basis of knowledge’ are all highly relevant in determining the
value of his report. * * * [T]hese elements * * * should be understood simply as closely
intertwined issues that may usefully illuminate the common sense, practical question
whether there is ‘probable cause’ to believe that contraband or evidence is located in a
particular place.” Id. at 230.
{¶ 32} “Sufficient information must be presented to the magistrate to allow that
official to determine probable cause; his action cannot be a mere ratification of the bare
13
conclusions of others.” Id. at 239. For example, an officer’s statement that he has
received “reliable information from a credible person” and does “believe” that contraband
would be found at a home, is insufficient standing alone to create probable cause to
support a search warrant. Id. Conversely, “an affidavit relying on hearsay ‘is not to be
deemed insufficient on that score, so long as a substantial basis for crediting the hearsay
is presented.’ * * * [E]ven in making a warrantless arrest an officer ‘may rely upon
information received through an informant, rather than upon his direct observations, so
long as the informant’s statement is reasonably corroborated by other matters within the
officer’s knowledge.’” Id. at 242.
{¶ 33} Gates directs appellate courts to employ a totality of the circumstances
analysis to determine whether probable cause supported the issuance of a search warrant.
Id. at 238. Gates also provides that “after-the-fact scrutiny by courts of the sufficiency of
an affidavit should not take the form of de novo review. A magistrate’s ‘determination of
probable cause should be paid great deference by reviewing courts.’” Id. at 236, other
citation omitted; see, also, State v. George (1989), 45 Ohio St.3d 325, 330.
{¶ 34} There is a presumption of the validity of a warrant affidavit, which the
defendant can overcome by an offer of proof showing the affidavit contained a knowing,
intentional, or reckless falsity. State v. Roberts (1980), 62 Ohio St.2d 170, 178, citing
Franks v. Delaware, 438 U.S. 154, 98 S.Ct. 2674, 57 L.Ed.2d 667. However, the validity
of the affidavit will not be overcome by such showing if, when the “affidavit material
14
alleged to be false is excluded from the affidavit, there remains sufficient content in the
affidavit to support a finding of probable cause.” Id., citing Franks, 438 U.S. at 171-172.
{¶ 35} The questions before us are (1) whether, under the totality of the
circumstances, the affidavit provided a substantial basis for the judge’s conclusion that
there was a fair probability that child pornography would be found on a computer in the
defendant’s residence, and (2) whether there remains sufficient content in the affidavit to
support the warrant after any false information is excluded. In each regard, we find in the
affirmative.
{¶ 36} McGinnis’s affidavit and testimony adequately provided a substantial basis
for concluding that the information obtained from Peer Spectre was credible and reliable,
including, but not limited to the following: McGinnis has many years of experience
investigating internet child pornography. He was aware of Peer Spectre’s accuracy based
on information he learned from other agencies. He was trained specifically on the use of
Peer Spectre and knew that Peer Spectre searches peer-to-peer, or file sharing, networks.
McGinnis had used other software programs to search peer-to-peer networks and obtained
the same information he got from using Peer Spectre. He has never known the other
programs to search beyond shared files.
{¶ 37} McGinnis located an IP address recorded as sharing files on May 12, 2008,
three of which he recognized as being child pornography from his years of experience.
He independently corroborated this by viewing the files. McGinnis obtained the account
15
holder information associated with that IP address from the ISP. Accordingly, there was
a sufficient factual basis to establish probable cause to believe that a computer containing
child pornography files was located at defendant’s residence.
{¶ 38} Defendant maintains that probable cause is lacking unless law enforcement
downloaded or confirmed that the suspect files from the computer were contraband
before obtaining the search warrant. In order to support a probable cause determination,
the totality of the circumstances need only indicate a fair probability, not a certainty, that
the contraband will be found at the place to be searched. United States v. Cartier (C.A.8,
2008), 543 F.3d 442. In Cartier, the court upheld the denial of a motion to suppress
where the FBI relied on information supplied by the Spanish Guardia that defendant had
downloaded child pornography from a peer-to-peer file sharing network. Cartier, like
defendant, argued that probable cause for the search warrant was lacking because the FBI
had not verified the reliability of the software prior to obtaining the warrant. The court
rejected the argument finding the evidence established that the FBI knew the Spanish
Guardia “to be a reliable law enforcement agency that used a trustworthy means of
computer forensics.” Id. at 446. McGinnis’s testimony likewise establishes his
knowledge that Peer Spectre is a trustworthy source of information used by law
enforcement agencies.
{¶ 39} Defendant’s first assignment of error is overruled.
16
{¶ 40} “II. The Trial Court erred when it denied the defendant-appellant’s motion
to compel and failed to hold a hearing or issue findings of fact or conclusions of law.”
{¶ 41} The granting or denial of a motion to compel discovery is reviewed under
an abuse-of-discretion standard. The inquiry is whether the trial court’s decision is
unreasonable, arbitrary, or unconscionable. State ex rel. V. Cos. v. Marshall (1998), 81
Ohio St.3d 467, 469, 692 N.E.2d 198.
{¶ 42} The trial court denied defendant’s motion to compel a mirror image forensic
copy of Peer Spectre used in the investigation, any and all instruction/operation and/or
training manuals associated with the software, and Peer Spectre’s source code. The
court’s order instructed defendant to contact the software company regarding issues
pertaining to the programming of Peer Spectre.
{¶ 43} Defendant had urged the court to compel production of the information
from the state pursuant to Crim.R. 16(B)(1)(c),3 which provided:
{¶ 44} “(c) Documents and tangible objects. Upon motion of the defendant the
court shall order the prosecuting attorney to permit the defendant to inspect and copy or
photograph books, papers, documents, photographs, tangible objects, buildings or places,
or copies or portions thereof, available to or within the possession, custody or control of
the state, and which are material to the preparation of his defense, or are intended for use
Amendments to Crim.R. 16 took effect on July 1, 2010 and now set forth
3
equivalent provisions in Crim.R. 16(B)(3).
17
by the prosecuting attorney as evidence at the trial, or were obtained from or belong to
the defendant.” (Emphasis added.)
{¶ 45} Defendant also cites to the provisions of Crim.R. 16, which require the
production of mental examinations and scientific tests within the possession, custody or
control of the state, evidence known or which may become known to the state that is
favorable to defendant, and material relevant to either guilt or punishment.
{¶ 46} The information sought by defendant is not a mental examination or
scientific test and was not subject to production on that basis. While defendant
speculates that the information may have been favorable to him in challenging the
reliability of the software’s results, the state maintains that it did not have possession,
custody or control of the information. The evidence supports the state’s position. Peer
Spectre’s owner, Wiltse, averred in his affidavit that Peer Spectre is copyrighted, the
source code is not distributed to anyone, and the use of Peer Spectre is restricted to
trained law enforcement officers. Wilste averred that defendant could not discern how
the software application used by the state operated without the source code.
{¶ 47} Alternatively, the state contends the information is not material to the
defense, and the release of the restricted use software would compromise a worldwide
network of trained law enforcement personnel and possibly the database.
{¶ 48} Defendant asserts that the information would enable him to challenge the
reliability of the results of the software. However, the evidence establishes that an
18
expert would be unable to test the reliability of the software without the source code,
which was not available to, or accessible by, the state. At least one federal court has
denied a similar request for production of the FBI’s proprietary enhanced LimeWire
program, finding that its production would not yield any information material to the
defense, particularly because the source code was locked and, therefore, the expert could
not discern how it operates. See United States v. Budziak (May 14, 2009), N.D.Cal. No.
CR08-00284. That logic applies equally here.
{¶ 49} Because the state was not in possession of the source code, and without it
one cannot discern how the software operates, the trial court did not abuse its discretion
by denying the motion to compel, and this assignment of error is overruled.
{¶ 50} “III. The defendant-appellant’s right to due process of law as guaranteed by
Article 1, Section 10 of the Ohio State Constitution and the Fourteenth Amendment to the
United States Constitution was violated when he was sentenced to sixteen (16) years.”
{¶ 51} “IV. The court’s imposition of consecutive sentences, without making
appropriate findings and reasons as required by R.C. §2929.14, violated the
defendant-appellant’s right to due process of law as guaranteed by Article I, Section 10 of
the Ohio State Constitution and the Fourteenth Amendment to the United States
Constitution.”
{¶ 52} The third and fourth assignments of error are overruled.
19
{¶ 53} The two-fold analysis for reviewing sentences is first to determine whether
the trial court complied with all applicable rules and statutes when imposing the sentence
such that the sentence is not “clearly and convincingly contrary to law,” and if so, second,
to examine if the trial court’s sentence constitutes an abuse of its discretion. State v.
Kalish, 120 Ohio St.3d 23, 2008-Ohio-4912, 896 N.E.2d 124, ¶4.
{¶ 54} Defendant contends his sentence is not supported by clear and convincing
evidence and is contrary to law. He also argues that the trial court abused its discretion
by imposing a 16-year sentence.
{¶ 55} The trial court imposed the maximum sentence of eight years on 81 counts
of the indictment. Then the court grouped the offenses into categories. The court
segregated Counts 1 through 11, which involved images defendant made available for
sharing, from Counts 12 through 81, which were based on images/videos found on
defendant’s computer hard drive that depicted children involved in sexual acts. For all
counts in each grouping, defendant received maximum but concurrent eight-year prison
terms, however, the sentences in Counts 1 through 11 were to be served consecutively to
the sentences in counts 12 through 81, for an aggregate term of 16 years in prison. The
court then imposed a four year prison sentence for Counts 82 through 94, which involved
images that depicted nude children but did not involve any sexual acts, and imposed a
one-year prison term on the final count for possessing criminal tools, i.e., the computer.
20
The court ordered those sentences to be served concurrently with the 16-year prison
term.4
{¶ 56} Defendant argues that the maximum sentence on 82 counts, as well as the
imposition of consecutive sentences, was not supported by sufficient reasoning and does
not comport with the purposes of felony sentencing set forth in R.C. 2929.11 and
2929.12. The court was not, and is not presently, required to make findings on the record
prior to imposing maximum or consecutive sentences. State v. Foster, 109 Ohio St.3d 1,
2006-Ohio-856, 845 N.E.2d 470; State v. Hodge, 128 Ohio St.3d 1, 2010-Ohio-6320, 941
N.E.2d 768.5 Rather, the court is bound to consider Ohio’s felony sentencing statutes.
Foster, 2006-Ohio-856; see, also, State v. Mathis, 109 Ohio St.3d 54, 62, 2006-Ohio-855,
846 N.E.2d 1.
{¶ 57} In imposing its sentence, the court noted that it is “well-known the
defendant has otherwise been a law-abiding, productive citizen.” The record reflects a
long marriage to his wife and that they raised a daughter who is successful. Defendant’s
wife, daughter, and others in their community continued to support him throughout these
proceedings and advocated on his behalf at sentencing. According to the record,
The sentencing order further addressed forfeiture specifications and terms of
4
postrelease control, which are not at issue in this appeal.
We note that on September 30, 2011, amendments to Ohio’s sentencing law
5
will take effect.
21
defendant immediately commenced treatment, which he continued throughout the two
years the matter was pending in the lower court, reportedly attending more than 100
meetings and participating in group and individual therapy. Defendant maintained gainful
employment until his arrest, after which he sought and obtained new employment. The
state emphasized the fact that defendant’s career was largely spent around young children
as an aquatics instructor, suggesting this should be considered within the context of his
offenses. The court noted that defendant had never been accused of engaging in the type
of conduct depicted in the images he possessed or shared, and he could not be sentenced
based upon potential future offenses. A polygraph test indicated that he had never
molested any children. Defendant’s Static-99 score placed him in the lowest possible
category for recidivism risk. Defendant cooperated with police, although the state
insisted that he minimized his culpability by indicating the individuals involved were girls
between 12 and 18, rather than younger.
{¶ 58} The court emphasized that defendant’s conduct victimized the subjects of
the child pornography every time the media is viewed, shared, or downloaded.
Defendant recognized this harm, which he discussed during his allocution. Defendant
stated he had an addiction, which escalated as he focused on younger and younger
subjects. The court cited this admission during sentencing. Defendant acknowledged
the heinous nature of the crimes, which was echoed by the state as well as the court. The
state described other sexually explicit content found on defendant’s computer, including
22
96,000 photographs. Furthermore, the parties stipulated that the state was seeking
sentencing regarding the 52 victims who formed the basis for defendant’s indictment.
{¶ 59} The record establishes that defendant’s conduct was “relentless and
ongoing” for a period of eight years until he was stopped by law enforcement
intervention. With respect to the images found on defendant’s computer, the court
expressed, “[e]verything you could possibly imagine occurred on this computer. And
everything you could possibly imagine was shared with other individuals.”
{¶ 60} Defendant asserts that his sentence is inconsistent with sentences imposed
for similar crimes by similar offenders. He refers us to sentencing journal entries from
other cases in this district where individuals convicted of multiple counts of pandering
sexually-oriented matter involving a minor received lesser sentences than his, ranging
from community control sanctions to four years in prison. According to defendant, all of
those individuals were also indicted as a result of Operation Safety Net. However, these
journal entries tell us little, if anything, of the offender characteristics and provide no
information beyond the convictions and terms of the sentences.
{¶ 61} On the other hand, our research has revealed that in at least one other case
an individual who was indicted in the same investigation received the same 16-year
sentence as defendant, which this court upheld. See State v. Cooper, Cuyahoga App. No.
93308, 2010-Ohio-1983, ¶19-21.
23
{¶ 62} Cooper was indicted following an investigation by Ohio’s ICAC, which
indicated he was using file sharing software to access child pornography. Cooper,
2010-Ohio-1983, ¶4. Cooper pled guilty to four counts of pandering sexually-oriented
material involving a minor and possessing criminal tools. Cooper also cooperated with
the investigation and gave a statement to police. Similar to this case, Cooper’s ex-wife
spoke on his behalf at sentencing, indicating that “he has been working hard to get help.”
Cooper, like defendant, was actively involved in AA and was obtaining counseling prior
to his sentencing. He expressed remorse for his behavior, which was noted as being
“considerable.” While a similarly situated offender, Cooper was convicted of
significantly fewer counts than defendant but still received a 16-year prison term.
Defendant’s sentence was consistent with Cooper’s sentence.
{¶ 63} We acknowledge that a 16 year prison term imposed on a first-time
offender who has, by all accounts, led an otherwise productive, law abiding life is a harsh
sentence and is perhaps not one that we may have imposed. Nonetheless, the sentence
was significantly less than what the court could have imposed based on defendant’s 95
convictions. There was ample testimony in the record of the harm that has been, and
continues to be, inflicted upon the victims who are the subjects of the material being
viewed in these types of cases. The images, once uploaded, continue to circulate on the
internet where individuals, like defendant, view them and make them available for
viewing by others. The wide range of sentences that have been apparently imposed on
24
defendants convicted of similar offenses is the result of the discretion vested in the trial
court. Defendant’s sentence was within the statutory range, lawful, and supported by the
record, thus we cannot say it was unconscionable or otherwise an abuse of the trial court’s
discretion.
{¶ 64} The third assignment of error is overruled.
{¶ 65} Judgment affirmed, and the case is remanded to correct the sentencing
journal entry to accurately reflect defendant’s classification as a Tier II sex offender.
It is ordered that appellee recover of appellant its costs herein taxed.
The Court finds there were reasonable grounds for this appeal.
It is ordered that a special mandate issue out of this Court directing the Common
Pleas Court to carry this judgment into execution. The defendant's conviction having
been affirmed, any bail pending appeal is terminated. Case remanded to the trial court
for execution of sentence.
A certified copy of this entry shall constitute the mandate pursuant to Rule 27 of
the Rules of Appellate Procedure.
JAMES J. SWEENEY, JUDGE
MELODY J., STEWART, P.J., and
FRANK D. CELEBREZZE, JR., J., CONCUR