State v. Mahan

[Cite as State v. Mahan, 2011-Ohio-5154.] Court of Appeals of Ohio EIGHTH APPELLATE DISTRICT COUNTY OF CUYAHOGA JOURNAL ENTRY AND OPINION No. 95696 STATE OF OHIO PLAINTIFF-APPELLEE vs. JAMES MAHAN DEFENDANT-APPELLANT JUDGMENT: AFFIRMED AND REMANDED Criminal Appeal from the Cuyahoga County Court of Common Pleas Case No. CR-525553 BEFORE: Sweeney, J., Stewart, P.J., and Celebrezze, J. RELEASED AND JOURNALIZED: October 6, 2011 2 ATTORNEY FOR APPELLANT Ronald L. Frey, Esq. Ian N. Friedman & Associates, L.L.C. 1304 West Sixth Street Cleveland, Ohio 44113 ATTORNEYS FOR APPELLEE William D. Mason, Esq. Cuyahoga County Prosecutor By: T. Allan Regas, Esq. Francine B. Goldberg, Esq. Assistant County Prosecutors The Justice Center, 9th Floor 1200 Ontario Street Cleveland, Ohio 44113 JAMES J. SWEENEY, J.: {¶ 1} Defendant-Appellant, James Mahan, appeals from the trial court’s denial of his motion to suppress and his motion to compel. Appellant also appeals the sentence imposed upon him. For the reasons that follow, we affirm but remand with instructions to reclassify defendant as a Tier II sex offender as both parties conceded at oral argument defendant was improperly classified as a Tier III sex offender.1 1 The sentencing transcript reflects that the court informed defendant he would be labeled a Tier II sex offender. Accordingly, the sentencing journal entry contains an obvious clerical error to the extent it provides that “defendant is a Tier III sex offender.” 3 {¶ 2} In this case, defendant was indicted with 95 counts, including pandering sexually-oriented matter involving a minor, illegal use of a minor in nudity-oriented material or performance, and possessing criminal tools. The charges stemmed from the presence of certain files found on defendant’s home computer as a result of an investigation conducted by Rick McGinnis (“McGinnis”). McGinnis is an investigator assigned to Ohio’s Internet Crimes Against Children Task Force (“ICAC”). McGinnis utilized software known as “Peer Spectre,” which identified an internet protocol (“IP”) address associated with three files that he recognized from his experience as being child pornography. McGinnis prepared an affidavit and obtained a search warrant for defendant’s residence. {¶ 3} During the course of the proceedings, defendant filed a motion to compel certain information from the state, including a mirror image forensic copy of Peer Spectre and any and all instruction/operation and/or training manuals associated with Peer Spectre, and the software’s source code. Defendant believed the information would reveal the functionality and calibration of the software, and asserted it was material to his defense in order to challenge the software’s reliability and methodology. {¶ 4} In opposition, the state maintained the requested discovery was not subject to disclosure by the state pursuant to Crim.R. 16. Specifically, the state indicated that Peer Spectre is maintained under the strict control and ownership of William Wiltse and is restricted to use by law enforcement. Wiltse supplied an affidavit wherein he averred 4 that “without the source code, it is not possible to authenticate the function of the application or validate its ‘calibration.’” Wiltse averred that the source code is not distributed. Officers are trained how to validate the findings of Peer Spectre by “conducting similar searches on the Gnutella network using freely available software applications.” The state confirmed that it did not own or have in its possession a copy of the source code and maintained that it could not produce what it did not have. The trial court denied the motion to compel discovery from the state and instructed that defendant could contact the software company regarding issues pertaining to programming. {¶ 5} The trial court conducted a hearing on defendant’s motion to suppress and the motion was denied. Defendant then entered a plea of no contest and was found guilty. The trial court imposed an aggregate prison sentence of 16 years comprised of the following: eight year concurrent prison terms on 11 counts to be served consecutively with eight year concurrent prison terms on 70 other counts; all concurrent with four and one year prison terms on the remaining counts. {¶ 6} Defendant’s appeal presents four assignments of error for our review: {¶ 7} “I. The trial court erred when it denied the defendant-appellant’s motion to suppress.” {¶ 8} “Appellate review of a trial court’s ruling on a motion to suppress presents mixed questions of law and fact. An appellate court is to accept the trial court’s factual findings unless they are clearly erroneous. We are therefore required to accept the factual 5 determinations of a trial court if they are supported by competent and credible evidence. The application of the law to those facts, however, is subject to de novo review.” State v. Polk, (Internal citations omitted) Cuyahoga App. No. 84361, 2005-Ohio-774, at ¶2. {¶ 9} Under this asserted error, defendant raises multiple issues that allege that: (1) the trial court erred in its findings of fact and conclusions of law; (2) the warrantless use of Peer Spectre constituted an unlawful search in violation of his constitutional rights; (3) the search warrant was issued without probable cause because it relied on information obtained from use of Peer Spectre; and (4) the probable cause finding for the search warrant was based upon an affidavit that contained substantive inaccuracies and omissions. {¶ 10} The trial court conducted an evidentiary hearing on defendant’s motion to suppress at which McGinnis was the only witness. {¶ 11} McGinnis testified as follows: He obtained training on internet investigations of child pornography from Fox Valley Technical College, and the training included peer-to-peer network searches. As part of his training, he was instructed on the use of Peer Spectre, which is exclusively restricted to law enforcement. Peer Spectre is a search program that operates on the Gnutella network, which is a public peer-to-peer network where people share their computer files back and forth. The Gnutella network enables people to log onto the internet to search, find, retrieve, and download shared files from other computers, including child pornography. The search will reveal an IP address 6 and SHA1 values,2 and from this information the user can download the desired file from the computer(s) that offered to share it. {¶ 12} McGinnis repeatedly testified that all the information he obtained from using Peer Spectre he could have obtained using other publicly available software, such as LimeWire or Phex, the only difference being that with the other software he would have to manually enter the data to keep searching. McGinnis stated that Peer Spectre saves time. {¶ 13} In short, Peer Spectre conducts an automated search that identifies file sharing of known or suspected child pornography associated with a specific IP address. While McGinnis acknowledged that he did not create Peer Spectre and was unaware of the technical aspects of it, he testified that he was trained how to operate it and understood that it reads publicly available advertisements from computers that are sharing files over the Gnutella peer-to-peer network. {¶ 14} Each time that Peer Spectre is used by a law enforcement agency anywhere in the world, the results are compiled in a centralized server. The information that is logged into the central database includes the IP address, the port that it came from, and SHA1 stands for Secure Hash Algorithm 1, which consists of 32 digits and 2 functions as a file’s digital signature or unique identifier, which cannot be altered. McGinnis testified that SHA1 values are accurate in identifying a file to the 160th degree, which is “better than DNA.” There is a certainty exceeding 99.99 percent that two or more files with the same SHA1 value are identical copies of the same file regardless of the file name. 7 the date and time of the search. Law enforcement agencies are then enabled to query the information that Peer Spectre recorded into the central server. {¶ 15} On May 23, 2008, McGinnis used this technology to search for IP addresses that were active in Ohio in May of 2008 and had been recorded as sharing known or suspected child pornography. McGinnis retrieved a “hit list” for the IP addresses at issue, which identified each file’s SHA1 value, the date and time the file was made available for sharing, and the file’s size, geographical location, and description. The records identified a particular IP address as a computer that made available for sharing known or suspected child pornography on May 12, 2008. From his experience, McGinnis recognized some of the SHA1 values as known child pornography. McGinnis nonetheless personally reviewed each file just to ensure that it was what he believed it to be. Portions of these files were played during defendant’s suppression hearing and corroborated McGinnis’s testimony as to their content of child pornography. {¶ 16} Each IP address is unique to a certain computer at a given time. McGinnis subpoenaed the internet service provider (“ISP”) for the subscriber associated with that IP address at that time. He received the customer name and account holder, which was defendant, however, this information does not identify who was actually using the computer at the relevant time. Therefore, McGinnis was not targeting defendant but instead he sought and obtained a search warrant for the residential address based upon his belief that a computer at that address contained the suspected contraband. 8 {¶ 17} McGinnis prepared a lengthy affidavit setting forth the basis upon which he was seeking the search warrant, which the court subsequently issued. McGinnis stated that this search warrant was executed in conjunction with approximately 60 other similar search warrants as part of Operation Safety Net. During the search, the known child pornography files that had been identified by Peer Spectre were found on defendant’s computer. {¶ 18} McGinnis testified that this was the first time he had used information gained from Peer Spectre to obtain search warrants, however, he was aware of Peer Spectre’s accuracy from other law enforcement agencies. By the suppression hearing, it had become McGinnis’s experience that whenever they located a computer through the use of Peer Spectre, they found child pornography on the computer unless the hard drive had been wiped clean. Under cross-examination, McGinnis stated that he could not testify to the technological processes Peer Spectre uses when it is functioning. However, he knew that Peer Spectre logs onto the same peer-to-peer network as any other publicly available software in order to perform its functions. The defense elicited an admission from McGinnis that he did not know if the files were located in a “shared folder.” {¶ 19} While McGinnis more than once testified that he did not know if Peer Spectre went beyond shared folders of a computer, he consistently confirmed that the information recorded by Peer Spectre is “identical to the information that you would get from running a search in LimeWire if you were running it at that time that the IP address 9 had a computer sharing file.” Peer Spectre simply automated the process. There was no evidence introduced that these publicly available software programs search beyond shared files on the network; in fact, McGinnis testified that he was unaware of that ever happening. {¶ 20} With regard to defendant’s assignment of error, it is well settled that “the protections of the Fourth Amendment only extend to places where ‘the defendant can claim a reasonable expectation of privacy.’” United States v. Norman (Sept. 24, 2010), M.D. Ala. No. 2:09-CR-118-WKW, quoting Katz v. United States (1967), 389 U.S. 347, 360, 88 S.Ct. 507, 9 L.Ed.2d, 576, other citations omitted. “‘What a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection.’” Id., quoting Katz, 389 U.S. at 351. {¶ 21} The state maintains that the use of Peer Spectre without a warrant did not violate defendant’s constitutional right to be free from unreasonable searches and seizures because it simply automated the ability to search information that had been placed in the public domain. In other words, the program searches those files that have been placed in a public file-sharing network. Therefore, the first issue becomes whether defendant had a reasonable expectation of privacy in the subject files. {¶ 22} At least one federal court that has confronted this issue concluded there is no reasonable expectation of privacy over files searched using Peer Spectre. Norman, supra (finding “a ‘search’ is not at issue unless the defendant first establishes that he or 10 she had a reasonable expectation of privacy in the area(s) searched. In other words, Mr. Norman must establish that he has standing to assert a Fourth Amendment violation in the first place. This he cannot do”). {¶ 23} In Norman, the court observed, “courts addressing this issue have uniformly held that there is no reasonable expectation of privacy in files made available to the public through peer-to-peer file-sharing networks.” Id., citing United States v. Stults (C.A.8, 2009), 575 F.3d 834, 842-843; United States v. Ganoe (C.A.9, 2008), 538 F.3d 1117, 1127; United States v. Perrine (C.A.10, 2008), 518 F.3d 1196, 1205; United States v. Laduea (Apr. 7, 2010), D.Mass. No. 09-40021-FDS; United States v. Brese (Apr. 9, 2008), W.D.Okla. No. CR-08-52-D. {¶ 24} Defendant asserts that McGinnis’s inability to testify as to the specific functionality of Peer Spectre wrongly placed the burden of proof on him. However, defendant has not challenged or refuted the evidence that indicated the files from an IP address assigned to his computer were being shared over a peer-to-peer network on May 12, 2008, and therefore he has not established a reasonable expectation of privacy. Where there is no reasonable expectation of privacy over the shared files, the technical aspects of the law enforcement software are not at issue. Norman, supra. {¶ 25} Next we address defendant’s argument that, as a means of establishing probable cause, McGinnis’s affidavit could not be based on information he obtained through Peer Spectre in the absence of testimony concerning the technical functionality of 11 the software. However, “probable cause is a fluid concept — turning on the assessment of probabilities in particular factual contexts — not readily, or even usefully, reduced to a neat set of legal rules.” Illinois v. Gates (1983), 462 U.S. 213, 232, 103 S.Ct. 2317, 76 L.Ed.2d 527; State v. Akers, Butler App. No. CA2007-07-163, 2008-Ohio-4164. {¶ 26} Crim.R. 41(C) provides in part: {¶ 27} “(1) A warrant shall issue on either an affidavit or affidavits sworn to before a judge of a court of record or an affidavit or affidavits communicated to the judge by reliable electronic means establishing the grounds for issuing the warrant. The affidavit shall name or describe the person to be searched or particularly describe the place to be searched, name or describe the property to be searched for and seized, state substantially the offense in relation thereto, and state the factual basis for the affiant’s belief that such property is there located. * * * {¶ 28} “(2) * * * The finding of probable cause may be based upon hearsay in whole or in part, provided there is a substantial basis for believing the source of the hearsay to be credible and for believing that there is a factual basis for the information furnished. * * *.” {¶ 29} The gravamen of defendant’s position is that probable cause was lacking because McGinnis was unable to testify as to the technical functionality of Peer Spectre and whether it was somehow able to search beyond what is shared, because he did not know Peer Spectre’s standard of error. Defendant has not provided us with a single 12 authority, in Ohio or otherwise, that found suppression was warranted where law enforcement obtained a search warrant based on the use of technology that searches open peer-to-peer networks. Instead, defendant equates information gathered from Peer Spectre to information gathered from a confidential informant. As such, defendant maintains, McGinnis was required to set forth underlying circumstances from which he concluded that the software was credible or reliable. {¶ 30} Assuming without deciding that the use of computer software is equivalent to obtaining information from a confidential informant, the affidavit supplied a probable cause basis to believe that the software was credible and reliable. {¶ 31} In Gates v. Illinois (1983), 462 U.S. 213, 217, 103 S.Ct. 2317, 76 L.Ed.2d 527, the United States Supreme Court considered “the application of the Fourth Amendment to a magistrate’s issuance of a search warrant on the basis of a partially corroborated anonymous informant’s tip.” In Gates, the Court reasoned, “[a]n informant’s ‘veracity,’ ‘reliability,’ and ‘basis of knowledge’ are all highly relevant in determining the value of his report. * * * [T]hese elements * * * should be understood simply as closely intertwined issues that may usefully illuminate the common sense, practical question whether there is ‘probable cause’ to believe that contraband or evidence is located in a particular place.” Id. at 230. {¶ 32} “Sufficient information must be presented to the magistrate to allow that official to determine probable cause; his action cannot be a mere ratification of the bare 13 conclusions of others.” Id. at 239. For example, an officer’s statement that he has received “reliable information from a credible person” and does “believe” that contraband would be found at a home, is insufficient standing alone to create probable cause to support a search warrant. Id. Conversely, “an affidavit relying on hearsay ‘is not to be deemed insufficient on that score, so long as a substantial basis for crediting the hearsay is presented.’ * * * [E]ven in making a warrantless arrest an officer ‘may rely upon information received through an informant, rather than upon his direct observations, so long as the informant’s statement is reasonably corroborated by other matters within the officer’s knowledge.’” Id. at 242. {¶ 33} Gates directs appellate courts to employ a totality of the circumstances analysis to determine whether probable cause supported the issuance of a search warrant. Id. at 238. Gates also provides that “after-the-fact scrutiny by courts of the sufficiency of an affidavit should not take the form of de novo review. A magistrate’s ‘determination of probable cause should be paid great deference by reviewing courts.’” Id. at 236, other citation omitted; see, also, State v. George (1989), 45 Ohio St.3d 325, 330. {¶ 34} There is a presumption of the validity of a warrant affidavit, which the defendant can overcome by an offer of proof showing the affidavit contained a knowing, intentional, or reckless falsity. State v. Roberts (1980), 62 Ohio St.2d 170, 178, citing Franks v. Delaware, 438 U.S. 154, 98 S.Ct. 2674, 57 L.Ed.2d 667. However, the validity of the affidavit will not be overcome by such showing if, when the “affidavit material 14 alleged to be false is excluded from the affidavit, there remains sufficient content in the affidavit to support a finding of probable cause.” Id., citing Franks, 438 U.S. at 171-172. {¶ 35} The questions before us are (1) whether, under the totality of the circumstances, the affidavit provided a substantial basis for the judge’s conclusion that there was a fair probability that child pornography would be found on a computer in the defendant’s residence, and (2) whether there remains sufficient content in the affidavit to support the warrant after any false information is excluded. In each regard, we find in the affirmative. {¶ 36} McGinnis’s affidavit and testimony adequately provided a substantial basis for concluding that the information obtained from Peer Spectre was credible and reliable, including, but not limited to the following: McGinnis has many years of experience investigating internet child pornography. He was aware of Peer Spectre’s accuracy based on information he learned from other agencies. He was trained specifically on the use of Peer Spectre and knew that Peer Spectre searches peer-to-peer, or file sharing, networks. McGinnis had used other software programs to search peer-to-peer networks and obtained the same information he got from using Peer Spectre. He has never known the other programs to search beyond shared files. {¶ 37} McGinnis located an IP address recorded as sharing files on May 12, 2008, three of which he recognized as being child pornography from his years of experience. He independently corroborated this by viewing the files. McGinnis obtained the account 15 holder information associated with that IP address from the ISP. Accordingly, there was a sufficient factual basis to establish probable cause to believe that a computer containing child pornography files was located at defendant’s residence. {¶ 38} Defendant maintains that probable cause is lacking unless law enforcement downloaded or confirmed that the suspect files from the computer were contraband before obtaining the search warrant. In order to support a probable cause determination, the totality of the circumstances need only indicate a fair probability, not a certainty, that the contraband will be found at the place to be searched. United States v. Cartier (C.A.8, 2008), 543 F.3d 442. In Cartier, the court upheld the denial of a motion to suppress where the FBI relied on information supplied by the Spanish Guardia that defendant had downloaded child pornography from a peer-to-peer file sharing network. Cartier, like defendant, argued that probable cause for the search warrant was lacking because the FBI had not verified the reliability of the software prior to obtaining the warrant. The court rejected the argument finding the evidence established that the FBI knew the Spanish Guardia “to be a reliable law enforcement agency that used a trustworthy means of computer forensics.” Id. at 446. McGinnis’s testimony likewise establishes his knowledge that Peer Spectre is a trustworthy source of information used by law enforcement agencies. {¶ 39} Defendant’s first assignment of error is overruled. 16 {¶ 40} “II. The Trial Court erred when it denied the defendant-appellant’s motion to compel and failed to hold a hearing or issue findings of fact or conclusions of law.” {¶ 41} The granting or denial of a motion to compel discovery is reviewed under an abuse-of-discretion standard. The inquiry is whether the trial court’s decision is unreasonable, arbitrary, or unconscionable. State ex rel. V. Cos. v. Marshall (1998), 81 Ohio St.3d 467, 469, 692 N.E.2d 198. {¶ 42} The trial court denied defendant’s motion to compel a mirror image forensic copy of Peer Spectre used in the investigation, any and all instruction/operation and/or training manuals associated with the software, and Peer Spectre’s source code. The court’s order instructed defendant to contact the software company regarding issues pertaining to the programming of Peer Spectre. {¶ 43} Defendant had urged the court to compel production of the information from the state pursuant to Crim.R. 16(B)(1)(c),3 which provided: {¶ 44} “(c) Documents and tangible objects. Upon motion of the defendant the court shall order the prosecuting attorney to permit the defendant to inspect and copy or photograph books, papers, documents, photographs, tangible objects, buildings or places, or copies or portions thereof, available to or within the possession, custody or control of the state, and which are material to the preparation of his defense, or are intended for use Amendments to Crim.R. 16 took effect on July 1, 2010 and now set forth 3 equivalent provisions in Crim.R. 16(B)(3). 17 by the prosecuting attorney as evidence at the trial, or were obtained from or belong to the defendant.” (Emphasis added.) {¶ 45} Defendant also cites to the provisions of Crim.R. 16, which require the production of mental examinations and scientific tests within the possession, custody or control of the state, evidence known or which may become known to the state that is favorable to defendant, and material relevant to either guilt or punishment. {¶ 46} The information sought by defendant is not a mental examination or scientific test and was not subject to production on that basis. While defendant speculates that the information may have been favorable to him in challenging the reliability of the software’s results, the state maintains that it did not have possession, custody or control of the information. The evidence supports the state’s position. Peer Spectre’s owner, Wiltse, averred in his affidavit that Peer Spectre is copyrighted, the source code is not distributed to anyone, and the use of Peer Spectre is restricted to trained law enforcement officers. Wilste averred that defendant could not discern how the software application used by the state operated without the source code. {¶ 47} Alternatively, the state contends the information is not material to the defense, and the release of the restricted use software would compromise a worldwide network of trained law enforcement personnel and possibly the database. {¶ 48} Defendant asserts that the information would enable him to challenge the reliability of the results of the software. However, the evidence establishes that an 18 expert would be unable to test the reliability of the software without the source code, which was not available to, or accessible by, the state. At least one federal court has denied a similar request for production of the FBI’s proprietary enhanced LimeWire program, finding that its production would not yield any information material to the defense, particularly because the source code was locked and, therefore, the expert could not discern how it operates. See United States v. Budziak (May 14, 2009), N.D.Cal. No. CR08-00284. That logic applies equally here. {¶ 49} Because the state was not in possession of the source code, and without it one cannot discern how the software operates, the trial court did not abuse its discretion by denying the motion to compel, and this assignment of error is overruled. {¶ 50} “III. The defendant-appellant’s right to due process of law as guaranteed by Article 1, Section 10 of the Ohio State Constitution and the Fourteenth Amendment to the United States Constitution was violated when he was sentenced to sixteen (16) years.” {¶ 51} “IV. The court’s imposition of consecutive sentences, without making appropriate findings and reasons as required by R.C. §2929.14, violated the defendant-appellant’s right to due process of law as guaranteed by Article I, Section 10 of the Ohio State Constitution and the Fourteenth Amendment to the United States Constitution.” {¶ 52} The third and fourth assignments of error are overruled. 19 {¶ 53} The two-fold analysis for reviewing sentences is first to determine whether the trial court complied with all applicable rules and statutes when imposing the sentence such that the sentence is not “clearly and convincingly contrary to law,” and if so, second, to examine if the trial court’s sentence constitutes an abuse of its discretion. State v. Kalish, 120 Ohio St.3d 23, 2008-Ohio-4912, 896 N.E.2d 124, ¶4. {¶ 54} Defendant contends his sentence is not supported by clear and convincing evidence and is contrary to law. He also argues that the trial court abused its discretion by imposing a 16-year sentence. {¶ 55} The trial court imposed the maximum sentence of eight years on 81 counts of the indictment. Then the court grouped the offenses into categories. The court segregated Counts 1 through 11, which involved images defendant made available for sharing, from Counts 12 through 81, which were based on images/videos found on defendant’s computer hard drive that depicted children involved in sexual acts. For all counts in each grouping, defendant received maximum but concurrent eight-year prison terms, however, the sentences in Counts 1 through 11 were to be served consecutively to the sentences in counts 12 through 81, for an aggregate term of 16 years in prison. The court then imposed a four year prison sentence for Counts 82 through 94, which involved images that depicted nude children but did not involve any sexual acts, and imposed a one-year prison term on the final count for possessing criminal tools, i.e., the computer. 20 The court ordered those sentences to be served concurrently with the 16-year prison term.4 {¶ 56} Defendant argues that the maximum sentence on 82 counts, as well as the imposition of consecutive sentences, was not supported by sufficient reasoning and does not comport with the purposes of felony sentencing set forth in R.C. 2929.11 and 2929.12. The court was not, and is not presently, required to make findings on the record prior to imposing maximum or consecutive sentences. State v. Foster, 109 Ohio St.3d 1, 2006-Ohio-856, 845 N.E.2d 470; State v. Hodge, 128 Ohio St.3d 1, 2010-Ohio-6320, 941 N.E.2d 768.5 Rather, the court is bound to consider Ohio’s felony sentencing statutes. Foster, 2006-Ohio-856; see, also, State v. Mathis, 109 Ohio St.3d 54, 62, 2006-Ohio-855, 846 N.E.2d 1. {¶ 57} In imposing its sentence, the court noted that it is “well-known the defendant has otherwise been a law-abiding, productive citizen.” The record reflects a long marriage to his wife and that they raised a daughter who is successful. Defendant’s wife, daughter, and others in their community continued to support him throughout these proceedings and advocated on his behalf at sentencing. According to the record, The sentencing order further addressed forfeiture specifications and terms of 4 postrelease control, which are not at issue in this appeal. We note that on September 30, 2011, amendments to Ohio’s sentencing law 5 will take effect. 21 defendant immediately commenced treatment, which he continued throughout the two years the matter was pending in the lower court, reportedly attending more than 100 meetings and participating in group and individual therapy. Defendant maintained gainful employment until his arrest, after which he sought and obtained new employment. The state emphasized the fact that defendant’s career was largely spent around young children as an aquatics instructor, suggesting this should be considered within the context of his offenses. The court noted that defendant had never been accused of engaging in the type of conduct depicted in the images he possessed or shared, and he could not be sentenced based upon potential future offenses. A polygraph test indicated that he had never molested any children. Defendant’s Static-99 score placed him in the lowest possible category for recidivism risk. Defendant cooperated with police, although the state insisted that he minimized his culpability by indicating the individuals involved were girls between 12 and 18, rather than younger. {¶ 58} The court emphasized that defendant’s conduct victimized the subjects of the child pornography every time the media is viewed, shared, or downloaded. Defendant recognized this harm, which he discussed during his allocution. Defendant stated he had an addiction, which escalated as he focused on younger and younger subjects. The court cited this admission during sentencing. Defendant acknowledged the heinous nature of the crimes, which was echoed by the state as well as the court. The state described other sexually explicit content found on defendant’s computer, including 22 96,000 photographs. Furthermore, the parties stipulated that the state was seeking sentencing regarding the 52 victims who formed the basis for defendant’s indictment. {¶ 59} The record establishes that defendant’s conduct was “relentless and ongoing” for a period of eight years until he was stopped by law enforcement intervention. With respect to the images found on defendant’s computer, the court expressed, “[e]verything you could possibly imagine occurred on this computer. And everything you could possibly imagine was shared with other individuals.” {¶ 60} Defendant asserts that his sentence is inconsistent with sentences imposed for similar crimes by similar offenders. He refers us to sentencing journal entries from other cases in this district where individuals convicted of multiple counts of pandering sexually-oriented matter involving a minor received lesser sentences than his, ranging from community control sanctions to four years in prison. According to defendant, all of those individuals were also indicted as a result of Operation Safety Net. However, these journal entries tell us little, if anything, of the offender characteristics and provide no information beyond the convictions and terms of the sentences. {¶ 61} On the other hand, our research has revealed that in at least one other case an individual who was indicted in the same investigation received the same 16-year sentence as defendant, which this court upheld. See State v. Cooper, Cuyahoga App. No. 93308, 2010-Ohio-1983, ¶19-21. 23 {¶ 62} Cooper was indicted following an investigation by Ohio’s ICAC, which indicated he was using file sharing software to access child pornography. Cooper, 2010-Ohio-1983, ¶4. Cooper pled guilty to four counts of pandering sexually-oriented material involving a minor and possessing criminal tools. Cooper also cooperated with the investigation and gave a statement to police. Similar to this case, Cooper’s ex-wife spoke on his behalf at sentencing, indicating that “he has been working hard to get help.” Cooper, like defendant, was actively involved in AA and was obtaining counseling prior to his sentencing. He expressed remorse for his behavior, which was noted as being “considerable.” While a similarly situated offender, Cooper was convicted of significantly fewer counts than defendant but still received a 16-year prison term. Defendant’s sentence was consistent with Cooper’s sentence. {¶ 63} We acknowledge that a 16 year prison term imposed on a first-time offender who has, by all accounts, led an otherwise productive, law abiding life is a harsh sentence and is perhaps not one that we may have imposed. Nonetheless, the sentence was significantly less than what the court could have imposed based on defendant’s 95 convictions. There was ample testimony in the record of the harm that has been, and continues to be, inflicted upon the victims who are the subjects of the material being viewed in these types of cases. The images, once uploaded, continue to circulate on the internet where individuals, like defendant, view them and make them available for viewing by others. The wide range of sentences that have been apparently imposed on 24 defendants convicted of similar offenses is the result of the discretion vested in the trial court. Defendant’s sentence was within the statutory range, lawful, and supported by the record, thus we cannot say it was unconscionable or otherwise an abuse of the trial court’s discretion. {¶ 64} The third assignment of error is overruled. {¶ 65} Judgment affirmed, and the case is remanded to correct the sentencing journal entry to accurately reflect defendant’s classification as a Tier II sex offender. It is ordered that appellee recover of appellant its costs herein taxed. The Court finds there were reasonable grounds for this appeal. It is ordered that a special mandate issue out of this Court directing the Common Pleas Court to carry this judgment into execution. The defendant's conviction having been affirmed, any bail pending appeal is terminated. Case remanded to the trial court for execution of sentence. A certified copy of this entry shall constitute the mandate pursuant to Rule 27 of the Rules of Appellate Procedure. JAMES J. SWEENEY, JUDGE MELODY J., STEWART, P.J., and FRANK D. CELEBREZZE, JR., J., CONCUR