Fourth Court of Appeals
San Antonio, Texas
OPINION
No. 04-12-00372-CR
Scott Edward WILSON,
Appellant
v.
The STATE of
The STATE of Texas,
Appellee
From the 175th Judicial District Court, Bexar County, Texas
Trial Court No. 2009CR12096
Honorable Lori I. Valenzuela, Judge Presiding
Opinion by: Karen Angelini, Justice
Concurring Opinion by: Rebeca C. Martinez, Justice
Sitting: Karen Angelini, Justice
Marialyn Barnard, Justice
Rebeca C. Martinez, Justice
Delivered and Filed: November 20, 2013
AFFIRMED
Scott Edward Wilson was charged with ten counts of possessing child pornography. After
being found guilty by a jury of all ten counts, he was sentenced by the trial court to four years
imprisonment and a $1500 fine, to run concurrently. On appeal he argues that (1) the evidence is
insufficient to support his convictions; (2) the trial court erred in not giving a limiting instruction
to the jury; (3) the trial court erred in instructing the jury that the images in the indictment were
children and thus commented on the weight of the evidence and reduced the State’s burden of
proof; and (4) the trial court erred in instructing the jury that the images in the indictment were
04-12-00372-CR
children and thus denied Wilson the right to a trial by jury under the Texas and U.S. Constitutions.
We affirm.
BACKGROUND
In 2008, Wilson and his wife, Sonja, were having marital problems. Wilson, however, did
not want a divorce because of religious reasons. At the time, Wilson and Sonja’s two children were
eleven and twelve years old. A computer used by all four members of the family (each with his or
her own profile) was in the converted-garage playroom. A book called “Cleaning Windows XP”
was found in the computer area. Sonja testified this book belonged to Wilson.
At trial, Sonja, a German citizen, testified that she met Wilson in Germany in 1992. In
1996, they had a daughter. In 1997, they married and had a son. They lived in Germany until 2000
when they moved to the United States. Sonja testified she and Wilson had a normal relationship
until Wilson purchased a computer. According to Sonja, Wilson started spending all his time in
their converted garage on the computer. He slept in the room and ate his meals there. He hung
towels and clothes so that the computer’s monitor could not be seen. Sonja testified, “When you
come into the room, he turned the screen in the corner where he was sitting so you couldn’t see it
when you come in that room what he was looking at.” According to Sonja, Wilson was addicted
to pornography. Because she was suspicious of him watching pornography on the computer, she
would attempt to see what Wilson was doing on the computer. However, because everyone in the
household (Wilson, Sonja, and their two children) had their own profiles and because she did not
know Wilson’s password, she would wait until Wilson had left to go to the bathroom or until
Wilson left the computer without logging off, and then she would check to see what he was doing
by looking into the internet history. On the evening of Monday October 27, 2008, while Wilson
was in the bathroom, Sonja checked the computer to see what he had been doing. She found in the
internet history images of what she believed were children not older than her own children
-2-
04-12-00372-CR
performing sexual acts. When she confronted Wilson, he told her that it must have been caused by
a virus, stating the children must have been clicking on websites. Sonja then called the police.
When the officers asked if she knew Wilson’s password, Sonja testified she told the police that
she did not. While the police were there, she looked in a folder where Wilson kept his passwords.
According to Sonja, “he had so many passwords in that folder” and would change his passwords
all the time. By clicking on a password hint, she was able to figure out which password was correct.
She then gave consent for the police to seize and search the computer. Sonja testified that she did
not download the images at issue onto the computer, nor has she ever looked at pornography on
the computer.
Jose Andrade, a police officer with the San Antonio Police Department, testified that he
responded to a call regarding child pornography on October 27, 2008. After separating Sonja and
Wilson, he and another officer followed Sonja into the converted garage where the computer was
located. Sonja showed him the pornographic images on the computer. According to Andrade, some
of the images appeared to be children under the age of eighteen.
Alicia Pardue, a crime scene technician testified that she was called to Wilson’s home on
October 27, 2008, and took photographs of the computer’s screen, which showed pornographic
images. She took photographs of the computer’s screen to document the history on the computer
and the images themselves. She scrolled down the computer screen and then took photographs of
the images on the computer. These photographs she took of the monitor’s screen, which depicted
about eighty-eight images, were admitted in evidence.
Michael Stark, a detective investigator with the technical investigations unit, computer
crimes detail, testified that he performed an analysis on the computer found in Wilson’s home. He
found hundreds of pictures of pornography, most of which were images of adult pornography. His
report was admitted in evidence. Stark testified that based on his experience over the last twelve
-3-
04-12-00372-CR
years of working on child pornography cases, he was able to pick through the images and choose
images that were of very young males and females. Stark testified that the images related to the
indictments were found in the temporary internet history under Wilson’s profile. He also testified
regarding when the images at issue were created on the computer according to the computer’s set
time of Pacific Standard Time:
• The image related to Count I was created on October 26, 2008, at 7:10:44 a.m.
• The image related to Count II was created on October 26, 2008, at 1:21:36 p.m.
• The image related to Count III was created on October 26, 2008, at 1:21:31 p.m.
• The image related to Count IV was created on October 26, 2008, at 3:11:05 p.m.
• The image related to Count V was created on October 26, 2008, at 7:51:06 a.m.
• The image related to Count VI was created on October 26, 2008, at 1:10:55 p.m.
• The image related to Count VII was created on October 26, 2008, at 1:19:30 p.m.
• The image related to Count VIII was created on October 26, 2008, at 3:17:04 p.m.
• The image related to Count IX was created on October 26, 2008, at 1:19:46 p.m.
• The image related to Count X was created on October 26, 2008, at 1:10:58 p.m.
Stark found no images created before October 22, 2008. He explained that “[e]verything you do
on the internet is stored in a temporary internet [cache] under a specific profile.” However, the
temporary internet cache is limited to a certain number of bytes on a hard drive that can be set by
the user. So, when that limit is reached, the computer overwrites it with new data. A user can also
clear the temporary internet cache. Stark also testified that a user of the computer can change the
computer’s clock, which would change all the recording times for the creation dates of files.
According to Stark,
-4-
04-12-00372-CR
Whatever the date and the time is at the time – whatever date and time that’s set on
the computer at the time an image is downloaded is the date and time stamp that
the computer is going to give that picture that it was put on that specific computer.
On January 21, 2009, Wilson submitted to a voluntary, noncustodial interview with
Detective Angel Castello. The interview was videotaped and admitted in evidence. During the
interview, Wilson admitted to looking at adult pornography on the computer. He said that while
he was looking at adult pornography, every once in a while a picture of an underage child would
pop up and he would quickly “back out.” He noted that this would happen specifically with a
certain Russian website. He admitted that he could tell the people depicted in these types of images
were underage. The youngest he could recall seeing on an image was a girl who looked to be about
twelve years old. He first stated that he just clicked on the image to “verify” that it was indeed an
image of an underage girl – “just to verify that this really could be what I think it might be.” When
Wilson was told how many images were found on the computer and asked why he would need to
keep verifying images, Wilson stated, “different girl, just because one girl looked [underage],
maybe the next one is older.” Wilson then stated that he clicked on the images of underage girls
because he was “curious” – “Could this be what I think it might be?” “Like, wow, I can’t believe
that really happens.” According to Wilson, he was sexually abused by a teenage girl as a child and
clicked on the images “just to see that this stuff is out there.” Wilson explained that he was curious
about the fact that “pictures like that were really out there.” He wondered if the children in the
pictures felt like he did when he was abused as a child. He spoke of seeing an image of an underage
girl on the Russian website: “The Russian girls – I think that is the worst case scenario of what I
have seen.” He spoke of certain images he saw on the Russian website, “With some of the Russian
girls that were nude . . . this [image] is getting really close to, you know, and I am not feeling too
cool about this, and she is naked, and she probably is, you know, twelve years old and, you know
what, poor kid, you know, I know how it feels –get out of here, you know what I’m saying.” At
-5-
04-12-00372-CR
the end of the interview, Detective Castello asked Wilson, “Do you think this ever occurred . . .
the images being on your computer?” “Yeah, I saw them.” Wilson repeated that he did not seek
out child pornography, but he admitted that he looked at images of underage children about ten
times, recognizing that he probably got into areas he should not have and that he “was curious
about it,” but then he “got out.”
Wilson’s daughter also testified about Sunday October 26, 2008, the day the images were
created on the computer according to the computer’s set time. On October 26, 2008, Wilson’s
daughter was twelve years old. She testified that on that day, she thought she, her father, and her
brother went to church. She thought that they went to Whataburger to eat breakfast before church,
which started at 9:30 a.m. Wilson’s daughter testified that church was over around “11:30, 12.”
She believed that she had a project to do for school and that after church, they went to Hobby
Lobby and some other store to get supplies. She testified that she believed that they then ate lunch
at Subway. She testified that when they came home, it was still daylight and they worked on her
project. She, her brother, and her father then went back to church for a second service at “5, 5:30.”
She also testified that about six months previous to the incident at issue, her mother and father had
gotten into an argument about adult pornography found on her user profile on the computer. She
told her mother later that she was the one to blame. She had been typing in Google a game to play
when a website came up. When she clicked on it, pornographic pictures popped up.
On cross examination, Wilson’s daughter testified that it was normal practice for her, her
father, and her brother to go to church on Sundays, and although she remembered “that weekend,”
“a week before her project was due,” she “didn’t know the exact date.” She admitted that she did
not remember when exactly her project was due. She did not “know for sure” if that weekend was
the weekend of October 26, 2008.
-6-
04-12-00372-CR
Wilson testified in his own defense. He testified that Detective Castello never showed him
the images the police were accusing him of having on his computer. He admitted he told Detective
Castello that he might have accidently gone on a website that had child pornography. He testified
that he is “not computer savvy” and he did not “know how some of them got on there.” “All I
know is I didn’t do it.” He testified that the accidental images he stumbled upon occurred “maybe
early 2008, 2007,” but they were not the images found between October 22, 2008 and October 27,
2008. He admitted to having viewed adult pornography on the computer – “not every day,” “not
every week,” “not every month,” “but there were times when I did do it.” Wilson testified that on
Sunday October 26, 2008, he went to church with his two kids. According to Wilson, church begins
at 9:30 a.m. and they went to breakfast at Whataburger before church. So, he estimated that he, his
daughter, and his son left around 8:30 a.m. or 8:45 a.m. Wilson testified a Bible class was at 9:30
a.m. and then the service began at 10:30 a.m. According to Wilson, church would typically end
between 11:45 and noon. Wilson testified that after church on October 26, 2008, his daughter’s
friend wanted to come over to visit, so he drove to the daughter’s friend’s house so that the friend
could change clothes. They then went home, and Wilson began watching football. He turned on
the computer to check football scores. The kids then said they were hungry, so Wilson took them
to Subway. They then went shopping for supplies for his daughter’s school project. He believed
that they got home around 3:45 p.m. While he was gone, he had left his computer open on the
website where the football scores had been posted. They then went back to church around 4:30
p.m. and arrived back at home around 6:30 p.m. He and his son then worked on the science project
(which was for his daughter) until 10 p.m. or 11:00 p.m. The next day, Monday October 27, 2008,
he went to the bathroom and when he came out, his wife began accusing him of having child
pornography on his computer. She called the police and would not let him near the computer.
-7-
04-12-00372-CR
SUFFICIENCY
In his first and second issues, Wilson argues that the evidence is insufficient to support his
convictions for possessing child pornography. In a federal due-process evidentiary-sufficiency
review, we view all the evidence in the light most favorable to the verdict to determine whether
any rational trier of fact could have found the essential elements of the crime beyond a reasonable
doubt. Jackson v. Virginia, 443 U.S. 307, 319 (1979); Adames v. State, 353 S.W.3d 854, 860 (Tex.
Crim. App. 2011), cert. denied, 132 S. Ct. 1763 (2012). The court of criminal appeals has explained
that this standard “recognizes the trier of fact’s role as the sole judge of the weight and credibility
of the evidence after drawing reasonable inferences from the evidence.” Adames, 353 S.W.3d at
860. Therefore, on appellate review, we determine whether based on “cumulative force of all the
evidence” the necessary inferences made by the trier of fact are reasonable. Id. We conduct this
constitutional review by measuring the evidentiary sufficiency with “explicit reference to the
substantive elements of the criminal offense as defined by state law.” Id.
Under Texas law, a person commits the offense of possession of child pornography if
(1) the person knowingly or intentionally possesses visual material that visually depicts a
child younger than 18 years of age at the time the image of the child was made who is
engaging in sexual conduct; and
(2) the person knows that the material depicts the child as described by Subdivision (1).
TEX. PENAL CODE ANN. § 43.26(a) (West Supp. 2012). Possession is defined by the Penal Code as
“actual care, custody, control, or management.” Id. § 1.07(a)(39).
Wilson first argues there is insufficient evidence that he possessed the images at issue. He
emphasizes that he was not in exclusive possession of his computer and contends that there is no
evidence affirmatively linking him to the images found on his family’s computer. We disagree.
When contraband is not found on a person or is not in a location that is under the exclusive
control of a person, mere presence at the location where the contraband is found is insufficient by
-8-
04-12-00372-CR
itself to establish actual care, custody, or control of the contraband. See Evans v. State, 202 S.W.3d
158, 162 (Tex. Crim. App. 2006). However, presence or proximity, when combined with other
evidence, either direct or circumstantial (e.g. “links”), may be sufficient to establish possession
beyond a reasonable doubt. Id. Evidence that links the defendant to the contraband suffices for
proof that he possessed it knowingly. Brown v. State, 911 S.W.2d 744, 747 (Tex. Crim. App.
1995); Santiesteban-Pileta v. State, No. 10-12-00154-CR, 2013 WL 3122431, at *1 (Tex. App.—
Waco June 20, 2013, pet. ref’d). It is not the number of links that is dispositive, but rather the
logical force of all of the evidence, direct and circumstantial. Evans, 202 S.W.3d at 162. This
“affirmative links” rule protects the innocent bystander from conviction merely because of his or
her fortuitous proximity to someone else’s contraband. Id.
In Wise v. State, 364 S.W.3d 900, 904 (Tex. Crim. App. 2012), the Texas Court of Criminal
Appeals noted the “peculiarities of determining knowing or intentional possession of computer
pornography.” In reviewing cases from other jurisdictions, the court of criminal appeals explained
that other courts have generally taken “two approaches to framing sufficiency analysis in cases
involving child-pornography images discovered in a computer’s cache or free space.” 1 Id.
The court of criminal appeals explained that courts in jurisdictions using the first approach,
termed a “present-possession approach,” analyze the sufficiency of the evidence to determine
whether a defendant had the knowledge and ability to access the files in their present format. Id.
1
Here, the images at issue were found under Wilson’s user profile in the cache.
A cache (pronounced ‘cash’) is a storage mechanism designed to speed up the loading of Internet
displays. When a computer user views a webpage, the web browser stores a copy of the page on the
computer’s hard drive in a folder or directory. That folder is known as the cache, and the individual
files within the cache are known as temporary Internet files. When the user later returns to a
previously visited webpage, the browser retrieves the cached file to display the webpage instead of
retrieving the file from the Internet.
Wise, 364 S.W.3d 904 n.3 (quoting Ty E. Howard, Don’t Cache Out Your Case: Prosecuting Child Pornography
Possession Laws Based on Images Located in Temporary Internet Files, 19 BERKELEY TECH. L. J. 1227, 1229-30
(2004)).
-9-
04-12-00372-CR
In contrast, courts in those jurisdictions using the second approach do not consider whether a
defendant had the knowledge and ability to access the files in their present format. Id. Instead,
those courts would hold evidence of child pornography found in a computer cache to be sufficient
to support a conviction because “the presence of the images in the cache is evidence that, at some
earlier point, a defendant knowingly or intentionally possessed the images by viewing them
online.” Id. at 905. Under this second approach, “a defendant need not be aware that the image
continued to exist on the computer, and the present accessibility of the image is not pertinent.” Id.
“Instead, the pertinent inquiry is whether a defendant had knowingly or intentionally possessed a
pornographic image at a prior point in time.” Id.
After considering both approaches, the court of criminal appeals concluded that
“[a]lthough these two general approaches are instructive in explaining the difficulties of
establishing criminal intent in the possession of computer pornography,” “each case must be
analyzed on its own facts.” Id. Thus, the court held that in computer-pornography cases, “like all
criminal cases, a court must assess whether the inferences necessary to establish guilt are
reasonable based upon the cumulative force of all the evidence considered in the light most
favorable to the verdict.” Id.
The court of criminal appeals then considered whether there was sufficient evidence to
support the appellant’s conviction for possession of child pornography found in the “free space”
of appellant’s computer. Id. at 902. The court of appeals had reversed the appellant’s conviction,
holding that the State had failed to prove that the appellant knowingly or intentionally possessed
the images because the images could possibly have gotten on the hard drive innocently without
appellant having ever seen or accessed them. Id. At the court of criminal appeals, the State
criticized the court of appeals for erroneously applying the “reasonable hypothesis analytical
construct,” which was rejected by the court of criminal appeals in Geesa v. State, 820 S.W.2d 154,
- 10 -
04-12-00372-CR
156 (Tex. Crim. App. 1991). 2 The court of criminal appeals agreed with the State that the court of
appeals had erroneously focused on two alternative hypotheses that the images could have been
placed on the computer without appellant’s knowledge either through (1) a virus; or (2) a previous
owner of the computer. Wise, 364 S.W.3d at 905.
With regard to a virus, the court of criminal appeals noted that while the State’s computer
expert acknowledged there were several viruses on the computer and that some viruses are capable
of placing images on a computer without a user’s knowledge, the expert also testified that it was
unlikely the presence of viruses would explain the presence of the images in the free space of a
computer. Id. at 905-06. Thus, the court of criminal appeals criticized the court of appeals for
“credit[ing] appellant’s suggestion that viruses on his computer could have placed the images
there,” explaining that “[b]ecause the placement of a pornographic image on the free space of a
computer would be inconsistent with the purpose for placing a virus on a computer, the jury could
have reasonably disregarded that explanation for the presence of the images.” Id. at 906.
With regard to prior owners of the computer, the court of criminal appeals explained “the
court of appeals erred by crediting appellant’s suggestion that the images could have been placed
on the computer by a prior owner of the computer and finding that to be an alternative hypothesis
inconsistent with guilt.” Id. Although the testimony that appellant bought the computer at a flea
market was uncontroverted, the jury could reasonably reject the testimony. Id. The court explained
that “[u]ncontroverted evidence does not necessarily equate to credible evidence, particularly
when the State could not readily controvert the evidence because of the lack of detail.” Id.
2
In Geesa, 820 S.W.2d at 156, the court of criminal appeals held that for the evidence to be sufficient to support a
conviction, the State need not disprove all reasonable alternative hypotheses that are inconsistent with the defendant’s
guilt. Rather, the court of criminal appeals explained that a court should consider only whether the inferences necessary
to establish guilt are reasonable based upon the cumulative force of all the evidence when considered in the light most
favorable to the verdict. See Wise, 364 S.W.3d at 903 (discussing Geesa).
- 11 -
04-12-00372-CR
Therefore, the court of criminal appeals held that “[b]y focusing on the alternative
hypotheses premised on the possibility of viruses or a prior owner placing the images on the free
space of the computer, the court of appeals used a sufficiency standard that [was] abrogated by
[this] Court” in Geesa. Wise, 364 S.W.3d at 906. The court of criminal appeals also explained that
the court of appeals “erred by implicitly examining the evidence in the light favorable to appellant,
focusing on the fact that he could not access the images in the free space of the computer and the
absence of computer evidence to establish exactly when the images were placed on, accessed, or
deleted from the computer.” Id. The court of criminal appeals explained that the court of appeals
should have viewed the evidence in the light favorable to the verdict. Id. Viewing the evidence in
the appropriate light, the court of criminal appeals held a jury “could have reasonably rejected
appellant’s claims that the images were due to a virus or former computer owner and instead
determined that appellant had a history of and present sexual attraction to children and that he
intended to possess the pornographic images of the children that were in the free space of his
computer.” Id. at 907-08.
Here, Wilson emphasizes that his former wife had access to the family’s computer, that she
had figured out his password, and that she had a motive for placing the images on the computer as
Wilson was refusing to give her a divorce. Wilson also points to the time-stamp of the images on
the computer and argues that he was not present at home when the images were viewed but was
instead at church and shopping with his children. However, in making this argument, Wilson is
asking this court to focus on an alternative hypothesis and view the evidence in the light most
favorable to him, not to the verdict. As explained, pursuant to Geesa, 820 S.W.2d at 156, the State
need not disprove all reasonable alternative hypotheses that are inconsistent with the defendant’s
guilt. Thus, we do not focus our inquiry on the alternative hypothesis of Wilson’s former wife
possibly being responsible for the images found in the cache under Wilson’s profile. See Wise, 364
- 12 -
04-12-00372-CR
S.W.3d at 906. Instead, we view all the evidence in the light most favorable to the jury’s verdict
and determine whether a jury could have reasonably rejected Wilson’s claim that the images were
due to his former wife and could have instead determined that Wilson intended to possess the
pornographic images of the children found in the computer’s cache under his user profile. See id.
at 907-08.
In looking at all the evidence in the light most favorable to the verdict, a reasonably jury
could have rejected Wilson’s argument that his former wife was responsible for the images and
could have instead determined that Wilson intentionally and knowingly possessed the images.
There was evidence at trial that (1) the images were found under Wilson’s profile; (2) Wilson’s
profile was password protected; (3) Wilson had moved into the room where the computer was
located and was sleeping in the room; (4) Wilson was addicted to pornography and started acting
differently after the family purchased a computer; (5) Wilson placed towels and clothing around
the computer so that one could not see the computer’s monitor; (6) Wilson would try to prevent
anyone from viewing the computer’s monitor; and (7) Wilson owned a book about how to “clean”
his computer. Most importantly, there was Wilson’s own videotaped interview with police where
he admitted that he had viewed, at least ten times, images he knew were child pornography on his
computer. During the interview, he first claimed to the officer that he had inadvertently viewed
images and would quickly “back out” when he saw something questionable. Then, he stated that
he just clicked on the images to “verify” that they were of underage children. When he was told
how many images were found on the computer, Wilson stated that he had viewed images he knew
were of underage children because he was “curious.” Then, he stated he looked at the images out
of sympathy for the children. He spoke in particular of a Russian website where he saw underage
girls and admitted to having continued to look at images on the website even after seeing underage
images because the next image may not be one of an underage girl.
- 13 -
04-12-00372-CR
With regard to whether his former wife was one who placed the images on the computer,
the jury could have believed his former wife’s testimony and rejected Wilson’s testimony. The
jury could have reasonably believed his former wife’s testimony that she found the images in
Wilson’s temporary internet history while Wilson was in the bathroom and that she figured out his
password only once the police arrived. As to the computer’s time-stamp of the images, there was
testimony that a user can change the clock on the computer. Thus, the jury could have reasonably
concluded that the time of creation of the images on the computer did not necessarily correspond
to real time. Finally, the jury could have reasonably rejected Wilson’s testimony that he was not
present when the images were viewed on the computer. The jury could have further reasonably
rejected his daughter’s testimony. His daughter testified that she really was not sure if the events
she remembered occurred on the weekend in question. See Wise, 364 S.W.3d at 906 (explaining
that “[u]ncontroverted evidence does not necessarily equate to credible evidence”). In looking at
all this evidence in the light most favorable to the verdict, a jury could have reasonably inferred
that Wilson knew about the child pornography on his computer and was in possession of it.
We note that Wilson cites United States v. Moreland, 665 F.3d 137 (5th Cir. 2011), for
support. However, Moreland is factually distinguishable from this case. In Moreland, 665 F.3d at
140, the Fifth Circuit considered whether the evidence was sufficient to rationally support a jury
finding beyond a reasonable doubt that the appellant knowingly possessed images found on two
computers in the computers’ disk slack space. 3 The two computers were owned by appellant and
his wife, and were used by appellant, his wife, and appellant’s terminally ill father. Id. Appellant’s
3
The Fifth Circuit explained that “[d]eleted files are not wholly removed from the computer.” Moreland, 665 F.3d at
142. “A deleted file is marked as unallocated file space, which allows that file to be overwritten by new files.” Id. “A
computer’s deleted files make up what is known, in this case, as the disk slack space.” Id. “A knowledgeable forensic
investigator may use forensic software to search for, recall, and view the contents of the unallocated file space.” Id.
“This process is known as ‘restoring’ a deleted, but not yet overwritten, file.” Id.
- 14 -
04-12-00372-CR
terminally ill father slept in the living room and frequently used the computers late at night while
appellant and his wife were sleeping, and during the day while appellant was at work. Id.
Appellant, his father, and his wife all had access to, and free use and control of appellant’s
username, password, and Yahoo! account on both computers. Id. Appellant’s father was never
interviewed or investigated by police before his death in January 2008. Id. In May 2008, appellant
was indicted with knowing possession of child pornography and was later convicted by a jury. Id.
In viewing all the evidence, the Fifth Circuit held that the evidence was insufficient for a
rational juror to have concluded that appellant knowingly possessed child pornography. Id. at 154.
The officer who testified about the two computers was not offered, qualified, or accepted as an
expert in child pornography or in forensic computer technology. Id. at 144. “Because of the lack
of information in the computers, [the officer] said he could not testify as to where the images had
come from, when they were received or deleted, or who was operating the computer at those times;
also, he testified that he could not express an opinion as to whether any particular image was child
pornography.” Id. The officer could not recover information pertaining to where the images had
come from or when they entered the computer. Id. at 145. The officer did find usage patterns
showing that a user of the computers in 2007 had visited a website that might have contained child
pornography shortly after or shortly before visiting the Yahoo! website where the user checked
email or played dominoes. Id. at 145-46. Appellant’s wife testified that appellant “was always
logged on” from both computers to his Yahoo! account on the internet. Id. at 146. Thus, she did
not need a password to access his account, and she used his Yahoo! email account to check and
send email. Id. She testified that appellant “had the same password for everything” and she knew
the password. Id. Both appellant and his wife testified that they had never looked at child
pornography and that appellant’s father would use the computers late at night while they were
sleeping and would log in under appellant’s name. Id. Appellant’s brother testified that when
- 15 -
04-12-00372-CR
appellant’s father learned the computers were being searched for child pornography, appellant’s
father asked him to bring the computer owned by appellant’s father to the residence he was staying.
Id. at 147. Appellant’s father then asked appellant’s brother to destroy the computer. Id.
Appellant’s brother refused and testified that as far as he knew, his father destroyed the computer.
Id. The wife of appellant’s brother corroborated this story. Id. Both appellant’s brother and the
wife of appellant’s brother testified that after appellant’s father died, they cleaned out his house
and found a large amount of pornographic material. Id.
In holding the evidence was insufficient, the Fifth Circuit emphasized that the only
evidence in support of appellant possessing child pornography was the fact that the images were
found on his profile. See id. at 151-53. However, the evidence showed that everyone in the home
used appellant’s profile. See id. at 151-52. Further, there was strong evidence that appellant’s father
was the perpetrator. See id. Unlike in Moreland, in this case there was evidence that (1) Wilson
was living and sleeping in the room where the computer was located; (2) Wilson’s profile was
password protected; (3) Wilson was addicted to pornography and started acting differently after
the family purchased a computer; (4) Wilson placed towels and clothing around the computer so
that one could not see the computer’s monitor; (5) Wilson would try to prevent anyone from
viewing the computer’s monitor; (6) Wilson owned a book about how to “clean” his computer;
and (7) in his videotaped statement to police, Wilson admitted he had viewed child pornography
on the computer.
Wilson next argues there is insufficient evidence that the images were actually of children
under eighteen years of age or that he knew the images depicted children under eighteen years of
age. First, the images themselves constitute evidence from which a rational juror could have
concluded beyond a reasonable doubt that the images depicted children less than eighteen years of
age. The Texas Penal Code does not require expert testimony to determine a child’s age in a
- 16 -
04-12-00372-CR
possession of child pornography case. Section 43.25(g) provides that when it becomes necessary
for purposes of section 43.26 to determine whether a child who participated in sexual conduct was
younger than eighteen years of age, the court or jury may make such a determination by any of the
following methods:
(1) personal inspection of the child;
(2) inspection of the photograph or motion picture that shows the child engaging in the
sexual performance;
(3) oral testimony by a witness to the sexual performance as to the age of the child based
on the child’s appearance at the time;
(4) expert medical testimony based on the appearance of the child engaging in the sexual
performance; or
(5) any other method authorized by law or by the rules of evidence at common law.
TEX. PENAL CODE ANN. § 43.25(g) (West 2011) (emphasis added).
The images at issue have been filed under seal in this Court. After viewing these images,
we conclude that the jury could have reasonably found beyond a reasonable doubt that the images
depicted underage children. Moreover, in his videotaped interview with police, Wilson admitted
that he knew certain images he had viewed on his computer were of children less than eighteen
years of age. Lastly, Detective Stark testified that based on his twelve years of experience working
on child pornography cases, he determined that the images were of “very young males and
females.” Thus, the jury could have rationally concluded that the images were of children less than
eighteen years of age and that Wilson knew they were less than eighteen years of age.
OTHER IMAGES ADMITTED IN EVIDENCE
Wilson also argues that the trial court erred in admitting images in addition to those
described in the indictment into evidence without giving a limiting instruction. Wilson emphasizes
that when evidence of extraneous offenses are admitted for a limited purpose, a defendant is
entitled, upon timely request, to an instruction by the trial court to the jury limiting the jury’s
consideration of the extraneous offenses to those purposes for which they are admitted. The State
- 17 -
04-12-00372-CR
responds that Wilson has not preserved this issue for review because when he made the request,
the trial court was not admitting the evidence for a limited purpose.
When the State first offered the images, defense counsel objected based on relevancy and
Rule 403. 4 After a discussion, the following occurred:
Court: In light of what – in light of my objection to – or excuse me, my overruling
your objection to relevancy, in light of what the State has proffered is going to be
testimony offered.
Defense: And as we said –
Court: Evidence offered, I should say.
Defense: -- the 403 balancing test, you also denied that, and are going to – and then
you’re admitting it for all purposes. If you’re admitting it for a limited purpose,
then we would ask for an instruction to the jury.
Court: Okay. And I’m not doing that at this point.
(emphasis added). Thus, according to the trial court, at that point in the proceedings, it was
admitting the images for all purposes, not just for a limited purpose. Wilson has made no complaint
on appeal about the trial court admitting the images for all purposes or that the images were
inadmissible pursuant to Texas Rule of Evidence 403. Further, we note that in his statement of the
issue, Wilson refers to “testimony regarding appellant’s addiction to adult pornography” being
admitted without a limiting instruction. However, Wilson never explains in his brief what
testimony he is referring to or where in the record he made a request for a limiting instruction with
regard to such testimony. See TEX. R. APP. P. 33.1; 38.1(i). Finally, we note that the additional
photographs at issue were same transaction contextual evidence. See Delgado v. State, 235 S.W.3d
244, 253 (Tex. Crim. App. 2007). And, the court of criminal appeals has held that a limiting
4
Defense counsel never objected pursuant to Texas Rule of Evidence 404(b).
- 18 -
04-12-00372-CR
instruction is not required when evidence is admitted as same-transaction contextual evidence. See
Devoe v. State, 354 S.W.3d 457, 471 (Tex. Crim. App. 2011).
JURY CHARGE
In his fourth and fifth issues, Wilson argues that the trial court, in its charge, commented
on the weight of the evidence by instructing the jury that the images in the indictment were of
children. The State responds that the trial court did not comment on the weight of the evidence as
the application paragraph clearly first instructed the jury “if you find from the evidence beyond a
reasonable doubt that” and then just tracked the language of the indictment. For example, Count I
of the indictment alleged the following:
on or about 27th Day of October 2008 SCOTT EDWARD WILSON, hereinafter
referred to as defendant, did intentionally and knowingly possess visual material
that visually depicted, and which the defendant knew visually depicted a child, who
was younger than 18 years of age at the time the image of the child was made,
engaging in sexual conduct, to wit: actual sexual intercourse, namely, Documents
and Settings\scott\Local Settings\Temporary Internet
Files\content.IE5\UX@JQF6Z\qI1986[1].jpg, which depicts a nude female child
with her legs spread sitting on a male’s groin.
The application paragraph of the jury charge provided the following with respect to Count I:
Now, if you find from the evidence beyond a reasonable doubt that on or about the
27th Day of October 2008, in Bexar County, Texas, the defendant, Scott Edward
Wilson, did intentionally or knowingly possess visual material that visually
depicted, and which the defendant knew visually depicted, a child, who was
younger than 18 years of age at the time the image of the child was made, engaging
in sexual conduct, to wit: actual sexual intercourse, namely, Documents and
Settings\scott\LocalSettings\Temporary internet
Files\content.IE5\UX2JQF6Z\qI986[1].jpg which depicts a nude female child with
her legs spread sitting on a male groin, then you will find the defendant guilty of
Possession of Child Pornography as charged in Count I of the indictment. If you
do not so believe, or if you have reasonable doubt thereof, you will find the
defendant not guilty in Count I of the indictment.
(emphasis added).
At the charge conference, defense counsel stated the following:
- 19 -
04-12-00372-CR
Your Honor, I’m concerned about some of the language on pages four through
thirteen. Each one of the charge that lists out the charge – the offense, right after
the line right after the long series of numbers and letters it says: which depicts a
nude female child. Well, the fact that [] either [it] is or isn’t a child is certainly one
of the major issues in this case. And even though I know that is the language that’s
taken off the indictment, it appears that the way it’s framed here and the flow of the
information appears to be a judgment by the Court stating that this is definitely a
child. Either I would ask that the word child be deleted from that in each of the
paragraphs or that we have some sentence after that stating that the use of the word
child in the previous paragraph does not indicate any judgment by the Court or any
intent to tell you that it is definitely a photo of a child. That that is for the jury to
decide.
The trial court overruled the defense’s objection and denied the defense’s request for an
instruction. On appeal, Wilson argues that the language “which depicts a nude female child” was
an improper comment by the trial court that the image was of a child.
Article 36.14 of the Texas Code of Criminal Procedure requires that a trial court provide a
jury charge “distinctly setting forth the law applicable to the case” and must not express “any
opinion as to the weight of the evidence.” TEX. CODE CRIM. PROC. ANN. art. 36.14. The charge
must contain an accurate statement of the law and must set out all the essential elements of the
offense. Dinkins v. State, 894 S.W.2d 330, 339 (Tex. Crim. App. 1995). A charge that “assumes
the truth of a controverted issue” is an improper comment on the weight of the evidence. Whaley
v. State, 717 S.W.2d 26, 32 (Tex. Crim. App. 1986).
Here, the application paragraph instructed the jury to first find every fact listed beyond a
reasonable doubt: “Now, if you find from the evidence beyond a reasonable doubt that ....” See
Coplin v. State, 585 S.W.2d 734, 736 (Tex. Crim. App. [Panel Op.] 1979) (holding that a jury
charge that tracked the language of the indictment after the phrase “if you find and believe” was
not a comment on the weight of the evidence). Additionally, using the word “child” was not a
comment on the weight of the evidence, as section 43.26(a) of the Penal Code provides that a
person commits an offense if he knowingly or intentionally possesses visual material that “visually
- 20 -
04-12-00372-CR
depicts a child younger than 18 years of age.” See TEX. PENAL CODE ANN. § 43.26(a) (West Supp.
2012) (emphasis added). In Casey v. State, 215 S.W.3d 870 (Tex. Crim. App. 2007), the court of
criminal appeals held that an application paragraph, which used the word “victim” but tracked the
language of the relevant statute, was not a comment by the trial court on the evidence. In Casey,
the application paragraph provided,
Now if you find from the evidence beyond a reasonable doubt that . . . [appellant],
acting alone or as a party, did . . . knowingly or intentionally cause penetration of
the female sexual organ of [K.T.], without the consent of [K.T.], by . . . the sexual
organ of [appellant], and [appellant], acting alone or as a party, did administer or
provide a drug, namely: [GHB] to [K.T.], the victim of the offense, with the intent
of facilitating the commission of the offense, then you will find the defendant guilty
of aggravated sexual assault, as charged in the indictment.
Id. at 886 (alterations in original). The court of criminal appeals noted that section
22.021(a)(1)(A)(i)(2) provides that a person commits aggravated sexual assault if he “administers
or provides flunitrazepam, otherwise known as rohypnol, [GHB], or ketamine to the victim of the
offense with the intent of facilitating the commission of the offense.” Id. (emphasis in original).
Thus, the charge in using the term “victim” was tracking the language of the statute. Id. at 886-87.
The court was “not persuaded that the charge as written assumed the truth of a controverted issue
or that the appearance of the word ‘victim’ in the charge without the modifier ‘alleged’ is a
comment by the trial court which assumes the truth of a controverted issue – the issue of consent.”
Id. at 887 (quotations omitted). Thus, the court of criminal appeals concluded that “[b]ecause the
jury charge tracked the language of the statute, the trial court did not abuse its discretion by
including the word ‘victim’ in the charge.” Id.
Finally, the phrase complained of by Wilson merely described the visual material at issue
and tracked the language of the indictment. Generally, an application paragraph that tracks the
pertinent language of the charging instrument is permissible. See Andrews v. State, 652 S.W.2d
370, 374 (Tex. Crim. App. 1983). In looking at the paragraph as a whole, it is clear the complained
- 21 -
04-12-00372-CR
of phrase was merely describing the image and was not a comment by the trial court that the image
depicted a child.
CONCLUSION
For the reasons explained, we affirm the judgments of the trial court. 5
Karen Angelini, Justice
Publish
5
After Wilson’s counsel filed a brief on appellant’s behalf, Wilson filed a pro se brief raising additional points of
error. We do not address these points because Wilson has no right to hybrid representation. See Marshall v. State, 210
S.W.3d 618, 620 n.1 (Tex. Crim. App. 2006); Scheanette v. State, 144 S.W.3d 503, 505 n.2 (Tex. Crim. App. 2004).
- 22 -