IN THE COURT OF CRIMINAL APPEALS OF TENNESSEE
AT NASHVILLE
Assigned on Briefs November 12, 2015
JARED S. AGUILAR v. STATE OF TENNESSEE
Appeal from the Circuit Court for Montgomery County
No. 41100542 Ross H. Hicks, Judge
No. M2015-00430-CCA-R3-PC – Filed December 30, 2015
_____________________________
Jared S. Aguilar (―the Petitioner‖) filed a Petition for Post-Conviction Relief alleging
ineffective assistance of counsel. After a hearing, the post-conviction court denied relief.
On appeal, the Petitioner argues that trial counsel rendered ineffective assistance of
counsel when she (1) decided not to obtain the services of an expert witness for the
defense without consulting the Petitioner and (2) ignored the Petitioner‘s specific request
that she cross-examine the State‘s experts ―on areas such as the contradicting of computer
expert reports vs. the expert‘s in-court testimony and whether [the Petitioner‘s] estranged
wife had ‗set him up.‘‖ Upon review of the record and applicable law, we affirm the
judgment of the post-conviction court.
Tenn. R. App. P. 3 Appeal as of Right; Judgment of the Circuit Court Affirmed
ROBERT L. HOLLOWAY, JR., J., delivered the opinion of the Court, in which NORMA
MCGEE OGLE and CAMILLE R. MCMULLEN, JJ., joined.
Gregory D. Smith, Clarksville, Tennessee, for the appellant, Jared S. Aguilar.
Herbert H. Slatery III, Attorney General and Reporter; Sophia S. Lee, Senior Counsel;
John W. Carney, District Attorney General; and Daniel Brollier, Assistant District
Attorney General, for the appellee, State of Tennessee.
OPINION
Trial
On direct appeal, this court summarized the facts presented at trial as follows:
A Montgomery County Circuit Court jury convicted [the Petitioner]
of one count of knowingly possessing 100 or more images of child
pornography, one count of knowingly possessing 50 or more images of
child pornography, and four counts of knowingly possessing a single image
of child pornography, all in violation of Code section 39-17-1003.
See T.C.A. § 39-17-1003(a)(1), (b), (d) (2006). At trial, Montgomery
County Sheriff‘s Office Investigator Mike Cereceres testified that as a
member of the Internet Crimes Against Children task force, he utilizes file
sharing software and graphic search terms, techniques most often used by
consumers of child pornography, to discover those viewing child
pornography and sharing child pornography data, ―whether it be in a video
format, whether it be an image.‖ He explained that file sharing software
enables users ―to share videos back and forth, to share PDFs, to share
movies.‖ He said, ―[I]f I have all this stuff on my computer which I‘m
sharing, videos, pictures, it‘s there for the world to get. All they have to do
is use the same software that I have, type in the title of what they want.‖
He said that, in a typical case, after he observes a user‘s viewing or sharing
child pornography, he ―geolocate[s]‖ the user using the internet protocol
(―IP‖) address of the computer used to view or share the images. He said
that the ―IP address . . . is essentially nothing more th[a]n like a house
address except your computer gets assigned an address.‖ If he ascertains
that the computer is located in Montgomery County, he asks for a judicial
subpoena to be sent to the internet service provider for that IP address in
order to determine the name and address of the service subscriber and
owner of the computer. After determining the owner and subscriber
information, he conducts surveillance on the residence before requesting a
search warrant. After obtaining a search warrant, he executes the warrant,
most often at night.
Investigator Cereceres testified that in this case, while using file
sharing software on January 9, 2011, he ―ended up making a download off
of the [d]efendant‘s computer . . . . [and] obtaining three images of child
pornography.‖ He said that the titles of the files indicated to him that they
contained child pornography. He viewed the files and confirmed that they
did, in fact, contain child pornography. He said that each of the files had a
different ―secure hash algorithm‖ (―SHA‖), which, he explained, is akin to
fingerprints in that it renders individual files unique. He said, ―No other
file is going to have that same SHA one value.‖ After viewing the
downloaded files, he ―geolocated‖ the IP address of the computer and
determined that it was in Montgomery County. He then obtained a judicial
subpoena that he sent to the internet service provider, and the service
-2-
provider indicated that the IP address was registered to [the Petitioner]. He
used the information gleaned during his investigation to obtain a warrant to
search [the Petitioner]‘s residence and computer.
Investigator Cereceres said that when officers executed the search
warrant at [the Petitioner]‘s residence on January 31, 2011, [the Petitioner]
answered the door and indicated that he was alone. During the search,
officers seized two laptop computers, and [the Petitioner] admitted
ownership of one of the laptops. Upon questioning, [the Petitioner]
acknowledged that he had used file sharing software, saying that he ―was
downloading movies like Twilight for his wife, and he‘s just made a lot of
downloads of various things.‖ Investigator Cereceres said that [the
Petitioner] also provided a written statement:
[]I have a program called FrostWire that I use to
download music and movies. In the past when child
pornography was accidently downloaded I deleted it
immediately. While making mass downloads in the past I
have downloaded various things that I am not interested in,
and I deleted them as such.
When my wife and I have friends over I‘m usually the
first to pass out. I leave my computer logged on in case
anyone wants to use it. I have not had any issues with any
friends in the past using my computer to download child porn
or anything else that is illegal.
I had a small party this past weekend to watch the
probowl . . . . I enjoy inviting new soldiers to my house for
various occasions to give them a sense of brotherhood.
I have searched FrostWire for porn using such key
words as little boy slash girl. I know it sounds suspicious; my
intention was looking for jailbait. My understanding of
jailbait is that it‘s a young girl, above the age of 18 that can
pass for younger. I‘m not interested in child porn in any way,
shape or form.
Let‘s see; a video that was downloaded by accident
that involved two boys. I tried to delete it, but the computer
said it was open in another program. I still have not been able
to delete it. I searched hymen looking for virgins obviously
-3-
over the age of 18. Carl David Hyman came up as pictures. I
downloaded the page, and the pictures ended up being child
porn. Again, I discarded them as something I wasn‘t
interested in.
When downloading movies I have hit preview and
seen that it was child porn and stopped the download. These
files are . . . in the incomplete section of the FrostWire
folder . . . .
I started using FrostWire when I got my computer in
2009. One day I accidently downloaded child porn. I was so
shocked that I did delete it—the image and uninstalled
FrostWire. I reinstalled it thinking that I can just ignore
anything like that that came up. I had done so by deleting
anything that is child porn. I have also typed in church girls
gone wild thinking it was innocent girls over the age of 18
that became sluts. I never tried it again when it turned out to
be child porn . . . .
Investigator Cereceres acknowledged that a user could accidentally
download child pornography, but he stated that an accidental download
would be rare and that more than one accidental download to the same
computer would be even more rare. He said that the search terms that [the
Petitioner] admitted using were those most often used by individuals
looking for child pornography and that, in his experience, those search
terms were not indicative of a desire to view adult pornography.
During cross-examination, Investigator Cereceres said that he did
not know when [the Petitioner] had downloaded the files or how many
times [the Petitioner] had accessed those files. He explained that when
using file sharing software, ―if you click on one file, you‘re initiating that
download of just the one file.‖ He said that a file sharing software user can
see what is on another computer ―on a list.‖ He maintained that ―virus-wise
or even someone hacking your e-mail wouldn‘t put a copious amount of
child pornography on your computer.‖
During redirect examination, Investigator Cereceres said that the
files observed via file sharing software would not automatically download
after a search. Instead, he said, ―[Y]ou have to choose to double click on it,
or right click, you have to make that choice.‖ He said that, because
downloading the files required an intentional download, the presence of
-4-
these files on [the Petitioner]‘s computer was indicative of an intentional
decision to download child pornography. He said, ―[G]oing online, you
know, and to Google child pornography, it‘s not that easy to find unless
you know what you‘re doing.‖ He added that most internet search engines
filter out child pornography even when illicit search terms are used and that
he had ―never seen‖ internet ―pop ups‖ that downloaded child pornography
onto a computer.
Dickson County Sheriff‘s Department Detective Scott Levasseur
testified that he was ―in charge of the computer forensics lab, cyber crime
unit‖ and also assigned as an investigator for the district attorney‘s office
and ―to the FBI task force out of Nashville.‖ He said that his primary duty
in each of these roles was to perform forensic examinations of computers
and other electronic equipment as an ―electronic evidence collection
specialist.‖ He explained, ―The job of a computer forensic examiner is to
examine a device, find the evidence as it pertains to the case, preserve it
and have it ready for display in a courtroom.‖
Detective Levasseur testified that Investigator Cereceres brought a
laptop and some other pieces of evidence to be examined by Detective
Levasseur. Only the laptop contained relevant evidence. He explained the
process of forensic examination:
We disconnect the battery supply, remove the hard
drive. And then I take the hard drive out of the laptop and
hook it up to a [write] blocker. And all a [write] blocker is a
physical device that allows me to copy the hard drive without
writing anything to the hard drive, so I‘m not making changes
on that hard drive at all. And I copy the hard drive over onto
one of the hard drives in the lab, so that I can work on it.
And before that process starts, you were told about a
hash value, well, we do an M–D hash on the hard drive and it
hashes the whole hard drive, and it gives us one of them big
long numbers, and then it copies it, and then it hashes the
copy to make sure that it‘s the same number, so we‘ve an
exact—an identical copy. And I did get an identical copy of
the hard drive. After it‘s copied over and verified that it‘s
identical, then I put the hard drive back in the laptop, and it
goes into the evidence, and . . . I don‘t touch it again. I do all
my work off of the image copy that I have.
-5-
. . . [W]hat I do after I copy the hard drive and process it with
my forensics software to get it indexed out, the first thing I go
ahead and do is I search for child pornography. I actually go
through and individually look at every picture that‘s on the
computer that‘s live, or been deleted, or whatever and scan
through them, and bookmark out. And bookmarking out just
means set aside for later examination when I find files that I
believe to be child porn. So I look for all the images and all
the videos that could be child pornography and bookmark
them and mark them for later examination.
Detective Levasseur said that he used ―software that . . . indexes the
entire hard drive and it separates all the files . . . . So it will put all the
pictures in one location and all the videos in another location and all the
word documents in another location.‖ He explained that unallocated space
on the hard drive is space ―that‘s not being used but there‘s files there.
Because when a file gets deleted . . . . [i]t doesn‘t actually go anywhere[ ],
it‘s still in the same place it was physically on the hard drive but it‘s just
being given a tag that hey, it[‘]s been deleted.‖ He testified that although
the ―deleted‖ file remains on the computer until overwritten by another file,
―it‘s not accessible to the user.‖ Detective Levasseur explained that after
his software indexed the files, he manually examined all the image files by
viewing them as ―thumbnail images‖ to determine if any contained child
pornography. He said that he used his training and experience to make that
determination, explaining, ―I‘ve seen millions [of images]. I‘ve seen the
same ones over and over and over. I‘m pretty familiar with all the different
series.‖ He said that all child pornography collected during law
enforcement investigations is sent to the National Center for Missing and
Exploited Children, which places the images into a database. The agency
then confirms which images actually contain minors.
Detective Levasseur testified that he located more than 160 images
containing child pornography and six videos depicting child pornography
on [the Petitioner]‘s laptop under the user account ―Jared.‖ He explained
that the name of the computer was ―Jared and Brittany‖ and that it
contained two user accounts, one for ―Jared‖ and one for ―Brittany.‖ He
said that the ―Jared‖ account had been used 2,521 times and the ―Brittany‖
account had been used only 77 times. No child pornography was located
under the ―Brittany‖ profile. Detective Levasseur recalled that he found the
pornographic images ―in the owner‘s FrostWire save folder and unallocated
space, which is free space, and the system volume information.‖
-6-
Specifically, six child pornography videos came from the ―FrostWire save
folder.‖ He explained, ―Basically FrostWire is a file sharing program. It‘s
the sister program to LimeWire.‖ He said that once FrostWire has been
added to the computer, when the user opens it, ―it‘s set to hook to the
Gnutella Network where everybody else with these programs, FrostWire,
LimeWire, they‘re on the same network, it will start looking for other
computers to connect to.‖ He explained that the file name for child
pornography images were ―really, really long and very descriptive . . . .
because the more descriptions . . . they can get the more hits they‘ll get
when they‘re searching files. And they want to be specific about what
they‘re getting.‖ He said, ―I have been doing this for a long time, you can‘t
mistake the terms that they‘re using for child pornography for adult
pornography. I mean, you just can‘t mistake it.‖
Detective Levasseur testified that during his forensic examination,
he recovered some of the search terms that [the Petitioner] used in Google:
―incest porn; jailbait girls; gay young boys porn; virgin porn; gay boys;
jailbait porn; teen jailbait porn; caught my daughter giving head; caught my
daughter having sex.‖ He said that those search terms when used in
Google may or may not return results that contain child pornography but
when used in FrostWire or LimeWire would yield ―child pornography in
your search results.‖ Detective Levasseur testified that before the images
would appear on [the Petitioner]‘s computer, [the Petitioner] ―had to type in
a search term that‘s associated with child pornography, and you had to see
your results, and then you have to double click on it, or single click on it,
and click on the download button to download it.‖ His examination
revealed that all of the files located in the ―save folder‖ were downloaded
between 2:58 p.m. on January 16 and 5:01 a.m. on January 17, 2011. His
examination also showed that of the last eight movie files played by [the
Petitioner]‘s computer, half depicted child pornography.
By examining the file creation dates and the file modified dates of
the child pornography files and comparing them with other ―history files‖
on the computer created at the same time, Detective Levasseur discovered
that someone had logged into a HotMail account and an account on a
website called Ashley Madison at the same time that files containing child
pornography were being downloaded by FrostWire. Detective Levasseur
examined the profile picture for the Ashley Madison account and saw a
picture of [the Petitioner]. The user name for both accounts was ―fun
soldier zero one.‖ Just before downloading child pornography, someone
searched Craigslist in the adult section for ―woman for men, and man and
-7-
woman for man‖ and just after the downloads, someone searched Google
for ―jailbait girls.‖ During that same time, [the Petitioner] logged into the
USAA website, and that data string indicated that [the Petitioner] ―was
conducting financial business on that website.‖ Additionally, around the
time of the child pornography downloads, [the Petitioner] logged into his
accounts on You Tube and Facebook. Detective Levasseur found no
evidence that any person other than [the Petitioner] had accessed the
computer during those times.
Detective Levasseur prepared a report of his findings and created a
compact disc that contained his report and the child pornography images
and videos that he found on [the Petitioner]‘s computer. Both the report
and the compact disc were admitted into evidence, and each of the 167
images were displayed for the jury. Some of the images ―were really
small . . . thumbnails that were carved out of unallocated space, that had
been deleted. Some of the bigger ones . . . . were live on the . . . shared
folder.‖ He explained that the images could not ―go to unallocated space
until they‘re live on the system first.‖ The videos located on [the
Petitioner]‘s computer were ―recognized throughout the law-enforcement
community . . . as being children underage.‖ The titles of each of the six
videos clearly indicate that they contain images of child pornography, and,
in fact, that the children in each video are being subjected to degrading and
sometimes violent sexual abuse. Portions of each video were played for the
jury.
Detective Levasseur acknowledged that it was possible to
unwittingly download child pornography, explaining,
[S]ometimes if . . . you‘re not paying attention and you click
on the whole screen full of files and, say, download all at
once, which nobody really ever does because it‘s too
slow, . . . if you‘re searching for adult porn on a file sharing it
is possible that child porn files will pop up and can accidently
be downloaded.
He clarified, though, that in those cases, only a few child pornography files
rather than hundreds would be found on the hard drive because ―[y]ou‘re
not going to keep making the same mistake over and over again.‖ He said
that in the case of accidental downloads, they are universally deleted
quickly and not played in the media player or moved from folder to folder.
Additionally, he said that search terms can establish whether a user was
looking for adult pornography or child pornography. He stated definitively
-8-
that the images on [the Petitioner]‘s computer did not come from ―pop ups‖
during his surfing the internet. He explained, ―The thing about it is if a pop
up occurs I‘m going to be able to tell if it was a pop up and that‘s where it
came from, because they‘re . . . known as redirects . . . . it will show me
that it‘s a redirect, show me the code on it.‖
During cross-examination, Detective Levasseur admitted that it was
possible to download a computer generated image of child pornography,
but he stated that in his opinion it was not difficult to tell the difference
between the real images and the computer generated images. He
acknowledged that he did not personally know any of the people depicted
in the images or videos. Detective Levasseur said that there were 10 live
images in the save folder on [the Petitioner]‘s laptop, and the rest were in
the unallocated space, indicating that they had been deleted. He said that he
could not tell whether the images had been downloaded individually or in a
mass download. He added that even in a ―mass download,‖ ―each
download is an individual event‖ and that the selected files ―don‘t come all
together.‖ The user account for ―Brittany‖ was created on the same day as
the videos were downloaded.
Upon redirect examination, Detective Levasseur clarified that even if
the user wished to download several files at the same time, each individual
file must be clicked. He said that only those files selected would be
downloaded.
At the conclusion of this proof, the State rested. [The Petitioner]
elected not to testify and chose not to present any proof. Based upon the
evidence presented by the State, the jury convicted [the Petitioner] as
charged.
State v. Aguilar, 437 S.W.3d 889, 893-98 (Tenn. Crim. App. Dec. 18, 2013), perm. app.
denied (Tenn. May 16, 2014) (footnotes omitted). This court affirmed the Petitioner‘s
convictions on direct appeal. Id. at 909.
Post-Conviction Proceedings
In his Amended Petition for Post-Conviction Relief (―the Petition‖), the Petitioner
alleged that trial counsel ―failed to fully, completely and adequately advise [the]
Petitioner of his rights and options and to use witnesses that were available at the hearing
but dismissed without consulting [the] Petitioner first. Further, [trial] counsel did not
fully investigate and/or explain the options available prior to his original trial.‖ He also
asserted that ―major tactical decisions on his case were not presented to [the] Petitioner so
-9-
that [the] Petitioner could make an informed and knowing decision on the path that his
case should proceed which amounts to the denial of the effective assistance of counsel.‖
At a hearing on the Petition, the Petitioner testified that he believed trial counsel
was ineffective because the Petitioner ―didn‘t have an expert witness for the defense.‖1
The Petitioner explained that he had discussed the possibility of an expert witness but
trial counsel informed him that ―such a witness would cost $125.‖ 2 Trial counsel did not
explain that he could receive funds for an expert witness, and the Petitioner stated that he
thought that he would have to pay the $125 himself. The Petitioner stated that he had just
been discharged from the military and he could not afford to pay for an expert witness.
He stated that he was not aware ―that the state would pick[ ]up any such costs.‖ The
Petitioner stated that, had he known he would not have had to pay for the expert witness,
―[i]t would have changed the outcome [of his case] significantly.‖
To explain why he thought an expert would have been helpful to his case, the
Petitioner stated that the ―sharing feature‖ on FrostWire could be disabled if the user does
not want others to have access to the user‘s files. According to the Petitioner, if someone
disables the sharing feature, the ―share folder is empty.‖ The Petitioner claimed that the
sharing feature on his file sharing program was disabled and that was why ―they didn‘t
find anything in [the Petitioner‘s] share folder.‖ Consequently, the Petitioner claimed
that Investigator Cereceres ―did not do the investigation that he claim[ed] to have done,
because he claimed to have downloaded directly from [the Petitioner‘s] share folder.‖
The Petitioner stated that trial counsel did not cross-examine Investigator Cereceres about
the Petitioner‘s empty share folder. The Petitioner brought this discrepancy to trial
counsel‘s attention after Investigator Cereceres had been excused as a witness, but trial
counsel told the Petitioner that Investigator Cereceres would not testify again.
The Petitioner also noted that Detective Levasseur testified that he found items in
the Petitioner‘s share folder, and the Petitioner claimed that such testimony contradicted
both Investigator Cereceres‘ testimony and Detective Levasseur‘s own report. 3 The
Petitioner asked trial counsel to ask Detective Levasseur ―if you could access files
without it being in the share folder,‖ but trial counsel did not ask the detective that
question. The Petitioner asserted that a defense expert witness could have said that there
was nothing in the Petitioner‘s share folder and that ―this investigation [was] impossible
1
It is not clear from this portion of the Petitioner‘s testimony what type of expert witness he felt
should have been called. However, by examining the rest of the Petitioner‘s testimony and his brief on
appeal, it appears the Petitioner believes trial counsel should have retained a computer expert to assist in
his defense.
2
The Petitioner did not know whether the $125 was a flat fee or an hourly rate.
3
Detective Levasseur‘s report is not included in the record on this appeal.
- 10 -
because there‘s nothing in the share folder.‖ The Petitioner admitted that Detective
Levasseur contradicted himself, but the Petitioner noted ―there‘s nothing to contradict
him directly.‖
The Petitioner stated that he wanted to present a theory of defense that his now-ex-
wife was working with the detective ―from day one‖ in order to get retribution against the
Petitioner because he was cheating on her. The Petitioner told trial counsel about this
theory, but trial counsel refused to use such a defense.
The Petitioner acknowledged that he did not tell trial counsel that he wanted to
proceed to trial, as opposed to taking a plea, until four days before the trial was scheduled
to start. The Petitioner said that he did not ―really discuss‖ trial strategy with trial
counsel. However, he stated, ―I had already come up with what I had thought was a
pretty solid defense, and I asked [trial counsel] can we just look at the evidence, and [trial
counsel] cut me off and just said ‗I‘ll see you Monday.‘‖ The Petitioner explained that he
wanted to highlight that both he and his wife shared the computer, and the Petitioner
―was trying to figure out how you can say it‘s one person and not the other.‖ The
Petitioner admitted that he had given a statement to police in which he admitted to
downloading pornography off of FrostWire, but he maintained that he did not
intentionally download child pornography but ―it had come up by accident several
times . . . during my downloading.‖
The Petitioner also noted that, in the fifteen days after his ex-wife‘s log-in had
been created on their shared computer, she had logged in seventy-seven times. The
Petitioner believed that an expert witness could also help support the Petitioner‘s theory
of defense because the expert could have looked at the date and time the Petitioner‘s ex-
wife‘s log-in had been created and calculated that she logged into the computer five times
a day. The Petitioner said he thought that evidence was significant because ―it shows two
people had access to the computer but only one was ever questioned, only one was ever
looked at. I mean, my wife, in my—in my opinion, was the embodiment of reasonable
doubt.‖
Trial counsel testified that she discussed the possibility of a computer expert with
the Petitioner and informed the Petitioner that they ―could try to find an expert to look
over everything . . . .‖ Trial counsel also told the Petitioner that the state would provide
funds for an expert. However, no expert was hired for the defense. Trial counsel
explained that she spoke with Detective Levasseur and met with Investigator Cereceres at
his office for over two hours. Investigator Cereceres showed trial counsel a copy of what
they had found on the Petitioner‘s computer and ―walked [trial counsel] through‖ the
evidence from beginning to end. In that meeting, trial counsel was able to see what was
found on the computer and how the files were stored and determine if she needed to hire
an expert witness. Trial counsel ―questioned [Investigator Cereceres] thoroughly on . . .
- 11 -
unallocated space, deleted files, where things were moved from shared files, how they
were downloaded from share drives, and [Investigator Cereceres] thoroughly walked
[trial counsel] though every part of that as preparation for [trial].‖ Additionally, trial
counsel consulted with Charles Bloodworth, another attorney in her office who was very
knowledgeable about computers, about the computer investigation and asked him to help
with the hearing on the Petitioner‘s motion to suppress prior to trial. Mr. Bloodworth
litigated the issue about the Petitioner‘s file sharing capability and whether the State
should have been able to get a search warrant based upon the police investigation at the
hearing for the motion to suppress.4
Based on her conversations with Detective Levasseur, Investigator Cereceres, and
Mr. Bloodworth, and after consulting with the Petitioner, trial counsel ―didn‘t think that
[a computer expert] would offer any benefit.‖ Trial counsel acknowledged that she made
the decision not to hire an expert witness. Trial counsel recalled speaking with the
Petitioner about the decision not to hire an expert, but she could not remember the exact
conversation she had with the Petitioner. Trial counsel could not remember whether the
Petitioner agreed with her conclusion not to hire an expert witness. Trial counsel also
could not recall whether she had any discussions with the Petitioner about the Petitioner‘s
share folder being blocked by disabling the file sharing feature.
Trial counsel stated that the trial was scheduled to begin in June or July, but trial
counsel announced that the Petitioner was accepting a plea agreement in March.
However, trial counsel said she was prepared for trial when the Petitioner decided not to
accept the plea on the eve of the scheduled trial date. Trial counsel explained that she did
not ask for a continuance because she had already spoken to all of the witnesses involved
before the March date and that she had spoken with the Petitioner numerous times, so
there was no need for a continuance. Trial counsel stated that she cross-examined both
Investigator Cereceres and Detective Levasseur. However, she did not recall having any
discussions with the Petitioner about a blocked share file.
On cross-examination, trial counsel explained that she gave the Petitioner a note
pad and pencil to write down questions for her during the trial. Trial counsel read the
Petitioner‘s notes and took them into consideration when she cross-examined witnesses.
Trial counsel stated that she did not ask every question the Petitioner posed, but she noted
that the Petitioner had ―a good amount of computer knowledge‖ and she tried to
accommodate his requests with her cross-examination. Additionally, trial counsel stated
4
In the hearing on the motion to suppress, Mr. Bloodworth argued that the application for the
search warrant of the Petitioner‘s home was insufficient and, consequently, that the warrant should not
have been issued. There was no discussion as to whether the Petitioner‘s file sharing capability was
disabled on his computer.
- 12 -
that she cross-examined the witnesses at trial about whether other people in the
Petitioner‘s home could have downloaded the files.
In regard to her decision not to hire an expert witness, trial counsel stated that she
scoured the case files and looked for a way to challenge the evidence. However, the
evidence showed that the images were downloaded within a twenty-four-hour window,
and during that time: the Petitioner was signed into the computer as himself; he signed
into an Ashley Madison account using his password; he signed into his email; and he
signed into his banking account in order to conduct some financial business.
Trial counsel stated that she had numerous meetings with the Petitioner and that
she listened to all of the Petitioner‘s suggestions for defense theories. Trial counsel also
said, ―I argued everything at trial from mass downloaded to zip files, to the wife being
home[,] to not being home, to the pornography not being recognized individuals. I mean,
I think if it was out there I think I threw it out there.‖ Trial counsel did not recall the
Petitioner‘s theory—that his wife had colluded with police in order to frame the
Petitioner—being so well-formed prior to trial. Prior to trial, the Petitioner simply told
trial counsel that his ex-wife and ―other people‖ lived in the home, and trial counsel
stated that she did cross-examine the witnesses about other people being in the house.
Trial counsel acknowledged that it would be reasonable to conclude that the Petitioner‘s
wife would have known the passwords to the Petitioner‘s accounts, and trial counsel
stated that she brought out that possibility at trial.
Investigator Cereceres testified that computers using FrostWire could share files
with one another via the share folder. Investigator Cereceres acknowledged that even
though the program‘s default setting allowed sharing, the Petitioner could disable the
sharing function. Based on Investigator Cereceres‘ experience, he believed that the
Petitioner‘s sharing function was enabled because ―otherwise it wouldn‘t share at all.‖
Investigator Cereceres explained that, in the course of his investigation, he would search
for key words indicating child pornography and the FrostWire software would pull results
from all over the world and would give Investigator Cereceres a geographical location of
where the image was found. Investigator Cereceres then downloaded the images, and he
was able to get the IP address of the computer from where the images were downloaded.
After that, Investigator Cereceres was able to subpoena records from the internet carrier
in order to get the address where the computer could be located. As such, Investigator
Cereceres said that there was no need to work with the Petitioner‘s wife to get access to
the Petitioner‘s computer. Investigator Cereceres did not recall speaking with the
Petitioner‘s wife about this case. On cross-examination, Investigator Cereceres
confirmed that he conducted a search for child pornography and found files that he was
able to trace back to the computer that was at the Petitioner‘s house.
- 13 -
The Petitioner was recalled and responded to Investigator Cereceres‘ testimony,
stating:
. . . [H]e said it himself that you can‘t—you can‘t access someone‘s files
unless it‘s in a share folder. If it‘s not in that share folder then you can‘t
access that. And as—as it says, both in the published report by the State‘s
expert witness and also as it states in the record, there was nothing ever
found in my share folder; there‘s no way that he could have done the
investigation that he claims to have done if there was nothing in the share
folder.
The Petitioner maintained that the sharing function on his computer was disabled.
In the order denying post-conviction relief, the post-conviction court noted that
both the Petitioner and trial counsel testified that they had ―some discussion or
conversation about the possibility of using an expert witness‖ and that trial counsel
decided not to call an expert witness after a thorough discussion with the State‘s experts
and Mr. Bloodworth. The post-conviction court also stated:
[The Petitioner] insists that had [trial counsel] retained and called an expert
to testify, the expert would have refuted the testimony of the State‘s experts
on these issues. However, [the Petitioner] has presented nothing but
argument to support his position. He has yet to produce any evidence other
than his own testimony to contradict the State‘s experts. Not only is he
unable to show that an expert would say what [the Petitioner] says the
expert would say, there is no showing that such an expert even exists.
Additionally, the post-conviction court found that ―all of [the issues about the search of
the computer and other people accessing the computer] were adequately addressed by
[the Petitioner‘s] counsel at the suppression hearing or during the course of the trial.‖
This timely appeal followed.
Analysis
On appeal, the Petitioner argues that trial counsel rendered ineffective assistance
of counsel when she (1) decided not to obtain the services of an expert witness for the
defense without consulting the Petitioner; and (2) ignored the Petitioner‘s specific
requests that she cross-examine the State‘s expert witnesses ―on areas such as the
contradicting of computer expert reports vs. the expert‘s in-court testimony and whether
[the Petitioner‘s] estranged wife had ‗set him up.‘‖
- 14 -
In order to prevail on a petition for post-conviction relief, a petitioner must prove
all factual allegations by clear and convincing evidence. Jaco v. State, 120 S.W.3d 828,
830 (Tenn. 2003). Post-conviction relief cases often present mixed questions of law and
fact. See Fields v. State, 40 S.W.3d 450, 458 (Tenn. 2001). Appellate courts are bound
by the post-conviction court‘s factual findings unless the evidence preponderates against
such findings. Kendrick v. State, 454 S.W.3d 450, 457 (Tenn. 2015). When reviewing
the post-conviction court‘s factual findings, this court does not reweigh the evidence or
substitute its own inferences for those drawn by the post-conviction court. Id.; Fields, 40
S.W.3d at 456 (citing Henley v. State, 960 S.W.2d 572, 578 (Tenn. 1997)). Additionally,
―questions concerning the credibility of the witnesses, the weight and value to be given
their testimony, and the factual issues raised by the evidence are to be resolved by the
[post-conviction court].‖ Fields, 40 S.W.3d at 456 (citing Henley, 960 S.W.2d at 579);
see also Kendrick, 454 S.W.3d at 457. The trial court‘s conclusions of law and
application of the law to factual findings are reviewed de novo with no presumption of
correctness. Kendrick, 454 S.W.3d at 457.
The right to effective assistance of counsel is safeguarded by the Constitutions of
both the United States and the State of Tennessee. U.S. Const. amend. VI; Tenn. Const.
art. I, § 9. In order to receive post-conviction relief for ineffective assistance of counsel,
a petitioner must prove two factors: (1) that counsel‘s performance was deficient; and (2)
that the deficiency prejudiced the defense. Strickland v. Washington, 466 U.S. 668, 687
(1984); see State v. Taylor, 968 S.W.2d 900, 905 (Tenn. Crim. App. 1997) (stating that
the same standard for ineffective assistance of counsel applies in both federal and
Tennessee cases). Both factors must be proven in order for the court to grant post-
conviction relief. Strickland, 466 U.S. at 687; Henley, 960 S.W.2d at 580; Goad v. State,
938 S.W.2d 363, 370 (Tenn. 1996). Accordingly, if we determine that either factor is not
satisfied, there is no need to consider the other factor. Finch v. State, 226 S.W.3d 307,
316 (Tenn. 2007) (citing Carpenter v. State, 126 S.W.3d 879, 886 (Tenn. 2004)).
Additionally, review of counsel‘s performance ―requires that every effort be made to
eliminate the distorting effects of hindsight, to reconstruct the circumstances of counsel‘s
challenged conduct, and to evaluate the conduct from counsel‘s perspective at the time.‖
Strickland, 466 U.S. at 689; see also Henley, 960 S.W.2d at 579. We will not second-
guess a reasonable trial strategy, and we will not grant relief based on a sound, yet
ultimately unsuccessful, tactical decision. Granderson v. State, 197 S.W.3d 782, 790
(Tenn. Crim. App. 2006).
As to the first prong of the Strickland analysis, ―counsel‘s performance is effective
if the advice given or the services rendered are within the range of competence demanded
of attorneys in criminal cases.‖ Henley, 960 S.W.2d at 579 (citing Baxter v. Rose, 523
S.W.2d 930, 936 (Tenn. 1975)); see also Goad, 938 S.W.2d at 369. In order to prove that
counsel was deficient, the petitioner must demonstrate ―that counsel‘s acts or omissions
- 15 -
were so serious as to fall below an objective standard of reasonableness under prevailing
professional norms.‖ Goad, 938 S.W.2d at 369 (citing Strickland, 466 U.S. at 688); see
also Baxter, 523 S.W.2d at 936.
Even if counsel‘s performance is deficient, the deficiency must have resulted in
prejudice to the defense. Goad, 938 S.W.2d at 370. Therefore, under the second prong
of the Strickland analysis, the petitioner ―must show that there is a reasonable probability
that, but for counsel‘s unprofessional errors, the result of the proceeding would have been
different. A reasonable probability is a probability sufficient to undermine confidence in
the outcome.‖ Id. (quoting Strickland, 466 U.S. at 694) (internal quotation marks
omitted).
Failure to Obtain an Expert Witness
First, the Petitioner claims that trial counsel was ineffective for deciding not to
obtain the services of a computer expert without consulting the Petitioner. The Petitioner
appears to argue that he was prejudiced by the combination of ―the short time frame
between the final decision to go forward with trial and [trial counsel‘s] sua sponte
decision to forego any defense expert‖ (emphasis in original). However, there is no
indication that trial counsel made the decision to ―forego any expert defense‖ after the
Petitioner informed her that he wanted to proceed to trial. Trial counsel testified that she
decided not to obtain a computer expert after she thoroughly discussed the matter with
Investigator Cereceres, Mr. Bloodworth, and the Petitioner. Additionally, trial counsel
testified that she had interviewed all the witnesses before the March trial date where she
announced that the Petitioner would accept a plea and that she was ready for trial when
the Petitioner decided to reject the plea. Accordingly, there is no factual basis for the
Petitioner‘s contention that trial counsel decided not to obtain a computer expert only
after the Petitioner informed her that he wanted to proceed to trial. The Petitioner has
failed to show that the ―short timeframe‖ resulted in prejudice.
Further, the Petitioner cannot establish prejudice by trial counsel‘s decision not to
hire an expert because he failed to present any evidence of what a defense expert would
have said if called to testify. This court has long held that ―[w]hen a petitioner contends
that trial counsel failed to discover, interview, or present witnesses in support of his
defense, these witnesses should be presented by the petitioner at the evidentiary hearing.‖
Black v. State, 794 S.W.2d 752, 757-58 (Tenn. Crim. App. 1990). The Petitioner cannot
establish that he was prejudiced unless he can produce a material witness who ―(a) could
have been found by reasonable investigation and (b) would have testified favorably in
support of his defense if called.‖ Id. Neither this court nor the post-conviction court can
speculate as to whether an expert witness who supported the Petitioner‘s theory existed,
what such a witness may have said if presented, or how that witness may have responded
- 16 -
to a rigorous cross-examination. See id. Accordingly, the Petitioner has failed to
establish that he was prejudiced by trial counsel‘s alleged deficiencies.
In his reply brief, the Petitioner notes that Tennessee Supreme Court Rule 13
section 5(a)(2) bars state funding for expert witnesses in non-capital post-conviction
proceedings and argues that mandating an indigent person to present expert testimony at
the post-conviction hearing violates due process. This issue is raised for the first time on
appeal. ―Issues not raised by the petitioner in the lower court[] cannot be raised for the
first time on appeal.‖ Bobby Taylor v. State, No. M2008-00335-CCA-R3-PC, 2009 WL
2047331, at *2 (Tenn. Crim. App. July 14, 2009) (citing Cauthern v. State, 145 S.W.3d
571, 599 (Tenn. Crim. App. 2004)). To the extent that the Petitioner raises a new due
process claim, such claim is not properly before this court. To the extent that the
Petitioner raises his due process claim to explain why he did not present a witness at the
post-conviction hearing to establish prejudice, his arguments are unpersuasive. The
Petitioner correctly states that Tennessee Supreme Court Rule 13 section 5(a)(2) bars
state funding for an expert witness in this case. However, we are unable to determine
whether the Petitioner suffered prejudice from trial counsel‘s alleged failure to obtain an
expert witness without credible testimony of what such an expert could have said. See
Black, 794 S.W.2d at 757-58.
Failure to Properly Cross-Examine Witnesses
Second, the Petitioner argues that trial counsel failed to cross-examine the State‘s
witnesses ―on areas such as the contradicting of computer expert reports vs. the expert‘s
in-court testimony and whether [the Petitioner‘s] estranged wife has ‗set him up.‘‖ It is
unclear whether the Petitioner asserts that the State‘s witnesses should have been cross-
examined with their own reports or with reports from other computer experts. However,
the trial transcripts reflect that trial counsel did question Detective Levasseur about his
own report on cross-examination. Additionally, we note that no expert reports—from
either the State‘s witnesses or other experts—are included in the record on this appeal.
Therefore, we are unable to determine whether the Petitioner was prejudiced by the
failure to use any such reports during cross-examination.
The Petitioner also insists that the State‘s witnesses contradicted each other as to
whether the Petitioner‘s file sharing function was disabled, and he provides citations to
the trial transcript which purportedly illustrate the contradictory testimony. However, the
Petitioner‘s citations do not include any discussion about whether the Petitioner‘s file
sharing function was disabled. The Petitioner does not explain how the witnesses‘
testimony contradicted each other, and we are unable to find any contradictions between
- 17 -
the two testimonies in the citations provided.5 The Petitioner has failed to prove that trial
counsel was deficient in her cross-examination of the State‘s witnesses about alleged
discrepancies in their testimony.
Likewise, the Petitioner has failed to show that trial counsel was deficient for
failing to cross-examine the State‘s witnesses about the theory that the Petitioner‘s ex-
wife colluded with police in order to frame the Petitioner. Trial counsel testified that,
prior to trial, the Petitioner simply told her that his ex-wife and other people were living
in the home and had access to the computer. Trial counsel did not hear the details of his
theory that his ex-wife colluded with police until the post-conviction hearing.
Nevertheless, Investigator Cereceres testified that he did not need to work with the
Petitioner‘s ex-wife in order to conduct his investigation and that he did not recall ever
speaking with the Petitioner‘s ex-wife. Moreover, during trial counsel‘s cross-
examination, Detective Levasseur admitted that the Petitioner‘s ex-wife could have
logged into the computer under the Petitioner‘s name and that she could have known the
Petitioner‘s passwords to access his email and banking account. Trial counsel was not
deficient for failing to ask whether the Petitioner‘s ex-wife colluded with police to frame
the Petitioner. The Petitioner is not entitled to relief.
Conclusion
For the aforementioned reasons, the judgment of the post-conviction court is
affirmed.
_________________________________
ROBERT L. HOLLOWAY, JR., JUDGE
5
The Petitioner cites to portions of Investigator Cereceres‘ testimony wherein he explained that
FrostWire utilizes a ―save folder‖ and an ―incomplete folder‖ when downloading files from the file
sharing system. Investigator Cereceres noted that he found files in the ―unallocated space‖ on the
Petitioner‘s hard drive that ―definitely were downloaded from the [file sharing system].‖ The Petitioner
also cites to a portion of Detective Levasseur‘s testimony wherein he stated that he found several files in
the ―unallocated space‖ of the Petitioner‘s hard drive and some files in the Petitioner‘s ―share folder.‖
Detective Levasseur explained that the files found in the ―unallocated space‖ had been deleted and were
not accessible without forensic equipment but that such files ―can‘t go to unallocated space until they‘re
live on the system first.‖
- 18 -