Jared S. Aguilar v. State of Tennessee

IN THE COURT OF CRIMINAL APPEALS OF TENNESSEE AT NASHVILLE Assigned on Briefs November 12, 2015 JARED S. AGUILAR v. STATE OF TENNESSEE Appeal from the Circuit Court for Montgomery County No. 41100542 Ross H. Hicks, Judge No. M2015-00430-CCA-R3-PC – Filed December 30, 2015 _____________________________ Jared S. Aguilar (―the Petitioner‖) filed a Petition for Post-Conviction Relief alleging ineffective assistance of counsel. After a hearing, the post-conviction court denied relief. On appeal, the Petitioner argues that trial counsel rendered ineffective assistance of counsel when she (1) decided not to obtain the services of an expert witness for the defense without consulting the Petitioner and (2) ignored the Petitioner‘s specific request that she cross-examine the State‘s experts ―on areas such as the contradicting of computer expert reports vs. the expert‘s in-court testimony and whether [the Petitioner‘s] estranged wife had ‗set him up.‘‖ Upon review of the record and applicable law, we affirm the judgment of the post-conviction court. Tenn. R. App. P. 3 Appeal as of Right; Judgment of the Circuit Court Affirmed ROBERT L. HOLLOWAY, JR., J., delivered the opinion of the Court, in which NORMA MCGEE OGLE and CAMILLE R. MCMULLEN, JJ., joined. Gregory D. Smith, Clarksville, Tennessee, for the appellant, Jared S. Aguilar. Herbert H. Slatery III, Attorney General and Reporter; Sophia S. Lee, Senior Counsel; John W. Carney, District Attorney General; and Daniel Brollier, Assistant District Attorney General, for the appellee, State of Tennessee. OPINION Trial On direct appeal, this court summarized the facts presented at trial as follows: A Montgomery County Circuit Court jury convicted [the Petitioner] of one count of knowingly possessing 100 or more images of child pornography, one count of knowingly possessing 50 or more images of child pornography, and four counts of knowingly possessing a single image of child pornography, all in violation of Code section 39-17-1003. See T.C.A. § 39-17-1003(a)(1), (b), (d) (2006). At trial, Montgomery County Sheriff‘s Office Investigator Mike Cereceres testified that as a member of the Internet Crimes Against Children task force, he utilizes file sharing software and graphic search terms, techniques most often used by consumers of child pornography, to discover those viewing child pornography and sharing child pornography data, ―whether it be in a video format, whether it be an image.‖ He explained that file sharing software enables users ―to share videos back and forth, to share PDFs, to share movies.‖ He said, ―[I]f I have all this stuff on my computer which I‘m sharing, videos, pictures, it‘s there for the world to get. All they have to do is use the same software that I have, type in the title of what they want.‖ He said that, in a typical case, after he observes a user‘s viewing or sharing child pornography, he ―geolocate[s]‖ the user using the internet protocol (―IP‖) address of the computer used to view or share the images. He said that the ―IP address . . . is essentially nothing more th[a]n like a house address except your computer gets assigned an address.‖ If he ascertains that the computer is located in Montgomery County, he asks for a judicial subpoena to be sent to the internet service provider for that IP address in order to determine the name and address of the service subscriber and owner of the computer. After determining the owner and subscriber information, he conducts surveillance on the residence before requesting a search warrant. After obtaining a search warrant, he executes the warrant, most often at night. Investigator Cereceres testified that in this case, while using file sharing software on January 9, 2011, he ―ended up making a download off of the [d]efendant‘s computer . . . . [and] obtaining three images of child pornography.‖ He said that the titles of the files indicated to him that they contained child pornography. He viewed the files and confirmed that they did, in fact, contain child pornography. He said that each of the files had a different ―secure hash algorithm‖ (―SHA‖), which, he explained, is akin to fingerprints in that it renders individual files unique. He said, ―No other file is going to have that same SHA one value.‖ After viewing the downloaded files, he ―geolocated‖ the IP address of the computer and determined that it was in Montgomery County. He then obtained a judicial subpoena that he sent to the internet service provider, and the service -2- provider indicated that the IP address was registered to [the Petitioner]. He used the information gleaned during his investigation to obtain a warrant to search [the Petitioner]‘s residence and computer. Investigator Cereceres said that when officers executed the search warrant at [the Petitioner]‘s residence on January 31, 2011, [the Petitioner] answered the door and indicated that he was alone. During the search, officers seized two laptop computers, and [the Petitioner] admitted ownership of one of the laptops. Upon questioning, [the Petitioner] acknowledged that he had used file sharing software, saying that he ―was downloading movies like Twilight for his wife, and he‘s just made a lot of downloads of various things.‖ Investigator Cereceres said that [the Petitioner] also provided a written statement: []I have a program called FrostWire that I use to download music and movies. In the past when child pornography was accidently downloaded I deleted it immediately. While making mass downloads in the past I have downloaded various things that I am not interested in, and I deleted them as such. When my wife and I have friends over I‘m usually the first to pass out. I leave my computer logged on in case anyone wants to use it. I have not had any issues with any friends in the past using my computer to download child porn or anything else that is illegal. I had a small party this past weekend to watch the probowl . . . . I enjoy inviting new soldiers to my house for various occasions to give them a sense of brotherhood. I have searched FrostWire for porn using such key words as little boy slash girl. I know it sounds suspicious; my intention was looking for jailbait. My understanding of jailbait is that it‘s a young girl, above the age of 18 that can pass for younger. I‘m not interested in child porn in any way, shape or form. Let‘s see; a video that was downloaded by accident that involved two boys. I tried to delete it, but the computer said it was open in another program. I still have not been able to delete it. I searched hymen looking for virgins obviously -3- over the age of 18. Carl David Hyman came up as pictures. I downloaded the page, and the pictures ended up being child porn. Again, I discarded them as something I wasn‘t interested in. When downloading movies I have hit preview and seen that it was child porn and stopped the download. These files are . . . in the incomplete section of the FrostWire folder . . . . I started using FrostWire when I got my computer in 2009. One day I accidently downloaded child porn. I was so shocked that I did delete it—the image and uninstalled FrostWire. I reinstalled it thinking that I can just ignore anything like that that came up. I had done so by deleting anything that is child porn. I have also typed in church girls gone wild thinking it was innocent girls over the age of 18 that became sluts. I never tried it again when it turned out to be child porn . . . . Investigator Cereceres acknowledged that a user could accidentally download child pornography, but he stated that an accidental download would be rare and that more than one accidental download to the same computer would be even more rare. He said that the search terms that [the Petitioner] admitted using were those most often used by individuals looking for child pornography and that, in his experience, those search terms were not indicative of a desire to view adult pornography. During cross-examination, Investigator Cereceres said that he did not know when [the Petitioner] had downloaded the files or how many times [the Petitioner] had accessed those files. He explained that when using file sharing software, ―if you click on one file, you‘re initiating that download of just the one file.‖ He said that a file sharing software user can see what is on another computer ―on a list.‖ He maintained that ―virus-wise or even someone hacking your e-mail wouldn‘t put a copious amount of child pornography on your computer.‖ During redirect examination, Investigator Cereceres said that the files observed via file sharing software would not automatically download after a search. Instead, he said, ―[Y]ou have to choose to double click on it, or right click, you have to make that choice.‖ He said that, because downloading the files required an intentional download, the presence of -4- these files on [the Petitioner]‘s computer was indicative of an intentional decision to download child pornography. He said, ―[G]oing online, you know, and to Google child pornography, it‘s not that easy to find unless you know what you‘re doing.‖ He added that most internet search engines filter out child pornography even when illicit search terms are used and that he had ―never seen‖ internet ―pop ups‖ that downloaded child pornography onto a computer. Dickson County Sheriff‘s Department Detective Scott Levasseur testified that he was ―in charge of the computer forensics lab, cyber crime unit‖ and also assigned as an investigator for the district attorney‘s office and ―to the FBI task force out of Nashville.‖ He said that his primary duty in each of these roles was to perform forensic examinations of computers and other electronic equipment as an ―electronic evidence collection specialist.‖ He explained, ―The job of a computer forensic examiner is to examine a device, find the evidence as it pertains to the case, preserve it and have it ready for display in a courtroom.‖ Detective Levasseur testified that Investigator Cereceres brought a laptop and some other pieces of evidence to be examined by Detective Levasseur. Only the laptop contained relevant evidence. He explained the process of forensic examination: We disconnect the battery supply, remove the hard drive. And then I take the hard drive out of the laptop and hook it up to a [write] blocker. And all a [write] blocker is a physical device that allows me to copy the hard drive without writing anything to the hard drive, so I‘m not making changes on that hard drive at all. And I copy the hard drive over onto one of the hard drives in the lab, so that I can work on it. And before that process starts, you were told about a hash value, well, we do an M–D hash on the hard drive and it hashes the whole hard drive, and it gives us one of them big long numbers, and then it copies it, and then it hashes the copy to make sure that it‘s the same number, so we‘ve an exact—an identical copy. And I did get an identical copy of the hard drive. After it‘s copied over and verified that it‘s identical, then I put the hard drive back in the laptop, and it goes into the evidence, and . . . I don‘t touch it again. I do all my work off of the image copy that I have. -5- . . . [W]hat I do after I copy the hard drive and process it with my forensics software to get it indexed out, the first thing I go ahead and do is I search for child pornography. I actually go through and individually look at every picture that‘s on the computer that‘s live, or been deleted, or whatever and scan through them, and bookmark out. And bookmarking out just means set aside for later examination when I find files that I believe to be child porn. So I look for all the images and all the videos that could be child pornography and bookmark them and mark them for later examination. Detective Levasseur said that he used ―software that . . . indexes the entire hard drive and it separates all the files . . . . So it will put all the pictures in one location and all the videos in another location and all the word documents in another location.‖ He explained that unallocated space on the hard drive is space ―that‘s not being used but there‘s files there. Because when a file gets deleted . . . . [i]t doesn‘t actually go anywhere[ ], it‘s still in the same place it was physically on the hard drive but it‘s just being given a tag that hey, it[‘]s been deleted.‖ He testified that although the ―deleted‖ file remains on the computer until overwritten by another file, ―it‘s not accessible to the user.‖ Detective Levasseur explained that after his software indexed the files, he manually examined all the image files by viewing them as ―thumbnail images‖ to determine if any contained child pornography. He said that he used his training and experience to make that determination, explaining, ―I‘ve seen millions [of images]. I‘ve seen the same ones over and over and over. I‘m pretty familiar with all the different series.‖ He said that all child pornography collected during law enforcement investigations is sent to the National Center for Missing and Exploited Children, which places the images into a database. The agency then confirms which images actually contain minors. Detective Levasseur testified that he located more than 160 images containing child pornography and six videos depicting child pornography on [the Petitioner]‘s laptop under the user account ―Jared.‖ He explained that the name of the computer was ―Jared and Brittany‖ and that it contained two user accounts, one for ―Jared‖ and one for ―Brittany.‖ He said that the ―Jared‖ account had been used 2,521 times and the ―Brittany‖ account had been used only 77 times. No child pornography was located under the ―Brittany‖ profile. Detective Levasseur recalled that he found the pornographic images ―in the owner‘s FrostWire save folder and unallocated space, which is free space, and the system volume information.‖ -6- Specifically, six child pornography videos came from the ―FrostWire save folder.‖ He explained, ―Basically FrostWire is a file sharing program. It‘s the sister program to LimeWire.‖ He said that once FrostWire has been added to the computer, when the user opens it, ―it‘s set to hook to the Gnutella Network where everybody else with these programs, FrostWire, LimeWire, they‘re on the same network, it will start looking for other computers to connect to.‖ He explained that the file name for child pornography images were ―really, really long and very descriptive . . . . because the more descriptions . . . they can get the more hits they‘ll get when they‘re searching files. And they want to be specific about what they‘re getting.‖ He said, ―I have been doing this for a long time, you can‘t mistake the terms that they‘re using for child pornography for adult pornography. I mean, you just can‘t mistake it.‖ Detective Levasseur testified that during his forensic examination, he recovered some of the search terms that [the Petitioner] used in Google: ―incest porn; jailbait girls; gay young boys porn; virgin porn; gay boys; jailbait porn; teen jailbait porn; caught my daughter giving head; caught my daughter having sex.‖ He said that those search terms when used in Google may or may not return results that contain child pornography but when used in FrostWire or LimeWire would yield ―child pornography in your search results.‖ Detective Levasseur testified that before the images would appear on [the Petitioner]‘s computer, [the Petitioner] ―had to type in a search term that‘s associated with child pornography, and you had to see your results, and then you have to double click on it, or single click on it, and click on the download button to download it.‖ His examination revealed that all of the files located in the ―save folder‖ were downloaded between 2:58 p.m. on January 16 and 5:01 a.m. on January 17, 2011. His examination also showed that of the last eight movie files played by [the Petitioner]‘s computer, half depicted child pornography. By examining the file creation dates and the file modified dates of the child pornography files and comparing them with other ―history files‖ on the computer created at the same time, Detective Levasseur discovered that someone had logged into a HotMail account and an account on a website called Ashley Madison at the same time that files containing child pornography were being downloaded by FrostWire. Detective Levasseur examined the profile picture for the Ashley Madison account and saw a picture of [the Petitioner]. The user name for both accounts was ―fun soldier zero one.‖ Just before downloading child pornography, someone searched Craigslist in the adult section for ―woman for men, and man and -7- woman for man‖ and just after the downloads, someone searched Google for ―jailbait girls.‖ During that same time, [the Petitioner] logged into the USAA website, and that data string indicated that [the Petitioner] ―was conducting financial business on that website.‖ Additionally, around the time of the child pornography downloads, [the Petitioner] logged into his accounts on You Tube and Facebook. Detective Levasseur found no evidence that any person other than [the Petitioner] had accessed the computer during those times. Detective Levasseur prepared a report of his findings and created a compact disc that contained his report and the child pornography images and videos that he found on [the Petitioner]‘s computer. Both the report and the compact disc were admitted into evidence, and each of the 167 images were displayed for the jury. Some of the images ―were really small . . . thumbnails that were carved out of unallocated space, that had been deleted. Some of the bigger ones . . . . were live on the . . . shared folder.‖ He explained that the images could not ―go to unallocated space until they‘re live on the system first.‖ The videos located on [the Petitioner]‘s computer were ―recognized throughout the law-enforcement community . . . as being children underage.‖ The titles of each of the six videos clearly indicate that they contain images of child pornography, and, in fact, that the children in each video are being subjected to degrading and sometimes violent sexual abuse. Portions of each video were played for the jury. Detective Levasseur acknowledged that it was possible to unwittingly download child pornography, explaining, [S]ometimes if . . . you‘re not paying attention and you click on the whole screen full of files and, say, download all at once, which nobody really ever does because it‘s too slow, . . . if you‘re searching for adult porn on a file sharing it is possible that child porn files will pop up and can accidently be downloaded. He clarified, though, that in those cases, only a few child pornography files rather than hundreds would be found on the hard drive because ―[y]ou‘re not going to keep making the same mistake over and over again.‖ He said that in the case of accidental downloads, they are universally deleted quickly and not played in the media player or moved from folder to folder. Additionally, he said that search terms can establish whether a user was looking for adult pornography or child pornography. He stated definitively -8- that the images on [the Petitioner]‘s computer did not come from ―pop ups‖ during his surfing the internet. He explained, ―The thing about it is if a pop up occurs I‘m going to be able to tell if it was a pop up and that‘s where it came from, because they‘re . . . known as redirects . . . . it will show me that it‘s a redirect, show me the code on it.‖ During cross-examination, Detective Levasseur admitted that it was possible to download a computer generated image of child pornography, but he stated that in his opinion it was not difficult to tell the difference between the real images and the computer generated images. He acknowledged that he did not personally know any of the people depicted in the images or videos. Detective Levasseur said that there were 10 live images in the save folder on [the Petitioner]‘s laptop, and the rest were in the unallocated space, indicating that they had been deleted. He said that he could not tell whether the images had been downloaded individually or in a mass download. He added that even in a ―mass download,‖ ―each download is an individual event‖ and that the selected files ―don‘t come all together.‖ The user account for ―Brittany‖ was created on the same day as the videos were downloaded. Upon redirect examination, Detective Levasseur clarified that even if the user wished to download several files at the same time, each individual file must be clicked. He said that only those files selected would be downloaded. At the conclusion of this proof, the State rested. [The Petitioner] elected not to testify and chose not to present any proof. Based upon the evidence presented by the State, the jury convicted [the Petitioner] as charged. State v. Aguilar, 437 S.W.3d 889, 893-98 (Tenn. Crim. App. Dec. 18, 2013), perm. app. denied (Tenn. May 16, 2014) (footnotes omitted). This court affirmed the Petitioner‘s convictions on direct appeal. Id. at 909. Post-Conviction Proceedings In his Amended Petition for Post-Conviction Relief (―the Petition‖), the Petitioner alleged that trial counsel ―failed to fully, completely and adequately advise [the] Petitioner of his rights and options and to use witnesses that were available at the hearing but dismissed without consulting [the] Petitioner first. Further, [trial] counsel did not fully investigate and/or explain the options available prior to his original trial.‖ He also asserted that ―major tactical decisions on his case were not presented to [the] Petitioner so -9- that [the] Petitioner could make an informed and knowing decision on the path that his case should proceed which amounts to the denial of the effective assistance of counsel.‖ At a hearing on the Petition, the Petitioner testified that he believed trial counsel was ineffective because the Petitioner ―didn‘t have an expert witness for the defense.‖1 The Petitioner explained that he had discussed the possibility of an expert witness but trial counsel informed him that ―such a witness would cost $125.‖ 2 Trial counsel did not explain that he could receive funds for an expert witness, and the Petitioner stated that he thought that he would have to pay the $125 himself. The Petitioner stated that he had just been discharged from the military and he could not afford to pay for an expert witness. He stated that he was not aware ―that the state would pick[ ]up any such costs.‖ The Petitioner stated that, had he known he would not have had to pay for the expert witness, ―[i]t would have changed the outcome [of his case] significantly.‖ To explain why he thought an expert would have been helpful to his case, the Petitioner stated that the ―sharing feature‖ on FrostWire could be disabled if the user does not want others to have access to the user‘s files. According to the Petitioner, if someone disables the sharing feature, the ―share folder is empty.‖ The Petitioner claimed that the sharing feature on his file sharing program was disabled and that was why ―they didn‘t find anything in [the Petitioner‘s] share folder.‖ Consequently, the Petitioner claimed that Investigator Cereceres ―did not do the investigation that he claim[ed] to have done, because he claimed to have downloaded directly from [the Petitioner‘s] share folder.‖ The Petitioner stated that trial counsel did not cross-examine Investigator Cereceres about the Petitioner‘s empty share folder. The Petitioner brought this discrepancy to trial counsel‘s attention after Investigator Cereceres had been excused as a witness, but trial counsel told the Petitioner that Investigator Cereceres would not testify again. The Petitioner also noted that Detective Levasseur testified that he found items in the Petitioner‘s share folder, and the Petitioner claimed that such testimony contradicted both Investigator Cereceres‘ testimony and Detective Levasseur‘s own report. 3 The Petitioner asked trial counsel to ask Detective Levasseur ―if you could access files without it being in the share folder,‖ but trial counsel did not ask the detective that question. The Petitioner asserted that a defense expert witness could have said that there was nothing in the Petitioner‘s share folder and that ―this investigation [was] impossible 1 It is not clear from this portion of the Petitioner‘s testimony what type of expert witness he felt should have been called. However, by examining the rest of the Petitioner‘s testimony and his brief on appeal, it appears the Petitioner believes trial counsel should have retained a computer expert to assist in his defense. 2 The Petitioner did not know whether the $125 was a flat fee or an hourly rate. 3 Detective Levasseur‘s report is not included in the record on this appeal. - 10 - because there‘s nothing in the share folder.‖ The Petitioner admitted that Detective Levasseur contradicted himself, but the Petitioner noted ―there‘s nothing to contradict him directly.‖ The Petitioner stated that he wanted to present a theory of defense that his now-ex- wife was working with the detective ―from day one‖ in order to get retribution against the Petitioner because he was cheating on her. The Petitioner told trial counsel about this theory, but trial counsel refused to use such a defense. The Petitioner acknowledged that he did not tell trial counsel that he wanted to proceed to trial, as opposed to taking a plea, until four days before the trial was scheduled to start. The Petitioner said that he did not ―really discuss‖ trial strategy with trial counsel. However, he stated, ―I had already come up with what I had thought was a pretty solid defense, and I asked [trial counsel] can we just look at the evidence, and [trial counsel] cut me off and just said ‗I‘ll see you Monday.‘‖ The Petitioner explained that he wanted to highlight that both he and his wife shared the computer, and the Petitioner ―was trying to figure out how you can say it‘s one person and not the other.‖ The Petitioner admitted that he had given a statement to police in which he admitted to downloading pornography off of FrostWire, but he maintained that he did not intentionally download child pornography but ―it had come up by accident several times . . . during my downloading.‖ The Petitioner also noted that, in the fifteen days after his ex-wife‘s log-in had been created on their shared computer, she had logged in seventy-seven times. The Petitioner believed that an expert witness could also help support the Petitioner‘s theory of defense because the expert could have looked at the date and time the Petitioner‘s ex- wife‘s log-in had been created and calculated that she logged into the computer five times a day. The Petitioner said he thought that evidence was significant because ―it shows two people had access to the computer but only one was ever questioned, only one was ever looked at. I mean, my wife, in my—in my opinion, was the embodiment of reasonable doubt.‖ Trial counsel testified that she discussed the possibility of a computer expert with the Petitioner and informed the Petitioner that they ―could try to find an expert to look over everything . . . .‖ Trial counsel also told the Petitioner that the state would provide funds for an expert. However, no expert was hired for the defense. Trial counsel explained that she spoke with Detective Levasseur and met with Investigator Cereceres at his office for over two hours. Investigator Cereceres showed trial counsel a copy of what they had found on the Petitioner‘s computer and ―walked [trial counsel] through‖ the evidence from beginning to end. In that meeting, trial counsel was able to see what was found on the computer and how the files were stored and determine if she needed to hire an expert witness. Trial counsel ―questioned [Investigator Cereceres] thoroughly on . . . - 11 - unallocated space, deleted files, where things were moved from shared files, how they were downloaded from share drives, and [Investigator Cereceres] thoroughly walked [trial counsel] though every part of that as preparation for [trial].‖ Additionally, trial counsel consulted with Charles Bloodworth, another attorney in her office who was very knowledgeable about computers, about the computer investigation and asked him to help with the hearing on the Petitioner‘s motion to suppress prior to trial. Mr. Bloodworth litigated the issue about the Petitioner‘s file sharing capability and whether the State should have been able to get a search warrant based upon the police investigation at the hearing for the motion to suppress.4 Based on her conversations with Detective Levasseur, Investigator Cereceres, and Mr. Bloodworth, and after consulting with the Petitioner, trial counsel ―didn‘t think that [a computer expert] would offer any benefit.‖ Trial counsel acknowledged that she made the decision not to hire an expert witness. Trial counsel recalled speaking with the Petitioner about the decision not to hire an expert, but she could not remember the exact conversation she had with the Petitioner. Trial counsel could not remember whether the Petitioner agreed with her conclusion not to hire an expert witness. Trial counsel also could not recall whether she had any discussions with the Petitioner about the Petitioner‘s share folder being blocked by disabling the file sharing feature. Trial counsel stated that the trial was scheduled to begin in June or July, but trial counsel announced that the Petitioner was accepting a plea agreement in March. However, trial counsel said she was prepared for trial when the Petitioner decided not to accept the plea on the eve of the scheduled trial date. Trial counsel explained that she did not ask for a continuance because she had already spoken to all of the witnesses involved before the March date and that she had spoken with the Petitioner numerous times, so there was no need for a continuance. Trial counsel stated that she cross-examined both Investigator Cereceres and Detective Levasseur. However, she did not recall having any discussions with the Petitioner about a blocked share file. On cross-examination, trial counsel explained that she gave the Petitioner a note pad and pencil to write down questions for her during the trial. Trial counsel read the Petitioner‘s notes and took them into consideration when she cross-examined witnesses. Trial counsel stated that she did not ask every question the Petitioner posed, but she noted that the Petitioner had ―a good amount of computer knowledge‖ and she tried to accommodate his requests with her cross-examination. Additionally, trial counsel stated 4 In the hearing on the motion to suppress, Mr. Bloodworth argued that the application for the search warrant of the Petitioner‘s home was insufficient and, consequently, that the warrant should not have been issued. There was no discussion as to whether the Petitioner‘s file sharing capability was disabled on his computer. - 12 - that she cross-examined the witnesses at trial about whether other people in the Petitioner‘s home could have downloaded the files. In regard to her decision not to hire an expert witness, trial counsel stated that she scoured the case files and looked for a way to challenge the evidence. However, the evidence showed that the images were downloaded within a twenty-four-hour window, and during that time: the Petitioner was signed into the computer as himself; he signed into an Ashley Madison account using his password; he signed into his email; and he signed into his banking account in order to conduct some financial business. Trial counsel stated that she had numerous meetings with the Petitioner and that she listened to all of the Petitioner‘s suggestions for defense theories. Trial counsel also said, ―I argued everything at trial from mass downloaded to zip files, to the wife being home[,] to not being home, to the pornography not being recognized individuals. I mean, I think if it was out there I think I threw it out there.‖ Trial counsel did not recall the Petitioner‘s theory—that his wife had colluded with police in order to frame the Petitioner—being so well-formed prior to trial. Prior to trial, the Petitioner simply told trial counsel that his ex-wife and ―other people‖ lived in the home, and trial counsel stated that she did cross-examine the witnesses about other people being in the house. Trial counsel acknowledged that it would be reasonable to conclude that the Petitioner‘s wife would have known the passwords to the Petitioner‘s accounts, and trial counsel stated that she brought out that possibility at trial. Investigator Cereceres testified that computers using FrostWire could share files with one another via the share folder. Investigator Cereceres acknowledged that even though the program‘s default setting allowed sharing, the Petitioner could disable the sharing function. Based on Investigator Cereceres‘ experience, he believed that the Petitioner‘s sharing function was enabled because ―otherwise it wouldn‘t share at all.‖ Investigator Cereceres explained that, in the course of his investigation, he would search for key words indicating child pornography and the FrostWire software would pull results from all over the world and would give Investigator Cereceres a geographical location of where the image was found. Investigator Cereceres then downloaded the images, and he was able to get the IP address of the computer from where the images were downloaded. After that, Investigator Cereceres was able to subpoena records from the internet carrier in order to get the address where the computer could be located. As such, Investigator Cereceres said that there was no need to work with the Petitioner‘s wife to get access to the Petitioner‘s computer. Investigator Cereceres did not recall speaking with the Petitioner‘s wife about this case. On cross-examination, Investigator Cereceres confirmed that he conducted a search for child pornography and found files that he was able to trace back to the computer that was at the Petitioner‘s house. - 13 - The Petitioner was recalled and responded to Investigator Cereceres‘ testimony, stating: . . . [H]e said it himself that you can‘t—you can‘t access someone‘s files unless it‘s in a share folder. If it‘s not in that share folder then you can‘t access that. And as—as it says, both in the published report by the State‘s expert witness and also as it states in the record, there was nothing ever found in my share folder; there‘s no way that he could have done the investigation that he claims to have done if there was nothing in the share folder. The Petitioner maintained that the sharing function on his computer was disabled. In the order denying post-conviction relief, the post-conviction court noted that both the Petitioner and trial counsel testified that they had ―some discussion or conversation about the possibility of using an expert witness‖ and that trial counsel decided not to call an expert witness after a thorough discussion with the State‘s experts and Mr. Bloodworth. The post-conviction court also stated: [The Petitioner] insists that had [trial counsel] retained and called an expert to testify, the expert would have refuted the testimony of the State‘s experts on these issues. However, [the Petitioner] has presented nothing but argument to support his position. He has yet to produce any evidence other than his own testimony to contradict the State‘s experts. Not only is he unable to show that an expert would say what [the Petitioner] says the expert would say, there is no showing that such an expert even exists. Additionally, the post-conviction court found that ―all of [the issues about the search of the computer and other people accessing the computer] were adequately addressed by [the Petitioner‘s] counsel at the suppression hearing or during the course of the trial.‖ This timely appeal followed. Analysis On appeal, the Petitioner argues that trial counsel rendered ineffective assistance of counsel when she (1) decided not to obtain the services of an expert witness for the defense without consulting the Petitioner; and (2) ignored the Petitioner‘s specific requests that she cross-examine the State‘s expert witnesses ―on areas such as the contradicting of computer expert reports vs. the expert‘s in-court testimony and whether [the Petitioner‘s] estranged wife had ‗set him up.‘‖ - 14 - In order to prevail on a petition for post-conviction relief, a petitioner must prove all factual allegations by clear and convincing evidence. Jaco v. State, 120 S.W.3d 828, 830 (Tenn. 2003). Post-conviction relief cases often present mixed questions of law and fact. See Fields v. State, 40 S.W.3d 450, 458 (Tenn. 2001). Appellate courts are bound by the post-conviction court‘s factual findings unless the evidence preponderates against such findings. Kendrick v. State, 454 S.W.3d 450, 457 (Tenn. 2015). When reviewing the post-conviction court‘s factual findings, this court does not reweigh the evidence or substitute its own inferences for those drawn by the post-conviction court. Id.; Fields, 40 S.W.3d at 456 (citing Henley v. State, 960 S.W.2d 572, 578 (Tenn. 1997)). Additionally, ―questions concerning the credibility of the witnesses, the weight and value to be given their testimony, and the factual issues raised by the evidence are to be resolved by the [post-conviction court].‖ Fields, 40 S.W.3d at 456 (citing Henley, 960 S.W.2d at 579); see also Kendrick, 454 S.W.3d at 457. The trial court‘s conclusions of law and application of the law to factual findings are reviewed de novo with no presumption of correctness. Kendrick, 454 S.W.3d at 457. The right to effective assistance of counsel is safeguarded by the Constitutions of both the United States and the State of Tennessee. U.S. Const. amend. VI; Tenn. Const. art. I, § 9. In order to receive post-conviction relief for ineffective assistance of counsel, a petitioner must prove two factors: (1) that counsel‘s performance was deficient; and (2) that the deficiency prejudiced the defense. Strickland v. Washington, 466 U.S. 668, 687 (1984); see State v. Taylor, 968 S.W.2d 900, 905 (Tenn. Crim. App. 1997) (stating that the same standard for ineffective assistance of counsel applies in both federal and Tennessee cases). Both factors must be proven in order for the court to grant post- conviction relief. Strickland, 466 U.S. at 687; Henley, 960 S.W.2d at 580; Goad v. State, 938 S.W.2d 363, 370 (Tenn. 1996). Accordingly, if we determine that either factor is not satisfied, there is no need to consider the other factor. Finch v. State, 226 S.W.3d 307, 316 (Tenn. 2007) (citing Carpenter v. State, 126 S.W.3d 879, 886 (Tenn. 2004)). Additionally, review of counsel‘s performance ―requires that every effort be made to eliminate the distorting effects of hindsight, to reconstruct the circumstances of counsel‘s challenged conduct, and to evaluate the conduct from counsel‘s perspective at the time.‖ Strickland, 466 U.S. at 689; see also Henley, 960 S.W.2d at 579. We will not second- guess a reasonable trial strategy, and we will not grant relief based on a sound, yet ultimately unsuccessful, tactical decision. Granderson v. State, 197 S.W.3d 782, 790 (Tenn. Crim. App. 2006). As to the first prong of the Strickland analysis, ―counsel‘s performance is effective if the advice given or the services rendered are within the range of competence demanded of attorneys in criminal cases.‖ Henley, 960 S.W.2d at 579 (citing Baxter v. Rose, 523 S.W.2d 930, 936 (Tenn. 1975)); see also Goad, 938 S.W.2d at 369. In order to prove that counsel was deficient, the petitioner must demonstrate ―that counsel‘s acts or omissions - 15 - were so serious as to fall below an objective standard of reasonableness under prevailing professional norms.‖ Goad, 938 S.W.2d at 369 (citing Strickland, 466 U.S. at 688); see also Baxter, 523 S.W.2d at 936. Even if counsel‘s performance is deficient, the deficiency must have resulted in prejudice to the defense. Goad, 938 S.W.2d at 370. Therefore, under the second prong of the Strickland analysis, the petitioner ―must show that there is a reasonable probability that, but for counsel‘s unprofessional errors, the result of the proceeding would have been different. A reasonable probability is a probability sufficient to undermine confidence in the outcome.‖ Id. (quoting Strickland, 466 U.S. at 694) (internal quotation marks omitted). Failure to Obtain an Expert Witness First, the Petitioner claims that trial counsel was ineffective for deciding not to obtain the services of a computer expert without consulting the Petitioner. The Petitioner appears to argue that he was prejudiced by the combination of ―the short time frame between the final decision to go forward with trial and [trial counsel‘s] sua sponte decision to forego any defense expert‖ (emphasis in original). However, there is no indication that trial counsel made the decision to ―forego any expert defense‖ after the Petitioner informed her that he wanted to proceed to trial. Trial counsel testified that she decided not to obtain a computer expert after she thoroughly discussed the matter with Investigator Cereceres, Mr. Bloodworth, and the Petitioner. Additionally, trial counsel testified that she had interviewed all the witnesses before the March trial date where she announced that the Petitioner would accept a plea and that she was ready for trial when the Petitioner decided to reject the plea. Accordingly, there is no factual basis for the Petitioner‘s contention that trial counsel decided not to obtain a computer expert only after the Petitioner informed her that he wanted to proceed to trial. The Petitioner has failed to show that the ―short timeframe‖ resulted in prejudice. Further, the Petitioner cannot establish prejudice by trial counsel‘s decision not to hire an expert because he failed to present any evidence of what a defense expert would have said if called to testify. This court has long held that ―[w]hen a petitioner contends that trial counsel failed to discover, interview, or present witnesses in support of his defense, these witnesses should be presented by the petitioner at the evidentiary hearing.‖ Black v. State, 794 S.W.2d 752, 757-58 (Tenn. Crim. App. 1990). The Petitioner cannot establish that he was prejudiced unless he can produce a material witness who ―(a) could have been found by reasonable investigation and (b) would have testified favorably in support of his defense if called.‖ Id. Neither this court nor the post-conviction court can speculate as to whether an expert witness who supported the Petitioner‘s theory existed, what such a witness may have said if presented, or how that witness may have responded - 16 - to a rigorous cross-examination. See id. Accordingly, the Petitioner has failed to establish that he was prejudiced by trial counsel‘s alleged deficiencies. In his reply brief, the Petitioner notes that Tennessee Supreme Court Rule 13 section 5(a)(2) bars state funding for expert witnesses in non-capital post-conviction proceedings and argues that mandating an indigent person to present expert testimony at the post-conviction hearing violates due process. This issue is raised for the first time on appeal. ―Issues not raised by the petitioner in the lower court[] cannot be raised for the first time on appeal.‖ Bobby Taylor v. State, No. M2008-00335-CCA-R3-PC, 2009 WL 2047331, at *2 (Tenn. Crim. App. July 14, 2009) (citing Cauthern v. State, 145 S.W.3d 571, 599 (Tenn. Crim. App. 2004)). To the extent that the Petitioner raises a new due process claim, such claim is not properly before this court. To the extent that the Petitioner raises his due process claim to explain why he did not present a witness at the post-conviction hearing to establish prejudice, his arguments are unpersuasive. The Petitioner correctly states that Tennessee Supreme Court Rule 13 section 5(a)(2) bars state funding for an expert witness in this case. However, we are unable to determine whether the Petitioner suffered prejudice from trial counsel‘s alleged failure to obtain an expert witness without credible testimony of what such an expert could have said. See Black, 794 S.W.2d at 757-58. Failure to Properly Cross-Examine Witnesses Second, the Petitioner argues that trial counsel failed to cross-examine the State‘s witnesses ―on areas such as the contradicting of computer expert reports vs. the expert‘s in-court testimony and whether [the Petitioner‘s] estranged wife has ‗set him up.‘‖ It is unclear whether the Petitioner asserts that the State‘s witnesses should have been cross- examined with their own reports or with reports from other computer experts. However, the trial transcripts reflect that trial counsel did question Detective Levasseur about his own report on cross-examination. Additionally, we note that no expert reports—from either the State‘s witnesses or other experts—are included in the record on this appeal. Therefore, we are unable to determine whether the Petitioner was prejudiced by the failure to use any such reports during cross-examination. The Petitioner also insists that the State‘s witnesses contradicted each other as to whether the Petitioner‘s file sharing function was disabled, and he provides citations to the trial transcript which purportedly illustrate the contradictory testimony. However, the Petitioner‘s citations do not include any discussion about whether the Petitioner‘s file sharing function was disabled. The Petitioner does not explain how the witnesses‘ testimony contradicted each other, and we are unable to find any contradictions between - 17 - the two testimonies in the citations provided.5 The Petitioner has failed to prove that trial counsel was deficient in her cross-examination of the State‘s witnesses about alleged discrepancies in their testimony. Likewise, the Petitioner has failed to show that trial counsel was deficient for failing to cross-examine the State‘s witnesses about the theory that the Petitioner‘s ex- wife colluded with police in order to frame the Petitioner. Trial counsel testified that, prior to trial, the Petitioner simply told her that his ex-wife and other people were living in the home and had access to the computer. Trial counsel did not hear the details of his theory that his ex-wife colluded with police until the post-conviction hearing. Nevertheless, Investigator Cereceres testified that he did not need to work with the Petitioner‘s ex-wife in order to conduct his investigation and that he did not recall ever speaking with the Petitioner‘s ex-wife. Moreover, during trial counsel‘s cross- examination, Detective Levasseur admitted that the Petitioner‘s ex-wife could have logged into the computer under the Petitioner‘s name and that she could have known the Petitioner‘s passwords to access his email and banking account. Trial counsel was not deficient for failing to ask whether the Petitioner‘s ex-wife colluded with police to frame the Petitioner. The Petitioner is not entitled to relief. Conclusion For the aforementioned reasons, the judgment of the post-conviction court is affirmed. _________________________________ ROBERT L. HOLLOWAY, JR., JUDGE 5 The Petitioner cites to portions of Investigator Cereceres‘ testimony wherein he explained that FrostWire utilizes a ―save folder‖ and an ―incomplete folder‖ when downloading files from the file sharing system. Investigator Cereceres noted that he found files in the ―unallocated space‖ on the Petitioner‘s hard drive that ―definitely were downloaded from the [file sharing system].‖ The Petitioner also cites to a portion of Detective Levasseur‘s testimony wherein he stated that he found several files in the ―unallocated space‖ of the Petitioner‘s hard drive and some files in the Petitioner‘s ―share folder.‖ Detective Levasseur explained that the files found in the ―unallocated space‖ had been deleted and were not accessible without forensic equipment but that such files ―can‘t go to unallocated space until they‘re live on the system first.‖ - 18 -