Com. v. McNulty, J.

J-S10013-16 NON-PRECEDENTIAL DECISION - SEE SUPERIOR COURT I.O.P. 65.37 COMMONWEALTH OF PENNSYLVANIA IN THE SUPERIOR COURT OF PENNSYLVANIA Appellee v. JAMES P. MCNULTY Appellant No. 1767 EDA 2015 Appeal from the Judgment of Sentence May 28, 2015 In the Court of Common Pleas of Philadelphia County Criminal Division at No(s): CP-51-CR-0003422-2014 BEFORE: GANTMAN, P.J., BENDER, P.J.E., and PLATT, J.* MEMORANDUM BY GANTMAN, P.J.: FILED MARCH 04, 2016 Appellant, James P. McNulty, appeals from the judgment of sentence entered in the Philadelphia County Court of Common Pleas, following his convictions of two counts of dissemination of child pornography, one count of criminal use of communication facility, and fifty counts of possession of child pornography.1 We affirm. In its opinion, the trial court fully and correctly sets forth the relevant facts and procedural history of this case. Therefore, we have no reason to restate them. Appellant raises the following issue for our review: ____________________________________________ 1 18 Pa.C.S.A. §§ 6312(c), 7512(a), and 6312(d), respectively. _____________________________ *Retired Senior Judge assigned to the Superior Court. J-S10013-16 WHETHER THE EVIDENCE WAS INSUFFICIENT AS A MATTER OF LAW TO PROVE THAT APPELLANT COMMITTED DISSEMINATION OF PHOTOS OF CHILD SEX ACTS, ONE COUNT OF CRIMINAL USE OF COMMUNICATION FACILITY, AND FIFTY COUNTS OF POSSESSION OF CHILD PORNOGRAPHY[,] THE [LOCATION] WHERE APPELLANT KNOWINGLY DISSEMINATED AND POSSESSED COMPUTER DEPICTIONS OF CHILDREN UNDER THE AGE OF 18 OR THAT HE USED OR CONTROLLED A COMPUTER OR THE IMAGES OF CHILD PORNOGRAPHY[?] (Appellant’s Brief at 5).2 A challenge to the sufficiency of the evidence implicates the following legal principles: The standard we apply in reviewing the sufficiency of the evidence is whether viewing all the evidence admitted at trial in the light most favorable to the verdict winner, there is sufficient evidence to enable the fact-finder to find every element of the crime beyond a reasonable doubt. In applying [the above] test, we may not weigh the evidence and substitute our judgment for the fact-finder. In addition, we note that the facts and circumstances established by the Commonwealth need not preclude every possibility of innocence. Any doubts regarding a defendant’s guilt may be resolved by the fact-finder unless the evidence is so weak and inconclusive that as a matter of law no probability of fact may be drawn from the ____________________________________________ 2 To the extent Appellant challenges the sufficiency of the evidence for his criminal use of communication facility conviction, Appellant failed to raise this issue in his Rule 1925(b) statement. Appellant’s failure to raise this issue before the trial court explains why the court’s opinion addressed the sufficiency of the evidence only for Appellant’s dissemination of child pornography and possession of child pornography convictions. Additionally, Appellant’s failure to raise this issue in his Rule 1925(b) statement constitutes waiver of the issue on appeal. See Commonwealth v. Poncala, 915 A.2d 97, 100 (Pa.Super. 2006), appeal denied, 594 Pa. 678, 932 A.2d 1287 (2007) (explaining failure to raise issue in court-ordered Rule 1925(b) statement results in waiver of issue on appeal). -2- J-S10013-16 combined circumstances. The Commonwealth may sustain its burden of proving every element of the crime beyond a reasonable doubt by means of wholly circumstantial evidence. Moreover, in applying the above test, the entire record must be evaluated and all evidence actually received must be considered. Finally, the [finder] of fact while passing upon the credibility of witnesses and the weight of the evidence produced, is free to believe all, part or none of the evidence. Commonwealth v. Jones, 874 A.2d 108, 120-21 (Pa.Super. 2005) (quoting Commonwealth v. Bullick, 830 A.2d 998, 1000 (Pa.Super. 2003)). After a thorough review of the record, the briefs of the parties, the applicable law, and the well-reasoned opinion of the Honorable Barbara A. McDermott, we conclude Appellant’s issue on appeal merits no relief. The trial court opinion comprehensively discusses and properly disposes of the question presented. (See Trial Court Opinion, filed August 7, 2015, at 7-12) (finding: facts established Appellant’s control over entire residence at 743 Watkins Street where agents discovered child pornography; specifically, Appellant confirmed he and his brother were only occupants of that address, search of Pennsylvania Justice Network verified that Appellant and his brother resided at that address, and agents recovered personal documents in Appellant’s name from computer desk at that address; facts also established Appellant knowingly possessed and controlled child pornography found on computers at 743 Watkins Street; search of computers seized from dining room at that address revealed 4 personal documents in Appellant’s -3- J-S10013-16 name, 508 child pornography images, 3 child pornography videos, and 100 link files indicative of child pornography; search of computers seized from Appellant’s bedroom at that address revealed video of Appellant titled “MeInCoat,” photo of Appellant titled “FacePic,” 844 child pornography images, and 2 videos indicative of child pornography; importantly, 956 of 1466 child pornography files found on computers seized from that address were stored under usernames marked “JAMES” and no child pornography files were discovered under usernames “JUSTIN”; of 510 child pornography files stored under generic usernames, agents discovered items on those computers that identified Appellant as user; additionally, evidence established Appellant had intent to exercise control over child pornography files; specifically, Appellant made several comments in presence of agents which implied his use of computers and his knowledge that computers contained illegal content; under totality of circumstances, sufficient evidence existed to establish that Appellant knowingly possessed child pornography discovered on computers confiscated from 743 Watkins Street; sufficient evidence also existed to prove Appellant possessed child pornography for purpose of dissemination; on September 15 and 18, 2013, Special Agent Tabak downloaded two child pornography videos from individual using file- sharing program to offer child pornography for download on BitTorrent network; Special Agent Tabak determined that individual who shared child pornography had used IP address associated with Appellant’s residence; -4- J-S10013-16 examination of computer confiscated from Appellant’s bedroom indicated it was computer used to download two child pornography videos copied by Special Agent Tabak; further examination of computer revealed that user had searched for, downloaded, and viewed those two child pornography videos on September 14, 2013; significantly, Appellant admitted he had used file-sharing program on computers located at 743 Watkins Street; thus, sufficient evidence also existed to support Appellant’s dissemination of child pornography conviction). Accordingly, we affirm on the basis of the trial court’s opinion. Judgment of sentence affirmed. Judgment Entered. Joseph D. Seletyn, Esq. Prothonotary Date: 3/4/2016 -5- Circulated 02/22/2016 11:02 AM IN THE COURT OF COMMON PLEAS FIRST JUDICIAL DISTRICT OF PENNSYLVANIA CRIMINAL TRIAL DIVISION COMMONWEALTH OF PENNSYLVANIA CP-51-CR-0003422-2014 CP-51-CR-0003422-2014 Comm. v. McNulty, James P Opinion v. JAMES MCNULTY 111111111111111 7329486551 Ill I II I Ill OPINION McDermott, J. August 7, 2015 Procedural History On January 7, 2014, the defendant, James McNulty, was arrested and charged with two counts of Dissemination of Photos of Child Sex Acts, one count of Criminal Use of Communication Facility, and fifty counts of Possession of Child Pornography. On June 17, 2014, the defendant entered into a non-negotiated guilty plea to two counts of Dissemination of Photos of Child Sex Acts, one count of Criminal Use of Communication Facility, and twenty-five counts of Possession of Child Pornography, before the Honorable Ann Butchart. Judge Butchart deferred sentencing until August 14, 2014, for the completion of pre-sentence and mental health reports. On August 14, 2014, the defendant filed a Motion to Withdraw his guilty plea, and on the same date, Judge Butchart granted the defendant's Motion. On March 26, 2015, the case was transferred to this Court for trial. After a bench trial the same date, this Court found defendant guilty of all charges and revoked bail. On May 28, 2015, after a hearing, this Court determined the defendant was not a sexually violent predator. That same day, this Court sentenced defendant to concurrent terms of imprisonment of two to four years for both counts of Dissemination of Photo of Child Sex Acts, a consecutive term of imprisonment of two to four years for Criminal Use of Communication Facility, and one year of probation for ten counts of Possession of Child Pornography, each to run consecutive to the other, for a total sentence of four to eight years of imprisonment followed by ten years of probation. No further penalty was imposed on the forty remaining charges of Possession of Child Pornography .. On June 12, 2015, the defendant filed a Notice of Appeal to the Superior Court. On June 16, 2015, this Court ordered the defendant to file a Statement of Matters Complained of on Appeal pursuant to Pa.R.A.P. 1925(b). On June 25, 2015, the defendant filed a timely Statement. On September 15, 2013, Special Agent Duane Tabak of the Pennsylvania Attorney General's Office's Child Predator Section conducted an investigation to identify individuals possessing and sharing child pornography using the BitTorrent file-sharing network.' On September 15, 2013, and again on September 18, 2013, Special Agent Tabak made a direct connection to a computer utilizing the IP address 68.82.141.16. This IP address was operating on the BitTorrent Network and was making child pornography publicly available for download. Special Agent Tabak successfully downloaded two video files depicting children, under the age of eighteen years old, engaging in sexual acts. N.T. 3/26/2015 at 45-47. On October 24, 2013, Special Agent Tabak obtained a court order directing Comcast to release the subscriber information associated with IP address 68.82.141.16 for the dates of September 15 and September 18. On October 28, 2013, Special Agent Tabak received information pursuant to the order indicating that Wang Chang of743 Watkins Street in I BitTorrent is a file sharing Network that allows users to download and share files with others via the internet. N.T. 3/26/2015 at 39. 2 Philadelphia was the subscriber to that IP address. On December 16, 2013, Special Agent Tabak prepared a search warrant for 743 Watkins Street. N.T. 3/26/2015 at 52-53, 56, 58-59. On December 16, 2013, Agent Kurt Smith, the Philadelphia Regional Supervisor from the Attorney General's Office's Child Predator Section, executed the search warrant on 743 Watkins Street. Agent Smith spoke with the defendant who confirmed that he and his brother, Justin McNulty, lived at 743 Watkins Street.2 During the search of the residence, Agent Daniel Block testified to overhearing the defendant tell his brother the following statements: "I've downloaded some extreme stuff, but I always thought they were adults;" "No matter what, they're going to find something illegal;" "This is horrible shit. They got all my hard drives. How am I going to show my face around my kids now;" "I didn't get to say good-bye to my kids and my ass is getting locked up;" and "They are ta1cing my IBM. Fuck." N.T. 3/26/2015 at 85-86, 107-08. Law enforcement recovered seventy-five computer related items from the McNulty residence including multiple computers, loose hard drives, and other media storage devices. Law enforcement also seized a photo ID, a vehicle title, and other paperwork belonging to the defendant on the computer desk in the first-floor dining room. 3 There was no documentation pertaining to Justin McNulty in the vicinity of the computers. From what Agent Smith believed to be Justin McNulty's room, agents recovered a Comcast bill dated September 12, 2013, that was addressed to Wang Chang. From what Agent Smith believed to be the defendant's bedroom, agents recovered one Apple computer, one Apple Mac computer tower and one external storage device. When Agent Smith informed the defendant that the search was related to child 2 Agent Smith later confirmed the defendant and Justin McNulty's addresses through Pa. Justice Network. N.T. 3/26/2015 at 87. 3 The computers were found in the first-floor main room which combined both the living room and dining room. N.T. 3/26/2015 at 93-94. 3 pornography, the defendant responded, "people get twenty years for downloading." N.T. 3/26/2015 at 61, 92, 96-97, 101. On November 24, 2014, Agent Braden Cook of the Attorney General's Forensic Unit examined the items seized from the defendant's residence. According to Agent Cook, nine items contained child pornography. An examination of an eMachines computer tower confiscated from the dining room of the McNulty residence revealed a user profile marked "JAMES." Under this user profile, Agent Cook discovered three child pornography videos and eighty-six Torrent files, indicative of child pornography, that were downloaded on January 31, 2011, and stored under the folder marked "Vuze."4 N.T. 3/26/2015 at 124, 134-35, 137. From an Apple Mac Minicomputer, seized from the dining room, Agent Cook recovered 508 child pornography images under the user profile marked "FirstLast." Also under this user profile, Agent Cook discovered four business documents belonging to the defendant including: a rejection letter from the Patent and Trademark Office addressed to the defendant and dated May 14, 2013; a letter addressed to Mr. Kurt Hughes from the defendant; an amendment name change document; and articles of amendment for "Holoco Incorporated," listing the defendant as Chairman and sole director. There was no relevant information discovered under the user profiles marked "GateVistaJames" and "VaioPrintJames." N.T. 3/26/2015 at 165-67. Agent Cook examined a Compaq Presario C500 laptop computer, also confiscated from the dining room. There were two non-default user profiles associated with this laptop computer, one marked "JAMES" and the other marked "JUSTIN." Agent Cook retrieved twenty-four link files that were indicative of child pornography stored under the user profile "JAMES." Agent 4 Vuze is a file-sharing program accessible on the BitTorrent network that allows users to share electronic files. N.T. 3/26/2015 at 38. 4 Cook did not discover any child pornography stored under the user profile "JUSTIN." N.T. 3/26/2015 at 168-69. An examination of an Apple Power Mac G5 computer tower that agents seized from the defendant's bedroom revealed a user profile marked "JAMES." Under this user profile, Agent Cook discovered a Vuze file-sharing program and 843 child pornographic pictures that were downloaded on August 3, 2009. N.T. 3/26/2015 at 140-41. Agent Cook examined an Apple iMac computer, also recovered from the defendant's bedroom, which revealed one child pornographic picture downloaded on January 12, 2012, and stored under a non-default user profile marked "USER." Elsewhere on this computer, Agent Cook discovered the two videos that Special Agent Tabak successfully downloaded on September 15, 2013 and September 18, 2013. Special Agent Tabak determined that both videos were searched and downloaded on September 14, 2013, and further determined that both videos were viewed on this computer. In an attempt to identify the user of this profile, Agent Cook examined other files located on this computer and found a video of the defendant with the file name "MelnCoat" and a picture of the defendant with the file name "FacePic." N.T. 3/26/2015 at 152, 154, 161-164. On December 16, 2013, law enforcement issued an arrest warrant for the defendant. On January 7, 2014, the defendant surrendered. N.T. 3/26/2015 at 98-99. Justin McNulty, the defendant's brother, testified on the defendant's behalf that Justin McNulty operated a computer repair business in his home. Justin McNulty recalled working on four customers' computers on December 16, 2013, and indicated that most of the computers confiscated from the first floor belonged to his customers. According to Justin McNulty, his employee, James Smith, who had been installing operating systems on the customers' computers 5 since 2002, was responsible for putting "JAMES" as the primary default account on these computers. Justin McNulty testified that the defendant carried his own laptop around with him and had used a separate Wi-Fi system from Clear Channel since 2005. Justin McNulty and his neighbor Wang Chang agreed to put the cable Wi-Fi service from Comcast in Wang Chang's name, creating an open network for both parties to use. N.T. 3/26/2015 at 182, 185-87, 198, 202. Justin McNulty also presented alibi evidence that he picked up the defendant on Tuesday, September 10, 2013, from his probation meeting and transported him to Kelly Baran's residence in New Jersey. He believed the defendant remained in New Jersey until Friday, September 13, 2013, at which time he picked up the defendant and drove him to his residence at 743 Watkins Street in Philadelphia, where the defendant remained for the weekend. Justin McNulty then drove the defendant back to New Jersey on Sunday, September 15, 2013, where the defendant remained until September 20, 2013. N.T. 3/26/2015 at 205-06. Kelly Baran, the mother of the defendant's children, testified on behalf of the defense. Baran testified that in September of 2013, the defendant would stay with her at her home located in National Park, New Jersey and with his brother in Philadelphia. Baran stated that the defendant was in New Jersey the week before his daughter's birthday on September 20, 2013, and departed the night of September 20, 2013. N.T. 3/26/2015 at254-55, 257, 259. The defendant testified to being in New Jersey on the 15 and 18 of September, 2013. The defendant admitted to using the computers agents confiscated from 7 4 3 Watkins Street, but specified that he worked primarily on a computer that he kept in his possession. The defendant denied downloading any child pornography on any computers and stated that he never set up the user profile "JAMES." N.T. 3/26/2015 at 224-25, 229-30, 237, 240. 6 The defendant claims that the evidence was insufficient to support his convictions because the Commonwealth failed to establish the defendant knowingly disseminated or possessed computer depictions of children engaging in a prohibited sexual act or that the defendant knowingly controlled child pornography. Evidence presented at trial is sufficient when, viewed in the light most favorable to the Commonwealth as the verdict winner, the evidence and all reasonable inferences derived therefrom are sufficient to establish all elements of the offense beyond a reasonable doubt. Commonwealthv. Baumhammers, 960 A.2d 59, 68 (Pa. 2008). The Commonwealth may sustain its burden of proving every element of the crime beyond a reasonable doubt by means of wholly circumstantial evidence: Commonwealth v. Estepp, 17 A.3d 939, 943 (Pa. Super. 2011) (citing Commonwealth v. Brooks, 7 A.3d 852, 856-57 (Pa. Super. 2010)). The fact-finder is free to believe all, part, or none of the evidence, and credibility determination rest solely within the purview of the fact-finder. Commonwealth v. Treiber, 874 A.2d 26, 30 (Pa. 2005). The defendant claims that the evidence is insufficient to prove he controlled child pornography. 18 Pa.C.S. § 6312(d) establishes that a person is guilty of Sexual Abuse of Children if: Any person intentionally views or knowingly possesses or controls any book, magazine, pamphlet, slide, photograph, film, videotape, computer depiction or other material depicting a child under the age of 18 years engaging in a prohibited sexual act or in the simulation of such act. Commonwealth. v. Diodoro, 970 A.2d 1100, 1107 (Pa. 2009). The Commonwealth need not establish that an individual controlled the child pornography to prove a violation of the statute if it can prove that a defendant knowingly possessed the child pornography. Id. at 1107. 7 Possession can be proven by showing actual possession or by showing constructive possession. Commonwealth v. Thompson, 93 A.3d 478, 490 (Pa. Super. 2014). Courts have defined constructive possession as "the ability to exercise a conscious dominion over the material; the power of control and the intent to exercise that control." Commonwealth v. Hanson, 82 A.3d 1023, 1035 (Pa. 2013). Constructive possession can be proven by circumstantial evidence and the requisite knowledge and intent may be inferred from examination of the totality of the circumstances. Commonwealth v. Parker, 847 A.2d 745, 750 (Pa. Super. 2004). For example, in Commonwealth v. Davidson, the Superior court held that the evidence was sufficient to establish that defendant knowingly possessed images of child pornography that were found on his computer. The Commonwealth presented evidence that the defendant was the owner and administrator of the computer and each of the twenty-eight pornographic photographs appeared in more than one place on the defendant's computer. Commonwealth v. Davidson, 860 A.2d 575, 581 (Pa. Super. 2004) aff'd, 938 A.2d 198 (Pa. 2007). Similarly, in Commonwealth v. Koehler, the Superior Court held that the evidence was sufficient to support the defendant's convictions of Sexual Abuse of Children and Possession of Child Pornography. There, the evidence consisted of a screen name and a systems properties name all referring in some respects to the defendant's proper name. The evidence also demonstrated that the defendant had ownership, use, and the ability to access the computer and the child pornography. Based on the totality of the circumstances, the court reasonably inferred that the defendant was the person who possessed the child pornography. Commonwealth v. Koehler, 914 A.2d 427, 437 (Pa. Super. 2006). 8 Other factors utilized by courts to determine whether a defendant possessed child pornography include: the defendant's ability to retain, download, save or print the image, the defendant's assertive steps that led to the downloading of child pornography images, and the defendant's knowledge of the existence of the images of child pornography. Diodoro, 970 A.2d at 1107 (holding that the evidence was sufficient to find the defendant guilty of Possession of Child Pornography where the defendant had 340 images of child pornography images stored on his hard drive.) In the instant case, the evidence establishes that the defendant knowingly possessed the child pornography discovered on the computers confiscated from 743 Watkins Street. The defendant resided at 743 Watkins Street and confirmed that he and his brother were the only occupants of the residence. N.T. 3/26/2015 at 87. Agent Smith conducted a search on the Pennsylvania Justice Network ("JNET") which verified that Justin and James McNulty were the residents of 743 Watkins Street. Id. In addition, agents recovered mailing and personal documents addressed to the defendant from the computer desk located in the dining room identifying his address as 743 Watkins Street. Id. at 95-96. Such facts are sufficient to prove the defendant had control over the entire premises, including the areas where the computers containing child pornography were located. The pornographic files Agent Cook discovered on the seized computers provided further support that the defendant had control and access to the child pornography. From the eMachines computer tower, the Apple Mac Minicomputer and the Compaq Presario laptop computer, all seized from the dining room, Agent Cook collectively retrieved four personal documents belonging to the defendant, 508 child pornography images, three child pornographic videos, and 100 link files indicative of child pornography. N.T. 3/26/2015 at 134, 137-38, 166, 168. From the 9 Apple Power Mac GS computer tower and Apple iMac computer, both confiscated from the defendant's bedroom, Agent Cook collectively discovered a video of the defendant named "MelnCoat," a photograph of the defendant named "FacePic," 844 pornographic images, and two video files indicative of child pornography. Id. at 140, 152, 163. 956 out of the 1,466 child pornography files found by Agent Cook were stored under folders or user names marked "JAMES." No pornographic material was found under the user profile marked "JUSTIN" N.T. 3/26/2015 at 169. For the 510 child pornography files stored under generic user profiles, Agent Cook discovered items that identified the defendant as the user of these computers. On the Apple iMac computer seized from the defendant's bedroom, Agent Cook discovered a video of the defendant with the file name "MelnCoat," and a picture of the defendant with the file name "FacePic." Id. at 163. On the Apple Mac minicomputer confiscated from the dining room, Agent Cook discovered four business documents belonging to the defendant. This evidence provides indicia of the defendant's control and ownership of the child pornography. Id. at 166. Additionally, the evidence established that the defendant had the intent to exercise control over the child pornography. Intent to exercise control over material may be established by knowledge of its presence. Commonwealth v. Bricker, 882 A.2d 1008, 1016 (Pa. Super. 2005). According to both Agent Smith and Agent Block, the defendant admitted: (1) "They got all my hard drives ... "; (2) "I've downloaded some extreme stuff, but I always thought they were adults"; and (3) "People get twenty years for downloading." N.T. 3/26/2015 at 89, 107-08. The defendant's comments provide evidence that the computer hard drives belonged to him and that he knew the computers contained illegal content. In reviewing the totality of the 10 circumstance, the evidence establishes that the defendant knowingly possessed material depicting children engaging in prohibited sexual acts. Next, the defendant claims that evidence was insufficient to show that he possessed child pornography for the purpose of dissemination. To be convicted under 18 Pa.C.S. § 6312(c), the Commonwealth must prove beyond a reasonable doubt, that: (1) there was a depiction of an actual child engaged in a prohibited sexual act or simulation of such act; (2) the child must be under the age of 18; and (3) defendant knowingly sold, distributed delivered, disseminated, transferred, displayed or exhibited the depiction to others, or possessed the depiction for the purpose of sale, distribution, delivery, dissemination, transfer, display or exhibition to others. Commonwealth. v. McCue, 487 A.2d 880, 883 (Pa. Super. 1985). The meaning of "disseminate" includes the act of spreading, sending, fostering general knowledge of, broadcasting, or publicizing. Commonwealth v. Hacker, 959 A.2d 380, 389 (Pa. Super. 2008) rev'd on other grounds, 15 A.3d 333 (Pa. 2011). As discussed supra, the evidence sufficiently established the defendant knowingly possessed the pornographic files. The evidence also establishes that the defendant knowingly disseminated depictions of child pornography. On the 15 and 18 of September, 2013, Special Agent Tabak downloaded two child pornography files from an individual using a Vuze file- sharing program to offer child pornography on the BitTorrent Network. N.T. 3/26/2015 at 45-47. Special Agent Tabak determined that the individual offering the pornography utilized an IP address associated with the defendant's residence. Id at 159. An examination of an Apple iMac computer confiscated from the defendant's bedroom indicated that this computer was used to download the two video files Special Agent Tabak copied on the 15 and 18 of September, 2013. According to Agent Cook, these video files were 11 searched for, downloaded, and viewed on this Apple iMac computer on September 14, 2013, using a Vuze file-sharing program. Id. at 159, 160, 162. The defendant admitted to using the computers located at 743 Watkins Street, and further admitted to using a Vuze file-sharing program. N.T. 3/26/2015 at 232. This Court concluded that the defendant, who had two personal files stored on the same Apple iMac computer that also contained the two child pornography videos Special Agent Tabak downloaded on September 15 and 18, 2013, was the user of the computer and the individual who offered the file for public download on the BitTorrent Network. Therefore, the evidence is sufficient to establish the defendant disseminated child pornography using a Vuze file-sharing program. For the foregoing reasons, defendant's judgment of sentence should be affirmed. BY THE COURT, Barbara A. McDermott, J. 12 Commonwealth v. James McNulty, CP-Sl-CR-0003422-2014 PROOF OF SERVICE I hereby certify that I am this day serving the foregoing filing upon the person(s), and in the manner indicated below, which service satisfies the requirements of Pa. R. Crim. P. 114: Philadelphia District Attorney's Office Three South Penn Square Philadelphia, PA 19107 Attn: Hugh Burns, Esquire Type of Service: Hand Delivery John McMahon, Esquire 13 9 N. Croskey Street Philadelphia, PA 19103 Type of Service: Certified Mail Dated: August 7, 2015 Amifj)--- Law Clerk to the Honorable Barbara A. McDermott