REPORTED
IN THE COURT OF SPECIAL APPEALS
OF MARYLAND
No. 962
September Term, 2016
______________________________________
JOHN R. FONE
v.
STATE OF MARYLAND
______________________________________
Eyler, Deborah S.,
Arthur,
Wilner, Alan M.
(Senior Judge, Specially Assigned),
JJ.
______________________________________
Opinion by Eyler, Deborah S., J.
______________________________________
Filed: June 6, 2017
A jury in the Circuit Court for Montgomery County convicted John R. Fone, the
appellant, of ten counts of distribution of child pornography. The court sentenced him to
five years for each count, with the sentences to run concurrently, and suspended the
sentences in favor of a five-year term of supervised probation.
The appellant presents four questions for review, which we have condensed and
rephrased as three:
I. Did the circuit court err by denying his motion to suppress from
evidence pornographic images of children seized in a search of his laptop
computer in his townhouse?
II. Did the trial court err or abuse its discretion by permitting the State’s
expert witness to opine about certain activity on the appellant’s laptop
computer immediately before and after pornographic images of children
were shared?
III. Was the evidence legally sufficient to support the appellant’s
convictions?
For the following reasons, we shall affirm the judgments of the circuit court.
FACTS AND PROCEEDINGS
The Child Exploitation Unit (“CEU”) operates within the Special Victims
Investigations Division (“SVID”) of the Montgomery County Police Department
(“MCPD”). On January 2, 2015, the CEU received information from the National Center
for Missing and Exploited Children (“NCMEC”) that an image of child pornography had
been attached to an email on a gmail account with the address CaptainJRF@gmail.com,
accessed from an Internet Protocol (“IP”) address in Germantown. The NCMEC had
received that information from Google, which operates gmail.
MCPD Detective Louvenna Pallas, who was working in the CEU, investigated the
information and on March 18, 2015, applied for and obtained a search warrant for the
appellant’s townhouse in Germantown. That same day, she and MCPD Detective Robert
Onorio went to the townhouse to execute that search warrant. They knocked on the door
and the appellant answered. They asked if they could come inside and speak to him, and
he consented.
The detectives sat down with the appellant at his dining room table and talked to
him for over an hour. With the appellant’s consent, Detective Pallas audio recorded their
conversation. The appellant told them he was married with two adult children, neither of
whom lived at home. His wife had been diagnosed with Alzheimer’s disease six years
earlier, and he was her primary caregiver. She was upstairs sleeping during the
interview.
Detectives Pallas and Onorio asked the appellant if he had a gmail account; he
replied that he did. He identified his email address as “CaptainJRF6969@gmail.com.”
They asked if he had any other email accounts, such as an account with an address of
CaptainJRF@gmail.com. He replied that he “might have had that.”1
The detectives inquired about the appellant’s internet usage. He acknowledged
having pornography on his computer but denied having any “inappropriate images of
children.” He primarily used a Gateway laptop computer (“laptop”), which he kept in the
1
The appellant later confirmed that he had used that email address. He also
identified two other email accounts he used: NudistJohn6969@yahoo.com and
CaptJRF6969@verizon.net.
-2-
basement of the townhouse. He said he spent a couple of hours each day in online
chatrooms and also spent time on Yahoo! Messenger, which is an instant messaging
program. He had an account with Flickr, an online photo storage site, under the name
“NudistJohn6969.”
Detective Onorio asked the appellant whether they could search his laptop and he
agreed. Detective Onorio accompanied the appellant to the basement of the townhouse to
retrieve the laptop. While the interview continued, Detective Onorio inspected the
contents of the laptop. He received permission from the appellant to run a computer
program to scan the laptop for child pornography. That program did not work, however,
so Detective Onorio carried out a manual search of the laptop. The appellant told the
detectives he engaged in “fantasy chats” on the laptop about sexual activity with children.
He denied ever having exchanged any child pornography images or videos. He said that
on one occasion the previous year a “guy” had sent him two images that he had looked at
for “about 10 seconds” and then deleted. One image depicted an infant and the other
image depicted “a child in pain.”
The appellant said he “d[id] it all” in caring for his wife. His sister had taken care
of his wife “once,” when he was out of town, but that time he had “left [his wife] at [his]
sister’s house.” His son lived in Seattle. A “good friend” who lived in Phoenix also had
taken care of his wife for him.
Detective Onorio located images of what the CEU calls “child erotica” on the
laptop. “Child erotica” are images of children in “sexually exploitative positions and
dress” that do not meet the definition of child pornography. He asked the appellant if it
-3-
was “fair to say [he had] a sexual attraction to children in a fan[tasy] component?” The
appellant replied, “Not to children, well yeah.” Detective Onorio inquired about the
appellant’s “age of attraction,” noting that his internet searches suggested he was
attracted to children from infancy through their teenage years. The appellant replied,
“Yeah.” He claimed there was no chance that he had child pornography on his laptop,
however.
As he continued his manual search of the laptop, Detective Onorio located an
image he believed to be child pornography. At that point, he stopped the interview and
advised the appellant that the detectives had a search warrant for his house. The
detectives seized the laptop and an external hard drive for it that was in the basement
where the laptop had been. They also seized a computer tower for a desktop computer
that was in the master bedroom. The appellant was not placed under arrest at that time.
Detective Onorio made copies of the hard drives from the devices seized at the
appellant’s townhouse and provided the copies to the MCPD Electronic Crimes Unit
(“ECU”). Detective William Heverly, with the ECU, analyzed the digital copies. From
the appellant’s laptop, he located ten images of child pornography and numerous internet
searches, websites visited, and chat sessions that were associated with child pornography.
The ten images had been sent by the appellant to an unknown third party on August 24,
2014.
On September 24, 2015, the appellant was arrested and charged with ten counts of
possession of child pornography and ten counts of distribution of child pornography. He
later filed a pre-trial motion to suppress the evidence seized from his townhouse.
-4-
On April 8, 2016, the court held a suppression hearing. Among other things, the
appellant argued that the search warrant was issued based upon information that was stale
and therefore did not give rise to probable cause. The court denied the suppression
motion, rejecting the staleness argument and ruling, in the alternative, that even if
probable cause was lacking the detectives relied upon the warrant in good faith. The
appellant filed a motion for reconsideration, which was denied.
Before trial, the State entered a nolle prosequi on the possession counts.
A four day jury trial commenced on May 2, 2016. The State called Detective
Pallas, Detective Onorio, and Detective Heverly, who was accepted as an expert in digital
forensic analysis. The audio recording of the appellant’s March 18, 2015 interview with
the police was played for the jury, with minor redactions.
Detective Heverly testified that there were two user accounts associated with the
appellant’s laptop: one under the name “John” and one under the appellant’s wife’s name.
The appellant’s wife’s account was password protected and had been accessed just 7
times, with the last access in January 2013. The “John” account was not password
protected and had been accessed 2,937 times. The ten images of child pornography that
formed the basis for the charges had been accessed from the “John” account on the laptop
and sent to an unknown third party via Yahoo! Messenger on August 24, 2014, between
3:41 p.m. and 3:47 p.m.
Detective Heverly determined that fifteen minutes before that six-minute Yahoo!
Messenger session, a user of the “John” account had accessed the Flickr account the
appellant identified as his during the police interview and the
-5-
CaptainJRF6969@gmail.com gmail account, which the appellant also had identified as
his. Five minutes after the end of the Yahoo! Messenger session, a user of the “John”
account had accessed that same gmail account. A user of the “John” account also had
accessed a particular chatroom before and after the Yahoo! Messenger session. Detective
Heverly further testified that the external hard drive seized from the appellant’s
townhouse had been plugged into the laptop before and after the Yahoo! Messenger
session and images from it had been accessed.
In his case, the appellant presented his own digital forensic analysis expert, Patrick
Siewart, who testified that it was possible that a user other than the appellant had
uploaded and sent the ten child pornography images. He further testified that laptops are
portable, and therefore the images in question could have been sent when the appellant’s
laptop was outside of Montgomery County or outside of Maryland. He suggested that the
MCPD should have subpoenaed the IP address logs for the appellant’s internet service
provider (“ISP”) for August 24, 2014, to determine whether the laptop was connected to
the internet at the appellant’s townhouse on that date.
The appellant’s motion for judgment of acquittal at the close of all the evidence
was denied.
After conviction and sentencing, the appellant noted a timely appeal. We shall
include additional facts in our discussion of the issues.
DISCUSSION
I.
Denial of the Motion to Suppress
-6-
In his pre-trial motion to suppress the evidence the police seized from his
townhouse, the appellant argued that the warrant was lacking in probable cause for
several reasons, including, as pertinent here, that the affidavit in support of the warrant
application “fail[ed] to state the date of the events relied upon to show probable cause . . .
[making it impossible] to determine the remoteness in time between the facts observed
and the issuance of the warrant, rendering the probable cause stale.” In other words, the
appellant maintained that because the warrant application did not disclose when the
image of child pornography was attached to the CaptainJRF@gmail.com account, that
event was not shown to be close enough in time to the date of the warrant application not
to be stale.2
At the suppression hearing, the warrant application was introduced into evidence
by joint stipulation. No testimony or other evidence was introduced.
The warrant application was sworn out by Detective Pallas on March 18, 2015,
and the warrant was issued and executed that same day. In the affidavit, Detective Pallas
detailed her experience, identified the location to be searched, listed the items to be
seized, and averred:
On 01-02-15, the [NCMEC] cyber tipline received a complaint from
Google that an image containing child pornography was attached to the
Google email address, captainjrf@gmail.com which may or may not have
been sent. (Cybertip #3384307)
The following is a description of the attached image:
1. Jpeg image titled: 39601_15
2
It appears that the image of child pornography that Google reported to the
NCMEC on January 2, 2015, is not one of the ten images of child pornography the
appellant later was charged with possessing and distributing on August 24, 2014.
-7-
This image depicts an adult female performing fellatio on a
male toddler’s penis.
Your affiant through her training, knowledge, and experience
identified the above described image as being child pornography.
Google provided an IP address, date, and time of the suspected
uploaded image. A preservation letter was also sent to Google, Inc. to
preserve the account information pending warrant service.
Detective Pallas further attested that, using the IP address, she determined that the
computer associated with the image was located in Germantown and used a Verizon
internet account. She obtained Verizon subscriber information for that account, which
was registered to the appellant at an address in Germantown. A Department of
Assessments and Taxation search revealed that the address was a townhouse owned by
the appellant and his wife. A criminal history background check showed that the
appellant had been arrested and charged with public masturbation in Jacksonville,
Florida, in 1986.
Detective Pallas further averred in the warrant application that, based on her
training and experience, “[s]ubjects who view or collect child pornography value their
collections and often go to great lengths to organize and protect their collections
including concealing the images on computer media.” Moreover, “when subjects
possessing child pornography conceal or delete it to avoid detection . . . it is possible to
recover files and data from computer media in hidden areas or after it has been deleted.”
Before the suppression court, the appellant argued that the information contained
within the four corners of the warrant was stale, and therefore the warrant was not
-8-
supported by probable cause.3 The State responded that staleness was not an issue
because, unlike drug evidence that is likely to “dissipate” because the drugs will be
“used,” child pornography stored on a digital device is a “collector’s item.”
Alternatively, the State argued that even if the information in the warrant was stale, the
evidence seized should not be excluded because Detectives Pallas and Onorio had relied
upon the warrant in good faith.
In rejecting the staleness argument, the suppression court, quoting United States v.
Seiver, 692 F.3d 774, 777 (7th Cir. 2012), stated that it was persuaded that staleness “‘is
highly relevant to the legality of a search for a perishable or consumable object like
cocaine but rarely relevant when it is a computer file.’” The court emphasized that
computer files, even if deleted, can be recovered. The court also found that Detective
Pallas’s averments in the warrant affidavit, based upon her 14 years of experience as an
SVID detective, about “the habits and propensities of those who view or collect child
pornography,” further supported the view that it is likely that a computer image of child
pornography will be saved (or will be recoverable even if deleted).
The court reasoned that given all of the above, the “issue of when did this
possession occur . . . doesn’t matter much because it is still on the computer until
destroyed and that there are ways to get these images back or to recover these images
3
This was not the appellant’s primary argument. His primary argument, which he
does not raise on appeal, was that the warrant was not supported by probable cause
because the tip from Google was inadmissible hearsay, was uncorroborated, and was
unreliable. Defense counsel did not touch on the staleness argument until he was given
an opportunity for rebuttal.
-9-
even if they have been deleted twice by a person who has access to the computer.”
Moreover, the court pointed out, federal law requires ISPs, including Google, to report
suspected child pornography to the NCMEC “as soon as reasonably possible.” See 18
U.S.C. § 2258A(a)(1). Thus, it reasonably could “assume that the existence of the picture
[was] fairly recent in time,” relative to the date of the tip (January 2, 2015).
Alternatively, the court ruled that even if the warrant was lacking in probable
cause because it was based on stale information, Detectives Pallas and Onorio acted in
good faith in executing it, under United States v. Leon, 468 U.S. 897 (1984). The court
opined that there was “nothing so glaring about this search warrant that would suggest to
a well-trained officer that he [or she] could not rely on that warrant particularly since it
[was] linked to [the appellant]’s address and computer very well.” Moreover, the
“description of the contraband [was] clear and d[idn’t] leave anything subject to
interpretation” and the source of the tip was Google, which did “have some degree of
reliability.”
The appellant filed a motion for reconsideration addressing only the issue of
staleness, which the State opposed.4 On the first day of trial, the court heard argument on
that motion and denied it.
Before this Court, the appellant contends the suppression court erred by “ruling
that the evidence contained within the search warrant affidavit was not stale.” He relies
upon numerous federal cases on staleness of probable cause that hold that information
4
The appellant’s motion does not appear in the record, but the State’s opposition
to it does.
-10-
leading police to believe that child pornography is present on a computer can become
stale over time; that each case must be considered on its unique facts; and that a period of
more than a year is often too remote. The appellant argues that because the warrant
affidavit established only that one image of suspected child pornography was attached to
an email on an unknown date before January 2, 2015, and there were no facts showing
that Detective Pallas took any additional investigative steps to determine when that image
was uploaded, the court could not assess whether the length of time was too remote. He
maintains, moreover, that Detectives Pallas and Onorio could not “claim objective good
faith when they relied upon a search warrant that was so lacking in probable cause.”
The State responds that the warrant application in this case was not the type of
conclusory, bare-bones application that falls outside the broad protections of Leon, and
the suppression court correctly ruled that the detectives relied upon the warrant in good
faith. The State maintains that because the good faith ruling was correct, this Court need
not address the staleness issue; and if we do, the issuing judge had a substantial basis to
believe that probable cause supporting the warrant was not stale, and therefore child
pornography would be found at the appellant’s townhouse.
We shall address staleness and good faith.
-a-
Our standard of review when considering a facial challenge to a search warrant is
well-established:
We determine first whether the issuing judge had a substantial basis to
conclude that the warrant was supported by probable cause. State v.
Amerman, 84 Md. App. 461, 463–64, 581 A.2d 19, 20 (1990). We do so not
-11-
by applying a de novo standard of review, but rather a deferential one. The
task of the issuing judge is to reach a practical and common-sense decision,
given all of the circumstances set forth in the affidavit, as to whether there
exists a fair probability that contraband or evidence of a crime will be found
in a particular search. Illinois v. Gates, 462 U.S. 213, 238–39, 103 S.Ct.
2317, 2332, 76 L.Ed.2d 527, 548 (1983). The duty of a reviewing court is
to ensure that the issuing judge had a “substantial basis for . . . conclud[ing]
that probable cause existed.” Id. (Quotation and citations omitted);
Birchead v. State, 317 Md. 691, 701, 566 A.2d 488, 492–93 (1989); Potts v.
State, 300 Md. 567, 572, 479 A.2d 1335, 1338 (1984) (Quotation and
citation omitted). The U.S. Supreme Court explained in Gates that the
purpose of this standard of review is to encourage the police to submit to
the warrant process. Gates, 462 U.S. at 237 n.10, 103 S.Ct. at 2331 n.10, 76
L.Ed.2d at 547 n.10.
Greenstreet v. State, 392 Md. 652, 667–68 (2006).
“One of the factors in the ‘probable cause puzzle’ concerns the staleness of the
information contained in an affidavit supporting a search warrant application.” Behrel v.
State, 151 Md. App. 64, 88 (2003) (quoting West v. State, 137 Md. App. 314, 327–28
(2001)). “There is no ‘bright-line’ rule for determining the ‘staleness’ of probable cause;
rather, it depends upon the circumstances of each case, as related in the affidavit for the
warrant.” Connelly v. State, 322 Md. 719, 733 (1991). In making that assessment, the
court considers whether “the ‘event[s] or circumstance[s] constituting probable cause,
occurred at . . . [a] time . . . so remote from the date of the affidavit as to render it
improbable that the alleged violation of law authorizing the search was extant at the
time[.]’” Patterson v. State, 401 Md. 76, 92 (2007) (quoting Peterson v. State, 281 Md.
304, 314 (1977)). That assessment turns on the particular facts of the case:
The ultimate criterion in determining the degree of evaporation of probable
cause, however, is not case law but reason. The likelihood that the evidence
sought is still in place is a function not simply of watch and calendar but of
variables that do not punch a clock: the character of the crime (chance
-12-
encounter in the night or regenerating conspiracy?), of the criminal
(nomadic or entrenched?), of the thing to be seized (perishable and easily
transferable or of enduring utility to its holder?), of the place to be
searched (mere criminal forum of convenience or secure operational base?),
etc. The observation of a half smoked marijuana cigarette in an ashtray at a
cocktail party may well be stale the day after the cleaning lady has been in;
the observation of the burial of a corpse in a cellar may well not be stale
three decades later. The hare and the tortoise do not disappear at the same
rate of speed.
Andresen v. State, 24 Md. App. 128, 172 (1975) (emphasis added).
Several federal courts addressing staleness of probable cause in the context of
child pornography stored on digital devices have reasoned that because digital images
have a “potentially infinite lifespan,” United States v. Elbe, 774 F.3d 885, 891 (6th Cir.
2014), cert. denied, 135 S.Ct. 1573 (2015), “‘the passage of time alone’ cannot
demonstrate staleness.” United States v. Burkhart, 602 F.3d 1202, 1206 (10th Cir. 2010)
(quoting United States v. Mathis, 357 F.3d 1200, 1207 (10th Cir. 2004)). In Seiver, 692
F. 3d at 775–76, for example, the Seventh Circuit held that a seven-month delay from the
date that child pornography images were downloaded from the internet to the defendant’s
computer to the date a search warrant for the defendant’s computer was applied for did
not render the information stale. The court opined:
“Staleness” is highly relevant to the legality of a search for a perishable or
consumable object, like cocaine, but rarely relevant when it is a computer
file. Computers and computer equipment are “not the type of evidence that
rapidly dissipates or degrades.” United States v. Vosburgh, 602 F.3d 512,
529 (3d Cir. 2010). Because of overwriting, it is possible that the deleted
file will no longer be recoverable from the computer’s hard drive. And it is
also possible that the computer will have been sold or physically destroyed.
And the longer the interval between the uploading of the material sought as
evidence and the search of the computer, the greater these possibilities. But
rarely will they be so probable as to destroy probable cause to believe that a
search of the computer will turn up the evidence sought; for probable cause
-13-
is far short of certainty—it “requires only a probability or substantial
chance of criminal activity, not an actual showing of such activity,” Illinois
v. Gates, 462 U.S. 213, 244 n. 13, 103 S.Ct. 2317, 76 L.Ed.2d 527 (1983),
and not a probability that exceeds 50 percent (“more likely than not”),
either. Hanson v. Dane County, 608 F.3d 335, 338 (7th Cir. 2010).
Id. at 777 (emphasis in original).
The Seiver court recognized that
after a very long time, the likelihood that the defendant still has [a
particular] computer, and if he does that the file hasn’t been overwritten, or
if he’s sold it that the current owner can be identified, drops to a level at
which probable cause to search the suspect’s home for the computer can no
longer be established.
Id. (emphasis in original). Seven months was far too short a period of time for that to
occur, however. See also United States v. Carroll, 750 F.3d 700, 704-05 (7th Cir. 2014)
(five-year gap between date victim alleged she was molested by defendant, at which time
he showed her images of child pornography and took digital images of her genitals, and
date of warrant application was not so remote as to render probable cause to search the
defendant’s home and seize cameras and other digital devices stale); Burkhart, 602 F.3d
at 1206-07 (information pertaining to an email between child pornography distributor and
the defendant two years and four months before issuance of a search warrant not stale);
United States v. Morales-Aldahondo, 524 F.3d 115, 119 (1st Cir. 2008) (lapse of three
years between the defendant’s purchase of digital child pornography images and warrant
application did not render search warrant stale); but see United States v. Greathouse, 297
F.Supp. 2d 1264, 1272-73 (D. Ore. 2003) (information that child pornography was
distributed from a computer f: drive 13 months before a search warrant was applied for
was stale, so search warrant was not supported by probable cause).
-14-
In the case at bar, the March 18, 2015 warrant application showed that Google
made its disclosure to the NCMEC about ten weeks earlier, on January 2, 2015. NCMEC
then reported the information from Google to the MCPD, which engaged in the
investigation set forth in the affidavit. Google gave the information to NCMEC pursuant
to a federal statute mandating ISPs to notify the NCMEC of suspected child pornography
“as soon as reasonably possible.” We agree with the suppression court that, given that
statutory mandate, the judge to whom the warrant application was presented rationally
could infer that the image of suspected child pornography was attached to an email on a
day reasonably close in time to January 2, 2015, and certainly within a few years. In this
case, in which the lapse between the report from Google and the issuance of the search
warrant was only three months and the lapse between the emails of August 24 and the
warrant was only seven months, Detective Pallas’s averments about the habits of
possessors of child pornography and the ability of the police “to recover files and data
from computer media [even] after it has been deleted” gave rise to a substantial basis for
the issuing judge’s probable cause determination. See Behrel, 151 Md. App. at 90 (“In
analyzing the issue of staleness, ‘the expertise and experience of the officer are to be
taken into account in applying the Fourth Amendment probable cause test,’ even if ‘the
officer would not qualify as an expert witness on the subject.’” (quoting 2 LaFave, §
3.2(c), at 38–39, 38 n.70)).
-15-
-b-
If we agreed with the appellant that the information in the warrant application was
stale, which we do not, we nevertheless would agree with the suppression court that the
good faith exception applied.
Evidence seized without a warrant or based upon a warrant not supported by
probable cause may be subject to exclusion. See, e.g., Agurs v. State, 415 Md. 62, 76
(2010). Unlike a warrantless search, however, “searches pursuant to a warrant will rarely
require any deep inquiry into reasonableness, for a warrant issued by a magistrate
normally suffices to establish that a law enforcement officer has acted in good faith in
conducting the search.” Leon, 468 U.S. at 922 (citations omitted). Thus, “[i]n the
absence of an allegation that the magistrate abandoned his detached and neutral role,
suppression is appropriate only if the officers were dishonest or reckless in preparing
their affidavit or could not have harbored an objectively reasonable belief in the
existence of probable cause.” Id. at 926 (emphasis added).
The Leon Court outlined four scenarios in which the good faith exception will not
apply:
(1) the magistrate was misled by information in an affidavit that the officer
knew was false or would have known was false except for the officer's
reckless regard for the truth;
(2) the magistrate wholly abandoned his detached and neutral judicial role;
(3) the warrant was based on an affidavit that was so lacking in probable
cause as to render official belief in its existence entirely unreasonable; and
(4) the warrant was so facially deficient, by failing to particularize the place
to be searched or the things to be seized, that the executing officers cannot
reasonabl[y] presume it to be valid.
Id. at 923. The appellant relies only upon the third scenario.
-16-
Where, as here, the facts are not in dispute, we review the suppression court’s
ruling on “the applicability of the Leon good faith exception to the exclusionary rule . . .
de novo[.]” Patterson, 401 Md. at 104–05. In assessing whether the warrant application
was “so lacking in probable cause as to render official belief in its existence entirely
unreasonable,” Leon, 468 U.S. at 923, we apply an objective test to determine whether
“officers, exercising professional judgment, could have reasonably believed that the
averments of their affidavit related a present and continuing violation of law, not remote
from the date of their affidavit, and that the evidence sought would be likely found at [the
place identified in the affidavit].” Connelly, 322 Md. at 735. As this Court has
explained, that reasonable belief test will not be satisfied when the warrant application
contains “nothing beyond mere conclusions.” State v. Jenkins, 178 Md. App. 156, 203
(2008).
In the case at bar, the warrant application was not conclusory or bare bones. It
gave the date and the substance of the Google tip to the NCMEC; the nature of the
pornographic image uploaded; the investigation into the IP address associated with the
upload; the means to establish that the appellant lived at that address; the types of devices
that might be used to store child pornography; expert information about the habits of
collectors of child pornography; and expert information about forensic techniques to
recover deleted computer files. Although the date the image was attached to the email
was not included, the date Google informed the NCMEC about the image, which was just
over three months before the warrant application, supported a reasonable belief that
someone at the appellant’s townhouse had engaged in a violation of the law (possession
-17-
of child pornography) within months of the warrant application and, in light of the other
averments, that evidence of that possession could be found on a device located at that
address, even if it had since been deleted.
II.
State’s Expert’s Testimony
As circumstantial proof of the appellant’s criminal agency, the State presented
evidence, through Detective Heverly, that 1) the appellant’s gmail account and his Flickr
account were accessed from his laptop within 15 minutes before the six minute Yahoo!
Messenger session in which the ten images of child pornography were distributed by
means of that laptop; 2) his gmail account also was accessed from that laptop within five
minutes after that session; 3) pornographic images of adult males were accessed by the
appellant’s laptop from his external hard drive soon before and after the critical Yahoo!
Messenger session; and 4) the “Silver Daddy” chatroom was accessed from the
appellant’s laptop soon before and after the Yahoo! Messenger session. The last two
categories of evidence were relevant because the appellant told the police in his interview
that he was bisexual, had had two long-term sexual relations with men over the past
several decades, and viewed adult gay pornography and participated in gay sexual
chatrooms such as “Silver Daddy.”
The appellant contends the State violated Rule 4-263(d), governing mandatory
discovery disclosures by the State in a criminal case, by not disclosing the specific
information about the gmail and Flickr account access, and consequently the court erred
-18-
by not excluding Detective Heverly’s testimony in that regard. (The appellant does not
raise any issue about the evidence on the external hard drive.)
The State responds that this issue is not preserved for review and, in any event, the
court did not err or abuse its discretion by permitting Detective Heverly to testify about
the account activity on the laptop soon before and after the incriminating Yahoo!
Messenger session.
On March 30, 2016, the State sent a letter to defense counsel stating that it
intended to call Detective Heverly as an expert witness in “digital forensic examination”;
that he would testify that his examination of the laptop revealed that the “contraband
charged in counts 1-10 was distributed via Yahoo! Messenger on August 24, 2014”; and
that he would “further testify that his examination revealed that both prior-to and after the
distribution of the contraband charged in counts 1-10, the user [of the laptop] accessed
images files and video files of pornography, specifically pornography depicting adult
men engaged in various sexual activities with each other.”
Before trial, the State provided the defense a summary of the Internet Evidence
Finding report (“IEF”) that Detective Heverly prepared after he examined the copies of
the hard drives for the appellant’s laptop and other devices. The State could not provide
the full IEF report to the defense because it contained prohibited images that could not be
shared. The full IEF report included the information about the gmail and Flickr accounts
used immediately before and after the Yahoo! Messenger session. The State made open
file discovery available, so the defense had access to the full IEF report. And, as part of
open file discovery, the State made the copies of the hard drives that were searched by
-19-
Detective Heverly and were the subject of his IEF report available for inspection by the
defense expert. Indeed, the defense expert inspected them, twice, performing his own
forensic examination and preparing his own IEF report.
At the outset of the proceedings on May 5, 2016, which was the third day of trial
and the day Detective Heverly was expected to testify, the prosecutor advised the court
that he planned to use a demonstrative exhibit titled “Timeline analysis for August 24,
2014” (“Exhibit 11”) that showed laptop user access of the Flickr account and the gmail
account in the periods shortly before and after the Yahoo! Messenger session. The
prosecutor explained that Detective Heverly’s testimony about user access before and
after the Yahoo! Messenger session would be “circumstantial evidence of who was using
the laptop at the time of the distribution [of child pornography].” The prosecutor
maintained that the information in Exhibit 11 had been disclosed to defense counsel in
the March 30, 2016 expert disclosure.
Defense counsel responded that the prosecutor had not disclosed that the State
intended to present evidence that a user of the laptop accessed the Flickr account or the
gmail account, only that a user of the laptop had viewed pornography involving adult gay
men. The prosecutor disagreed, taking the position that the expert disclosure was
sufficient and, in any event, because the defense expert had been given full access to the
copy of the hard drive for the laptop, the defense could not claim unfair surprise about
any information on the laptop.
The court denied the motion in limine, ruling that Detective Heverly could testify
about the user access as shown on Exhibit 11. Defense counsel “note[d] [his] objection
-20-
to the expert testifying as to the usage of the computer shortly prior to and subsequent
thereto because that was not something that was provided [in discovery].” He did not
seek a continuing objection.
Detective Heverly was called as the second witness that day. He was accepted as
an expert in digital forensic analysis by stipulation. After he testified generally about his
analysis of the laptop hard drive, the Yahoo! Messenger program, and the ten images of
child pornography sent via Yahoo! Messenger over six minutes on August 24, 2014, the
prosecutor approached the stand and showed him Exhibit 11 to refresh his recollection
about the start time (3:41 p.m.) and end time (3:47 p.m.) of that Yahoo! Messenger
session. Defense counsel did not object to any of this line of inquiry.
Later in Detective Heverly’s direct examination, the prosecutor asked: “And how
do you go about trying to identify the person who is sitting at the computer? The user.”
Detective Heverly responded that he tries to “find data and artifacts that will kind of help
us determine who that person was.” He gave as an example a user who works on his
resume, then engages in “illegal activity,” and then goes back to working on his resume.
He explained, “So we[] look for activity before and after.” He was asked if he had
“attempt[ed] to ascertain anything that was going on on [the laptop] that the user was
accessing at the time, 3:41 [p.m.] to 3:47 [p.m.] on August 24th of 2014?” He responded
that he had “specifically searched for activity right around that date to see what was
going on.” He did not find any other user activity during the Yahoo! Messenger session,
but he did find user activity just before and after that session. He then testified about the
gmail and Flickr accounts access as reflected on Exhibit 11. These questions all were
-21-
asked, and Detective Heverly’s answers all were given, without any objection or motion
to strike.
When Detective Heverly was asked whether he was able to determine that a user
had accessed the external hard drive seized from the appellant’s basement around the
time of the Yahoo! Messenger session, defense counsel objected and a bench conference
was held. The prosecutor explained that Detective Heverly was going to testify that
images were accessed from an external hard drive plugged into the laptop immediately
before and again immediately after the 6 minute Yahoo! Messenger session. Defense
counsel argued that the March 30, 2016 expert disclosure letter did not reveal that the
State’s expert would testify that the external hard drive had been accessed at those times.
The court disagreed and overruled the objection.
The prosecutor then resumed questioning Detective Heverly about the access of
the external hard drive. The questioning spans more than two pages of the transcript.
Defense counsel did not lodge any further objections.
The prosecutor subsequently sought to introduce Exhibit 11 into evidence. The
court denied that request, ruling that it was a demonstrative exhibit that had not been
disclosed to defense counsel in a timely manner.
We agree with the State that the issue the appellant raises on appeal—whether the
trial court erred by allowing Detective Heverly to testify about the laptop user accessing
his gmail and Flickr accounts close in time to the Yahoo! Messenger session in which the
child pornography images were distributed—is not preserved for review. “It is well-
established that a party opposing the admission of evidence ‘shall object’ at the time the
-22-
evidence is offered or as soon thereafter as the grounds for objection become apparent.
Wimbish v. State 201 Md. App. 239, 260–61 (2011) (quoting Md. Rule 4-323(a))
(additional citations omitted). If not, the objection is waived and the issue is not
preserved for review. Id. at 261. Also, “to preserve an objection, a party must either
‘object each time a question concerning the [matter is] posed or . . . request a continuing
objection to the entire line of questioning.’” Id. (quoting Brown v. State, 90 Md. App.
220, 225 (1992)). “Th[is] requirement of a contemporaneous objection at trial applies
even when the party contesting the evidence has made his or her objection known in a
motion in limine[.]” Id.
Here, the appellant did not object to any of the long line of questions that elicited
the evidence he complains about on appeal. His only objection was to the admission of
Detective Heverly’s testimony about the images of pornography on the external hard
drive, which is not the evidence being challenged on appeal. Moreover, we disagree with
the appellant’s argument in his reply belief that there was sufficient temporal proximity
between the trial court’s denial of the motion in limine and the direct examination of
Detective Heverly that the failure to make a contemporaneous objection should be
excused. Detective Heverly’s testimony was preceded by the cross-examination and
redirect examination of Detective Onorio. See, e.g., Hickman v. State, 76 Md. App. 111,
117-18 (1988) (“temporal closeness” exception to the contemporaneous objection rule
applies only when the court rules (or reiterates a prior ruling) immediately prior to the
objectionable testimony being elicited or evidence being offered). Also, at the close of
-23-
the motion in limine, the appellant could have requested a continuing objection but did
not.
In any event, we would not find merit in this issue even if it were preserved for
review. Rule 4-263(d) governs mandatory discovery disclosures by the State. At
subsection (d)(8), “Reports or Statements of Experts,” it requires the State to disclose, in
pertinent part, “[a]s to each expert consulted by the State’s Attorney . . . the expert’s
name and address, the subject matter of the consultation, the substance of the expert’s
findings and opinions, and a summary of the grounds for each opinion.” Also, the State
is required to provide the defense “the opportunity to inspect and copy all written reports
or statements made in connection with the action by the expert, including the results of
any physical or mental examination, scientific test, experiment, or comparison.” Id.
The March 30, 2016 disclosure by the State was non-specific, but referred to video
images and files accessed by the laptop user before and after the Yahoo! Messenger
session in which the images of child pornography were distributed. The details were
contained in the full IEF report prepared by Detective Heverly.
As noted, the State could not give that report to the defense as it contained
prohibited images, so the State gave the defense a summary and the opportunity for the
defense to have its own expert review the full IEF report in person. The dispute during
the motion in limine argument was over whether the State in fact did so. Defense counsel
asserted that the State did not; the prosecutor asserted that the State did. The court found
that the State had provided the report, and we cannot say that that finding was clearly
erroneous. Moreover, there was no dispute that the defense expert in fact examined the
-24-
hard drive copy for the laptop more than once and that the State offered to have Detective
Heverly review it with him. On this record, the court did not err or abuse its discretion in
denying the motion in limine.
III.
Sufficiency of the Evidence
Finally, the appellant contends the evidence was legally insufficient to sustain his
convictions for distribution of child pornography for two reasons. First, the State failed
to establish that he was the person using the laptop when the 10 images were sent via the
Yahoo! Messenger program. Second, the State failed to prove territorial jurisdiction, i.e.,
that the criminal conduct occurred in Maryland.
The State responds that it presented ample circumstantial evidence from which
jurors reasonably could infer that the appellant was the user of the laptop when the
images of child pornography were accessed and transmitted and that he was at his home
in Maryland at the time of the charged conduct. We agree with the State.
As this Court has explained:
“The standard for appellate review of evidentiary sufficiency is whether,
after viewing the evidence in the light most favorable to the prosecution,
any rational trier of fact could have found the essential elements of the
crime beyond a reasonable doubt.” State v. Smith, 374 Md. 527, 533, 823
A.2d 664 (2003) (citations omitted). “Weighing the credibility of witnesses
and resolving any conflicts in the evidence are tasks proper for the fact
finder.” State v. Stanley, 351 Md. 733, 750, 720 A.2d 323 (1998). In
addition, we give “‘due regard to the [fact finder’s] finding of facts, its
resolution of conflicting evidence, and, significantly, its opportunity to
observe and assess the credibility of witnesses.’” Moye v. State, 369 Md. 2,
12, 796 A.2d 821 (2002) (quoting McDonald v. State, 347 Md. 452, 474,
701 A.2d 675 (1997) (quoting State v. Albrecht, 336 Md. 475, 478, 649
A.2d 336 (1994))).
-25-
Larocca v. State, 164 Md. App. 460, 471-72 (2005) (en banc).
The appellant relies upon several federal cases holding that evidence was legally
insufficient to prove criminal agency vis-à-vis charges of possession of child
pornography when someone other than the defendant had access to the digital device and
was not excluded as the user. See United States v. Lowe, 795 F.3d 519, 523-24 (6th Cir.
2015) (evidence insufficient to prove criminal agency when the defendant, his wife, and
his “adoptive son” had access to the laptop and were not excluded as possible users);
United States v. Moreland, 665 F.3d 137, 151-52 (5th Cir. 2011) (evidence insufficient to
prove criminal agency when child pornography was found on a computer in the home
shared by the defendant, his wife, and his father, and there was evidence that the
defendant’s father frequently used the computer late at night while the defendant and his
wife slept).
In the case at bar, in contrast, the evidence viewed in the light most favorable to
the State did not reveal any actual or even potential alternative users. The appellant lived
in a townhouse with his wife, who was suffering from Alzheimer’s disease. The
appellant’s wife had been diagnosed around 2009, more than four years before the
Yahoo! Messenger session. The appellant admitted to the police that the laptop in his
basement belonged to him and that he spent several hours every day using it there. In his
police interview, the appellant did not claim that anyone else had used his laptop or even
that anyone else frequented his townhouse, either to visit or help care for his wife. He
openly informed the police about his bisexuality and that his current partner, of eight
-26-
years, lived in Atlanta and never came to his house to visit. 5 He acknowledged having
several gmail accounts (and provided the addresses); having a Flickr account (and
provided his user name); visiting the Silver Daddy chatroom (and provided his user
name); and using Yahoo! Messenger.
The appellant further admitted that he was sexually attracted to children; that he
engaged in fantasy chats about sexual activity with children; and that he frequently
viewed pornography, including images of adult men engaging in sex acts, on his laptop.
The evidence pertinent to April 24, 2014, the date of the distribution, showed that
a user of the appellant’s laptop accessed a gmail account belonging to the appellant and a
Flickr account belonging to the appellant about 15 minutes before the 10 images were
sent via Yahoo! Messenger. Within two minutes of the end of that session, a user of the
appellant’s laptop again accessed those same two accounts. A user of the appellant’s
laptop also accessed an external hard drive kept in the appellant’s basement before and
after the Yahoo! Messenger session, accessing images depicting adult males engaged in
sexual acts. This plainly was evidence from which reasonable jurors could infer that the
appellant was the person using the laptop before, during, and after the Yahoo! Messenger
session.
The evidence also was legally sufficient to prove that the criminal conduct took
place in Maryland. Detective Heverly testified that he had detected “artifacts” on the
laptop showing that it had been connected to the internet in the appellant’s townhouse ten
5
The appellant’s family members knew he was bisexual and knew his partner, but
he had promised his wife he would not bring his partner to their home.
-27-
days before the subject images were distributed. As noted, the appellant told police that
he used his laptop in his basement and that he had had to “give up all”
his activities after his wife became ill, sometime around 2009. There also was evidence
that the laptop was connected to an external hard drive on August 24, 2014, both before
and after the Yahoo! Messenger session. This was evidence from which a reasonable
juror could infer that the laptop was located in the appellant’s home in Maryland, where
he stored his laptop and the external hard drive, at the time of the Yahoo! Messenger
session.
JUDGMENTS AFFIRMED. COSTS
TO BE PAID BY THE APPELLANT.
-28-