NUMBER 13-17-00491-CR
COURT OF APPEALS
THIRTEENTH DISTRICT OF TEXAS
CORPUS CHRISTI - EDINBURG
JONATHAN DAVID LEWIS, Appellant,
v.
THE STATE OF TEXAS, Appellee.
On appeal from the 130th District Court
of Matagorda County, Texas.
MEMORANDUM OPINION
Before Justices Contreras, Longoria, and Hinojosa
Memorandum Opinion by Justice Hinojosa
Appellant Jonathan David Lewis appeals his conviction for possession of child
pornography, a third-degree felony. See TEX. PENAL CODE ANN. § 43.26 (West, Westlaw
through 2017 1st C.S.). A jury found appellant guilty, and the trial court assessed
punishment of eight years’ imprisonment in the Texas Department of Criminal Justice–
Institutional Division and a $10,000 fine. By two issues, which we have reordered,
appellant argues that: (1) the evidence supporting his conviction is legally insufficient;
and (2) the trial court erred in denying appellant’s motion to suppress evidence obtained
pursuant to a search warrant. We affirm.
I. BACKGROUND
A. Suppression Hearing
1. Testimony
Appellant filed a motion to suppress evidence obtained pursuant to a search
warrant, arguing that the supporting affidavit did not establish probable cause. Lee
Erickson, a special agent with the Department of Homeland Security, testified at the
suppression hearing. Agent Erickson is assigned to child exploitation investigations and
his agency is affiliated with the Houston Metropolitan Internet Crimes Against Children
(HMICAC) task force. Using specialized software, Agent Erickson monitors files being
shared by individuals using peer-to-peer (PTP) networks. PTP networks connect
computers using the same PTP software and allow the computers to share files, pictures,
videos, games, and programs.
2. Search Warrant Affidavit
The trial court admitted Agent Erickson’s search warrant affidavit into evidence.
According to the affidavit, PTP networks are “one of the most pervasive distribution
methods of child pornography[.]” An individual user receives files on a PTP network
through an Internet Protocol (IP) address. An IP address is a unique identifier for a
computer accessing the internet. Using a file’s “hash” digital signature, Agent Erickson
is able to identify known child pornography files, which are tracked by the National Center
2
for Missing and Exploited Children (NCMEC).
While conducting a PTP child pornography inquiry, Agent Erickson identified an IP
address sharing at least three known child pornography files. The title for these files
contained common child pornography search terms or “tags.” Through an administrative
subpoena, Agent Erickson obtained subscriber information from the internet service
provider controlling the IP address. The provider identified the IP address as being
assigned to an address in Bay City, Texas, where appellant resided. Agent Erickson
shared the IP address with Jonathan Cox, an officer with the Pearland Police Department.
Using this information, Officer Cox identified four child pornography videos in the PTP
share folder by referencing the files’ hash signature. Officer Cox provided Agent
Erickson with a compact disc containing the video files. Agent Erickson viewed the
videos and determined that they depicted minors engaging in sexual conduct.
Next, Agent Erickson visually inspected appellant’s residence. He noted multiple
secured wireless network systems in the front and rear of the home. He discovered a
pickup truck parked outside and confirmed that it was registered to appellant. Agent
Erickson and another agent knocked on the front door of the home and spoke to appellant.
As a ruse, Agent Erickson told appellant they were conducting an immigration
investigation and showed appellant a picture of an individual they were looking for.
Appellant told Agent Erickson that he resided in the home with his wife and daughter. In
his affidavit, Agent Erickson requested that a warrant be issued to seize various electronic
devices from appellant’s residence that might contain child pornography.
3
3. Trial Court’s Ruling
The trial court denied appellant’s motion to suppress, and the case proceeded to
trial.
B. Trial
At trial, Agent Erickson testified concerning his investigation and efforts to secure
a search warrant. 1 After the search warrant was issued, Agent Erickson executed the
warrant with federal and state law enforcement officials. Agent Erickson located
appellant in the rear of the house and informed appellant why he was there. Officers
performed a security sweep of the house, while the forensic team began locating
computers and other electronic devices. Officer Cox, who was part of the forensic team,
used specialized software to determine the contents of the electronic devices. A Dell
laptop, which appellant confirmed to be his personal laptop, was in the living room.
Officer Cox examined its contents and identified multiple child pornography files.
Officer Cox testified that he has received training in using forensic software. The
software enables him to perform on-site previews to determine the contents of an
electronic device. This allows Officer Cox to identify electronic devices containing
contraband. After a suspect device is seized, Officer Cox conducts an in-depth forensic
analysis of the devices.
Officer Cox seized several devices from appellant’s residence, including the Dell
laptop, two hard drives, an iPhone, and two video recorders. Officer Cox discovered
multiple child pornography files on the Dell laptop as well as various search terms
1Agent Erickson’s testimony in this regard is largely duplicative of his affidavit testimony, which we
detail above. We do not include Agent Erickson’s trial testimony on this topic to avoid redundancy.
4
commonly used to find child pornography. The search terms included variations of
“PTHC,” an acronym for preteen hardcore; pedo, which is short for pedophile or
pedophilia; and Lolita, which means “a precociously seductive girl.” Lolita, MERRIAM-
WEBSTER ONLINE DICTIONARY, https://www.merriam-webster.com/dictionary/Lolita (last
visited September 17, 2018).
The trial court admitted multiple exhibits containing Officer Cox’s forensic analysis.
The exhibits identified search terms, search results, and file names found on the seized
devices. The trial court also admitted five video files that were found on the laptop. The
videos were published to the jury, and each depicted a child under the age of eighteen
engaging in sexual intercourse. Two videos were located in the recycle bin of the laptop.
The others were located under “Saved Games” in a folder titled “Y-O.” The trial court
admitted two additional exhibits, described as a “data dump” from the seized hard drives.
The exhibits showed various files downloaded from PTP software and the files’ location
on the hard drive. Officer Cox identified the files as child pornography.
Dewayne Lewis, a special agent with Homeland Security, testified that he
interviewed appellant in front of the residence. He read appellant his Miranda rights, and
appellant agreed to speak to him. According to Agent Lewis, appellant was well versed
in concepts such as IP addresses, file sharing, and PTP networks. Appellant admitted
that he used PTP networks to access adult pornography. Appellant claimed that some
child pornography may have shown up as a search result, but he denied intentionally
downloading the files. Appellant told Agent Lewis that he used search terms such as
young, Tiny Tasha, and Lola. Appellant stated that if he recognized a file as child
5
pornography, he would delete it. Appellant verified that the Dell laptop located in the
living room was his computer. Agent Lewis showed appellant multiple images taken
from videos found on the laptop, and appellant claimed to recognize at least two of them.
Appellant then acknowledged that there was likely child pornography on his laptop. He
told Agent Lewis that he viewed certain child pornography videos all the way through
before deleting them.
In a later interview at the jail, appellant told Agent Lewis that he recognized other
search terms commonly used to download child pornography. Appellant stated that he
watched the videos before deleting them due to his morbid curiosity.
Jennifer Lewis, appellant’s ex-wife, recalled receiving a call from a Homeland
Security agent while at work. Jennifer went home where she saw officers looking at the
computers in the house. Jennifer initially bought the Dell laptop for office use, but she
later gave it to appellant. Jennifer stated that appellant removed the spare hard drives
from junk computers.
Appellant testified that he discovered something on his computer last year that
should not have been there. A program on his laptop was frozen, and when he exited
the program, he saw a file sharing program displaying titles of videos. According to
appellant, he opened the downloaded files to confirm they were as the titles described.
After doing so, he claimed he deleted the files. Appellant described various acts of
sexual conduct involving minors that were depicted in the videos. Appellant testified that
he lied to Agent Lewis when he said he used certain search terms. Appellant denied
downloading the files, speculating that someone else, possibly his neighbor, had used his
6
computer to do so. Appellant claimed that he had never used the spare hard drives that
contained child pornography.
Officer Cox testified in rebuttal that a picture of appellant’s daughter was saved to
one of the spare hard drives alongside child pornography files.
The jury returned a guilty verdict. This appeal followed.
II. LEGAL SUFFICIENCY
By his first issue, appellant argues the evidence supporting his conviction was
legally insufficient.
A. Standard of Review and Applicable Law
The standard for determining whether the evidence is legally sufficient to support
a conviction is whether, after viewing the evidence in the light most favorable to the
prosecution, any rational trier of fact could have found the essential elements of the crime
beyond a reasonable doubt. Johnson v. State, 364 S.W.3d 292, 293–94 (Tex. Crim.
App. 2012) (citing Jackson v. Virginia, 443 U.S. 307, 319 (1979)); see Brooks v. State,
323 S.W.3d 893, 898–99 (Tex. Crim. App. 2010) (plurality op.). The fact-finder is the
exclusive judge of the credibility of witnesses and of the weight to be given to their
testimony. Brooks, 323 S.W.3d at 899; Lancon v. State, 253 S.W.3d 699, 707 (Tex.
Crim. App. 2008). Reconciliation of conflicts in the evidence is within the fact-finder’s
exclusive province. Wyatt v. State, 23 S.W.3d 18, 30 (Tex. Crim. App. 2000). We
resolve any inconsistencies in the testimony in favor of the verdict. Bynum v. State, 767
S.W.2d 769, 776 (Tex. Crim. App. 1989).
The legal sufficiency standard of review is the same for both direct and
7
circumstantial evidence. Hooper v. State, 214 S.W.3d 9, 13 (Tex. Crim. App. 2007).
For the evidence to be sufficient, the State need not disprove all reasonable alternative
hypotheses that are inconsistent with the defendant’s guilt. Wise v. State, 364 S.W.3d
900, 903 (Tex. Crim. App. 2012). Rather, we consider whether the inferences necessary
to establish guilt are reasonable based upon the cumulative force of all the evidence.
Hooper, 214 S.W.3d at 13.
We measure the sufficiency of the evidence by the elements of the offense as
defined by a hypothetically correct jury charge. Cada v. State, 334 S.W.3d 766, 773
(Tex. Crim. App. 2011) (citing Malik v. State, 953 S.W.2d 234, 240 (Tex. Crim. App.
1997)). Such a charge is one that accurately sets out the law, is authorized by the
indictment, does not unnecessarily increase the State’s burden of proof or unnecessarily
restrict the State’s theories of liability, and adequately describes the particular offense for
which the defendant was tried. Id.
Under a hypothetically correct jury charge in this case, the State was required to
prove that (1) appellant (2) knowingly or intentionally (3) possessed (4) visual material
that visually depicts a child younger than eighteen years of age at the time the image of
the child was made (5) who is engaging in sexual conduct, and (6) appellant knew that
the material depicts a child younger than eighteen engaging in sexual conduct. See TEX.
PENAL CODE ANN. § 43.26(a). 2
2 “Sexual conduct” includes “sexual contact, actual or simulated sexual intercourse, deviate sexual
intercourse, sexual bestiality, masturbation, sado-masochistic abuse, or lewd exhibition of the genitals, the
anus, or any portion of the female breast below the top of the areola.” TEX. PENAL CODE ANN. § 43.25(a)(2)
(West, Westlaw through 2017 1st C.S.); see id. § 43.26(b)(2) (West, Westlaw through 2017 1st C.S.).
“Visual material” means either (a) any film, photograph, videotape, negative, or slide or any photographic
reproduction that contains or incorporates in any manner any film, photograph, videotape, negative, or slide,
or (b) any disk, diskette, or other physical medium that allows an image to be displayed on a computer or
8
Appellant’s sufficiency argument is limited to whether he possessed the requisite
mental state. “A person acts intentionally, or with intent, with respect to the nature of his
conduct or to a result of his conduct when it is his conscious objective or desire to engage
in the conduct or cause the result.” Id. § 6.03(a) (West, Westlaw through 2017 1st C.S.).
“A person acts knowingly, or with knowledge, with respect to the nature of his conduct or
to circumstances surrounding his conduct when he is aware of the nature of his conduct
or that the circumstances exist.” Id. § 6.03(b). “A person acts knowingly, or with
knowledge, with respect to a result of his conduct when he is aware that his conduct is
reasonably certain to cause the result.” Id. The Texas Penal Code defines
“possession” of contraband as “actual care, custody, control, or management.” Id.
§ 1.07(a)(39) (West, Westlaw through 2017 1st C.S.).
B. Analysis
Appellant contends that though there was evidence of deleted child pornography
files, there was no evidence that he had the ability to access the deleted files. Therefore,
according to appellant, he did not intentionally or knowingly possess child pornography.
Appellant’s argument misrepresents the evidence before the jury and is contrary to
controlling precedent.
In Wise, the Texas Court of Criminal Appeals noted the “peculiarities of
determining knowing or intentional possession of computer pornography.” 364 S.W.3d
at 904. The Court concluded that “each case must be analyzed on its own facts.” Id. at
905. Thus, the Court held that in computer-pornography cases, “like all criminal cases,
other video screen and any image transmitted to a computer or other video screen by telephone line, cable,
satellite transmission, or other method. Id. § 43.26(b)(3).
9
a court must assess whether the inferences necessary to establish guilt are reasonable
based upon the cumulative force of all the evidence considered in the light most favorable
to the verdict.” Id. Sufficient evidence to support a jury’s determination that the
defendant intentionally or knowingly possessed images of child pornography on his
computer may include evidence that: (1) the images of child pornography were found in
different computer files, showing the images were copied or moved; (2) the images of
child pornography were found on an external hard drive or CD, which indicates the images
were deliberately saved on the external devices; (3) the images stored on the computer
and the external hard drive were stored in similarly named folders; (4) the names of the
folders containing the images of child pornography necessarily were assigned by the
person saving the file; or (5) the defendant’s computer contained numerous images of
child pornography. Ballard v. State, 537 S.W.3d 517, 523 (Tex. App.—Houston [1st
Dist.] 2017, pet. struck) (citing Krause v. State, 243 S.W.3d 95, 110–12 (Tex. App.—
Houston [1st Dist.] 2007, pet. ref’d)).
Here, contrary to appellant’s assertion, there were multiple undeleted videos found
on appellant’s laptop and hard drives. A forensic examination of the seized devices
revealed several videos depicting children engaging in sexual conduct. Only two of the
videos were found in the laptop’s recycle bin. The others were stored under “Saved
Games” in a folder titled “Y-O.” There were also commonly used child pornography
search terms stored on the laptop’s PTP software. The search results for the PTP
software contained explicit titles relating to child pornography. The evidence established
that appellant was the primary user of the laptop. Appellant admitted to viewing multiple
10
child pornography videos, although he claimed to have deleted them. The fact that other
child pornography videos remained in a specific folder on the laptop supports an inference
that appellant knowingly and intentionally possessed child pornography. See Ballard,
537 S.W.3d at 524; Krause, 243 S.W.3d at 111–12. Further, the presence of common
child pornography search queries found on the laptop is circumstantial evidence that
appellant acted knowingly and intentionally. See Ballard, 537 S.W.3d at 524; Krause,
243 S.W.3d at 111–12.
Agents also discovered child pornography on the disconnected hard drives. This
evidence supports an inference that appellant acted knowingly and intentionally in
deliberately saving the illicit files to the external devices. See Ballard, 537 S.W.3d at
524; Krause, 243 S.W.3d at 112.
Appellant suggested through his testimony that the child pornography files could
have been placed on his laptop by another person. However, the State need not
disprove all reasonable alternative hypotheses that are inconsistent with appellant’s guilt.
See Wise, 364 S.W.3d at 903. Further, appellant’s explanation fails to account for the
child pornography found on the disconnected hard drives. The jury reasonably could
have rejected appellant’s alternative hypothesis. See Wise, 364 S.W.3d at 906–08;
Ballard, 537 S.W.3d at 524.
Viewing the totality of the evidence and inferences in a light most favorable to the
verdict, we conclude that the jury could have reasonably found beyond a reasonable
doubt that appellant knowingly and intentionally possessed the child pornography found
on the digital devices in his home. See Wise, 364 S.W.3d at 906–08; Ballard, 537
11
S.W.3d at 524; Krause, 243. We overrule appellant’s first issue.
III. SEARCH WARRANT AFFIDAVIT
By his second issue, appellant argues the trial court abused its discretion in
denying his motion to suppress evidence obtained pursuant to the search warrant.
A. Standard of Review and Applicable Law
An appellate court normally reviews a trial court’s ruling on a motion to suppress
by using a bifurcated standard of review, giving almost total deference to the historical
facts found by the trial court and reviewing de novo the trial court’s application of the law.
Amador v. State, 221 S.W.3d 666, 673 (Tex. Crim. App. 2007). However, when
assessing the sufficiency of an affidavit for a search warrant, the reviewing court is limited
to the four corners of the affidavit. Hankins v. State, 132 S.W.3d 380, 388 (Tex. Crim.
App. 2004). Accordingly, when we review the magistrate’s decision to issue a warrant,
we apply a highly deferential standard because of the constitutional preference for
searches to be conducted pursuant to a warrant as opposed to a warrantless search.
Swearingen v. State, 143 S.W.3d 808, 810–11 (Tex. Crim. App. 2004) (citing Illinois v.
Gates, 462 U.S. 213, 234–37 (1983)). We must interpret the affidavit in a common sense
and realistic manner, recognizing that the magistrate was permitted to draw reasonable
inferences. Davis v. State, 202 S.W.3d 149, 154 (Tex. Crim. App. 2006).
A search warrant may not legally issue unless it is based on probable cause. U.S.
CONST. amend. IV; TEX. CONST. art. I, § 9; TEX. CODE CRIM. PROC. ANN. art. 1.06 (West,
Westlaw through 2017 1st C.S.). To obtain a warrant, law enforcement must present to
a magistrate a sworn affidavit setting forth sufficient facts to establish probable cause that
12
a specific offense has been committed, among other requirements. TEX. CODE CRIM.
PROC. ANN. art. 18.01(c) (West, Westlaw through 2017 1st C.S.). Probable cause exists
when, under the totality of the circumstances, there is a fair probability that contraband or
evidence of a crime will be found at the specified location, and the facts stated in a search
warrant affidavit are “so closely related to the time of the issuance of the warrant that a
finding of probable cause is justified.” State v. McLain, 337 S.W.3d 268, 272 (Tex. Crim.
App. 2011). “The focus is not on what other facts could or should have been included in
the affidavit; the focus is on the combined logical force of facts that are in the affidavit.”
State v. Duarte, 389 S.W.3d 349, 354–55 (Tex. Crim. App. 2012). As long as the issuing
magistrate had a substantial basis for concluding that probable cause existed, we will
uphold that magistrate’s probable cause determination. McLain, 337 S.W.3d at 271.
B. Analysis
Appellant generally argues that Agent Erickson’s affidavit did not establish
probable cause that child pornography would be found at his residence. In his affidavit,
Agent Erickson details how he identified a particular IP address sharing known child
pornography files. Agent Erickson learned from the internet service provider controlling
the IP address that the address was tied to appellant’s residence. Agent Erickson
viewed video files shared by the IP address and confirmed that they were child
pornography. He then visited the residence and discovered that it had a secured
wireless network. A vehicle parked at the home was registered to appellant. Agent
Erickson also talked to appellant and confirmed that he resided at the home with his wife
and daughter.
13
We conclude that the facts and circumstances submitted to the magistrate within
the “four corners” of the affidavit provide a substantial basis for the magistrate’s
conclusion that child pornography would probably be found at appellant’s residence at
the time the warrant was issued. Thus, the affidavit was sufficient to establish probable
cause. See id. at 272. We overrule appellant’s second issue.
IV. CONCLUSION
We affirm the trial court’s judgment.
LETICIA HINOJOSA
Justice
Do not publish.
TEX. R. APP. P. 47.2(b).
Delivered and filed the
11th day of October, 2018.
14