NOTICE: This opinion is subject to motions for rehearing under Rule 22 as
well as formal revision before publication in the New Hampshire Reports.
Readers are requested to notify the Reporter, Supreme Court of New
Hampshire, One Charles Doe Drive, Concord, New Hampshire 03301, of any
editorial errors in order that corrections may be made before the opinion goes
to press. Errors may be reported by e-mail at the following address:
reporter@courts.state.nh.us. Opinions are available on the Internet by 9:00
a.m. on the morning of their release. The direct address of the court’s home
page is: http://www.courts.state.nh.us/supreme.
THE SUPREME COURT OF NEW HAMPSHIRE
___________________________
Merrimack
No. 2017-0265
THE STATE OF NEW HAMPSHIRE
v.
OWEN LABRIE
Argued: November 28, 2018
Opinion Issued: June 7, 2019
Gordon J. MacDonald, attorney general (Sean R. Locke, assistant
attorney general, on the brief and orally), for the State.
Christopher M. Johnson, chief appellate defender, of Concord, on the
brief and orally, for the defendant.
HANTZ MARCONI, J. The defendant, Owen Labrie, was convicted by a
jury on three counts of sexual assault, see RSA 632-A:4, I(c) (2016), one count
of endangering the welfare of a child, see RSA 639:3, I (2016), and one count of
using computer services for a prohibited purpose, see RSA 649-B:4, I(a) (2016)
(computer services use charge). State v. Labrie, 171 N.H. 475, 477 (2018). In
the instant appeal, the defendant challenges an order of the Superior Court
(Smukler, J.) denying his motion for a new trial based upon ineffective
assistance of counsel as to the computer services use charge. We affirm.
I. Pertinent Facts
The facts underlying the defendant’s convictions are fully set forth in
Labrie. See id. at 478-81. We repeat only those facts necessary to decide the
instant matter. For the facts relevant to the defendant’s motion for a new trial,
we rely upon the trial court’s order denying that motion and the record
submitted in this appeal.
A. Facts Underlying the Defendant’s Convictions
In early 2014, the defendant was 18 years old and a senior at St. Paul’s
School (SPS), a private coeducational boarding school in Concord. Id. at 478.
At SPS, there was a prominent annual springtime tradition known as the
“senior salute,” which involved a senior sending a note (or a senior salute) to a
younger student on campus, inviting that younger student to spend time with
the senior before he or she graduated. Id. Often, these notes had sexual
connotations. Id. Although a senior salute could be an invitation simply to
meet up with someone on campus, it was widely understood among SPS
students that physical contact, at least in the form of a kiss, was almost always
expected. Id. It was not unusual for the invitation to imply more advanced
sexual contact as well, including sexual intercourse. Id.
On May 28, the defendant sent the victim the following senior salute via
e-mail:
[W]hile the thought of my name in your inbox makes me
blush perhaps more than it should, there’s something [I] want to
share with you and my evenings left to do it are growing fewer by
the evening. [T]here’s a door here that’s been locked since before
we were born, but in a moment of divine intervention the night
before last, its hinges swung open in my hands. [I]f you want a
definition of the word bittersweet, think of me spending three years
trying to open it yet now only having three nights to remember the
view. [I] want to invite you to come with me, to climb these hidden
steps, and to bask in the nicest view [M]illville has ever had to
offer. [I] hope you’re all right with heights.
[I]f you’re not otherwise engaged, mull it over. [I] ask only
that you let me know soon--these days they’re not making time
quite like they used to.
Id. at 479 (quotation omitted). The victim replied to the defendant, stating:
[W]hile the thought of your name in my inbox gives me a sense of
[déjà vu], ([my sister] and I are very close sisters,) and although I
would like to climb those hidden steps with you, I have to decline.
2
I would like to climb that, not the list of [freshmen] that have spent
quality time with you.
Id. at 479-80 (quotation omitted). The defendant responded to the victim’s
e-mail, stating:
[P]robably one of the sassier emails [I]’ve ever received, my sweet
lord. . . . [I]’m afraid that list is slimmer than you might think.
[P]retty much nonexistent this term, even. [B]ut do as you please,
[ma chère]. [I]’d have taken you either way.
Id. at 480 (quotation omitted). The defendant concluded his response with
song lyrics in French, which translate as, “It’s 2:45, . . . it’s late and all the
boys are dancing for you to console you, . . . their queen.” Id. (quotation
omitted).
Following this exchange, the defendant asked a freshman in his
dormitory to put in a good word for him with the victim. Id. After speaking
with the freshman, the victim e-mailed the defendant. Id. Translated from
French, the e-mail stated, “It’s true, . . . please forgive me. Yes, only if it’s our
little secret.” Id. (quotation omitted). The defendant interpreted this to mean
that the victim would meet him, but only if they kept it between themselves.
Id. The defendant responded, “[W]hat a golden change of heart. [Y]ou’ve saved
it until the very end — there’s not a lot of time but [I]’m sure we can figure
something out. [P.S.] [Y]our French is amazing. [N]ot a soul needs to know.”
Id. (quotation omitted). Subsequently, via Facebook Messenger, the two made
a plan to meet. Id.
Before meeting the victim, as planned, on May 30, the defendant sent a
message to an SPS alumnus that stated, “I’m slaying [the victim].” Id. at 480-
81 (quotation omitted). Viewed in the light most favorable to the State, “slay”
was a word regularly used by students at SPS to refer to sexual penetration,
including digital penetration, oral sex, and sexual intercourse. Id. at 478 &
n.1.
That evening, the victim met the defendant on campus, and the pair, at
the defendant’s suggestion, entered an SPS building. Id. at 481. The evidence,
viewed in the light most favorable to the State, indicates that the defendant
ultimately penetrated the victim digitally, with his tongue, and with his penis.
Id. Viewed in the light most favorable to the State, the evidence establishes
that on the evening of the encounter and throughout the weekend, the
defendant told various SPS students that he had had sexual intercourse with
the victim. Id. In a conversation with a friend, the friend asked, “How did it go
from no to bone?,” meaning how did it go from the victim declining the
defendant’s e-mail invitation to the victim and the defendant having sexual
3
intercourse. Id. (quotation omitted). The defendant responded that he “just
pulled every trick in the book,” including oral sex. Id. (quotation omitted).
B. Jury Trial
The defendant’s jury trial was in August 2015. He was represented
primarily by J.W. Carney, Jr. and Samir Zaganjori. Because neither attorney is
admitted to practice in New Hampshire, they retained local counsel, Jaye
Rancourt. Carney acted as lead counsel; Zaganjori acted as co-counsel; and
Rancourt was available to consult with the rest of the trial team and to act as
needed.
In addition to the felony computer services use charge, the defendant
faced three counts of aggravated felonious sexual assault (AFSA), three counts
of misdemeanor sexual assault, two counts of endangering the welfare of a
child, and one count of misdemeanor simple assault. One of the AFSA charges
alleged that the defendant “utilize[d] the element of surprise” to cause
penetration. See RSA 632-A:2, I(i) (2016). The remaining two AFSA charges
alleged that he penetrated the victim when she indicated by speech and/or
conduct that she did not freely consent to that penetration. See RSA 632-A:2,
I(m) (2016). Six of the ten charges the defendant faced required the State to
prove sexual penetration beyond a reasonable doubt. After the close of the
State’s case, the trial court dismissed one of the endangering the welfare of a
child charges.
In her opening statement, the prosecutor told the jury that the defendant
raped the victim. The prosecutor said that the evidence would show, beyond a
reasonable doubt, that the defendant “penetrated [the victim] digitally, that he
engaged in oral sex with her, that he penetrated her with his penis, [and] that
she indicated by speech or her actions that her consent was not given, that this
was against her will.” As to the computer services use charge, the prosecutor
said:
The evidence is going to show you that the Defendant
utilized the email server and Facebook, social network, to entice
[the victim] to solicit, lure, or entice her to meet with him with a
plan that he was going to have sex with her. And I encourage you
to listen to that very carefully.
She told the jury that “[u]ltimately,” the case came “down to one thing: Do you
believe [the victim]? The State believes that you will.”
In his opening statement, Carney began by telling the jury that if the jury
had a reasonable doubt about the victim’s testimony, “then the government
hasn’t proven its case.” He told the jury that the first issue for it to consider “is
what does the evidence show about whether [the victim] was willing or
4
unwilling” during her encounter with the defendant. He suggested that the
“best evidence” of whether the victim was a willing or unwilling participant was
her “own words.” Carney then quoted each of the electronic messages that the
defendant and victim exchanged and invited the jury to infer that the victim’s
words in those messages were not the “the words of a rape victim.”
Carney told the jury that the second issue for it to consider was whether
there was “penetration of the vagina by . . . a penis or a finger or a tongue.”
Carney informed the jury that the phrase “senior salute” refers to a “range of
activity,” that the defendant denied to the police and would deny at trial that he
ever penetrated the victim sexually, and that the evidence would show that the
defendant and the victim, in fact, “never did have sex.”
The victim was the first witness to testify. On cross-examination, Carney
elicited the victim’s admission that the phrase “senior salute” could mean “to
just hang out with someone,” and did not necessarily refer to having sex. The
victim testified that, after she received the defendant’s senior salute, she
thought that he might want to kiss her, but that was “the extent [to which she]
thought it would go.” During his cross-examination of the victim, Carney
reviewed with her the electronic messages that she and the defendant
exchanged. Carney also asked the victim whether she had told her friend
before meeting up with the defendant, “I’ll probably let him finger me and . . .
at most I’ll blow him.” The victim testified that she had “no recollection” of
saying this.
On the fourth day of trial, several of the defendant’s friends testified on
behalf of the State. Defense counsel cross-examined several of those friends
regarding the meaning of terms like “score,” “hook up,” and “slay,” words that
the defendant had used in electronic communications and conversations with
his friends. Counsel elicited testimony that those terms did not necessarily
refer to sexual intercourse.
In addition, the defense team elicited testimony from both the
defendant’s friends and the victim’s friends that the term “senior salute” could
be an invitation to engage in any number of activities from walking around
campus to having sex. During his cross-examination of one of the defendant’s
friends, Zaganjori elicited testimony that the defendant never told that friend
that he planned or expected to have sexual intercourse with the victim. During
cross-examination, one of the victim’s friends testified that, before meeting up
with the defendant, the victim had said that she would probably let the
defendant “finger her” and that “[a]t most,” she would “blow him.”
The defendant testified on the sixth day of trial. On direct examination,
he testified that the word “slay” could refer to “walking around the lake,” that
the word “bone” could refer to “kissing,” that the word “score” did not
necessarily refer to engaging in physical activity with a member of the opposite
5
sex, and that the term “hook up” could refer to kissing or “dry-humping.” The
defendant testified that he sent a senior salute to the victim because he
“wanted to ask her out.” His plan, he said, was to take her to the chapel tower.
During his direct examination of the defendant, Carney reviewed with the
defendant the electronic messages that he and the victim had exchanged. In
testifying about the encounter with the victim, the defendant denied ever
putting his fingers, tongue, or penis under the victim’s underwear. He testified
that it had not “been [his] intention going into the night to have sex with [the
victim].”
In his closing argument, Carney again focused upon the electronic
messages that the defendant and the victim exchanged. He told the jury:
Now one of the most important piece[s] of evidence of all is
what the e-mails and chats were between [the victim] and [the
defendant]. In particular, the ones after they got together, not just
in the next hour, not through the remainder of the day, not into
the next day, into the next week between the two of them. Please
read those e-mails and chats and decide is this someone who was
unwilling in what happened in the attic. Was this the
conversations at [the victim’s] end by a rape victim, because that’s
what the government says she was, as soon as she left the Lindsey
Building, she was a rape victim. That’s the government’s view.
Take a look at what was said before there was any
prosecution, see the words [the victim] used. I’ll read some of [the
victim’s] lines. You will be able to put them in context. You will be
able to see where in the conversation they fit, but when I talk
about someone who is the victim of a violent sexual assault, that
as the Prosecutor described in her opening, would that person
[m]ake the following responses to her rapist?
[The defendant] that said “You’re an angel,” and [the victim]
replies “You’re quite an angel yourself.”
[The defendant] says something, and she replies in French,
“Thank you, my good man.”
[The defendant] pays the victim a compliment about
something, [the victim] says “You’re not so bad yourself.” They’re
talking about what happened on the top of the Lindsey Building.
Would a victim begin telling her assailant “I lost my earring up
there, ha, ha.”?
I mean, ladies and gentlemen, you come to this trial [with]
an incredibly valuable asset, and that’s your common sense that
6
you have developed from your life experience. You may have been
teenagers once, but you’re not teenagers anymore.
Would a victim of sexual assault say to her assailant a day
or two later, “Ha, ha, ha, the prose of French.” How about in
response to a compliment by [the defendant] that “You’re
incredible.” She responds “As are you. (French spoken).”
At another point, she thanks him, “(French spoken).” And at
the end of one conversation a few days later, he says “Happy
dreams.” And she replied “And you, too.”
There were e-mails even about birth control, condom, [the
defendant] responded to those. As [the defendant] told you
yesterday, he was puzzled by why [the victim] was doing this, but
wanted to reassure her that in his view, he knew she could never
be pregnant, and just went along with it so she could be reassured,
and in the end, she was.
....
So I respectfully submit that the evidence of the entire
encounter between [the defendant] and [the victim], not just based
on the physical evidence, not just based on the doctor visits that
I’ve just described, not just based on the statements [the victim]
made coming out of Lindsey Building to her friend, . . . to her
housemate, . . . and to her closest friend, . . . and also on her
statements to Detective Curtin about what she thought [the
defendant] would have realized, but above all, above all, the
e-mails between [the defendant] and [the victim] beginning minutes
-- well, let’s say 20 minutes, after they got back to their dorms, and
starting at that point going up to several days later, I submit that
when you look at those words of [the victim], herself, it would be
impossible to conclude that those were the words, these were the
statements, and that these were the actions of a person, who
during that encounter was not consenting and was not willing, and
so on.
He also told the jury:
Every indictment that alleges that [the defendant] had some
kind of contact of whatever nature with [the victim] and did so
either without her consent or with her surprise, every single one of
those indictments, you don’t even have to reach the point of
whether you have a reasonable doubt because the evidence is
7
overwhelming on those indictments that [the defendant] is not
guilty.
And, he concluded by saying:
Members of the jury, it’s not about that [the defendant] had
excellent academics or was a terrific athlete. I’m not saying he is a
saint, he’s not a saint, he’s a teenager, but I submit he told you the
truth from that stand, and at the end of the day if you cannot say I
believe everything [the victim] said beyond a reasonable doubt,
then the Prosecutor has not met her burden on any of the charges
and the Defendant is entitled to be found by you not guilty.
Thereafter, the trial court instructed the jury with regard to the computer
services use charge as follows:
Indictment 973494C accuses the Defendant of prohibited
uses of computer equipment. The definition of this offense has
three parts or elements. The State must prove each element
beyond a reasonable doubt.
Thus, the State must prove first, the Defendant utilized a
computer online service, and/or internet service to seduce, solicit,
lure, or entice another person to engage in an act of sexual
penetration . . . ; second, the Defendant actually believed that the
person he was attempting to seduce, solicit, lure, or entice, was
under the age of 16; and third, the Defendant acted knowingly.
The first element of the crime of prohibited uses of computer
equipment requires the State to prove that the Defendant utilized
the computer -- a computer online service and/or an internet
service, to seduce, solicit, lure, or entice another person to engage
in sexual penetration.
....
The definition of sexual penetration includes sexual
intercourse and cunnilingus. Sexual penetration also includes any
intrusion, however slight, by any part of the Defendant’s body into
the genital opening of the other person’s body. . . .
The second element involving the other person’s age is self-
explanatory. No further definition is required.
The third element requires the State to prove the Defendant’s
mental state. Here, that he acted knowingly. This means that the
8
State must prove that the Defendant was aware that his acts
would cause the prohibited result.
The State does not have to prove that the Defendant
specifically intended or desired a particular result. What the State
must prove is that the Defendant was aware or knew that his
conduct would cause the result.
Whether the Defendant acted knowingly is a question of fact
for you to decide. Keep in mind that there is often no direct
evidence of intent because there is no way of examining the
operation of a person’s mind. You should consider all the facts
and circumstances in evidence in deciding whether or not the State
has proved that the Defendant acted knowingly.
On the first day of trial, the court had instructed the jury that “[t]he opening
and closing statements of the attorneys are not evidence.”
The jury returned not guilty verdicts on all of the AFSA charges and the
misdemeanor simple assault charge. The jury found the defendant guilty of the
felony computer services use charge, three misdemeanor sexual assault
charges, and the misdemeanor endangering the welfare of a child charge.
C. Motion for Ineffective Assistance of Counsel
Shortly after the jury returned its verdicts on August 28, 2015, the
defendant moved to set aside the verdict on the computer services use charge,
asserting that his conviction was “inconsistent with the overall purpose of the
Criminal Code” and that it “violate[d] his rights under the State and Federal
Constitutions.” Alternatively, the defendant asked to be relieved of the
obligation to register with the sex offender registry. The trial court ruled that
the motion was untimely, but denied it on its merits nevertheless. In doing so,
the trial court found that the evidence was “legally sufficient to support the
jury’s verdict of guilty on the computer [services use] indictment.”
Thereafter, the defendant appealed his convictions to this court. See
Labrie, 171 N.H. at 477. As to the computer services use charge, the defendant
argued that the evidence was insufficient to establish that “when he
communicated with the victim over a computer network, he intended to
‘seduce, solicit, lure, or entice’ [her], with the belief that she was under the age
of 16, to engage in an act of sexual penetration.” Id. at 482; see RSA 649-B:4,
I(a).
While the defendant’s direct appeal of his convictions was pending, he
moved for a new trial based upon ineffective assistance of trial counsel.
Processing of his direct appeal of his convictions was stayed.
9
The trial court held a three-day evidentiary hearing on the defendant’s
motion for a new trial. Carney and Zaganjori testified that the defendant
consistently denied all the charges against him. As a result, their trial strategy
was to defend the charges by arguing that the defendant did not penetrate the
victim sexually.
The defense strategy with respect to the computer services use charge
was, in Zaganjori’s words, “encompassed in [the] general theory of the case,”
which was that, on the night in question, the defendant “didn’t meet up with
[the victim] . . . to engage in sexual intercourse, but just to have a romantic
special evening.” He explained: “[O]ur theory of the case was that he met up
with [the victim] that evening . . . with romantic ideas, but not to engage in
sexual intercourse, and our defense was that no intercourse had occurred
. . . .” Zaganjori opined that this theory was “consistent . . . with not being
responsible under the computer [services use] statute because the question
would be, obviously, what was his intent when he sent those particular
messages, and we . . . [went] to great lengths to illustrate that his intent at that
time was not to have sex.” Zaganjori testified that to illustrate the defendant’s
intent, defense counsel “cross-examined several of [the victim’s] friends, as well
as several of [the defendant’s] friends and . . . elicited from them that some of
the terminology that was used [in the messages] . . . , that those terms didn’t
necessarily mean sexual intercourse.” In addition, he testified that defense
counsel “challenged whether sexual intercourse had actually occurred,” and
that the defendant testified that “his intent was not to go there to have sex.”
Zaganjori testified that the defense theory was that if defense counsel were able
“to show that sexual intercourse did not, in fact, occur, then a jury [would be]
less likely to believe that that was his intent originally.” Zaganjori testified that
he “knew that [the defendant] could be convicted of the computer [services use]
charge based on the misdemeanor sex offenses.” He also agreed that the
defendant could be found not guilty “on all the sexual assault charges, [both]
misdemeanor and felony, and still be found guilty of the computer [services
use] charge.” Zaganjori believed that this result — that the defendant would be
acquitted of the AFSAs and the misdemeanor sexual assault charges, but
convicted of the computer services use charge — “was probably unlikely.”
Carney testified that the defense team pursued three defenses to the
computer services use charge: (1) to challenge, at trial, the State’s contention
that the defendant penetrated the victim; (2) to argue, post-trial, if the
defendant were convicted of the computer services use charge and the
misdemeanor sexual assaults, but not of the AFSAs, that it was contrary to
legislative intent to apply the computer services use statute to him; and (3) to
argue, post-trial, if the defendant were convicted of the computer services use
charge and the misdemeanor sexual assaults, but not of the AFSAs, that the
penalty under the computer services use statute constituted cruel and unusual
punishment. See State v. Serpa, 170 N.H. 781 (2018) (ruling upon similar
arguments). With respect to the defense team’s trial strategy, Carney testified
10
that the team “tried to very zealously contest the government’s allegation that
[the defendant] had engaged in any type of sexual activity with [the victim] that
involved penetration. So we contested whether it had been forcible and we
contested whether it had even occurred at all.” His “view was that if [the
defendant] were acquitted of the forcible charges and . . . the consensual
charges, then it was highly likely, if not almost certain, that the jury would
acquit him on the computer charge, as well.” He explained:
If [the defendant] had forcibly raped [the victim], then I felt
someone could infer that that was his intent in communicating
with her to set up the meeting.
If [the defendant’s] intent were to have a sexual experience
with [the victim] that included penetration, then it would be
possible to conclude that that was his intent in sending a
communication, setting up the meeting with her.
So the jury’s verdicts on those two sets of charges would be
very much an indication of what the jury thought [the defendant’s]
intention was in setting up the meeting with [the victim].
So if we focus on what actually happened during the
meeting, then the computer charge would follow along.
So that was how to attack that charge during the trial. And I
think we went very vigorously the entire trial rebutting the
evidence of forcible sexual activity and with [the defendant’s]
testimony in particular any type of sexual activity that involved
penetration.
The defendant argued that his trial counsel rendered ineffective
assistance in part because they “failed to challenge the application of the
[computer services use] statute during trial.” He observed that his trial counsel
“made no argument to the jury regarding [the computer services use] offense
either in the opening statement, closing argument, or through cross-
examination of witnesses” and that counsel failed to challenge the sufficiency of
the evidence on that charge at trial. The trial court noted that the defendant
brought a sufficiency argument in his motion to set aside the verdict and that
the court had rejected that argument on the merits, finding the evidence
“legally sufficient” to support the defendant’s conviction on the computer
services use charge. The court concluded, therefore, that because the
assertion of a claim of insufficiency during trial would not have changed the
outcome of the case, counsel’s performance was not constitutionally infirm.
Subsequently, the defendant timely filed the instant appeal, contesting
the trial court’s denial of his motion for a new trial based upon ineffective
11
assistance of counsel. After this appeal was accepted, processing of the
defendant’s direct appeal continued, and in November 2018, we affirmed his
convictions. See Labrie, 171 N.H. at 475, 477. As to the computer services use
charge, we held that regardless of whether we analyzed each pre-encounter
communication individually, or considered them collectively, “[t]here was ample
evidence of the defendant’s intent to ‘solicit, seduce, lure, or entice’ the victim
to engage in sexual penetration throughout early 2014.” Id. at 485.
Accordingly, we found the evidence sufficient to support his conviction on the
computer services use charge. Id.
II. The Defendant’s Appellate Arguments
On appeal, the defendant argues that his trial counsel rendered
ineffective assistance in challenging the computer services use charge, in
violation of the State and Federal Constitutions. See N.H. CONST. pt. I, art.
15; U.S. CONST. amends. VI, XIV. Specifically, he contends that his trial
counsel was ineffective “in failing to contest the mens rea element” of the
computer services use charge and “in failing to contest the actus reus element
of use of the internet or an on-line service.” With regard to the mens rea
element, he argues that trial counsel was ineffective because “counsel never
mentioned [the computer services use] charge or [the defendant’s] defense to it
to the jury, either in opening statement, closing argument or otherwise.” As to
the actus reus element, he argues that his trial counsel was ineffective because
counsel “did not consider the possibility of” or advance “a defense based on the
intranet character of the [SPS] network.” (Emphasis omitted.)
“Part I, Article 15 of the State Constitution and the Sixth and Fourteenth
Amendments to the United States Constitution guarantee a criminal defendant
reasonably competent assistance of counsel.” State v. Brown, 160 N.H. 408,
412 (2010) (quotation omitted); see Strickland v. Washington, 466 U.S. 668,
685-86 (1984). We first address the defendant’s claims of ineffective assistance
of counsel under the State Constitution, citing federal opinions for guidance
only. State v. Ball, 124 N.H. 226, 231-33 (1983).
To prevail upon a claim of ineffective assistance of counsel, the defendant
must demonstrate, “first, that counsel’s representation was constitutionally
deficient and, second, that counsel’s deficient performance actually prejudiced
the outcome of the case.” Brown, 160 N.H. at 412 (quotation omitted). “To
satisfy the first prong of the test, the performance prong, the defendant must
show that counsel’s representation fell below an objective standard of
reasonableness.” Id. (quotation omitted). We judge the reasonableness of
counsel’s conduct based upon the facts and circumstances of that particular
case, viewed at the time of that conduct. Id. As we have previously stated:
Judicial scrutiny of counsel’s performance must be highly
deferential. A fair assessment of attorney performance requires
12
that every effort be made to eliminate the distorting effects of
hindsight, to reconstruct the circumstances of counsel’s
challenged conduct, and to evaluate the conduct from counsel’s
perspective at the time. Because of the difficulties inherent in
making the evaluation, a court must indulge a strong presumption
that counsel’s conduct falls within the wide range of reasonable
professional assistance; that is, the defendant must overcome the
presumption that, under the circumstances, the challenged action
might be considered sound trial strategy.
Id. at 412-13 (quotation omitted); see Strickland, 466 U.S. at 689. Strategic or
tactical decisions, made after a thorough investigation of the law and facts, “are
virtually unchallengeable” in an ineffective assistance claim. Strickland, 466
U.S. at 690. When reviewing an ineffective assistance of counsel claim, we are
mindful that the State and Federal Constitutions guarantee “reasonable
competence, not perfect advocacy judged with the benefit of hindsight.”
Yarborough v. Gentry, 540 U.S. 1, 8 (2003) (per curiam).
Because the proper measure of attorney performance is reasonableness
under prevailing professional norms, to establish that his trial attorney’s
performance fell below this standard, the defendant has to show that “no
competent lawyer” would have engaged in the challenged conduct. State v.
Cable, 168 N.H. 673, 680-81 (2016) (quotation omitted). Thus, in the instant
case, to prevail on the first prong, the defendant must show that “no competent
lawyer” would have failed to: (1) mention the computer services use charge in
opening statement or closing argument; and/or (2) consider or mount a specific
defense to the computer services use charge by arguing that the computer
services use statute did not apply to the defendant’s e-mails to the victim
because SPS’s computer network is an intranet network. Id.
To satisfy the second prong, the prejudice prong, the defendant must
establish that “there is a reasonable probability that, but for counsel’s
unprofessional errors, the result of the proceeding would have been different.”
Brown, 160 N.H. at 413 (quotation omitted); see Strickland, 466 U.S. at 694. A
reasonable probability is “a probability sufficient to undermine confidence in
the outcome.” Brown, 160 N.H. at 413 (quotation omitted). In making this
determination, we consider “the totality of the evidence presented at trial.” Id.
(quotation omitted).
Both the performance and prejudice components of the ineffectiveness
inquiry are mixed questions of law and fact. Id. Therefore, we will not disturb
the trial court’s factual findings unless they are not supported by the evidence
or are erroneous as a matter of law, and we review the ultimate determination
of whether each prong is met de novo. Id. “On appeal, when we determine that
a defendant has failed to meet either prong of the test, we need not consider
the other one.” Cable, 168 N.H. at 681 (quotation omitted).
13
A. Mens Rea Defense
The defendant first maintains that his trial counsel was ineffective for
failing to mention in opening statement or closing argument or otherwise the
computer services use charge or the defense that he did not intend to engage in
sexual penetration with the victim when he sent the e-mails and Facebook
messages at issue. He argues that counsel “should plainly have told the jury
that it could only convict if it could find, beyond a reasonable doubt, that [the
defendant] intended, when he sent the messages, to lure [the victim] to engage
in sexual penetration.”
The right to effective assistance extends to opening statements and
closing arguments. See Yarborough, 540 U.S. at 5 (referring to closing
arguments); Bruce v. Kramer, No. CV 05-867GAF(JC), 2010 WL 466156, at *17
(C.D. Cal. Jan. 27, 2010) (referring to opening statements). “Nonetheless,
counsel has wide latitude in deciding how best to represent a client, and
deference to counsel’s tactical decisions” in opening and closing presentations
“is particularly important because of the broad range of legitimate defense
strategy” at those stages. Yarborough, 540 U.S. at 5-6. Opening statements
and closing arguments “should sharpen and clarify the issues for resolution by
the trier of fact, but which issues to sharpen and how best to clarify them are
questions with many reasonable answers.” Id. at 6 (quotation and citation
omitted).
Judicial review of a defense counsel’s opening statement and closing
argument is, thus, highly deferential. See id. “Courts are . . . hesitant to find
that an attorney’s decision to leave out reference to particular aspects of the
case” in opening statement or closing argument “constitutes ineffective
assistance.” Knight v. Spencer, 447 F.3d 6, 18 (1st Cir. 2006). “When counsel
focuses on some issues to the exclusion of others, there is a strong
presumption that he did so for tactical reasons rather than through sheer
neglect.” Yarborough, 540 U.S. at 8. Indeed, “[b]ecause the decision to make
an argument or assert a specific defense is at the heart of trial strategy,
defendants face considerable difficulty in showing that counsel’s tactics were
unreasonable.” John M. Burkoff & Nancy M. Burkoff, Ineffective Assistance of
Counsel § 7.1, at 342 (2017 ed.). Counsel’s opening statement and closing
argument “must . . . be viewed in the context of the entire proceeding.” Knight,
447 F.3d at 18.
Here, the prosecutor told the jury that the critical issue in the case was
the victim’s credibility. Thus, defense counsel’s opening statement and closing
argument centered upon attacking that credibility. Consistent with defense
counsel’s overall theory of the case, counsel focused particularly upon the
victim’s credibility related to consent and penetration.
14
In his opening statement, Carney used the electronic messages that the
defendant and victim had exchanged as evidence that the victim’s claim of rape
was a lie. He asked the jury to focus upon whether, in light of the victim’s
words in her e-mail messages to the defendant, she “appears to have been
unwilling during her date.” After quoting those messages in their entirety,
Carney asked the jury: “Does this sound like texting where she was unwilling
that night, where the prosecutor is going to be able to show by these words
that very night that these are the words of a rape victim? He ended that part of
his opening statement by saying:
Her own words, no force, no compulsion. She’s in her room. He’s
in his room. She’s typing all of these words. That will be, I
submit, the most important evidence on that issue about whether
she was an unwilling participant in what happened that night. In
other words, whether she was a rape victim or whether she was a
willing participant.
Similarly, in his closing argument, Carney intimated that the victim’s
words in her electronic messages to the defendant were not those of a rape
victim, and that she had lied about the rape because she was worried about
disappointing her sister and parents and about her reputation on campus. He
reminded the jury that, although the victim’s friend had testified that, before
meeting the defendant on May 30, the victim had said, “I’ll probably let him
finger me and I’ll probably blow him,” the victim claimed not to have
remembered saying that. (Quotation omitted.) Carney invited the jury to find
that in so saying, the victim had lied. He then told the jury:
The Prosecutor said something during her opening, she said
“In order to prove the government’s case, you have to believe
[the victim].”
His Honor will tell you that you have to believe in the
government’s case beyond a reasonable doubt. If you can’t say I
can believe [the victim] beyond a reasonable doubt, after this
blatant lie to you, then you’ve got to return a verdict of not guilty.
Viewing defense counsel’s opening statement and closing argument in
the context of the entire proceeding, see Knight, 447 F.3d at 18, we conclude
that the defendant “ha[s] failed to rebut the presumption of adequate
assistance,” Yarborough, 540 U.S. at 9. We cannot say that defense counsel’s
strategic use of the electronic messages to attack the victim’s credibility,
instead of to prove the defendant’s intent, “fell below an objective standard of
reasonableness.” Brown, 160 N.H. at 412 (quotation omitted).
15
Nor can we fault defense counsel for choosing to defend against all of the
charges the defendant faced by focusing upon whether penetration occurred
and whether the victim consented. Given the number of charges that required
proof of penetration and the number of felony charges that required proof of
lack of consent, this was a reasonable strategy. “This is precisely the sort of
calculated risk that lies at the heart of an advocate’s discretion.” Yarborough,
540 U.S. at 9.
Although the defendant argues that his trial counsel “ignored the
computer felony charge because they believed that no conviction on that charge
would be legally proper if the defense prevailed on the other charges,” our
review of Zaganjori’s testimony, in particular, does not demonstrate that
counsel misunderstood the applicable law. Zaganjori specifically testified that
he understood that the defendant could be found not guilty of all but the
computer services use charge. Indeed, he agreed that the computer services
use statute does not require that the perpetrator ever have any physical
contact with the recipient of the communication and that “[t]he offense is
complete as soon as the communication is sent.” Zaganjori’s belief that this
result — acquittal on all of the charges except the computer services use
charge — was unlikely is not unreasonable. Also reasonable is trial counsel’s
belief that if the jury had found that no sexual penetration occurred, it would
also likely find that the defendant lacked the intent to sexually penetrate when
he sent the victim electronic messages in the days leading up to their
encounter. In addition, although counsel did not specifically refer to the
computer services use charge in his opening statement or closing argument, it
was reasonable for him to count on the court’s jury instructions to remind the
jury of the elements of that charge. See id. at 10. We likewise find reasonable
trial counsel’s strategy of waiting until after the verdict to argue that applying
the computer services use statute to the defendant, even though the jury found
him not guilty of the other felony charges, was inconsistent with the purpose of
the statute and with the Eighth Amendment to the Federal Constitution.
Contrary to the defendant’s assertions, although defense counsel did not
explicitly tell the jury that the defendant lacked the requisite intent for
conviction on the computer services use charge, throughout the trial, the
defense attacked the State’s circumstantial evidence of that intent. For
instance, through cross-examination of the defendant’s friends, defense
counsel elicited testimony that the defendant never expressed a plan to engage
in sexual penetration with the victim or had an expectation that he would do
so. Indeed, defense counsel elicited testimony from most of the SPS witnesses
that the terms that the defendant used in his electronic messages to his friends
could describe a range of activities, not just sexual contact. Defense counsel
also elicited testimony from the defendant, during his direct examination, that
“it hadn’t been [his] intention going into the night to have sex with [the victim].”
16
Even if telling the jury explicitly that the defendant lacked the intent
necessary to convict him of the computer services use charge “would
unquestionably have supported the defense, it does not follow that counsel was
incompetent for failing” to say that. Id. at 7. An advocate “is not required to
summarize or comment upon all the facts, opinions, inferences, and law
involved in a case.” Id. at 8 (quotation omitted). Indeed, “judicious selection of
arguments” for opening statement and summation “is a core exercise of defense
counsel’s discretion.” Id.
Counsel’s decision to focus his opening statement and closing argument
on attacking the victim’s credibility and to defend all of the charges the
defendant faced by focusing on penetration and consent are tactical decisions
that fall within the wide range of reasonable professional assistance. “Given
the wide latitude of discretion available to defense counsel to conduct the
defense in the manner of his or her own choosing,” Knight, 447 F.3d at 18, the
opening statement and closing argument and defense mounted by the
defendant’s trial counsel cannot be deemed ineffective assistance of counsel.
Accordingly, we hold that trial counsel’s failure to mention a specific defense to
the computer services use charge in his opening statement and closing
argument did not violate the defendant’s state constitutional right to effective
assistance of counsel. See Brown, 160 N.H. at 415. Because the standard for
determining whether a defendant has received ineffective assistance of counsel
is the same under both the State and Federal Constitutions, we necessarily
reach the same result under the Federal Constitution as we do under the State
Constitution. Id. at 418.
B. Intranet Defense to Computer Services Use Charge
The defendant next asserts that his trial counsel was ineffective because
counsel did not consider or advance a defense to the computer services use
charge by arguing that use of SPS’s intranet network did not constitute
computer services use within the meaning of RSA 649-B:4, I. To address this
argument, we interpret the computer services use statute, RSA 649-B:4, I. The
interpretation of a statute is a question of law, which we review de novo.
Serpa, 170 N.H. at 784. In matters of statutory interpretation, we are the final
arbiter of the intent of the legislature as expressed in the words of a statute
considered as a whole. Id. We first look to the language of the statute itself.
Id. “We will follow common and approved usage except where it is apparent
that a technical term is used in a technical sense.” Appeal of Public Serv. Co.
of N.H., 125 N.H. 46, 52 (1984); see RSA 21:2 (2012). We interpret legislative
intent from the statute as written and will not consider what the legislature
might have said or add language that the legislature did not see fit to include.
Serpa, 170 N.H. at 784. However, we will not interpret statutory language in a
literal manner when such a reading would lead to an absurd result. Id.
Moreover, we do not strictly construe Criminal Code provisions, but rather
17
construe them “according to the fair import of their terms and to promote
justice.” RSA 625:3 (2016).
RSA 649-B:4, I, provides:
No person shall knowingly utilize a computer on-line service,
internet service, or local bulletin board service to seduce, solicit,
lure, or entice a child or another person believed by the person to
be a child, to commit any of the following:
(a) Any offense under RSA 632-A, relative to sexual assault
and related offenses.
....
(c) Endangering a child as defined in RSA 639:3, III.
The defendant contends that his use of the SPS intranet network to send
e-mails to the victim does not constitute using a “computer on-line service,” an
“internet service,” or a “local bulletin board.” Thus, he asserts that his trial
counsel was ineffective for failing to consider or present a defense to the
computer services use charge on that ground.
When, as in RSA 649-B:4, I, the legislature has used “technical words
and phrases” that “have acquired a peculiar and appropriate meaning in law,”
we construe those words and phrases “according to such peculiar and
appropriate meaning.” RSA 21:2. Based upon the technical meaning of the
statutory terms, we conclude that SPS’s intranet network constitutes an
“internet service” within the meaning of RSA 649-B:4, I.
The word “internet” refers to “a worldwide system of interconnected
computer networks, communicating by means of TCP/IP and associated
protocols.” McGraw-Hill Dictionary of Scientific and Technical Terms 1101 (6th
ed. 2003); see The American Heritage Dictionary of the English Language 916
(5th ed. 2011) (defining the word “internet” as “a “publicly accessible system of
networks that connects computers around the world via the VCP/IP protocol”).
As one author has described it:
The Internet or “Net” is a system of linked computer
networks, international in scope and decentralized by design, that
facilitates communication among computers connected to it. It
allows computers to transparently “talk to one another” and share
services throughout much of the world. It does this by finding a
path to route tiny packets of data from one computer to another,
based on a standard called the Internet Protocol or “IP.” . . .
18
Many services use the Internet as their transport medium.
These include Internet e-mail, file transfer (ftp), network news
(non-interactive message-oriented discussion groups), interactive
chat, video conferencing, Internet telephony, streaming media
(audio and video), and the World Wide Web, among many others.
The World Wide Web may be the most visible, but it is just one of
many services built on top of the Internet.
Joseph Kershenbaum, The Unillustrated Guide to Cyberspace, 25 Vt. B.J. 11,
11 (1999).
An “intranet” is a “private network, based on Internet protocols, that is
accessible only within an organization.” McGraw-Hill Dictionary of Scientific
and Technical Terms, supra at 1106. Put another way, an “intranet is a private
network of linked computer networks that uses the same kinds of software
used on the Internet, but that is only for internal use.” Kershenbaum, supra at
12. “An intranet commonly includes connections through one or more gateway
computers to the outside Internet.” Id. Thus, “[m]any observers have
accurately described an intranet as a ‘private Internet.’” M. Sean Fosmire,
Intranets and Extranets—The Extension of Web Technology to the Distribution
of Private Information, 77 Mich. B.J. 412, 412 (1998).
Based upon the technical meaning of the terms “intranet” and “internet,”
we hold that use of SPS’s intranet network constitutes use of an “internet
service” within the meaning of RSA 649-B:4, I. We decline the defendant’s
invitation to examine the statute’s legislative history because “we find nothing
ambiguous about the statutory language.” Sutton v. Town of Gilford, 160 N.H.
43, 55 (2010). Because we have interpreted the statute according to its plain
language, we also do not invoke the rule of lenity, despite the defendant’s
urging that we do so. See Labrie, 171 N.H. at 484 n.3; see also State v. Brooks,
164 N.H. 272, 292 (2012) (stating that the “rule of lenity serves as a guide for
interpreting criminal statutes where the legislature failed to articulate its intent
unambiguously” (quotation omitted)).
Having rejected the defendant’s construction of the computer services
use statute, we hold that he has not demonstrated actual prejudice from his
trial counsel’s failure to mount an intranet defense to the computer services
use charge, and, thus, has not established under the State Constitution that
his trial counsel rendered ineffective assistance of counsel. See Brown, 160
N.H. at 412. We reach the same result under the Federal Constitution because
the standard for determining whether a defendant has received ineffective
assistance of counsel is the same under both constitutions. See id. at 418.
Affirmed.
LYNN, C.J., and DONOVAN, J., concurred.
19