State v. Newton

[Cite as State v. Newton, 2019-Ohio-3653.] COURT OF APPEALS OF OHIO EIGHTH APPELLATE DISTRICT COUNTY OF CUYAHOGA STATE OF OHIO, : Plaintiff-Appellee, : No. 107200 v. : ERIC S. NEWTON, JR., : Defendant-Appellant. : JOURNAL ENTRY AND OPINION JUDGMENT: AFFIRMED RELEASED AND JOURNALIZED: September 12, 2019 Criminal Appeal from the Cuyahoga County Court of Common Pleas Case No. CR-17-620243-A Appearances: Michael C. O’Malley, Cuyahoga County Prosecuting Attorney, and Carl Sullivan, Assistant Prosecuting Attorney, for appellee. Patricia J. Smith, for appellant. MICHELLE J. SHEEHAN, J.: Defendant-appellant Eric S. Newton, Jr. (“Newton”) appeals the denial of a motion to suppress as well as his convictions for pandering sexually oriented matter involving a minor, illegal use of a minor, and possessing criminal tools. Upon review, we find the trial court’s denial of the motion to suppress was proper, and Newton’s convictions were not against the manifest weight of the evidence. We therefore affirm Newton’s convictions. I. Procedural History On October 28, 2015, following a traffic stop, Newton was arrested in connection with a series of several incidents of breaking and entering. Subsequently, he was charged in a 47-count indictment relating to these crimes, in Cuyahoga C.P. No. CR-16-605078-B. During a search of the vehicle in which Newton was riding, the police seized evidence pertaining to the offenses charged in Case No. CR-16-605078, including a cell phone belonging to Newton. After obtaining a search warrant to search the contents of the phone, additional charges were filed against Newton. On August 8, 2017, Newton was charged in a 31-count indictment in Cuyahoga C.P. No. CR-17-620243-A as follows: Counts 1-17, pandering sexually oriented matter involving a minor, in violation of R.C. 2907.322(A)(2); Counts 18-20, 24, and 25, pandering sexually oriented matter involving a minor, in violation of R.C. 2907.322(A)(1); Counts 21-23, illegal use of minor in nudity- oriented material or performance, in violation of R.C. 2907.323(A)(1); Counts 26- 30, illegal use of minor in nudity-oriented material or performance, in violation of R.C. 2907.323(A)(3); and Count 31, possessing criminal tools, in violation of R.C. 2923.24(A), with a forfeiture specification. On September 17, 2017, Newton filed a motion to suppress the evidence obtained from the October 2015 search in Case No. CR-16-605078-B but incorporated the motion into the lower case of this appeal as well. The trial court denied the motion to suppress, and on October 18, 2017, Newton was convicted of multiple counts in Case No. CR-16-605078-B and sentenced to 22-years incarceration. Approximately four months after his conviction in Case No. CR-16-605078-B, on February 21, 2018, a jury returned a verdict of guilty on all charges in Case No. CR-17-620243-A. Thereafter, the court sentenced Newton to 34 years in prison, to run consecutively to his sentence in Case No. CR-16-605078-B. Newton appealed both cases, and this court ordered the cases to be treated as companion appeals, with each appeal briefed, argued, and disposed of separately by the same panel. In this appeal, Newton assigned the following errors for our review: I. The trial court erred when it overruled the defendant-appellant’s motion to suppress where the arresting officer lacked probable cause and specific, articulable facts to justify an investigatory stop. II. Where the quality of the evidence did not support the trier of facts verdict of guilt, as there was not sufficient evidence to link the defendant to the acts in question, the defendant[-appellant’s] convictions were against the manifest weight of the evidence. II. Evidence at Trial The state presented the following witnesses at trial: Cleveland Police Officer David Gallagher; Cleveland Police Sergeant John Lally; FBI Special Agent Andrew Burke; FBI Special Agent Kevin Matthews; FBI Forensics Examiner Daniel Richard; Ohio Internet Crimes Against Children (“OICAC”) Task Force Investigator Jason Howell; Cuyahoga County Sheriff’s Department Corrections Officer Philip Christopher; and appellant’s uncles, Anderson Newton (“Anderson”) and Noland Newton (“Noland”). On October 28, 2015, at approximately 1:12 a.m., Officer Gallagher and his partner conducted a traffic stop involving Newton, Amanda Rivera, Anthony Palmentara, and Jose Rivera. Officer Gallagher was wearing a body camera while conducting the stop. As the officer testified, the camera footage showed Newton in the back seat of the vehicle. During the stop, Officer Gallagher asked Newton to step out of the vehicle. When Newton stepped out of the vehicle, he initially had a black smart phone in his hands. On the body camera, Officer Gallagher told Newton that he could not have his phone “right now.” Sergeant Lally conducted a follow-up investigation on the traffic stop. He testified that another investigating officer recovered two cell phones from the stopped vehicle — one pink phone located in the front console and one black cell phone located in the rear seat of the vehicle. The evidence envelope containing the black cell phone was marked with the name “Jose Rivera” as “Defendant,” and the owner was listed as “unknown.” Sergeant Lally testified that the officers obtained a search warrant to retrieve information from the phone. The phones were forwarded to the FBI for a complete forensics examination. FBI Special Agent Burke, of the Cleveland Violent Crime and Child Exploitation Task Force, assisted local law enforcement in the investigation of this case. Special Agent Burke, using equipment called “Cellebrite” that extracts data in its complete and unedited form, extracted forensics data from the black cell phone recovered from the back seat of the vehicle in which Newton was riding. Special Agent Burke testified that in the course of extracting the cell phone’s data, a Cellebrite extraction report (state’s exhibit No. 3) was generated. Special Agent Burke forwarded this report to the investigating officers. Sergeant Lally testified that he reviewed the Cellebrite extraction report he received from Special Agent Burke. The report identified numerous computer searches associated with child pornography, such as the following: “young gay boys, gay boy porn videos,” “man masturbating boy,” “more nude boys,” “best young nude boys,” “horny nude young boys,” “abused teens-extreme-amateur- teen-hardcore-movies-porn,” “boy rape boys,” and “man f*** young gay boy.” The searches were conducted between August 29, 2015, and October 2, 2015. The report also included text messages from Jose Rivera to an individual using the black cell phone, dated September 13, 2015. In seven separate messages received within approximately one minute, the text states, “Call me right now. Hurry. Hurry. Bro what the f***. Call ke. Chris. Me.” Sergeant Lally testified that he learned through his investigation that Newton also goes by the name “Chris.” Sergeant Lally further testified regarding emails obtained from the phone. The sergeant identified several email addresses associated with the phone: Ericnelson19005@gmail.com; Ericnewtonjr@gmail.com; Ericjr1981@gmail.com; and Ericjr19005@yahoo.com. In the email section of the phone, the report obtained five email messages that were sent from the “ericjr19005@yahoo” address. On August 20, 2013, “Eric Jr.” from “ericjr19005@yahoo” emailed “Mr. Cock” a message stating, I like boys. so if you send me some good ones ill send you some. Hopefully we can build a trusting relationship. i am not a cop or any law enforcement. That pic u have use to be one of my fav on the web site imgsrc.boy. but they cleaned most of it up especially the good stuff, you can call me Chris. i like 10-13. hope to here from you. And on August 21, 2013, Eric Jr. also sent a message to “Mr. Cock,” stating, “i like the ones you sent! seen one of the[m] before. send me some more good ones ill send you some more too.” Later that same day, Eric Jr. emailed a message stating, “ill send more you send me some.” All of these emails contained attachments. Finally, Sergeant Lally testified regarding documents obtained in the “Documents” section of the phone. This section included a document titled, “Eric Newton, Jr. Resume Draft.” The resume, which was created on May 3, 2013, and modified on October 21, 2014, included Newton’s home address on Grimsby Avenue and the email address of “ericnewtonjr@gmail.com.” The report also identified certain photographs that were on the phone, which included photos of Newton as well as photos of unidentified children. Sergeant Lally testified that upon reviewing all of the information contained in the Cellebrite report, he determined the black cell phone belonged to Newton. He conceded, however, that he had no knowledge whether anyone else used Newton’s phone. At some point during Sergeant Lally’s investigation of Newton, the sergeant learned that the FBI had been conducting a “parallel” investigation of Newton, and the organizations shared information. Special Agent Kevin Matthews, of the FBI’s Innocent Images Squad, investigates crimes against children, including online possession, distribution, and receipt of child pornography. Special Agent Burke testified that in investigating online child pornography, he assumes the online identity of an established pornographer. Assuming this individual’s identity allows the special agent access to other individuals who are sharing online child pornography, specifically through “peer-to-peer” sharing programs such as Ares and Gigatribe. Special Agent Matthews testified that in November 2014, he discovered a Gigatribe user named “Chris19005,” with a profile picture of a young black boy, and in December 2014, he discovered four password-protected folders associated with this user, entitled, “all black boys,” “mix Ricans china,” “white boys,” and “young black thugs.” The special agent requested the user’s password to his password-protected files. The user provided the special agent with his password, which was “boy1.” Using the password, Special Agent Burke learned there were 485 files containing images or videos with titles indicative of child pornography in “all black boys” folder, 429 files in “mix Ricans china,” 434 files in “white boys,” and 67 files in “young black thugs” folder. The special agent testified that these files were all associated with “Chris19005” through Gigatribe, and they were all associated with the same internet protocol address (“IP” address) identifying the computer and its location. Of these files contained in the password-protected folders, the special agent viewed and downloaded approximately 47 images and 24 videos (state’s exhibit No. 28). He testified that the images contained child pornography. A representative sample of the titles of the images depicted within the password protected folders that correspond to each count of the indictment include: “New 2010 Boy is Blown 10YO,” “New 2012 11 and 12YR Pillow Penis Boy Lick 2 P10800,” “A Little Pussy Videos Young Boy,” “Little Thai Boys,” “P101 African 11YO Boy FMN (“F * * * Man”),” and “Young Boy Getting F***.” All of the images depicted young children, sometimes teenagers and sometimes prepubescents, engaging in sexual activity of some kind. Special Agent Burke also testified regarding the “blog” section of Gigatribe, where users can post comments, words, or files. On “1/11/14,” “Chris19005” posted the following message, “i pay money for the best young black boys pics or videos ages 10-13.”1 In his investigation, Special Agent Burke learned that the IP address was linked to 12*** Grimsby Avenue, Cleveland, Ohio. The account holder at this address was Louise Newton. Law enforcement then executed a search warrant of the Grimsby Avenue residence. The FBI’s Daniel Richard testified that in “early 2015,” he received from his colleague information on 12*** Grimsby Avenue regarding a child pornography investigation. Agent Richard continued the investigation, including 1 According to Special Agent Burke, it is not clear if the date is January 11, 2014, or November 1, 2014, because Gigatribe is a French company and the French write dates using the sequence: day/month/year. conducting surveillance and executing a search warrant to search the premises. In executing the search warrant, the law enforcement officers interviewed residents of the house and determined that Newton was the suspect. The officers also conducted an onsite forensics examination of all electronic devices found in the home, and they confiscated only items that contained evidence of child pornography, which included a jump drive and an Acer laptop discovered in the bedroom identified as Newton’s. The officers also confiscated photographs found in Newton’s bedroom. The photographs contained images of Newton with shirtless boys and a photo of a shirtless young boy on satin sheets with money around him. The officers also discovered a notebook in Newton’s dresser that included Newton’s email account addresses: esnewtjr2000@yahoo.com, Ericnewtonjr@gmail.com, and Ericjr1981@gmail.com. Upon conducting an initial forensics examination of the seized computer, Agent Richard discovered approximately 900 images that depicted mostly prepubescent boys and girls in a state of nudity or engaging in some sexual activity. Agent Richard then turned the seized computer over to OICAC investigator, Jason Howell, for further investigation. In conducting a full forensics examination of the Acer laptop, Howell discovered 23,012 images of “child abuse” and 172 “child abuse” videos. The videos totaled more than 27 hours in length. The examination also revealed 26 images and two videos of children under the age of five. All of the images depicted children engaging in sexual activity. In addition to the child abuse materials, Howell discovered computer searches such as “boy porn,” “boys sex,” “boys naked,” “boys kissing,” “pics of shirtless sagging young black kids,” “pics of dead kids hit by cars,” and “pics of dead body kids.” Howell testified that the user searched “belly and boxers” just 13 days before the search warrant was executed. Additionally, Howell testified that the forensics examination also revealed that another Gigatribe user had messaged the user of this computer, stating, “Sorry you are sharing too young kids. Please go away. You are sharing underage.” Finally, Howell testified concerning other documents discovered on the Acer laptop, including Newton’s resume, which listed his address as “12*** Grimsby Avenue” and his email address as “ericnewtonjr@gmail.com.” The examination also revealed that the user emailed files to alternative emails. Howell stated that “ericnewtonjr@gmail.com” sent photos and videos, including one titled “13YO, dark skinned boy.mp4,” to “esnewtonjr2000@yahoo.com.” According to Howell, Newton’s Google account included auto-saved information such as a credit card under the name “Eric Newton Jr.,” his account was saved as “Eric Newton,” and his Windows user name was “Eric.” “Eric” last logged in on April 1, 2015, which was six days before law enforcement officers executed the search warrant. Anderson, Newton’s uncle, also lived at 12*** Grimsby Avenue, with Newton; Anderson’s father, Jerome; and previously his mother, Louise. Anderson stated that his mother passed away approximately one week before law enforcement executed the search warrant at his house. Anderson works in internet design and “electrical” and “mechanical work.” He maintains a computer station in the basement of the house. The basement computer was not confiscated during execution of the search warrant. Anderson testified that his father is 86 years old, has dementia, and is not technically proficient. Anderson stated that his brother, Noland, was staying at his house for only a few days when the search was conducted. Anderson identified Newton’s bedroom for the authorities, which is the bedroom in which Newton stayed until Noland arrived in town for Louise’s memorial service. Anderson also identified the Acer laptop as belong to Newton, although he admitted that on occasion he would play computer games with his children using Newton’s laptop. Anderson stated that he never downloaded child pornography or a peer-to-peer software for purposes of sharing child pornography. Noland, Newton’s other uncle, testified that he resides in Atlanta but came to Cleveland for his mother’s memorial service a few days before April 7, 2015, when the search warrant was executed. Noland is an electrical engineer and programs computer software. Noland testified that he stayed in Newton’s bedroom while visiting. He stated that he had never downloaded child pornography or a peer- to-peer software for purposes of sharing child pornography. He identified one desktop computer and two Dell laptops belonging to him that were discovered in the residence by law enforcement. These computers were not confiscated during the search. III. Motion to Suppress Newton contends in his first assignment of error that the trial court erred when it denied his motion to suppress the evidence obtained as a result of the police officers’ search of the vehicle in which he was riding. In support, he argues that the record does not show that the police officers had reasonable suspicion that “criminal activity was afoot,” and therefore, all evidence obtained as a result of the search must be suppressed. In the companion appeal, State v. Newton, 8th Dist. Cuyahoga No. 107195, 2019-Ohio-3566 (lower court No. CR-16-605078), Newton also assigned as error the trial court’s denial of his motion to suppress. In that appeal, this panel affirmed the trial court’s decision on the motion to suppress, finding that the officers had reasonable suspicion, supported by articulable facts, that the individuals in the vehicle in which Newton was a passenger were engaged in criminal activity, and therefore, the stop was justified. Newton at ¶ 30. We also concluded that Newton’s argument regarding a purportedly “false statement” made in the search warrant regarding ownership of the cell phone seized in the vehicle had no merit, thus finding that “[b]ecause of the circumstances in which the phones were obtained, probable cause existed to search the phones, regardless of which [individuals] owned the phones.” Id. at ¶ 35. We found, therefore, that the motion to suppress was proper. Id. at ¶ 36. For purposes of this appeal, we adopt the analysis and conclusion made in the companion appeal regarding Newton’s motion to suppress and incorporate the same in this appeal. Accordingly, Newton’s first assignment of error is overruled. For a more complete recitation of the court’s analysis on Newton’s motion to suppress, see Newton at ¶ 25-36. IV. Manifest Weight In his second assignment of error, Newton contends that his conviction is against the manifest weight of the evidence. In support, he essentially argues that there was insufficient evidence connecting him to the child pornography, stating that three other adults lived in the home with Newton where the computer was located, all having access to the computer, and Newton was rarely home. Newton also argues that the state’s witness could not identify who put the child pornography on Newton’s phone. A manifest weight challenge questions whether the state has met its burden of persuasion. State v. Thompkins, 78 Ohio St.3d 380, 390, 678 N.E.2d 541 (1997). This challenge raises a factual issue: “The court, reviewing the entire record, weighs the evidence and all reasonable inferences, considers the credibility of witnesses and determines whether in resolving conflicts in the evidence, the jury clearly lost its way and created such a manifest miscarriage of justice that the conviction must be reversed and a new trial ordered. The discretionary power to grant a new trial should be exercised only in the exceptional case in which the evidence weighs heavily against the conviction.” Id. at 387, quoting State v. Martin, 20 Ohio App.3d 172, 175, 485 N.E.2d 717 (1st Dist.1983). A finding that a conviction was supported by the manifest weight of the evidence necessarily includes a finding of sufficiency. Thompkins at 388. It is well established that the elements of an offense may be proven by direct evidence, circumstantial evidence, or both. See State v. Durr, 58 Ohio St.3d 86, 568 N.E.2d 674 (1991). Direct evidence exists when “a witness testifies about a matter within the witness’s personal knowledge such that the trier of fact is not required to draw an inference from the evidence to the proposition that it is offered to establish.” State v. Cassano, 8th Dist. Cuyahoga No. 97228, 2012-Ohio-4047, ¶ 13. Circumstantial evidence, on the other hand, is evidence that requires “the drawing of inferences that are reasonably permitted by the evidence.” Id. See also State v. Hartman, 8th Dist. Cuyahoga No. 90284, 2008-Ohio-3683, ¶ 37 (“[c]ircumstantial evidence is the proof of facts by direct evidence from which the trier of fact may infer or derive by reasoning other facts in accordance with the common experience of mankind”). Circumstantial and direct evidence are of equal evidentiary value. State v. Santiago, 8th Dist. Cuyahoga No. 95333, 2011-Ohio-1691, ¶ 12. “Although there are obvious differences between direct and circumstantial evidence, those differences are irrelevant to the probative value of the evidence.” Cassano at ¶ 13, citing State v. Treesh, 90 Ohio St.3d 460, 485, 739 N.E.2d 749 (2001). In some cases, circumstantial evidence may be “‘more certain, satisfying and persuasive than direct evidence.’” State v. Lott, 51 Ohio St.3d 160, 167, 555 N.E.2d 293 (1990), quoting Michalic v. Cleveland Tankers, Inc., 364 U.S. 325, 330, 81 S.Ct. 6, 5 L.Ed.2d 20 (1960). Newton was convicted of pandering sexually oriented matter involving a minor in violation of R.C. 2907.322(A)(1) and (2): (A) No person, with knowledge of the character of the material or performance involved, shall do any of the following: (1) Create, record, photograph, film, develop, reproduce, or publish any material that shows a minor or impaired person participating or engaging in sexual activity, masturbation, or bestiality; (2) Advertise for sale or dissemination, sell, distribute, transport, disseminate, exhibit, or display any material that shows a minor or impaired person participating or engaging in sexual activity, masturbation, or bestiality. Newton was also convicted of illegal use of minor in nudity-oriented material or performance in violation of R.C. 2907.323(A)(1) and (3): (A) No person shall do any of the following: (1) Photograph any minor or impaired person who is not the person’s child or ward in a state of nudity, or create, direct, produce, or transfer any material or performance that shows the minor or impaired person in a state of nudity * * *. *** (3) Possess or view any material or performance that shows a minor or impaired person who is not the person’s child or ward in a state of nudity * * *. Newton was further convicted of possessing criminal tools in violation of R.C. 2923.24(A), namely a cell phone and an Acer laptop computer. Here, Newton does not dispute that the materials discovered on the Acer laptop and the black cell phone are evidence of child pornography. Rather, he contends that the state failed to provide enough evidence linking him to the child pornography. In support, he argues that he lived in a home where two other individuals with computer experience had access to Newton’s computer and his computer passwords and someone else could have placed the child pornography on Newton’s phone. We find Newton’s argument unpersuasive. Though it is true that the state did not present any eyewitness who testified that he or she saw Newton viewing, downloading, or sharing any of the child pornography found on the devices, the evidence linking Newton to the child pornography is overwhelming. The evidence demonstrates that law enforcement officers seized only the computers that contained child pornography. The only device containing child pornography at Newton’s residence was the Acer laptop discovered in Newton’s bedroom. The laptop was identified as belonging to Newton. The forensics examination of the laptop revealed Newton’s resume, which contained his home address, 12*** Grimsby Avenue, and his email address of “ericnewtonjr@gmail.com.” Also discovered in the bedroom was a notebook containing various email addresses linked to Newton. The forensics examination of the computer also revealed that Newton had emailed files containing child pornography from one of his email addresses to another of his email addresses. The evidence showed that Newton’s profile name was “Chris,” and his username was “Chris19005.” As “Chris19005,” Newton was conducting searches arguably containing child pornography and he was downloading and sharing thousands of files containing child pornography. Additionally, “Chris 19005” posted a message on a Gigatribe blog stating that he “pay[s] money for the best young black boy pics or videos ages 10-13.” The examination further showed that “Eric Newton, Jr.’s” credit card information was saved in a Google account and the account name was saved as “Eric Newton.” And the Windows user name was “Eric.” Additionally, the evidence showed several email addresses connected to the phone, including Ericnelson19005@gmail.com; Ericnewtonjr@gmail.com; Ericjr1981@gmail.com; and Ericjr19005@yahoo.com. In the emails section of the phone, the examination revealed that “ericjr19005@yahoo” emailed “Mr. Cock” a message soliciting child pornography. Newton also sent a message to this same person indicating that Newton had viewed the pornography sent by Mr. Cock, that he desired more, and he promised to likewise “send more.” The documents section of the phone contained Newton’s resume, which included his home address and the email address “ericnewtonjr@gmail.com.” The resume was created on May 3, 2013, and modified on October 21, 2014. Other documents discovered on the phone included several photos of Newton and unidentified children. Finally, in the messages section of the phone, law enforcement officers discovered text messages from Newton’s codefendant in a companion case, Jose Rivera. The messages ask “Chris” to “hurry” and “call me.” And the evidence shows that during the initial traffic stop that led to the search warrant of the contents of the phone and ultimately the search of Newton’s residence, Newton asked the officers if he could have his cell phone back. We find the jury could reasonably infer from the foregoing evidence that Newton was in fact the perpetrator of the crimes charged. Newton claims that others had access to the Acer laptop, including his uncles, who stayed at the same home and had extensive computer knowledge. Newton’s uncles, however, denied ever having downloaded or shared child pornography, and there was no evidence that the uncles’ computers contained child pornography. Furthermore, Newton’s uncle, Noland, who used Newton’s bedroom when he came to town in April 2015, testified that he had only arrived days before the search warrant was executed, and the forensics examination had discovered child pornography on the Acer laptop dating as far back as 2014. Newton presented no evidence of other individuals who may have shared his cell phone. The jury evidently found the state’s witnesses to be credible and it rejected the possibility that someone else used Newton’s computer or cell phone to create, download, view, share, or offer for sale child pornography, which it was free to do. In light of all the evidence presented, we find the jury did not lose its way in finding Newton guilty of pandering sexually oriented matter involving a minor, illegal use of a minor, and possessing criminal tools. His convictions are therefore not against the manifest weight of the evidence. Newton’s second assignment of error is overruled. Judgment affirmed. It is ordered that appellee recover from appellant costs herein taxed. The court finds there were reasonable grounds for this appeal. It is ordered that a special mandate be sent to said court to carry this judgment into execution. A certified copy of this entry shall constitute the mandate pursuant to Rule 27 of the Rules of Appellate Procedure. MICHELLE J. SHEEHAN, JUDGE ANITA LASTER MAYS, P.J., and RAYMOND C. HEADEN, J., CONCUR