[Cite as State v. Newton, 2019-Ohio-3653.]
COURT OF APPEALS OF OHIO
EIGHTH APPELLATE DISTRICT
COUNTY OF CUYAHOGA
STATE OF OHIO, :
Plaintiff-Appellee, :
No. 107200
v. :
ERIC S. NEWTON, JR., :
Defendant-Appellant. :
JOURNAL ENTRY AND OPINION
JUDGMENT: AFFIRMED
RELEASED AND JOURNALIZED: September 12, 2019
Criminal Appeal from the Cuyahoga County Court of Common Pleas
Case No. CR-17-620243-A
Appearances:
Michael C. O’Malley, Cuyahoga County Prosecuting
Attorney, and Carl Sullivan, Assistant Prosecuting
Attorney, for appellee.
Patricia J. Smith, for appellant.
MICHELLE J. SHEEHAN, J.:
Defendant-appellant Eric S. Newton, Jr. (“Newton”) appeals the
denial of a motion to suppress as well as his convictions for pandering sexually
oriented matter involving a minor, illegal use of a minor, and possessing criminal
tools. Upon review, we find the trial court’s denial of the motion to suppress was
proper, and Newton’s convictions were not against the manifest weight of the
evidence. We therefore affirm Newton’s convictions.
I. Procedural History
On October 28, 2015, following a traffic stop, Newton was arrested in
connection with a series of several incidents of breaking and entering.
Subsequently, he was charged in a 47-count indictment relating to these crimes, in
Cuyahoga C.P. No. CR-16-605078-B. During a search of the vehicle in which
Newton was riding, the police seized evidence pertaining to the offenses charged in
Case No. CR-16-605078, including a cell phone belonging to Newton. After
obtaining a search warrant to search the contents of the phone, additional charges
were filed against Newton.
On August 8, 2017, Newton was charged in a 31-count indictment in
Cuyahoga C.P. No. CR-17-620243-A as follows: Counts 1-17, pandering sexually
oriented matter involving a minor, in violation of R.C. 2907.322(A)(2);
Counts 18-20, 24, and 25, pandering sexually oriented matter involving a minor, in
violation of R.C. 2907.322(A)(1); Counts 21-23, illegal use of minor in nudity-
oriented material or performance, in violation of R.C. 2907.323(A)(1); Counts 26-
30, illegal use of minor in nudity-oriented material or performance, in violation of
R.C. 2907.323(A)(3); and Count 31, possessing criminal tools, in violation of
R.C. 2923.24(A), with a forfeiture specification.
On September 17, 2017, Newton filed a motion to suppress the
evidence obtained from the October 2015 search in Case No. CR-16-605078-B but
incorporated the motion into the lower case of this appeal as well. The trial court
denied the motion to suppress, and on October 18, 2017, Newton was convicted of
multiple counts in Case No. CR-16-605078-B and sentenced to 22-years
incarceration.
Approximately four months after his conviction in Case
No. CR-16-605078-B, on February 21, 2018, a jury returned a verdict of guilty on all
charges in Case No. CR-17-620243-A. Thereafter, the court sentenced Newton to 34
years in prison, to run consecutively to his sentence in Case No. CR-16-605078-B.
Newton appealed both cases, and this court ordered the cases to be treated as
companion appeals, with each appeal briefed, argued, and disposed of separately by
the same panel.
In this appeal, Newton assigned the following errors for our review:
I. The trial court erred when it overruled the defendant-appellant’s
motion to suppress where the arresting officer lacked probable cause
and specific, articulable facts to justify an investigatory stop.
II. Where the quality of the evidence did not support the trier of facts
verdict of guilt, as there was not sufficient evidence to link the
defendant to the acts in question, the defendant[-appellant’s]
convictions were against the manifest weight of the evidence.
II. Evidence at Trial
The state presented the following witnesses at trial: Cleveland Police
Officer David Gallagher; Cleveland Police Sergeant John Lally; FBI Special Agent
Andrew Burke; FBI Special Agent Kevin Matthews; FBI Forensics Examiner Daniel
Richard; Ohio Internet Crimes Against Children (“OICAC”) Task Force Investigator
Jason Howell; Cuyahoga County Sheriff’s Department Corrections Officer Philip
Christopher; and appellant’s uncles, Anderson Newton (“Anderson”) and Noland
Newton (“Noland”).
On October 28, 2015, at approximately 1:12 a.m., Officer Gallagher
and his partner conducted a traffic stop involving Newton, Amanda Rivera, Anthony
Palmentara, and Jose Rivera. Officer Gallagher was wearing a body camera while
conducting the stop. As the officer testified, the camera footage showed Newton in
the back seat of the vehicle. During the stop, Officer Gallagher asked Newton to step
out of the vehicle. When Newton stepped out of the vehicle, he initially had a black
smart phone in his hands. On the body camera, Officer Gallagher told Newton that
he could not have his phone “right now.”
Sergeant Lally conducted a follow-up investigation on the traffic stop.
He testified that another investigating officer recovered two cell phones from the
stopped vehicle — one pink phone located in the front console and one black cell
phone located in the rear seat of the vehicle. The evidence envelope containing the
black cell phone was marked with the name “Jose Rivera” as “Defendant,” and the
owner was listed as “unknown.” Sergeant Lally testified that the officers obtained a
search warrant to retrieve information from the phone. The phones were forwarded
to the FBI for a complete forensics examination.
FBI Special Agent Burke, of the Cleveland Violent Crime and Child
Exploitation Task Force, assisted local law enforcement in the investigation of this
case. Special Agent Burke, using equipment called “Cellebrite” that extracts data in
its complete and unedited form, extracted forensics data from the black cell phone
recovered from the back seat of the vehicle in which Newton was riding. Special
Agent Burke testified that in the course of extracting the cell phone’s data, a
Cellebrite extraction report (state’s exhibit No. 3) was generated. Special Agent
Burke forwarded this report to the investigating officers.
Sergeant Lally testified that he reviewed the Cellebrite extraction
report he received from Special Agent Burke. The report identified numerous
computer searches associated with child pornography, such as the following:
“young gay boys, gay boy porn videos,” “man masturbating boy,” “more nude boys,”
“best young nude boys,” “horny nude young boys,” “abused teens-extreme-amateur-
teen-hardcore-movies-porn,” “boy rape boys,” and “man f*** young gay boy.” The
searches were conducted between August 29, 2015, and October 2, 2015.
The report also included text messages from Jose Rivera to an
individual using the black cell phone, dated September 13, 2015. In seven separate
messages received within approximately one minute, the text states, “Call me right
now. Hurry. Hurry. Bro what the f***. Call ke. Chris. Me.” Sergeant Lally testified
that he learned through his investigation that Newton also goes by the name “Chris.”
Sergeant Lally further testified regarding emails obtained from the
phone. The sergeant identified several email addresses associated with the phone:
Ericnelson19005@gmail.com; Ericnewtonjr@gmail.com; Ericjr1981@gmail.com; and
Ericjr19005@yahoo.com. In the email section of the phone, the report obtained five
email messages that were sent from the “ericjr19005@yahoo” address. On August
20, 2013, “Eric Jr.” from “ericjr19005@yahoo” emailed “Mr. Cock” a message
stating,
I like boys. so if you send me some good ones ill send you some.
Hopefully we can build a trusting relationship. i am not a cop or any
law enforcement. That pic u have use to be one of my fav on the web
site imgsrc.boy. but they cleaned most of it up especially the good
stuff, you can call me Chris. i like 10-13. hope to here from you.
And on August 21, 2013, Eric Jr. also sent a message to “Mr. Cock,” stating, “i like
the ones you sent! seen one of the[m] before. send me some more good ones ill send
you some more too.” Later that same day, Eric Jr. emailed a message stating, “ill
send more you send me some.” All of these emails contained attachments.
Finally, Sergeant Lally testified regarding documents obtained in the
“Documents” section of the phone. This section included a document titled, “Eric
Newton, Jr. Resume Draft.” The resume, which was created on May 3, 2013, and
modified on October 21, 2014, included Newton’s home address on Grimsby Avenue
and the email address of “ericnewtonjr@gmail.com.” The report also identified
certain photographs that were on the phone, which included photos of Newton as
well as photos of unidentified children. Sergeant Lally testified that upon reviewing
all of the information contained in the Cellebrite report, he determined the black cell
phone belonged to Newton. He conceded, however, that he had no knowledge
whether anyone else used Newton’s phone. At some point during Sergeant Lally’s
investigation of Newton, the sergeant learned that the FBI had been conducting a
“parallel” investigation of Newton, and the organizations shared information.
Special Agent Kevin Matthews, of the FBI’s Innocent Images Squad,
investigates crimes against children, including online possession, distribution, and
receipt of child pornography. Special Agent Burke testified that in investigating
online child pornography, he assumes the online identity of an established
pornographer. Assuming this individual’s identity allows the special agent access to
other individuals who are sharing online child pornography, specifically through
“peer-to-peer” sharing programs such as Ares and Gigatribe.
Special Agent Matthews testified that in November 2014, he
discovered a Gigatribe user named “Chris19005,” with a profile picture of a young
black boy, and in December 2014, he discovered four password-protected folders
associated with this user, entitled, “all black boys,” “mix Ricans china,” “white boys,”
and “young black thugs.” The special agent requested the user’s password to his
password-protected files. The user provided the special agent with his password,
which was “boy1.” Using the password, Special Agent Burke learned there were 485
files containing images or videos with titles indicative of child pornography in “all
black boys” folder, 429 files in “mix Ricans china,” 434 files in “white boys,” and 67
files in “young black thugs” folder.
The special agent testified that these files were all associated with
“Chris19005” through Gigatribe, and they were all associated with the same internet
protocol address (“IP” address) identifying the computer and its location. Of these
files contained in the password-protected folders, the special agent viewed and
downloaded approximately 47 images and 24 videos (state’s exhibit No. 28). He
testified that the images contained child pornography. A representative sample of
the titles of the images depicted within the password protected folders that
correspond to each count of the indictment include: “New 2010 Boy is Blown 10YO,”
“New 2012 11 and 12YR Pillow Penis Boy Lick 2 P10800,” “A Little Pussy Videos
Young Boy,” “Little Thai Boys,” “P101 African 11YO Boy FMN (“F * * * Man”),” and
“Young Boy Getting F***.” All of the images depicted young children, sometimes
teenagers and sometimes prepubescents, engaging in sexual activity of some kind.
Special Agent Burke also testified regarding the “blog” section of
Gigatribe, where users can post comments, words, or files. On “1/11/14,”
“Chris19005” posted the following message, “i pay money for the best young black
boys pics or videos ages 10-13.”1
In his investigation, Special Agent Burke learned that the IP address
was linked to 12*** Grimsby Avenue, Cleveland, Ohio. The account holder at this
address was Louise Newton. Law enforcement then executed a search warrant of
the Grimsby Avenue residence.
The FBI’s Daniel Richard testified that in “early 2015,” he received
from his colleague information on 12*** Grimsby Avenue regarding a child
pornography investigation. Agent Richard continued the investigation, including
1 According to Special Agent Burke, it is not clear if the date is January 11, 2014,
or November 1, 2014, because Gigatribe is a French company and the French write dates
using the sequence: day/month/year.
conducting surveillance and executing a search warrant to search the premises. In
executing the search warrant, the law enforcement officers interviewed residents of
the house and determined that Newton was the suspect.
The officers also conducted an onsite forensics examination of all
electronic devices found in the home, and they confiscated only items that contained
evidence of child pornography, which included a jump drive and an Acer laptop
discovered in the bedroom identified as Newton’s. The officers also confiscated
photographs found in Newton’s bedroom. The photographs contained images of
Newton with shirtless boys and a photo of a shirtless young boy on satin sheets with
money around him. The officers also discovered a notebook in Newton’s dresser
that included Newton’s email account addresses: esnewtjr2000@yahoo.com,
Ericnewtonjr@gmail.com, and Ericjr1981@gmail.com.
Upon conducting an initial forensics examination of the seized
computer, Agent Richard discovered approximately 900 images that depicted
mostly prepubescent boys and girls in a state of nudity or engaging in some sexual
activity. Agent Richard then turned the seized computer over to OICAC investigator,
Jason Howell, for further investigation. In conducting a full forensics examination
of the Acer laptop, Howell discovered 23,012 images of “child abuse” and 172 “child
abuse” videos. The videos totaled more than 27 hours in length. The examination
also revealed 26 images and two videos of children under the age of five. All of the
images depicted children engaging in sexual activity. In addition to the child abuse
materials, Howell discovered computer searches such as “boy porn,” “boys sex,”
“boys naked,” “boys kissing,” “pics of shirtless sagging young black kids,” “pics of
dead kids hit by cars,” and “pics of dead body kids.” Howell testified that the user
searched “belly and boxers” just 13 days before the search warrant was executed.
Additionally, Howell testified that the forensics examination also revealed that
another Gigatribe user had messaged the user of this computer, stating, “Sorry you
are sharing too young kids. Please go away. You are sharing underage.”
Finally, Howell testified concerning other documents discovered on
the Acer laptop, including Newton’s resume, which listed his address as “12***
Grimsby Avenue” and his email address as “ericnewtonjr@gmail.com.” The
examination also revealed that the user emailed files to alternative emails. Howell
stated that “ericnewtonjr@gmail.com” sent photos and videos, including one titled
“13YO, dark skinned boy.mp4,” to “esnewtonjr2000@yahoo.com.” According to
Howell, Newton’s Google account included auto-saved information such as a credit
card under the name “Eric Newton Jr.,” his account was saved as “Eric Newton,” and
his Windows user name was “Eric.” “Eric” last logged in on April 1, 2015, which was
six days before law enforcement officers executed the search warrant.
Anderson, Newton’s uncle, also lived at 12*** Grimsby Avenue, with
Newton; Anderson’s father, Jerome; and previously his mother, Louise. Anderson
stated that his mother passed away approximately one week before law enforcement
executed the search warrant at his house. Anderson works in internet design and
“electrical” and “mechanical work.” He maintains a computer station in the
basement of the house. The basement computer was not confiscated during
execution of the search warrant.
Anderson testified that his father is 86 years old, has dementia, and
is not technically proficient. Anderson stated that his brother, Noland, was staying
at his house for only a few days when the search was conducted. Anderson identified
Newton’s bedroom for the authorities, which is the bedroom in which Newton
stayed until Noland arrived in town for Louise’s memorial service. Anderson also
identified the Acer laptop as belong to Newton, although he admitted that on
occasion he would play computer games with his children using Newton’s laptop.
Anderson stated that he never downloaded child pornography or a peer-to-peer
software for purposes of sharing child pornography.
Noland, Newton’s other uncle, testified that he resides in Atlanta but
came to Cleveland for his mother’s memorial service a few days before April 7, 2015,
when the search warrant was executed. Noland is an electrical engineer and
programs computer software. Noland testified that he stayed in Newton’s bedroom
while visiting. He stated that he had never downloaded child pornography or a peer-
to-peer software for purposes of sharing child pornography. He identified one
desktop computer and two Dell laptops belonging to him that were discovered in the
residence by law enforcement. These computers were not confiscated during the
search.
III. Motion to Suppress
Newton contends in his first assignment of error that the trial court
erred when it denied his motion to suppress the evidence obtained as a result of the
police officers’ search of the vehicle in which he was riding. In support, he argues
that the record does not show that the police officers had reasonable suspicion that
“criminal activity was afoot,” and therefore, all evidence obtained as a result of the
search must be suppressed.
In the companion appeal, State v. Newton, 8th Dist. Cuyahoga No.
107195, 2019-Ohio-3566 (lower court No. CR-16-605078), Newton also assigned as
error the trial court’s denial of his motion to suppress. In that appeal, this panel
affirmed the trial court’s decision on the motion to suppress, finding that the officers
had reasonable suspicion, supported by articulable facts, that the individuals in the
vehicle in which Newton was a passenger were engaged in criminal activity, and
therefore, the stop was justified. Newton at ¶ 30. We also concluded that Newton’s
argument regarding a purportedly “false statement” made in the search warrant
regarding ownership of the cell phone seized in the vehicle had no merit, thus
finding that “[b]ecause of the circumstances in which the phones were obtained,
probable cause existed to search the phones, regardless of which [individuals]
owned the phones.” Id. at ¶ 35. We found, therefore, that the motion to suppress
was proper. Id. at ¶ 36.
For purposes of this appeal, we adopt the analysis and conclusion
made in the companion appeal regarding Newton’s motion to suppress and
incorporate the same in this appeal. Accordingly, Newton’s first assignment of error
is overruled. For a more complete recitation of the court’s analysis on Newton’s
motion to suppress, see Newton at ¶ 25-36.
IV. Manifest Weight
In his second assignment of error, Newton contends that his
conviction is against the manifest weight of the evidence. In support, he essentially
argues that there was insufficient evidence connecting him to the child pornography,
stating that three other adults lived in the home with Newton where the computer
was located, all having access to the computer, and Newton was rarely home.
Newton also argues that the state’s witness could not identify who put the child
pornography on Newton’s phone.
A manifest weight challenge questions whether the state has met its
burden of persuasion. State v. Thompkins, 78 Ohio St.3d 380, 390, 678 N.E.2d 541
(1997). This challenge raises a factual issue:
“The court, reviewing the entire record, weighs the evidence and all
reasonable inferences, considers the credibility of witnesses and
determines whether in resolving conflicts in the evidence, the jury
clearly lost its way and created such a manifest miscarriage of justice
that the conviction must be reversed and a new trial ordered. The
discretionary power to grant a new trial should be exercised only in
the exceptional case in which the evidence weighs heavily against the
conviction.”
Id. at 387, quoting State v. Martin, 20 Ohio App.3d 172, 175, 485 N.E.2d 717 (1st
Dist.1983). A finding that a conviction was supported by the manifest weight of the
evidence necessarily includes a finding of sufficiency. Thompkins at 388.
It is well established that the elements of an offense may be proven by
direct evidence, circumstantial evidence, or both. See State v. Durr, 58 Ohio St.3d
86, 568 N.E.2d 674 (1991). Direct evidence exists when “a witness testifies about a
matter within the witness’s personal knowledge such that the trier of fact is not
required to draw an inference from the evidence to the proposition that it is offered
to establish.” State v. Cassano, 8th Dist. Cuyahoga No. 97228, 2012-Ohio-4047, ¶
13. Circumstantial evidence, on the other hand, is evidence that requires “the
drawing of inferences that are reasonably permitted by the evidence.” Id. See also
State v. Hartman, 8th Dist. Cuyahoga No. 90284, 2008-Ohio-3683, ¶ 37
(“[c]ircumstantial evidence is the proof of facts by direct evidence from which the
trier of fact may infer or derive by reasoning other facts in accordance with the
common experience of mankind”).
Circumstantial and direct evidence are of equal evidentiary value.
State v. Santiago, 8th Dist. Cuyahoga No. 95333, 2011-Ohio-1691, ¶ 12. “Although
there are obvious differences between direct and circumstantial evidence, those
differences are irrelevant to the probative value of the evidence.” Cassano at ¶ 13,
citing State v. Treesh, 90 Ohio St.3d 460, 485, 739 N.E.2d 749 (2001). In some
cases, circumstantial evidence may be “‘more certain, satisfying and persuasive than
direct evidence.’” State v. Lott, 51 Ohio St.3d 160, 167, 555 N.E.2d 293 (1990),
quoting Michalic v. Cleveland Tankers, Inc., 364 U.S. 325, 330, 81 S.Ct. 6, 5 L.Ed.2d
20 (1960).
Newton was convicted of pandering sexually oriented matter
involving a minor in violation of R.C. 2907.322(A)(1) and (2):
(A) No person, with knowledge of the character of the material or
performance involved, shall do any of the following:
(1) Create, record, photograph, film, develop, reproduce, or publish
any material that shows a minor or impaired person participating or
engaging in sexual activity, masturbation, or bestiality;
(2) Advertise for sale or dissemination, sell, distribute, transport,
disseminate, exhibit, or display any material that shows a minor or
impaired person participating or engaging in sexual activity,
masturbation, or bestiality.
Newton was also convicted of illegal use of minor in nudity-oriented
material or performance in violation of R.C. 2907.323(A)(1) and (3):
(A) No person shall do any of the following:
(1) Photograph any minor or impaired person who is not the person’s
child or ward in a state of nudity, or create, direct, produce, or transfer
any material or performance that shows the minor or impaired person
in a state of nudity * * *.
***
(3) Possess or view any material or performance that shows a minor
or impaired person who is not the person’s child or ward in a state of
nudity * * *.
Newton was further convicted of possessing criminal tools in
violation of R.C. 2923.24(A), namely a cell phone and an Acer laptop computer.
Here, Newton does not dispute that the materials discovered on the
Acer laptop and the black cell phone are evidence of child pornography. Rather, he
contends that the state failed to provide enough evidence linking him to the child
pornography. In support, he argues that he lived in a home where two other
individuals with computer experience had access to Newton’s computer and his
computer passwords and someone else could have placed the child pornography on
Newton’s phone. We find Newton’s argument unpersuasive.
Though it is true that the state did not present any eyewitness who
testified that he or she saw Newton viewing, downloading, or sharing any of the child
pornography found on the devices, the evidence linking Newton to the child
pornography is overwhelming. The evidence demonstrates that law enforcement
officers seized only the computers that contained child pornography. The only
device containing child pornography at Newton’s residence was the Acer laptop
discovered in Newton’s bedroom. The laptop was identified as belonging to Newton.
The forensics examination of the laptop revealed Newton’s resume, which contained
his home address, 12*** Grimsby Avenue, and his email address of
“ericnewtonjr@gmail.com.” Also discovered in the bedroom was a notebook
containing various email addresses linked to Newton.
The forensics examination of the computer also revealed that Newton
had emailed files containing child pornography from one of his email addresses to
another of his email addresses. The evidence showed that Newton’s profile name
was “Chris,” and his username was “Chris19005.” As “Chris19005,” Newton was
conducting searches arguably containing child pornography and he was
downloading and sharing thousands of files containing child pornography.
Additionally, “Chris 19005” posted a message on a Gigatribe blog stating that he
“pay[s] money for the best young black boy pics or videos ages 10-13.” The
examination further showed that “Eric Newton, Jr.’s” credit card information was
saved in a Google account and the account name was saved as “Eric Newton.” And
the Windows user name was “Eric.”
Additionally, the evidence showed several email addresses connected
to the phone, including Ericnelson19005@gmail.com; Ericnewtonjr@gmail.com;
Ericjr1981@gmail.com; and Ericjr19005@yahoo.com. In the emails section of the
phone, the examination revealed that “ericjr19005@yahoo” emailed “Mr. Cock” a
message soliciting child pornography. Newton also sent a message to this same
person indicating that Newton had viewed the pornography sent by Mr. Cock, that
he desired more, and he promised to likewise “send more.” The documents section
of the phone contained Newton’s resume, which included his home address and the
email address “ericnewtonjr@gmail.com.” The resume was created on May 3, 2013,
and modified on October 21, 2014. Other documents discovered on the phone
included several photos of Newton and unidentified children.
Finally, in the messages section of the phone, law enforcement
officers discovered text messages from Newton’s codefendant in a companion case,
Jose Rivera. The messages ask “Chris” to “hurry” and “call me.” And the evidence
shows that during the initial traffic stop that led to the search warrant of the contents
of the phone and ultimately the search of Newton’s residence, Newton asked the
officers if he could have his cell phone back.
We find the jury could reasonably infer from the foregoing evidence
that Newton was in fact the perpetrator of the crimes charged.
Newton claims that others had access to the Acer laptop, including his
uncles, who stayed at the same home and had extensive computer knowledge.
Newton’s uncles, however, denied ever having downloaded or shared child
pornography, and there was no evidence that the uncles’ computers contained child
pornography. Furthermore, Newton’s uncle, Noland, who used Newton’s bedroom
when he came to town in April 2015, testified that he had only arrived days before
the search warrant was executed, and the forensics examination had discovered
child pornography on the Acer laptop dating as far back as 2014. Newton presented
no evidence of other individuals who may have shared his cell phone. The jury
evidently found the state’s witnesses to be credible and it rejected the possibility that
someone else used Newton’s computer or cell phone to create, download, view,
share, or offer for sale child pornography, which it was free to do.
In light of all the evidence presented, we find the jury did not lose its
way in finding Newton guilty of pandering sexually oriented matter involving a
minor, illegal use of a minor, and possessing criminal tools. His convictions are
therefore not against the manifest weight of the evidence.
Newton’s second assignment of error is overruled.
Judgment affirmed.
It is ordered that appellee recover from appellant costs herein taxed.
The court finds there were reasonable grounds for this appeal.
It is ordered that a special mandate be sent to said court to carry this judgment
into execution.
A certified copy of this entry shall constitute the mandate pursuant to Rule 27
of the Rules of Appellate Procedure.
MICHELLE J. SHEEHAN, JUDGE
ANITA LASTER MAYS, P.J., and
RAYMOND C. HEADEN, J., CONCUR