Affirmed and Opinion filed April 23, 2020.
In The
Fourteenth Court of Appeals
NO. 14-19-00119-CR
NO. 14-19-00120-CR
CHRISTOPHER MICHAEL DUPUY, Appellant
V.
THE STATE OF TEXAS, Appellee
On Appeal from the 405th District Court
Galveston County, Texas
Trial Court Cause Nos. 15-CR-1660 & 15-CR-1661
OPINION
In this appeal from two convictions for online impersonation, appellant
complains in several issues that the evidence is legally insufficient, that the trial court
abused its discretion by denying a motion for mistrial and by admitting certain
evidence, and that the statute defining the offense is unconstitutional. For the reasons
explained below, we overrule each of these issues and affirm the trial court’s
judgments.
BACKGROUND
This case is about two women who were falsely advertised as prostitutes
without their knowledge or consent.
The first woman is named Amy, and she was startled one evening when she
received dozens of unsolicited text messages and phone calls within a short span of
twenty minutes. The text messages complimented Amy on her beauty, and inquired
about her “overnight” services. Amy mostly ignored the communications, all of
which were from unfamiliar numbers, until she decided to answer one of the phone
calls. When Amy asked the caller why he was contacting her, the caller responded
that her information had been posted to Backpage.com, a now defunct website that
was primarily used for prostitution and other illegal activities before it was shut
down by the government.
Amy had never heard of Backpage.com, but with the assistance of the caller,
she navigated the website and found the advertisement that contained her contact
information. The advertisement was entitled “Looking for a sexy nurse?” Within the
body of the advertisement, there were three pictures of Amy, all from her Facebook
account, including one that showed her in a Halloween costume as a nurse.
Beneath the pictures, the advertisement contained the following text:
All donations are for time and companionship only. Anything else that
may occur is between two consenting adults. By contacting me you
agree that you are not affiliated with any form of law enforcement.
First time trying this. I am sweet and discreet . . . a total blast. Whatever
makes you happy, I certainly adore and will accommodate.
VERY FETISH FRIENDLY and drama-free.
I guarantee you an extraordinary time and full satisfaction, sure to
knock your socks off. PICS are 100% ME and RECENT or it’s on the
house.
2
70hh/140hr/overnight SPECIALS
The bottom of the advertisement listed Amy’s name, phone number, and the
neighborhood where she lived.
Amy was in disbelief when she saw the advertisement. She quickly changed
her phone number and then contacted the police. When she was asked to identify a
possible suspect, the only person who came to mind was appellant.
Amy explained that she and appellant had known each other for twenty years.
They dated when they were in college, but then they went their separate ways. Amy
eventually married someone else, and when that marriage began to falter, she
reached out to appellant, whom she knew to be a lawyer, and asked appellant to
assist in the divorce.
While the divorce was pending, and when Amy was still separated from her
husband, she and appellant rekindled their earlier passions and became romantic
paramours. They had sex several times, but Amy did not consider the relationship to
be much more than a friendship. Appellant had other feelings though, and when he
learned that Amy had spent a night out with another man, appellant sent Amy a series
of “hateful” text messages and threatened to end their attorney-client relationship.
Appellant ultimately completed his legal representation in the divorce. The
advertisement on Backpage.com appeared less than a month after the divorce was
finalized.
The officer assigned to Amy’s case subpoenaed Backpage.com to obtain more
information about the advertisement. The business records that were returned to the
officer revealed that the person who created Amy’s advertisement had also created
a second advertisement on the same day.
3
The headline for the second advertisement was “Clear Lake MILF,” which is
an explicit acronym for “mom I’d like to f***.” Three pictures were associated with
this advertisement. The first two were face pictures of a woman named Courtney.
The third was a nude picture of Courtney’s breasts, and superimposed on her breasts
were large dollar symbols.
The text of Courtney’s advertisement was similar to Amy’s advertisement.
Beneath the pictures, the text read as follows:
All donations are for time and companionship only. Anything else that
may occur is between consenting adults. By contacting me you agree
that you are not affiliated with any form of law enforcement.
Hi there! My name is Courtney.
I am a classy MILF who wants to fulfill all your needs! Nice, always
clean place. Will consider pot for discounts. Everything is negotiable
in life so just ask. I am also glad to see you and you will leave very
satisfied. . . .
Pictures are 100% Me
50hh 100hr 300all night
The rest of the advertisement contained Courtney’s name, phone number, and
the neighborhood where she lived.
The officer tracked down Courtney and discovered that she had changed her
phone number shortly before the advertisement was posted, which meant that she
did not learn of the advertisement until the officer’s outreach. Like Amy, Courtney
had never heard of Backpage.com, and she immediately suspected that appellant was
responsible for the advertisement.
Courtney explained that she had dated appellant several months earlier, and
that their relationship had ended on terms that were “not great.” She also said that
she had texted the nude picture to appellant when they had been dating, though
without the superimposed dollar symbols.
4
The business records from Backpage.com did not implicate appellant by
name. Instead, the records reflected that both advertisements were created by a
person calling himself “Don Tequila.” The records further contained this person’s
email address, his IP address, and the credit card number that he used to purchase
the advertisements.
The officer traced the IP address to an internet network in Venezuela. But
after juxtaposing the remoteness of that network with the narrowness of the regional
advertisements, the officer came to suspect that the person who created the
advertisements had actually been using a virtual private network (or “VPN”), which
is an encryption tool that can mask an internet user’s true location.
The officer also traced the credit card number to a type of prepaid account that
can be activated in stores, without any form of personal registration. This
information signified to the officer that the person who created the advertisements
was consciously attempting to protect his anonymity.
But when the officer conducted an online search for Don Tequila, he found a
close connection to appellant. The officer’s search led to a Facebook account for an
individual who had taken the name Don Tequila as an alias. The individual used this
alias to promote negative news articles about appellant, who had achieved some
local notoriety.
The officer found another connection to appellant with the email address that
was used to create the advertisements. Records from the email provider indicated
that the email account was created on the same day as the advertisements, but from
an IP address in Germany, which was another clue that a VPN had been used.
Additional records from the email provider showed that the email account was
accessed a week after the advertisements were created, and the IP address associated
5
with that access belonged to a Comcast network in the United States. Records from
Comcast showed that the registered owner of that IP address was appellant.
Armed with this information, the officer obtained a warrant to search
appellant’s residence. Inside the residence, the officer found packaging for the same
type of prepaid credit card that was used to purchase the two advertisements. The
officer also found multiple electronic devices, which were seized. A forensic
analysis of those devices showed that appellant possessed versions of the same
pictures that were attached to the advertisements, and that appellant had visited
Backpage.com before the advertisements were created. The forensic analysis further
revealed that, when the advertisements were created, appellant had visited
Hidemyass.com, a website that provides easy access to a VPN.
Based on the foregoing, appellant was indicted on two separate charges of
online impersonation (one for impersonating Amy, the other for impersonating
Courtney). Appellant pleaded not guilty to both charges. He did not testify at his
trial, but his defense counsel suggested that the advertisements were orchestrated by
the followers of Don Tequila, who must have exploited appellant’s Wi-Fi
connection. The jury rejected this defensive theory and convicted appellant on both
charges.
SUFFICIENCY OF THE EVIDENCE
In a sufficiency challenge, a reviewing court must determine whether a
rational trier of fact could have found the essential elements of an offense beyond a
reasonable doubt. See Temple v. State, 390 S.W.3d 341, 360 (Tex. Crim. App. 2013).
There were two offenses here, but they were both for online impersonation, which
meant that the prosecution had the burden of proving the following essential
elements: (1) appellant used the names or personas of Amy and Courtney to create
web pages on a commercial social networking site or other internet website;
6
(2) without obtaining their consent; and (3) with the intent to harm, defraud,
intimidate, or threaten any person. See Tex. Penal Code § 33.07(a)(1). In deciding
whether the prosecution satisfied this burden, we consider all of the evidence in the
light most favorable to the verdict. See Braughton v. State, 569 S.W.3d 592, 608
(Tex. Crim. App. 2018).
There was clear and direct evidence of impersonation in this case. Both Amy
and Courtney testified that their names and pictures were used to create web pages
on Backpage.com, which is an internet website. They also testified that a third party
created these web pages without their knowledge or consent.
The main issue at trial was whether appellant was this third party, and as to
that element of identity, there was an abundance of circumstantial evidence showing
that he was. The business records from Backpage.com established that both
advertisements were created by the same person using a single email address. And
the business records from other entities established that this email address was
accessed from an IP address that was assigned to appellant.
There was evidence that multiple IP addresses had been used in the
commission of these offenses, but the jury could have reasonably inferred that
appellant had used a VPN on the day that he created the advertisements, which would
explain why some of those IP addresses were traced to foreign networks. This
inference is supported by the forensic evidence, which showed that appellant had
visited Hidemyass.com, a VPN provider. The jury could have likewise inferred that
appellant had neglected to use a VPN when he accessed his email account several
days later, which would explain why one of the IP addresses was traced specifically
to him.
Other circumstantial evidence of identity included appellant’s possession of
the same type of prepaid credit card that was used to purchase the advertisements.
7
He also possessed versions of the pictures that were used in those advertisements,
and there was forensic evidence showing that he had a history of searching
Backpage.com.
Finally, the evidence showed that appellant was the common bond between
Amy and Courtney, who did not know each other. Their testimony established that
they each had prior romantic relationships with appellant that ended in moments that
were “hateful” and “not great.” From that testimony, the jury could have reasonably
inferred that appellant impersonated Amy and Courtney on Backpage.com with the
vindictive intent to cause them harm.
Appellant responds that the evidence is insufficient because the forensic
analyst relied on a partial digital extraction of appellant’s electronic devices. And
based on that incomplete data, appellant argues that the jury could only speculate
that he was the person who committed these offenses, as opposed to some other party
who might have exploited his Wi-Fi connection. This argument is not persuasive.
Speculation is mere theorizing or guessing about the possible meaning of facts
and evidence presented. See Hooper v. State, 214 S.W.3d 9, 16 (Tex. Crim. App.
2007). Such speculation does not occur when the jury is capable of considering other
facts and deducing a logical consequence from them. Id. And here, the forensic
analyst explained that the data may have been incomplete simply because it was lost
in a temporary browser cache, deleted, or contained on a separate device that was
never recovered.
Appellant suggests that there could have been a separate device belonging to
Amy or Courtney, who might have gained trusted access to appellant’s Wi-Fi
connection on an earlier occasion. Appellant further suggests that Amy, Courtney,
or some third party subsequently used this device to frame him. But the jury had a
substantial basis for rejecting this theory: If a third party had actually intended to
8
frame appellant, there would be little reason for the third party to use a VPN, which
had the effect of masking appellant’s IP address. The more logical deduction from
the evidence is that appellant was the person who created the advertisements, and
not some third party.
In any event, because this is a sufficiency challenge, we must view the
evidence in the light most favorable to the verdict, which means that even if there
were evidence in support of appellant’s defensive theory that he was framed, we
could not indulge it.
In a separate point, appellant argues that he is entitled to an acquittal because
the prosecution produced no evidence that he created the advertisements in
Galveston County, which is where the case was tried. This argument is also
unpersuasive because venue is not an element of the offense. See Schmutz v. State,
440 S.W.3d 29, 34–35 (Tex. Crim. App. 2014) (“Because venue is not an element
of the offense, the court of appeals properly determined that failure to prove venue
does not implicate sufficiency of the evidence, nor does it require acquittal under
Jackson.”).
Moreover, venue is presumed to be proved in the trial court, unless it was
disputed, see Tex. R. App. P. 44.2(c)(1), in which case the prosecution must establish
that venue is proper by a preponderance of the evidence. See Tex. Code Crim. Proc.
art. 13.17 (“To sustain the allegation of venue, it shall only be necessary to prove by
the preponderance of the evidence that by reason of the facts in the case, the county
where such prosecution is carried on has venue.”). There was ample evidence in this
case that venue was proper. The business records from Comcast established that
appellant’s IP address was registered to his residence in League City, Texas. And
the officer who obtained the warrant to search that residence testified that the
residence was located in Galveston County. Insofar as the evidence supported a
9
reasonable conclusion that appellant was responsible for posting the advertisements
on Backpage.com, the jury could have reasonably concluded that the prosecution
satisfied its burden of showing that appellant created those advertisements from his
residence in Galveston County.
We conclude that the evidence was legally sufficient to support every essential
element of the offense beyond a reasonable doubt.
MOTION FOR MISTRIAL
Appellant’s next issue arises out of an exchange that occurred at the very
beginning of voir dire, which we reproduce here:
The Court: Does anyone here know anybody? Does anyone
here know any of us? Anybody? Yes?
Venireperson: I know Mr. Dupuy.
The Court: Okay. How do you know Mr. Dupuy? Do you know
him personally?
Venireperson: I hired him one time.
The Court: Okay. Thank you.
Venireperson: Yeah.
The Court: All right. Thanks.
Anybody else?
Venireperson: He owes me money.
The Court: Okay. You can stop. Okay?
Venireperson: I’m sorry.
The Court: All right. That’s it.
Anybody else know anybody here besides [the
venireperson]? Thank you.
Is there anyone else here that knows anybody here?
Anybody?
All right. Is there anything about anything that [the
venireperson] just said that would influence
10
anybody in any way? Because, of course, y’all
haven’t heard anything. All right.
Defense Counsel: Your Honor, let me respectfully move for a mistrial.
The Court: All right. That’s denied.
Appellant now challenges this ruling, which he characterizes as the trial
court’s refusal “to quash the jury panel.” For purposes of this opinion, we adhere to
the terminology that was used in the trial court and characterize the ruling as a refusal
to grant a mistrial, which is the functional equivalent of a refusal to quash the jury
panel. See Alvarez v. State, 804 S.W.2d 617, 619 (Tex. App.—El Paso 1991)
(remarking that the differences between a motion for mistrial and a motion to quash
are “purely semantic”), aff’d, 864 S.W.2d 64 (Tex. Crim. App. 1993); see also Young
v. State, 137 S.W.3d 65, 68–70 (Tex. Crim. App. 2004) (where the defendant
specifically moved for a mistrial on the grounds that a comment by a venireperson
had “polluted the jury panel,” the trial court’s ruling was characterized as a refusal
to grant a mistrial).
The traditional and preferred procedure for seeking a mistrial involves three
steps: (1) objecting to a prejudicial event, if possible; (2) requesting an instruction
that the jury disregard the prejudicial event; and (3) requesting a mistrial if the
moving party believes that the instruction to disregard is insufficient. See Young,
137 S.W.3d at 69. When, as here, the moving party’s first action is to request a
mistrial, the scope of appellate review is limited to the question whether the trial
court erred in not taking the most serious action of ending the trial. Id. If the
prejudicial event could have been prevented by a timely objection or cured by an
instruction to disregard, then we may not disturb the trial court’s refusal to grant the
mistrial. Id.
The prejudicial event in this case is the venireperson’s unsolicited comment
that appellant owed her money. For the sake of argument, we will assume that the
11
comment was unforeseeable, which means that it could not have been prevented by
a timely objection. Id. at 70 (“If an objectionable event occurs before a party could
reasonably have foreseen it, the omission of objection will not prevent appellate
review.”).
The question then becomes whether the prejudice arising out of the
venireperson’s comment could have been cured by an instruction to disregard, or if
the comment qualified as one of those “extreme circumstances” in which no
instruction to disregard would have sufficed. See Archie v. State, 221 S.W.3d 695,
699 (Tex. Crim. App. 2007). For at least three reasons, we hold that the prejudicial
comment was curable.
First, the comment was brief, and it did not convey any information at all
beyond the alleged existence of a debt. See Young, 137 S.W.3d at 71 (concluding
that an instruction to disregard would have been sufficient in a case where the venire
panel had “minimal information” about the venireperson who made a prejudicial
remark).
Second, appellant was on trial for online impersonation, not for anything that
could conceivably be related to a debt, like theft. Because the venireperson’s
comment did not relate to an issue in the case, the prejudice could not have been so
great as to be incurable. Cf. id. at 71–72 (concluding that an instruction to disregard
would have been sufficient even where the venireperson’s comment addressed a
crucial issue in the case).
And third, before appellant had even moved for a mistrial, the trial court
canvassed the venire panel to determine whether anyone would be influenced by the
venireperson’s comment. The record does not reveal that anyone on the panel
answered affirmatively. Based on these circumstances, we cannot say that the
venireperson’s comment was so extreme as to necessitate a mistrial.
12
Appellant contends that the opposite conclusion is required by this court’s
decision in Drake v. State, 465 S.W.3d 759 (Tex. App.—Houston [14th Dist.] 2015,
no pet.). But that case, which involved neither a motion for mistrial nor a motion to
quash, was decided on remarkably different facts. The issue there was whether the
trial court had erred by holding a venireperson in contempt when the venireperson
expressed a religious objection to viewing child pornography. We determined that
the trial court had erred, and that the error was fundamental because it had a chilling
effect on the rest of the venire panel, which prevented the honest exchange of
information during voir dire. That reasoning does not apply to appellant’s case
because the trial court here did not hold this venireperson in contempt, nor could we
say that the trial court’s remarks to the venireperson had any sort of chilling effect.
Based on the foregoing, we conclude that the trial court did not abuse its
discretion by denying the motion for mistrial.
ADMISSION OF BUSINESS RECORDS
When the prosecution offered into evidence the business records from
Backpage.com, the defense objected to their admission on the grounds of
“constitutionality, hearsay and authentication.” A lengthy discussion ensued in
which the defense claimed that it did not receive fourteen days’ notice of the business
records affidavit. The prosecution countered that there was a signed disclosure
establishing that the records had been delivered by hand to the defense. The trial
court overruled the objection.
The defense then repeated that there was an authentication issue because the
custodian of records had represented in her affidavit that the records consisted of
only fourteen pages, whereas the prosecution’s records consisted of fifteen pages.
The defense asserted that one unidentified page “is not supposed to be in there.”
13
The prosecution responded that a formatting issue may have caused a printer
to produce an additional page, but the defense countered that the PDF version of the
records also contained fifteen pages. The prosecution then argued that the custodian
may have made an error in counting the pages, but there was otherwise no indication
of a lack of reliability. The defense countered that point by asserting that
Backpage.com was a criminal enterprise.
The trial court interjected, “Well, that’s argument so far.” The trial court then
invited the prosecution to authenticate a portion of the records, using Amy as the
sponsoring witness. Amy testified that the records contained a copy of the
advertisement that had impersonated her, which she recognized from the time that
she had visited Backpage.com. Amy further testified that she did not recognize a
separate portion of the records, which related to the advertisement impersonating
Courtney.
During a voir dire examination, the defense established that the advertisement
that Amy had previously seen on Backpage.com was different from the copy
contained in the records, which included metadata that had not been published on
the website.
The defense again objected to admitting the records because Amy could not
properly authenticate even a portion of them. The prosecution offered to introduce
the records as a demonstrative exhibit and to establish their admissibility with other
witnesses. The trial court declined this offer and overruled all of the defense’s
objections, admitting the records in their entirety on the basis of the custodian’s
affidavit.
Appellant now complains of this ruling, in what we discern to be two separate
points. In the first point, appellant contends that the business records contained
testimonial evidence, and that their admission violated his constitutional rights under
14
the Confrontation Clause. We conclude that this point has not been preserved for
appellate review because it was never presented to the trial court. Appellant’s bare
objection on the basis of “constitutionality” was not sufficiently specific to apprise
the trial court that he was lodging a complaint under the Confrontation Clause. See
Tex. R. App. P. 33.1 (objections must be specific); Reyna v. State, 168 S.W.3d 173,
179 (Tex. Crim. App. 2005) (even a constitutional complaint under the
Confrontation Clause can be waived if the objection is not sufficiently specific).
In the second point, appellant reasserts his authentication complaint. Without
challenging whether the prosecution had established the predicate for the business
records, appellant argues that all of the records should have been excluded because
the custodian’s affidavit was inaccurate on its face and because the custodian worked
for a criminal enterprise.
As the opponent of the evidence, appellant had the burden “to demonstrate
that the source of information or the method or circumstances of preparation indicate
a lack of trustworthiness.” See Tex. R. Evid. 803(6)(E). By admitting the business
records over appellant’s objections that the affidavit was inaccurate and that the
source was unreliable, the trial court implicitly determined that appellant did not
satisfy his burden. We cannot say that this determination was an abuse of discretion.
The trial court could have reasonably believed that the custodian’s misstatement of
numbers was a simple clerical mistake. See Adams v. State, 985 S.W.2d 582, 584
(Tex. App.—Eastland 1998, pet. ref’d) (“The affidavits before us are not patently
false although it is not clear whether the affidavits misstated the number of pages
contained in the medical records or whether there are pages missing from the medical
records. Whether the affidavits are inaccurate or whether there are pages missing
from the medical records should affect the weight to be given the evidence not the
admissibility.”). Likewise, on this limited record, the trial court could have
15
reasonably believed that the custodian was credible, even if her organization was
facing criminal allegations. See Okonkwo v. State, 398 S.W.3d 689, 694 (Tex. Crim.
App. 2013) (recognizing that trial courts have wide discretion in assessing the
credibility of affidavits). The trial court’s interjection to the defense’s
characterization of Backpage.com as a criminal enterprise further supports this
conclusion.
FIRST AMENDMENT CHALLENGES
In his final issue, appellant contends that the online impersonation statute is
unconstitutional, both on its face and as applied.
In the facial challenge, appellant argues that the statute violates the First
Amendment because it is overbroad and vague. Appellant acknowledges that this
court has already considered and rejected the very same facial challenge in State v.
Stubbs, 502 S.W.3d 218, 232–37 (Tex. App.—Houston [14th Dist.] 2016, pet. ref’d).
Nonetheless, appellant asserts his arguments in the interest of preserving error before
a higher court. Because his arguments present nothing new, we overrule them, as
our precedent requires.
In his as-applied challenge, appellant argues that the statute is
unconstitutionally overbroad on the specific facts of this case. Appellant asserts that,
if the advertisements were attributable to him, then he was engaged in
constitutionally protected speech. Continuing with that premise, he argues that his
convictions must be reversed because the statute operates as an impermissible
content-based regulation.
Appellant believes that the statute regulates content because a court must first
examine the content of his advertisements before it can determine whether an offense
has been committed. This point was also raised in Stubbs, which rejected appellant’s
16
reasoning and held that the statute is content-neutral. Id. at 231 (“Moreover, just
because the content of the web page or the message may need to be examined does
not render the law content based.”).
As for whether appellant’s particular speech was nonetheless deserving of
constitutional protection, we conclude that it was not. The First Amendment affords
no protection to communicative conduct in which one individual invades the
substantial privacy interests of another in an essentially intolerable manner. See Scott
v. State, 322 S.W.3d 662, 670 (Tex. Crim. App. 2010), abrogated on other grounds
by Wilson v. State, 448 S.W.3d 418 (Tex. Crim. App. 2014). The evidence here
established the application of that rule: Appellant invaded the substantial privacy
interests of Amy and Courtney by posting their personal identifying information to
the internet, and this communicative conduct was intolerable because appellant
falsely represented that Amy and Courtney were prostitutes without their knowledge
or consent. Because the online impersonation statute was applied to conduct that was
not entitled to constitutional protection, appellant’s overbreadth challenge must fail.
Cf. Wagner v. State, 539 S.W.3d 298, 311 (Tex. Crim. App. 2018) (rejecting a
similar as-applied challenge to the statute for violating a protective order).
CONCLUSION
The trial court’s judgments are affirmed.
/s/ Tracy Christopher
Justice
Panel consists of Justices Christopher, Wise, and Zimmerer.
Publish — Tex. R. App. P. 47.2(b).
17