Com. v. McNulty, J.

J-S71040-19 NON-PRECEDENTIAL DECISION - SEE SUPERIOR COURT I.O.P. 65.37 COMMONWEALTH OF PENNSYLVANIA : IN THE SUPERIOR COURT OF : PENNSYLVANIA : v. : : : JAMES MCNULTY : : Appellant : No. 717 EDA 2019 Appeal from the PCRA Order Entered January 24, 2019 In the Court of Common Pleas of Philadelphia County Criminal Division at No(s): CP-51-CR-0003422-2014 BEFORE: BOWES, J., MURRAY, J., and McLAUGHLIN, J. MEMORANDUM BY McLAUGHLIN, J.: FILED APRIL 27, 2020 James McNulty appeals the denial of his request for relief under the Post Conviction Relief Act (“PCRA”), 42 Pa.C.S.A. §§ 9541-9546. The PCRA court denied McNulty’s PCRA petition, concluding that he failed to present any meritorious claims. We affirm. Following a bench trial, the court found McNulty guilty of 50 counts of sexual abuse child – child pornography; two counts of sexual abuse of children – dissemination of photographs, videotapes, computer depictions and films; and one count of criminal use of communication facility.1 The trial court sentenced him to aggregate term of four to eight years’ incarceration followed by 10 years of reporting probation. We affirmed the judgment of sentence in March 2016; McNulty did not file a petition for allowance of appeal with our ____________________________________________ 1 18 Pa.C.S.A. §§ 6312(c), (d), and 7512(a), respectively. J-S71040-19 Supreme Court. See Commonwealth v. McNulty, 2016 WL 854136 (Pa.Super. filed March 4, 2016). McNulty filed the instant, timely counseled PCRA petition in February 2017, and the Commonwealth filed a response. The PCRA court held two evidentiary hearings, after which it ordered both parties to file briefs. The PCRA court ultimately denied the petition and this timely appeal followed. McNulty raises the following claims before this Court: I. Did the PCRA [c]ourt err as a matter of law in determining that trial counsel was not ineffective when trial counsel failed to acquire an expert to conduct independent adversarial testing in a case centering on forensic computer evidence? II. Did the PCRA [c]ourt err as a matter of law in determining that trial counsel was [not] ineffective in failing to investigate and present witnesses available to testify at trial? III. Did the PCRA [c]ourt err in determining counsel was not ineffective for failing to object to inadmissible evidence? IV. Did the PCRA [c]ourt err in determining counsel was not ineffective for failing to impeach witnesses? V. Did the PCRA [c]ourt err in determining that there was neither a Brady[ v. Maryland, 373 U.S. 83 (1963)] violation nor possible prosecutorial misconduct? McNulty’s Br. at 4-5 (suggested answers omitted). We review the denial of a PCRA petition by determining whether the PCRA committed legal error and if its legal conclusions are supported by the record. See Commonwealth v. Williams, 950 A.2d 294, 299 (Pa. 2008). -2- J-S71040-19 None of McNulty’s issues have merit, and we affirm on the basis of the opinion of the PCRA judge, the Honorable Barbara A. McDermott. As Judge McDermott explains, McNulty’s first two claims fail because the testimony of the only expert he has identified does not undermine confidence in McNulty’s convictions. McNulty’s next issue, relating to the best evidence rule, fails because the Commonwealth introduced into evidence exact copies of the files the agents received from McNulty, and the failure to locate such files on McNulty’s computers did not render those copies inadmissible. McNulty’s impeachment issue lacks merit because we agree with Judge McDermott that McNulty cannot show prejudice. His Brady claim fails because he has not shown that the allegedly withheld information was exculpatory, and his claim of prosecutorial misconduct based on the alleged Brady violation likewise fails. We thus affirm on the basis of Judge McDermott’s well-reasoned opinion. Order affirmed. Judgment Entered. Joseph D. Seletyn, Esq. Prothonotary Date: 4/27/20 -3- Circulated 04/02/2020 12 30 PM IN THE COURT OF COMMON PLEAS FIRST JUDICIAL DISTRICT OF PENNSYLVANIA CRIMINAL TRIAL DIVISION COMMONWEALTH OF PENNSYLVANIA CP-51-CR-0003422-2014 v. FILED JAMES MCNULTY JAN 2 4 2019 ORDER AND OPINION PCRA Unit CP Criminal Listings McDermott, J. January 24, 2019 Procedural History On January 7, 2014, the Petitioner, James McNulty, was arrested and charged with two counts of Dissemination of Photos of Child Sex Acts, one count of Criminal Use of Communication Facility, and fifty counts of Possession of Child Pornography. On June 17, 2014, the Petitioner entered into a non-negotiated guilty plea to two counts of Dissemination of Photos of Child Sex Acts, one count of Criminal Use of Communication Facility, and twenty-five counts of Possession of Child Pornography, before the Honorable Ann Butchart. Judge Butchart deferred sentencing until August 14, 2014, for the completion of pre-sentence and mental health reports. On August 14, 2014, the Petitioner filed a Motion to Withdraw his guilty plea, and on the same date, Judge Butchart granted the Petitioner's Motion. On March 26, 2015, the case was transferred to this Court for trial. After a bench trial the same date, this Court found Petitioner guilty of all charges and revoked bail. On May 28, 2015, after a hearing, this Court determined the Petitioner was not a sexually violent predator. That same day, this Court sentenced Petitioner to concurrent terms of imprisorunent of two to four years for both counts of Dissemination of Photo of Child Sex Acts, a consecutive term of imprisonment of two to four years for Criminal Use of Communication Facility, and one year of probation for ten counts of Possession of Child Pornography, each to run consecutive to the other, for a total sentence of four to eight years of imprisonment followed by ten years of probation. No further penalty was imposed on the forty remaining charges of Possession of Child Pornography. The Petitioner appealed and on March 4, 2016, the Superior Court affirmed this Court's Judgment of Sentence. The Petitioner did not file a Petition for Allowance of Appeal with the Supreme Court of Pennsylvania. On June 29, 2016, through retained PCRA counsel Joseph P. Capone, Esq. the Petitioner filed the instant, timely Post-Conviction Relief Act ("PCRA") petition, his first. On July 14, 2016, the Petitioner withdrew his petition. On February 28, 2017, the Petitioner filed a timely, counseled supplemental petition. On May 9, 2017, the Commonwealth filed its response. On July 25, 2017, this Court presided over an evidentiary hearing.1 On December 15, 2017, the Petitioner sent this Court a letter requesting permission to proceed pro se. On December 20, 2017, this Court permitted the Petitioner to proceed prose, and attorney Capone agreed to serve as standby counsel. On January 25, 2018, after the Petitioner requested to proceed in forma pauperis, this Court issued an Order allocating funds to secure the retention of Cornerstone Discovery as a Forensic Expert, On July 26, 2018, through newly retained PCRA counsel Brian J. Zeiger, Esq., the Petitioner filed a supplemental PCRA petition. I During the July 25, 2017 Evidentiary Hearing, the Petitioner presented Computer Forensic Investigator Rebecca Mercuri as an expert witness. During the hearing, Mercuri revealed that she did not examine the forensic evidence in this case. N.T. 7/25!2017 at 41-42, 63---65. At the conclusion of that hearing, this Court determined that the Petitioner's retained expert's testimony was insufficient to address the issues raised in his petition. The Petitioner elected not to continue employing Mercuri's services. 2 On August 23, 2018, this Court presided over a second evidentiary hearing. At the conclusion of that hearing, this Court ordered the Petitioner and the Commonwealth to submit briefs. On November 24, 2018, after having granted the Petitioner an extension of time to file his brief, the Petitioner submitted his Second Supplement to Petition Under the Post-Conviction Relief Act. On December 19, 2018, the Commonwealth submitted its Answer to Petition for Post-Conviction Relief.2 On January 4, 2019, the Petitioner filed his answer to the Commonwealth's answer. This Court previously recited the facts of the case as follows: On September 15, 2013, Special Agent Duane Tabak of the Pennsylvania Attorney General's Office's Child Predator Section conducted an investigation to identify individuals possessing and sharing child pornography using the BitTorrent file-sharing network.3 On September 15, 2013, and again on September 18, 2013, Special Agent Tabak made a direct connection to a computer utilizing the IP address 68.82.141.16. This IP address was operating on the BitTorrent Network and was making child pornography publicly available for download. Special Agent Tabak successfully downloaded two video files depicting children, under the age of eighteen years old, engaging in sexual acts. On October 24, 2013, Special Agent Tabak obtained a court order directing Comcast to release the subscriber information associated with IP address 68.82.141.16 for the dates of September 15 and September 18. On October 28, 2013, Special Agent Tabak received information pursuant to the order indicating that Wang Chang of 7 4 3 Watkins Street in Philadelphia was the subscriber to that IP address. On December 16, 2013, Special Agent Tabak prepared a search warrant for 743 Watkins Street. On December 16, 2013, Agent Kurt Smith, the Philadelphia Regional Supervisor from the Attorney General's Office's Child Predator Section, executed the search warrant on 743 Watkins Street. Agent Smith spoke with the [Petitioner] who confirmed that 2 For purposes of review, this Court considers the Petitioner's Second Supplemental Petition and the Commonwealth's Answer to Petition for Post-Conviction Relief as their briefs encompassing al I collateral issues preserved before this Court. 3 BitTorrent is a file sharing Network that allows users to download and share files with others via the internet. N.T. 3/26/2015 at 39. 3 he and his brother, Justin McNulty, lived at 743 Watkins Street.4 During the search of the residence, Agent Daniel Block testified to overhearing the [Petitioner] tell his brother the following statements: "I've downloaded some extreme stuff, but I always thought they were adults;" "No matter what, they're going to find something illegal;" "This is horrible shit. They got all my hard drives. How am I going to show my face around my kids now;" "I didn't get to say good-bye to my kids and my ass is getting locked up;" and "They are taking my IBM. Fuck." Law enforcement recovered seventy-five computer related items from the McNulty residence including multiple computers, loose hard drives, and other media storage devices. Law enforcement also seized a photo ID, a vehicle title, and other paperwork belonging to the [Petitioner] on the computer desk in the first-floor dining room.5 There was no documentation pertaining to Justin McNulty in the vicinity of the computers. From what Agent Smith believed to be Justin McNulty's room, agents recovered a Comcast bill dated September 12, 2013, that was addressed to Wang Chang. From what Agent Smith believed to be the [Petitioner]'s bedroom, agents recovered one Apple computer, one Apple Mac computer tower and one external storage device. When Agent Smith informed the [Petitioner] that the search was related to child pornography, the [Petitioner] responded, "people get twenty years for downloading." On November 24, 2014, Agent Braden Cook of the Attorney General's Forensic Unit examined the items seized from the [Petitioner]'s residence. According to Agent Cook, nine items contained child pornography. An examination of an eMachines computer tower confiscated from the dining room of the McNulty residence revealed a user profile marked "JAMES." Under this user profile, Agent Cook discovered three child pornography videos and eighty-six Torrent files, indicative of child pornography, that were downloaded on January 31, 2011, and stored under the folder marked "Vuze."6 From an Apple Mac Minicomputer, seized from the dining room, Agent Cook recovered 508 child pornography images under the user profile marked "FirstLast." Also under this user profile, Agent Cook discovered four business documents belonging to the [Petitioner] including: a rejection letter from the Patent and Trademark Office addressed to the [Petitioner] and dated May 14, 2013; a letter addressed to Mr. Kurt Hughes from the [Petitioner]; 4 Agent Smith later confirmed the Petitioner and Justin McNulty's addresses through Pa. Justice Network. N.T. 3/26/2015 at 87. 5 The computers were found in the first-floor main room which combined both the living room and dining room. N.T. 3/26/2015 at 93-94. 6 Vuze is a file-sharing program accessible on the BitTorrent network that allows users to share electronic files. N.T. 3/26/2015 at 3 8. 4 an amendment name change document; and articles of amendment for "Holoco Incorporated," listing the [Petitioner] as Chairman and sole director. There was no relevant information discovered under the user profiles marked "GateVistaJames" and "VaioPrintJames." Agent Cook examined a Compaq Presario C500 laptop computer, also confiscated from the dining room. There were two non-default user profiles associated with this laptop computer, one marked "JAMES" and the other marked "JUSTIN." Agent Cook retrieved twenty-four link files that were indicative of child pornography stored under the user profile "JAMES." Agent Cook did not discover any child pornography stored under the user profile "JUSTIN." An examination of an Apple Power Mac GS computer tower that agents seized from the [Petitioner]' s bedroom revealed a user profile marked "JAMES." Under this user profile, Agent Cook discovered a Vuze file-sharing program and 843 child pornographic pictures that were downloaded on August 3, 2009. Agent Cook examined an Apple iMac computer, also recovered from the [Petitioner]'s bedroom, which revealed one child pornographic picture downloaded on January 12, 2012, and stored under a non-default user profile marked "USER." Elsewhere on this computer, Agent Cook discovered the two videos that Special Agent Tabak successfully downloaded on September 15, 2013 and September 18, 2013. Special Agent Tabak determined that both videos were searched and downloaded on September 14, 2013, and · further determined that both videos were viewed on this computer. In an attempt to identify the user of this profile, Agent Cook examined other files located on this computer and found a video of the [Petitioner] with the file name "MeinCoat" and a picture of the [Petitioner] with the file name "FacePic." On December 16, 2013, law enforcement issued an arrest warrant for the [Petitioner]. On January 7, 2014, the [Petitioner] surrendered. Justin McNulty, the [Petitionerj's brother, testified on the [Petitioner]'s behalf that Justin McNulty operated a computer repair business in his home. Justin McNulty recalled working on four customers' computers on December 16, 2013, and indicated that most of the computers confiscated from the first floor belonged to his customers. According to Justin McNulty, his employee, James Smith, who had been installing operating systems on the customers' computers since 2002, was responsible for putting "JAMES" as the primary default account on these computers. Justin McNulty testified that the [Petitioner] carried his own laptop around with him and had used a separate Wi-Fi system from Clear Channel since 2005. Justin McNulty and his neighbor Wang Chang agreed to put 5 the cable Wi-Fi service from Comcast in Wang Chang's name, creating an open network for both parties to use. Justin McNulty also presented alibi evidence that he picked up the [Petitioner] on Tuesday, September 10, 2013, from his probation meeting and transported him to Kelly Baran's residence in New Jersey. He believed the [Petitioner] remained in New Jersey until Friday, September 13, 2013, at which time he picked up the [Petitioner] and drove him to his residence at 743 Watkins Street in Philadelphia, where the [Petitioner] remained for the weekend. Justin McNulty then drove the [Petitioner] back to New Jersey on Sunday, September 15, 2013, where the [Petitioner] remained until September 20, 2013. Kelly Baran, the mother of the [PetitionerJ's children, testified on behalf of the defense. Baran testified that in September of 2013, the [Petitioner] would stay with her at her home located in National Park, New Jersey and with his brother in Philadelphia. Baran stated that the [Petitioner] was in New Jersey the week before his daughter's birthday on September 20, 2013, and departed the night of September 20, 2013. The [Petitioner] testified to being in New Jersey on the 15[th] and 18[th] of September, 2013. The [Petitioner] admitted to using the computers agents confiscated from 743 Watkins Street, but specified that he worked primarily on a computer that he kept in his possession. The [Petitioner] denied downloading any child pornography on any computers and stated that he never set up the user profile "JAMES." 1925(a) Opinion at *2-6 (Pa. Cm. Pls. August 7, 2015). During the August 8, 2018 evidentiary hearing, Jason Silva, Director of Operations with Cornerstone Discovery and an expert in digital forensics, testified that he reviewed all forensic information from two computers recovered from the Petitioner's residence, an iMac and a GS. After reviewing the Commonwealth's forensic reports and attachments, Silva performed keyword searches and forensic artifacts to determine whether the Petitioner's computer was used to upload files containing pornographic imagery to the Commonwealth's agent. Through a forensic bootleg process, Silva was able to examine an unaltered digital replica of the computer, which preserves the integrity of any evidence found within. Silva's keyword search showed 6,466 matches, consistent with the Commonwealth's analysis. N.T. 8/23/2018 at 15-25. 6 Based on his review of the forensic evidence, Silva conceded that the Petitioner's iMac computer was used to download the pornographic files via the peer-to-peer file sharing program Vuze, and the files themselves were viewed through either a Quicktime Media Player or VLC program. Silva further testified that he was unable to recover any metadata or digital artifacts indicating that the files in question were ever stored on the computer. Silva was similarly unable to recover any evidence showing that the files were uploaded from the iMac to the Commonwealth's case agent. N.T. 8/23/2018 at 25-35. On cross examination, Silva noted that, while he did not find the files themselves on the iMac, he did find text fragments and a portion of a log file to support the idea that the files were downloaded, and further information indicated that the files were viewed on the iMac on September 14, 2013, one and four days prior to upload to the Commonwealth's computer on September 15, and 18, 2013. While the files were downloaded to the iMac, Silva opined that it was possible for the files to either have been deleted or stored elsewhere after download. Silva stated that he did not perform an independent analysis of the IP address the Commonwealth identified as performing the upload. Silva clarified that his analysis did not uncover direct evidence of an upload, but the absence of such evidence did not preclude the upload from occurring. Silva testified that he did not discover any evidence that would contradict the Commonwealth's evidence that pornographic images were uploaded onto Agent Tabak's computer on the specified dates. N.T. 8/23/2018 at 43---65. Agent Cook testified at the hearing, and provided consistent testimony to what he presented at trial. Agent Cook explained that the Vuze file creates a temporary file location for the purpose of download, which may contain all or part of the file. Upon completion of the download, users may store the files in many locations, including folders, internal hard drives, 7 thumb drives, and external hard drives. Files downloaded on the BitTorrent Network permit uses to download parts of the file from multiple locations to later reassemble the full file on the user's computer. In order to identify the Petitioner, the Agent Tabak and the Attorney General's office employed a program that isolates a single user uploading a file available for sharing, permitting them to upload the entire file from that user. N.T. 8/23/2018 at 78-81. Agent Cook reiterated that his forensic analysis prior to trial revealed that Agent Tabak downloaded the offending files from the iMac recovered from the Petitioner's home. His investigation further revealed the IP address from where the files were obtained, and that the iMac was located at that IP address. Cook also clarified that, in his original report and at trial, that he never recovered direct evidence of uploading from the iMac via code or fragments, and that his conclusion was based on the keyword analysis and the iMac's location on the IP address. Because he did not find direct evidence of upload on the computer, the absence of such evidence was not included in his report, as the report could not include information that \ he failed to discover. N.T. 8/23/2018 82-86. Discussion In his post-evidentiary hearing Second Supplemental Petition, the Petitioner raises seven issues for review, alleging that trial counsel was ineffective for failing to: (1) hire an expert witness to conduct adversarial testing; (2) investigate witnesses available to testify at trial; (3) object to inadmissible evidence; and, (4) impeach Commonwealth witnesses. The Petitioner further alleges that the prosecutor committed (5) misconduct and (6) violated Brady v. Maryland, 373 U.S. 83 (1963). To warrant relief based on an ineffectiveness claim, a petitioner must show that such ineffectiveness "in the circumstances of the particular case, so undermined the truth-determining 8 process that no reliable adjudication of guilt or innocence could have taken place." Commonwealth v. Bardo, 105 A.3d 678, 684 (Pa. 2014); 42 Pa.C.S. § 9543(a)(2)(ii). Counsel is presumed to have rendered effective assistance. Commonwealth v. Weiss, 81 A.3d 767, 783 (Pa. 2013) (citing Commonwealth v. Sepulveda, 55 A.3d 1108, 1117 (Pa. 2012)). To overcome the presumption, the Petitioner has to satisfy the performance and prejudice test set forth in Strickland v. Washington, 466 U.S. 668 (1984). The Supreme Court of Pennsylvania has applied the Strickland test by looking to three elements, whether (1) the underlying claim has arguable merit; (2) no reasonable basis existed for counsel's action or failure to act; and (3) the petitioner has shown that he suffered prejudice as a result of counsel's lapse, i.e., that there is a reasonable probability that the result of the proceeding would have been different. Commonwealth v. Pierce, 527 A.2d 973, 975 (Pa. 1987). If a claim fails under any necessary element of the Pierce test, the court may proceed to that element first. Commonwealth v. Bennett, 57 A.3d 1185, 1195-1196 (Pa. 2011). Counsel will not be deemed ineffective for failing to raise ameritless claim. Commonwealth v. Rivera, 108 A.3d 779, 789 (Pa. 2014) (citing Commonwealth v. Jones, 912 A.2d 268, 278 (Pa. 2006)). The Petitioner avers that trial counsel was ineffective for failing to call an expert witness to testify at trial or to conduct adversarial testing of the seized forensic computer evidence. Although the Petitioner does not frame the two claims as such, he is effectively arguing for relief in the form of after-discovered exculpatory evidence in the form of Silva's expert testimony. When challenging trial counsel's failure to produce expert testimony, the petitioner must articulate what evidence was available and identify the witness who was willing to offer such evidence. Commonwealth v. Luster, 71 AJd 1029, 1047 (Pa. Super. 2013) (citing Commonwealth v. Bryant, 855 A.2d 726, 745 (Pa. 2004)). At a minimum, a petitioner must also 9 show how the uncalled witness' testimony would have been beneficial under the circumstances of the case. See Sneed, supra. To prevail on an after-discovered evidence claim for relief, a Petitioner must prove that: (1) the exculpatory evidence has been discovered after trial and could not have been obtained at or prior to trial through reasonable diligence; (2) the evidence is not cumulative; (3) it is not being used solely to impeach credibility; and, (4) it would likely compel a different verdict. Commonwealth v. Burton, 158 A.3d 618, 629 (Pa. 2017) (citing Commonwealth v. D'Amato, 856 A.2d 806, 823 (Pa. 2004)). The Petitioner's argument is two pronged. First, the Petitioner alleges that, had trial counsel conducted a proper investigation of additional witnesses and discovery, he would have discovered that no evidence of that any illicit images had been identified, selected, opened, or copied by the Petitioner using the seized computers. He similarly argues that trial counsel would have discovered no evidence of computer usage activity by the Petitioner, but would have discovered computer usage activity by other persons. Second, the Petitioner claims that, had trial counsel hired an expert to conduct adversarial testing, he would have discovered exculpatory evidence demonstrating that the images and videos depicting child pornography were not uploaded from the Petitioner's computer. To support this claim, the Petitioner presents testimony from computer forensic expert Jason Silva, who conducted an independent analysis of the computers seized from the Petitioner's home. During the August 23, 2018 evidentiary hearing, Silva testified he was unable to discover any digital artifacts indicating that the seized pornographic files were uploaded from the iMac computer. The Petitioner appears to argue that this testimony alone exonerates him 10 Silva's testimony, when viewed in its totality, however, is insufficient to compel a different verdict in this matter. While Silva opined that the iMac computer bore no evidence indicating that the files in question were uploaded from it, he further testified that the absence of such direct evidence did not preclude the upload from occurring. In fact, Silva testified that that the Commonwealth's conclusion with respect to the uploading of files was reasonable. At trial and again during the evidentiary hearing, Agent Cook described the process of how the Commonwealth obtained said files from the Petitioner using a peer-to-peer network transmission. When uploading the pornographic files from the Petitioner's computer, the Commonwealth used a program that isolated uploader's IP address, such that all of the data transferred to the Commonwealth came from a single user employing that IP address. Upon search of the Petitioner's home, the Commonwealth recovered the Petitioner's iMac computer, which was located at the same IP address used to upload the offending files. Silva determined that Cook's conclusion was reasonable and did not challenge it. The Petitioner failed to present any evidence to challenge this evidence. Moreover, Silva agreed with the Commonwealth's and this Court's conclusion that the Petitioner downloaded and viewed pornographic images and videos depicting children. Metadata associated with the files were located on the hard drive indicated that the files were downloaded and viewed by a user. Circumstantial evidence including an image of the Petitioner saved under the offending username identified the Petitioner as the user in question. The fact that the files in question were not physically stored on the computer does not contradict these conclusions, as nothing presented in Silva's testimony or within the Petitioner's pleadings precluded the possibility that the files were saved externally or stored as temporary files. 11 Ultimately, Comerstone's analysis failed to unearth any additional evidence from the computers they examined, exculpatory or otherwise. The absence of evidence of the files having been stored on the hard drive does not preclude the Commonwealth's conclusion, as presented at trial, that the Petitioner downloaded and viewed pornographic images on that computer, and that those files were later transferred to a Commonwealth representative. Had trial counsel secured testimony from an expert who conducted adversarial testing akin to Silva's, the Commonwealth's conclusions concerning the Petitioner's download of child pornography, and his eventual transfer of those files to a Commonwealth agent, would remain unsullied. Accordingly, the fails to demonstrate that he has secured exculpatory evidence, or that trial counsel was ineffective for secure an expert or conduct adversarial testing. The Petitioner next claims that trial counsel was ineffective for failing to investigate and present a witness he had available for trial. To demonstrate the arguable merit of a claim that trial counsel was ineffective for failing to present additional witnesses, the Petitioner must establish the existence and availability of the witnesses, counsel's actual awareness, or duty to know of the witnesses, the willingness and ability of the witnesses to cooperate and appear of the Petitioner's behalf, and the necessity for the proposed testimony in order to avoid prejudice. Commonwealth v. Williams, 141 A.3d 440, 460 (Pa. 2016); Commonwealth v. Gibson, 951 A.2d 1110, 1133-1134 (Pa. 2008). A showing of prejudice requires the Petitioner to show how an uncalled witness' testimony would have been beneficial under the circumstances of the case, or how such testimony would have been beneficial to the defense. Commonwealth v. Sneed, 45 A.3d 1096, 1109 (Pa. 2012) (citing Gibson, 951 A.2d at 1134; Commonwealth v. Auker, 681 A.2d 1305, 1319 (Pa. 1996)). 12 Moments before trial, the Petitioner informed this Court that he had retained an expert witness to investigate the Commonwealth's forensic evidence. However, the Petitioner fails to identify what expert, if any, he retained. Immediately after the Petitioner claimed he secured an expert, trial counsel informed this Court that, despite meeting with the Petitioner multiple times in anticipation of trial, the Petitioner never requested that an expert be retained. As trial counsel said during the original trial, the Petitioner failed to furnish the identity of the witness, that counsel was not made aware of the witness' existence until the Petitioner mentioned retaining an expert in open court, and during no point of their multiple preparation sessions before trial did the Petitioner mention the retention of an expert. N.T. 3/26/20015 at 20-24. The Petitioner's assertion that he had retained an expert for trial is wholly incredible. Not only did the Petitioner fail to name the expert he had allegedly retained, he also failed to bring the expert to Court on the date of his trial. Although the Petitioner had been preparing for trial for more than one year, and was granted a continuance four months prior to the trial date, he made no mention of retaining an expert witness until mere moments before trial. This Court, therefore, has no reason reasonable basis to conclude that trial counsel was aware or should have been aware of the existence of an expert witness at any point before the trial date. For that reason alone, the Petitioner's claim fails. It is clear from the trial record that the Petitioner may have disagreed with trial counsel concerning strategy in the instant matter, and the Petitioner requested a continuance to prepare the case with an expert that he claimed to have retained. Nonetheless, that disagreement is of little consequence to this Court. On collateral review, this Court permitted the Petitioner to secure two experts to review the Commonwealth's evidence. As stated above, even after a 13 thorough review of the forensic evidence seized in this case, a competent expert was unable to provide evidence that was sufficient to overturn the verdict. Regardless of whether he actually retained an expert on the eve of trial, the Petitioner still fails to demonstrate how an expert's testimony would have been beneficial to his defense. Ultimately, the Petitioner fails to demonstrate prejudice, and his claim fails. The Petitioner next avers that original copies of the alleged video evidence were not found on the computer recovered from the Petitioner's home, rendering the video inadmissible under PA.R.E. l 002 (the Best Evidence Rule). Accordingly, he argues that trial counsel was ineffective for failing to object to the admission of the video and photographic evidence submitted to this Court, as the specific videos and photographs were not retrieved from the Petitioner's computer. The admission of evidence is committed to the sound discretion of the trial court, and a trial court's ruling will not be disturbed unless that ruling reflects manifest unreasonableness, or partiality, prejudice, bias, or ill will, or such lack of support to be clearly erroneous. Commonwealth v. Strafford, 194 A.3d 168, 176 (Pa. Super. 2018) (citing Commonwealth v. Huggins, 68 A.3d 962, 966 (Pa. Super. 2013)). The best evidence rule provides that an original writing, recording, or photograph is required in order to prove its content. Pa.R.E. 1002. The best evidence rule applies where the contents of the item in question must be proven to make a case. Commonwealth v. Janda, 14 A.3d 147, 161 -162 (Pa. Super. 2011). Traditionally, the best evidence rule applied only to writings, but where recordings and photographs are the only evidence of a transaction, such evidence is dispositive, especially in cases involving matters such as copyright infringement, 14 defamation, pornography, and invasion of privacy. Pa.R.E. 1002 Comment; Commonwealth v. Green, 162 A.3d 509, 517 (Pa. Super. 2017). For electronically stored information, "original" means any printout, or other output readable by sight, if it accurately reflects the information. Pa.R.E. 1001 ( d). The best evidence rule was designed to guard against testimony about the content of physical evidence when the original evidence has not been produced or admitted. Green, 162 A.3d at 518 (citing Commonwealth v. Lewis, 623 A.2d 355 (Pa. 1993). The Petitioner appears to argue that, because the files were not electronically stored on the seized computers, it is impossible for the Commonwealth to furnish an original copy of the video or photograph evidence used to convict him. The Petitioner's argument is without merit. With respect to the images that were recovered, the Commonwealth submitted exact bit by bit digital copies of the files that they received from the Petitioner. The presence of such files on the Petitioner's hard drive is thus irrelevant to the analysis, the Commonwealth received electronic evidence, and submitted an identical representation of that evidence to this Court during trial. This Court did not merely consider testimony concerning video or photographic evidence, the files themselves were submitted as evidence at trial and viewed by this Court. Under the current legal apparatus, such copies are deemed original for evidentiary purposes. The Petitioner alleges that trial counsel was ineffective for failing to impeach OAG Tabak concerning his testimony that the images and videos in question were discovered on the Petitioner's computer. A failure to impeach a key witness may be considered ineffectiveness in the absence of a reasonable strategic basis for not impeaching. Commonwealth v. Treiber, 121 A.3d 435, 456 (Pa. 2015) (citing Commonwealth v. Small, 980 A.2d 549, 565 (Pa. 2009)). In order to prove that counsel was ineffective for failing to impeach a witness, a petitioner must 15 satisfy the three-pronged test set forth in Pierce. Commonwealth v. Simpson, 112 A.3d 1194, 1197-1198 (Pa. 2015). The Commonwealth concedes that OAG Tabak misspoke when he stated that, to his understanding, two files were found to be stored on the Petitioner's computer. However, OAG Tabak later testified that it was merely his understanding, and that the issue of fact would be clarified by Agent Cook, who actually examined the Petitioner's computer. During his testimony, Agent Cook described the evidence of uploaded files as "text fragments" which did not show the data and time that the program was actually executed, but only that the text fragments were actually discovered on the computer. Accordingly, no such misrepresentation occurred, Tabak qualified his testimony by stating that he did not have personal knowledge of whether the files were actually discovered on the computer, a qualification that was clarified by Agent Cook's undisputed testimony and findings. The Petitioner fails to demonstrate prejudice, as any discrepancy between Agents Tabak's and Cook's testimony was minimal and did not implicate the truthfulness of Agent Tabak's testimony. At trial, Agent Tabak stated that he believed the electronic files were recovered from the Petitioner's computer: BY MR. DeSIPIO: Q. Were the two files shown in court today found in the residence of 743 Watkins Street? [AGENT TABAK:] A. My understanding is they were. Q. They what? A. They were. Q. It's your understanding they were? A. They were found on a computer within that residence. Q. Which one? A. That will be a question for the computer forensics specialist. He's prepared to testify to that. N.T. 3/26/2015 at 70-71. 16 Agent Tabak immediately qualified his misstatement by informing counsel and this Court that Agent Cook was better suited to testify on what was discovered in the Petitioner's home. Agent Tabak did not examine the evidence recovered from the apartment nor did he participate in the search of the apartment. Almost immediately after Agent Tabak concluded his testimony, Agent Cook testified that he examined all forensic evidence recovered from the Petitioner's computer. During his testimony, he stated that he did not find the physical files containing child pornography within the Petitioner's computer. Rather, Agent Cook testified that he discovered metadata on the computer which indicated that a user of the iMac computer downloaded and viewed the pornographic images on the computer in question. Agent Cook further testified that circumstantial evidence, such as photos of the Petitioner saved to the profile associated with that username entitled "MeinCoat" and "Facepic" identified the Petitioner as the user of that profile. At no point did Agent Cook testify that images of child pornography were found on the computer. Instead, the images that the Petitioner seeks to challenge were recovered by the Commonwealth after connecting with the Petitioner's computer via a peer-to-peer network and isolating his IP address to ensure that the files were transmitted from the Petitioner's computer alone. Had trial counsel attempted to impeach Agent Tabak on his misstatement, the outcome of the trial would have remained the same, as any contradiction was cured by Agent Cook's testimony. The Petitioner alleges that the Commonwealth deliberately withheld an exhaustive amount of discovery materials that, if provided to counsel before trial, could have been used to impeach Commonwealth witnesses. Specifically, the Petitioner lists fifteen examples of allegedly outstanding discovery material, including: (1) all evidence relating to the remote 17 download performed by Agent Tabak, notes taken by OAG Agents after they spoke to the Petitioner on December 12, 2013; (2) results of a JNET Search on the Petitioner's residence; (3) list of all law enforcement personnel who participated in the search of the Petitioner's residence; (4) all artifacts and reports collected from a preview of the Petitioner's computers from 12/16/2013; (5) all 24 attachments to Agent Cook's forensic report; (6) contents of a DVD listed in Agent Cook's forensic report; (7) forensic copies of all media and metadata created by law enforcement at the time of the execution of the warrant; (8) the PARS and CFU reports associated with the case; (9) several exhibits admitted at trial; (10) all impounded evidence recovered via search warrant; (11) all other impounded evidence not included in the search warrant inventory; (12) results of all keyword searches; (13) chain of custody documentation for all impounded evidence; (14) the Petitioner's notice of appeal; and (15) the Petitioner's 1925(b) Statement. Pursuant to Brady v. Maryland, 373 U.S. 83 (1963) and subsequent law, a prosecutor has an obligation to disclose all exculpatory information material to the guild or punishment of an accused, including evidence of an impeachment nature. Commonwealth v. Ovalles, 144 A.3d 957, 965 (Pa. Super. 2016) (citing Commonwealth v. Roney, 79 A.3d 595, 607-608 (Pa. 2013)). To establish a Brady violation, a petitioner must prove that: (1) the evidence at issue was favorable to the accused, either because it is exculpatory or because it impeaches; (2) the evidence was suppressed by the prosecution, either willfully or inadvertently; and (3) prejudice ensued. Id. (citing Commonwealth v. Hutchinson, 25 A.3d 277, 310 (Pa. 2011)). Favorable evidence is material if there is a reasonable probability that, had the evidence been disclosed to the defense, the result of the proceeding would have been different. Id. (citing Commonwealth v. Paddy, 15 A.3d 431, 450 (Pa. 2011)). 18 Brady does not require the disclosure of non-exculpatory information or information that might merely form the groundwork of possible defenses. Id. Prosecutors are not required to disclose every fruitless lead, rather the duty to disclose is limited to the information in possession of the government bringing the prosecution, including exculpatory evidence. Id. (citing Commonwealth v. Puksar, 951 A.2d 267, 283 (Pa. 2008)). The Commonwealth's Brady obligation does not extend to information that is not in its possession. Commonwealth v. Santos 176 A.3d 877, 883 (Pa. Super. 2017) (citing Roney, 79 A.3d at 610.) If the allegedly withheld evidence is not material for Brady purposes, then the failure to obtain that evidence does not result in prejudice for ineffectiveness purposes. Commonwealth v. Weiss, 81 A.3d 767, 791 n. 13 (Pa. 2013) (citing Kyles v. Whitley, 514 U.S. 419, 434 (1995)). The mere possibility that an item of undisclosed information might have helped the defense, or might have affected the outcome of the trial, does not establish materiality to warrant relief. Id (citing Commonwealth v. Miller, 987 A.2d 638, 655 (Pa. 2009)). The Petitioner fails to demonstrate that the above evidence was withheld by the prosecution in anticipation of trial, that any of the above information contains any exculpatory evidence, or even that such information is not currently in his possession. The Petitioner's Brady claim is a classic request for a fishing expedition to search for possible exculpatory evidence, only it's masquerading as a sixth amendment due process claim. The Petitioner fails to allege how any of the evidence he listed is exculpatory or material. For that reason, his Brady claim fails. The Petitioner finally alleges that the prosecutor's failure to disclose Brady materials constitutes prosecutorial misconduct. The proper Brady inquiry asks what course the defense and the trial would have taken at trial had the defense not been misled by the prosecutor, and 19 what impact the misconduct had on trial counsel preparation and presentation of the case. Weiss, 81 A.3d at 810 (Castille, J., concurring) (citing United States v. Bagley, 473 U.S. 667, 683 (1985)). To succeed on a claim of ineffective assistance of counsel based on trial counsel's failure to object to prosecutorial misconduct, the petitioner must demonstrate that the prosecutor's actions violated a constitutionally or statutorily protected right, such as the Sixth Amendment right to fair trial. Commonwealth v. Busanet, 54 A.3d 35, 50 (Pa. 2012) (citing Commonwealth v. Hanible, 30 A.3d 426, 464-465 (Pa. 2011)) Because the Petitioner failed to establish that any Brady material was withheld from counsel leading up to trial, his attendant prosecutorial misconduct claim must also fail. The Petitioner has failed to raise an issue or uncover any exculpatory evidence to demonstrate ineffective assistance from trial counsel. For the foregoing reasons, the instant petition is DENIED. The Petitioner is hereby notified that he has thirty (30) days from the date of this Order and Opinion to file an appeal with the Superior Court. BY THE COURT �crl� Barbara A. McDermott, J. 20 Commonwealth v. James McNulty, CP-51-CR-0003422-2014 PROOF OF SERVICE I hereby certify that I am this day serving the foregoing filing upon the person(s), and in the manner indicated below, which service satisfies the requirements of Pa. R. Crim. P. 114: Carson B. Morris, Esq. PA Office of Attorney General Strawberry Square Floor 16 Harrisburg, PA 17120 Type of Service: First-Class Mail Brian J. Zeiger, Esq. Levin & Zeiger, LLP 1500 John F. Kennedy Boulevard Suite 620 Philadelphia, PA 19102 Type of Service: First-Class Mail James McNulty MB1420 SCI Waymart P.O. Box 256, Route #6 Waymart, PA 18472 Type of Service: Certified Mail Jose y Judicial Clerk o the Honorable Bar ara A. McDermott