J-S71040-19
NON-PRECEDENTIAL DECISION - SEE SUPERIOR COURT I.O.P. 65.37
COMMONWEALTH OF PENNSYLVANIA : IN THE SUPERIOR COURT OF
: PENNSYLVANIA
:
v. :
:
:
JAMES MCNULTY :
:
Appellant : No. 717 EDA 2019
Appeal from the PCRA Order Entered January 24, 2019
In the Court of Common Pleas of Philadelphia County Criminal Division at
No(s): CP-51-CR-0003422-2014
BEFORE: BOWES, J., MURRAY, J., and McLAUGHLIN, J.
MEMORANDUM BY McLAUGHLIN, J.: FILED APRIL 27, 2020
James McNulty appeals the denial of his request for relief under the Post
Conviction Relief Act (“PCRA”), 42 Pa.C.S.A. §§ 9541-9546. The PCRA court
denied McNulty’s PCRA petition, concluding that he failed to present any
meritorious claims. We affirm.
Following a bench trial, the court found McNulty guilty of 50 counts of
sexual abuse child – child pornography; two counts of sexual abuse of children
– dissemination of photographs, videotapes, computer depictions and films;
and one count of criminal use of communication facility.1 The trial court
sentenced him to aggregate term of four to eight years’ incarceration followed
by 10 years of reporting probation. We affirmed the judgment of sentence in
March 2016; McNulty did not file a petition for allowance of appeal with our
____________________________________________
1 18 Pa.C.S.A. §§ 6312(c), (d), and 7512(a), respectively.
J-S71040-19
Supreme Court. See Commonwealth v. McNulty, 2016 WL 854136
(Pa.Super. filed March 4, 2016).
McNulty filed the instant, timely counseled PCRA petition in February
2017, and the Commonwealth filed a response. The PCRA court held two
evidentiary hearings, after which it ordered both parties to file briefs. The
PCRA court ultimately denied the petition and this timely appeal followed.
McNulty raises the following claims before this Court:
I. Did the PCRA [c]ourt err as a matter of law in
determining that trial counsel was not ineffective
when trial counsel failed to acquire an expert to
conduct independent adversarial testing in a case
centering on forensic computer evidence?
II. Did the PCRA [c]ourt err as a matter of law in
determining that trial counsel was [not] ineffective in
failing to investigate and present witnesses available
to testify at trial?
III. Did the PCRA [c]ourt err in determining counsel was
not ineffective for failing to object to inadmissible
evidence?
IV. Did the PCRA [c]ourt err in determining counsel was
not ineffective for failing to impeach witnesses?
V. Did the PCRA [c]ourt err in determining that there was
neither a Brady[ v. Maryland, 373 U.S. 83 (1963)]
violation nor possible prosecutorial misconduct?
McNulty’s Br. at 4-5 (suggested answers omitted).
We review the denial of a PCRA petition by determining whether the
PCRA committed legal error and if its legal conclusions are supported by the
record. See Commonwealth v. Williams, 950 A.2d 294, 299 (Pa. 2008).
-2-
J-S71040-19
None of McNulty’s issues have merit, and we affirm on the basis of the
opinion of the PCRA judge, the Honorable Barbara A. McDermott. As Judge
McDermott explains, McNulty’s first two claims fail because the testimony of
the only expert he has identified does not undermine confidence in McNulty’s
convictions. McNulty’s next issue, relating to the best evidence rule, fails
because the Commonwealth introduced into evidence exact copies of the files
the agents received from McNulty, and the failure to locate such files on
McNulty’s computers did not render those copies inadmissible. McNulty’s
impeachment issue lacks merit because we agree with Judge McDermott that
McNulty cannot show prejudice. His Brady claim fails because he has not
shown that the allegedly withheld information was exculpatory, and his claim
of prosecutorial misconduct based on the alleged Brady violation likewise
fails. We thus affirm on the basis of Judge McDermott’s well-reasoned opinion.
Order affirmed.
Judgment Entered.
Joseph D. Seletyn, Esq.
Prothonotary
Date: 4/27/20
-3-
Circulated 04/02/2020 12 30 PM
IN THE COURT OF COMMON PLEAS
FIRST JUDICIAL DISTRICT OF PENNSYLVANIA
CRIMINAL TRIAL DIVISION
COMMONWEALTH OF PENNSYLVANIA CP-51-CR-0003422-2014
v.
FILED
JAMES MCNULTY JAN 2 4 2019
ORDER AND OPINION PCRA Unit
CP Criminal Listings
McDermott, J. January 24, 2019
Procedural History
On January 7, 2014, the Petitioner, James McNulty, was arrested and charged with two
counts of Dissemination of Photos of Child Sex Acts, one count of Criminal Use of
Communication Facility, and fifty counts of Possession of Child Pornography. On June 17, 2014,
the Petitioner entered into a non-negotiated guilty plea to two counts of Dissemination of Photos
of Child Sex Acts, one count of Criminal Use of Communication Facility, and twenty-five counts
of Possession of Child Pornography, before the Honorable Ann Butchart. Judge Butchart
deferred sentencing until August 14, 2014, for the completion of pre-sentence and mental health
reports. On August 14, 2014, the Petitioner filed a Motion to Withdraw his guilty plea, and on
the same date, Judge Butchart granted the Petitioner's Motion.
On March 26, 2015, the case was transferred to this Court for trial. After a bench trial the
same date, this Court found Petitioner guilty of all charges and revoked bail. On May 28, 2015,
after a hearing, this Court determined the Petitioner was not a sexually violent predator. That
same day, this Court sentenced Petitioner to concurrent terms of imprisorunent of two to four
years for both counts of Dissemination of Photo of Child Sex Acts, a consecutive term of
imprisonment of two to four years for Criminal Use of Communication Facility, and one year of
probation for ten counts of Possession of Child Pornography, each to run consecutive to the
other, for a total sentence of four to eight years of imprisonment followed by ten years of
probation. No further penalty was imposed on the forty remaining charges of Possession of Child
Pornography.
The Petitioner appealed and on March 4, 2016, the Superior Court affirmed this Court's
Judgment of Sentence. The Petitioner did not file a Petition for Allowance of Appeal with the
Supreme Court of Pennsylvania.
On June 29, 2016, through retained PCRA counsel Joseph P. Capone, Esq. the Petitioner
filed the instant, timely Post-Conviction Relief Act ("PCRA") petition, his first. On July 14,
2016, the Petitioner withdrew his petition. On February 28, 2017, the Petitioner filed a timely,
counseled supplemental petition. On May 9, 2017, the Commonwealth filed its response. On
July 25, 2017, this Court presided over an evidentiary hearing.1 On December 15, 2017, the
Petitioner sent this Court a letter requesting permission to proceed pro se. On December 20,
2017, this Court permitted the Petitioner to proceed prose, and attorney Capone agreed to serve
as standby counsel. On January 25, 2018, after the Petitioner requested to proceed in forma
pauperis, this Court issued an Order allocating funds to secure the retention of Cornerstone
Discovery as a Forensic Expert, On July 26, 2018, through newly retained PCRA counsel Brian
J. Zeiger, Esq., the Petitioner filed a supplemental PCRA petition.
I
During the July 25, 2017 Evidentiary Hearing, the Petitioner presented Computer Forensic Investigator Rebecca
Mercuri as an expert witness. During the hearing, Mercuri revealed that she did not examine the forensic evidence
in this case. N.T. 7/25!2017 at 41-42, 63---65. At the conclusion of that hearing, this Court determined that the
Petitioner's retained expert's testimony was insufficient to address the issues raised in his petition. The Petitioner
elected not to continue employing Mercuri's services.
2
On August 23, 2018, this Court presided over a second evidentiary hearing. At the
conclusion of that hearing, this Court ordered the Petitioner and the Commonwealth to submit
briefs. On November 24, 2018, after having granted the Petitioner an extension of time to file
his brief, the Petitioner submitted his Second Supplement to Petition Under the Post-Conviction
Relief Act. On December 19, 2018, the Commonwealth submitted its Answer to Petition for
Post-Conviction Relief.2 On January 4, 2019, the Petitioner filed his answer to the
Commonwealth's answer.
This Court previously recited the facts of the case as follows:
On September 15, 2013, Special Agent Duane Tabak of the
Pennsylvania Attorney General's Office's Child Predator Section
conducted an investigation to identify individuals possessing and
sharing child pornography using the BitTorrent file-sharing
network.3 On September 15, 2013, and again on September 18,
2013, Special Agent Tabak made a direct connection to a computer
utilizing the IP address 68.82.141.16. This IP address was operating
on the BitTorrent Network and was making child pornography
publicly available for download. Special Agent Tabak successfully
downloaded two video files depicting children, under the age of
eighteen years old, engaging in sexual acts.
On October 24, 2013, Special Agent Tabak obtained a court
order directing Comcast to release the subscriber information
associated with IP address 68.82.141.16 for the dates of September
15 and September 18. On October 28, 2013, Special Agent Tabak
received information pursuant to the order indicating that Wang
Chang of 7 4 3 Watkins Street in Philadelphia was the subscriber to
that IP address. On December 16, 2013, Special Agent Tabak
prepared a search warrant for 743 Watkins Street.
On December 16, 2013, Agent Kurt Smith, the Philadelphia
Regional Supervisor from the Attorney General's Office's Child
Predator Section, executed the search warrant on 743 Watkins
Street. Agent Smith spoke with the [Petitioner] who confirmed that
2 For purposes of review, this Court considers the Petitioner's Second Supplemental Petition and the
Commonwealth's Answer to Petition for Post-Conviction Relief as their briefs encompassing al I collateral issues
preserved before this Court.
3 BitTorrent is a file
sharing Network that allows users to download and share files with others via the internet. N.T.
3/26/2015 at 39.
3
he and his brother, Justin McNulty, lived at 743 Watkins Street.4
During the search of the residence, Agent Daniel Block testified to
overhearing the [Petitioner] tell his brother the following statements:
"I've downloaded some extreme stuff, but I always thought they
were adults;" "No matter what, they're going to find something
illegal;" "This is horrible shit. They got all my hard drives. How am
I going to show my face around my kids now;" "I didn't get to say
good-bye to my kids and my ass is getting locked up;" and "They
are taking my IBM. Fuck."
Law enforcement recovered seventy-five computer related items
from the McNulty residence including multiple computers, loose
hard drives, and other media storage devices. Law enforcement also
seized a photo ID, a vehicle title, and other paperwork belonging to
the [Petitioner] on the computer desk in the first-floor dining room.5
There was no documentation pertaining to Justin McNulty in the
vicinity of the computers. From what Agent Smith believed to be
Justin McNulty's room, agents recovered a Comcast bill dated
September 12, 2013, that was addressed to Wang Chang. From what
Agent Smith believed to be the [Petitioner]'s bedroom, agents
recovered one Apple computer, one Apple Mac computer tower and
one external storage device. When Agent Smith informed the
[Petitioner] that the search was related to child pornography, the
[Petitioner] responded, "people get twenty years for downloading."
On November 24, 2014, Agent Braden Cook of the Attorney
General's Forensic Unit examined the items seized from the
[Petitioner]'s residence. According to Agent Cook, nine items
contained child pornography. An examination of an eMachines
computer tower confiscated from the dining room of the McNulty
residence revealed a user profile marked "JAMES." Under this user
profile, Agent Cook discovered three child pornography videos and
eighty-six Torrent files, indicative of child pornography, that were
downloaded on January 31, 2011, and stored under the folder
marked "Vuze."6
From an Apple Mac Minicomputer, seized from the dining
room, Agent Cook recovered 508 child pornography images under
the user profile marked "FirstLast." Also under this user profile,
Agent Cook discovered four business documents belonging to the
[Petitioner] including: a rejection letter from the Patent and
Trademark Office addressed to the [Petitioner] and dated May 14,
2013; a letter addressed to Mr. Kurt Hughes from the [Petitioner];
4 Agent Smith later confirmed the Petitioner and Justin McNulty's addresses through Pa. Justice Network. N.T.
3/26/2015 at 87.
5 The
computers were found in the first-floor main room which combined both the living room and dining room.
N.T. 3/26/2015 at 93-94.
6 Vuze is a
file-sharing program accessible on the BitTorrent network that allows users to share electronic files. N.T.
3/26/2015 at 3 8.
4
an amendment name change document; and articles of amendment
for "Holoco Incorporated," listing the [Petitioner] as Chairman and
sole director. There was no relevant information discovered under
the user profiles marked "GateVistaJames" and "VaioPrintJames."
Agent Cook examined a Compaq Presario C500 laptop
computer, also confiscated from the dining room. There were two
non-default user profiles associated with this laptop computer, one
marked "JAMES" and the other marked "JUSTIN." Agent Cook
retrieved twenty-four link files that were indicative of child
pornography stored under the user profile "JAMES." Agent Cook
did not discover any child pornography stored under the user profile
"JUSTIN."
An examination of an Apple Power Mac GS computer tower that
agents seized from the [Petitioner]' s bedroom revealed a user profile
marked "JAMES." Under this user profile, Agent Cook discovered
a Vuze file-sharing program and 843 child pornographic pictures
that were downloaded on August 3, 2009.
Agent Cook examined an Apple iMac computer, also recovered
from the [Petitioner]'s bedroom, which revealed one child
pornographic picture downloaded on January 12, 2012, and stored
under a non-default user profile marked "USER." Elsewhere on this
computer, Agent Cook discovered the two videos that Special Agent
Tabak successfully downloaded on September 15, 2013 and
September 18, 2013. Special Agent Tabak determined that both
videos were searched and downloaded on September 14, 2013, and
· further determined that both videos were viewed on this computer.
In an attempt to identify the user of this profile, Agent Cook
examined other files located on this computer and found a video of
the [Petitioner] with the file name "MeinCoat" and a picture of the
[Petitioner] with the file name "FacePic."
On December 16, 2013, law enforcement issued an arrest
warrant for the [Petitioner]. On January 7, 2014, the [Petitioner]
surrendered.
Justin McNulty, the [Petitionerj's brother, testified on the
[Petitioner]'s behalf that Justin McNulty operated a computer repair
business in his home. Justin McNulty recalled working on four
customers' computers on December 16, 2013, and indicated that
most of the computers confiscated from the first floor belonged to
his customers. According to Justin McNulty, his employee, James
Smith, who had been installing operating systems on the customers'
computers since 2002, was responsible for putting "JAMES" as the
primary default account on these computers. Justin McNulty
testified that the [Petitioner] carried his own laptop around with him
and had used a separate Wi-Fi system from Clear Channel since
2005. Justin McNulty and his neighbor Wang Chang agreed to put
5
the cable Wi-Fi service from Comcast in Wang Chang's name,
creating an open network for both parties to use.
Justin McNulty also presented alibi evidence that he picked up
the [Petitioner] on Tuesday, September 10, 2013, from his probation
meeting and transported him to Kelly Baran's residence in New
Jersey. He believed the [Petitioner] remained in New Jersey until
Friday, September 13, 2013, at which time he picked up the
[Petitioner] and drove him to his residence at 743 Watkins Street in
Philadelphia, where the [Petitioner] remained for the weekend.
Justin McNulty then drove the [Petitioner] back to New Jersey on
Sunday, September 15, 2013, where the [Petitioner] remained until
September 20, 2013.
Kelly Baran, the mother of the [PetitionerJ's children, testified
on behalf of the defense. Baran testified that in September of 2013,
the [Petitioner] would stay with her at her home located in National
Park, New Jersey and with his brother in Philadelphia. Baran stated
that the [Petitioner] was in New Jersey the week before his
daughter's birthday on September 20, 2013, and departed the night
of September 20, 2013.
The [Petitioner] testified to being in New Jersey on the 15[th]
and 18[th] of September, 2013. The [Petitioner] admitted to using
the computers agents confiscated from 743 Watkins Street, but
specified that he worked primarily on a computer that he kept in his
possession. The [Petitioner] denied downloading any child
pornography on any computers and stated that he never set up the
user profile "JAMES."
1925(a) Opinion at *2-6 (Pa. Cm. Pls. August 7, 2015).
During the August 8, 2018 evidentiary hearing, Jason Silva, Director of Operations with
Cornerstone Discovery and an expert in digital forensics, testified that he reviewed all forensic
information from two computers recovered from the Petitioner's residence, an iMac and a GS.
After reviewing the Commonwealth's forensic reports and attachments, Silva performed
keyword searches and forensic artifacts to determine whether the Petitioner's computer was used
to upload files containing pornographic imagery to the Commonwealth's agent. Through a
forensic bootleg process, Silva was able to examine an unaltered digital replica of the computer,
which preserves the integrity of any evidence found within. Silva's keyword search showed
6,466 matches, consistent with the Commonwealth's analysis. N.T. 8/23/2018 at 15-25.
6
Based on his review of the forensic evidence, Silva conceded that the Petitioner's iMac
computer was used to download the pornographic files via the peer-to-peer file sharing program
Vuze, and the files themselves were viewed through either a Quicktime Media Player or VLC
program. Silva further testified that he was unable to recover any metadata or digital artifacts
indicating that the files in question were ever stored on the computer. Silva was similarly unable
to recover any evidence showing that the files were uploaded from the iMac to the
Commonwealth's case agent. N.T. 8/23/2018 at 25-35.
On cross examination, Silva noted that, while he did not find the files themselves on the
iMac, he did find text fragments and a portion of a log file to support the idea that the files were
downloaded, and further information indicated that the files were viewed on the iMac on
September 14, 2013, one and four days prior to upload to the Commonwealth's computer on
September 15, and 18, 2013. While the files were downloaded to the iMac, Silva opined that it
was possible for the files to either have been deleted or stored elsewhere after download. Silva
stated that he did not perform an independent analysis of the IP address the Commonwealth
identified as performing the upload. Silva clarified that his analysis did not uncover direct
evidence of an upload, but the absence of such evidence did not preclude the upload from
occurring. Silva testified that he did not discover any evidence that would contradict the
Commonwealth's evidence that pornographic images were uploaded onto Agent Tabak's
computer on the specified dates. N.T. 8/23/2018 at 43---65.
Agent Cook testified at the hearing, and provided consistent testimony to what he
presented at trial. Agent Cook explained that the Vuze file creates a temporary file location for
the purpose of download, which may contain all or part of the file. Upon completion of the
download, users may store the files in many locations, including folders, internal hard drives,
7
thumb drives, and external hard drives. Files downloaded on the BitTorrent Network permit uses
to download parts of the file from multiple locations to later reassemble the full file on the user's
computer. In order to identify the Petitioner, the Agent Tabak and the Attorney General's office
employed a program that isolates a single user uploading a file available for sharing, permitting
them to upload the entire file from that user. N.T. 8/23/2018 at 78-81.
Agent Cook reiterated that his forensic analysis prior to trial revealed that Agent Tabak
downloaded the offending files from the iMac recovered from the Petitioner's home. His
investigation further revealed the IP address from where the files were obtained, and that the
iMac was located at that IP address. Cook also clarified that, in his original report and at trial,
that he never recovered direct evidence of uploading from the iMac via code or fragments, and
that his conclusion was based on the keyword analysis and the iMac's location on the IP address.
Because he did not find direct evidence of upload on the computer, the absence of such evidence
was not included in his report, as the report could not include information that
\
he failed to
discover. N.T. 8/23/2018 82-86.
Discussion
In his post-evidentiary hearing Second Supplemental Petition, the Petitioner raises seven
issues for review, alleging that trial counsel was ineffective for failing to: (1) hire an expert
witness to conduct adversarial testing; (2) investigate witnesses available to testify at trial; (3)
object to inadmissible evidence; and, (4) impeach Commonwealth witnesses. The Petitioner
further alleges that the prosecutor committed (5) misconduct and (6) violated Brady v. Maryland,
373 U.S. 83 (1963).
To warrant relief based on an ineffectiveness claim, a petitioner must show that such
ineffectiveness "in the circumstances of the particular case, so undermined the truth-determining
8
process that no reliable adjudication of guilt or innocence could have taken place."
Commonwealth v. Bardo, 105 A.3d 678, 684 (Pa. 2014); 42 Pa.C.S. § 9543(a)(2)(ii). Counsel is
presumed to have rendered effective assistance. Commonwealth v. Weiss, 81 A.3d 767, 783 (Pa.
2013) (citing Commonwealth v. Sepulveda, 55 A.3d 1108, 1117 (Pa. 2012)).
To overcome the presumption, the Petitioner has to satisfy the performance and prejudice
test set forth in Strickland v. Washington, 466 U.S. 668 (1984). The Supreme Court of
Pennsylvania has applied the Strickland test by looking to three elements, whether (1) the
underlying claim has arguable merit; (2) no reasonable basis existed for counsel's action or
failure to act; and (3) the petitioner has shown that he suffered prejudice as a result of counsel's
lapse, i.e., that there is a reasonable probability that the result of the proceeding would have been
different. Commonwealth v. Pierce, 527 A.2d 973, 975 (Pa. 1987). If a claim fails under any
necessary element of the Pierce test, the court may proceed to that element first. Commonwealth
v. Bennett, 57 A.3d 1185, 1195-1196 (Pa. 2011). Counsel will not be deemed ineffective for
failing to raise ameritless claim. Commonwealth v. Rivera, 108 A.3d 779, 789 (Pa. 2014) (citing
Commonwealth v. Jones, 912 A.2d 268, 278 (Pa. 2006)).
The Petitioner avers that trial counsel was ineffective for failing to call an expert witness
to testify at trial or to conduct adversarial testing of the seized forensic computer evidence.
Although the Petitioner does not frame the two claims as such, he is effectively arguing for relief
in the form of after-discovered exculpatory evidence in the form of Silva's expert testimony.
When challenging trial counsel's failure to produce expert testimony, the petitioner must
articulate what evidence was available and identify the witness who was willing to offer such
evidence. Commonwealth v. Luster, 71 AJd 1029, 1047 (Pa. Super. 2013) (citing
Commonwealth v. Bryant, 855 A.2d 726, 745 (Pa. 2004)). At a minimum, a petitioner must also
9
show how the uncalled witness' testimony would have been beneficial under the circumstances
of the case. See Sneed, supra.
To prevail on an after-discovered evidence claim for relief, a Petitioner must prove that:
(1) the exculpatory evidence has been discovered after trial and could not have been obtained at
or prior to trial through reasonable diligence; (2) the evidence is not cumulative; (3) it is not
being used solely to impeach credibility; and, (4) it would likely compel a different verdict.
Commonwealth v. Burton, 158 A.3d 618, 629 (Pa. 2017) (citing Commonwealth v. D'Amato, 856
A.2d 806, 823 (Pa. 2004)).
The Petitioner's argument is two pronged. First, the Petitioner alleges that, had trial
counsel conducted a proper investigation of additional witnesses and discovery, he would have
discovered that no evidence of that any illicit images had been identified, selected, opened, or
copied by the Petitioner using the seized computers. He similarly argues that trial counsel would
have discovered no evidence of computer usage activity by the Petitioner, but would have
discovered computer usage activity by other persons. Second, the Petitioner claims that, had trial
counsel hired an expert to conduct adversarial testing, he would have discovered exculpatory
evidence demonstrating that the images and videos depicting child pornography were not
uploaded from the Petitioner's computer. To support this claim, the Petitioner presents
testimony from computer forensic expert Jason Silva, who conducted an independent analysis of
the computers seized from the Petitioner's home. During the August 23, 2018 evidentiary
hearing, Silva testified he was unable to discover any digital artifacts indicating that the seized
pornographic files were uploaded from the iMac computer. The Petitioner appears to argue that
this testimony alone exonerates him
10
Silva's testimony, when viewed in its totality, however, is insufficient to compel a
different verdict in this matter. While Silva opined that the iMac computer bore no evidence
indicating that the files in question were uploaded from it, he further testified that the absence of
such direct evidence did not preclude the upload from occurring. In fact, Silva testified that that
the Commonwealth's conclusion with respect to the uploading of files was reasonable.
At trial and again during the evidentiary hearing, Agent Cook described the process of
how the Commonwealth obtained said files from the Petitioner using a peer-to-peer network
transmission. When uploading the pornographic files from the Petitioner's computer, the
Commonwealth used a program that isolated uploader's IP address, such that all of the data
transferred to the Commonwealth came from a single user employing that IP address. Upon
search of the Petitioner's home, the Commonwealth recovered the Petitioner's iMac computer,
which was located at the same IP address used to upload the offending files. Silva determined
that Cook's conclusion was reasonable and did not challenge it. The Petitioner failed to present
any evidence to challenge this evidence.
Moreover, Silva agreed with the Commonwealth's and this Court's conclusion that the
Petitioner downloaded and viewed pornographic images and videos depicting children.
Metadata associated with the files were located on the hard drive indicated that the files were
downloaded and viewed by a user. Circumstantial evidence including an image of the Petitioner
saved under the offending username identified the Petitioner as the user in question. The fact
that the files in question were not physically stored on the computer does not contradict these
conclusions, as nothing presented in Silva's testimony or within the Petitioner's pleadings
precluded the possibility that the files were saved externally or stored as temporary files.
11
Ultimately, Comerstone's analysis failed to unearth any additional evidence from the
computers they examined, exculpatory or otherwise. The absence of evidence of the files having
been stored on the hard drive does not preclude the Commonwealth's conclusion, as presented at
trial, that the Petitioner downloaded and viewed pornographic images on that computer, and that
those files were later transferred to a Commonwealth representative. Had trial counsel secured
testimony from an expert who conducted adversarial testing akin to Silva's, the
Commonwealth's conclusions concerning the Petitioner's download of child pornography, and
his eventual transfer of those files to a Commonwealth agent, would remain unsullied.
Accordingly, the fails to demonstrate that he has secured exculpatory evidence, or that trial
counsel was ineffective for secure an expert or conduct adversarial testing.
The Petitioner next claims that trial counsel was ineffective for failing to investigate and
present a witness he had available for trial. To demonstrate the arguable merit of a claim that
trial counsel was ineffective for failing to present additional witnesses, the Petitioner must
establish the existence and availability of the witnesses, counsel's actual awareness, or duty to
know of the witnesses, the willingness and ability of the witnesses to cooperate and appear of the
Petitioner's behalf, and the necessity for the proposed testimony in order to avoid prejudice.
Commonwealth v. Williams, 141 A.3d 440, 460 (Pa. 2016); Commonwealth v. Gibson, 951 A.2d
1110, 1133-1134 (Pa. 2008). A showing of prejudice requires the Petitioner to show how an
uncalled witness' testimony would have been beneficial under the circumstances of the case, or
how such testimony would have been beneficial to the defense. Commonwealth v. Sneed, 45
A.3d 1096, 1109 (Pa. 2012) (citing Gibson, 951 A.2d at 1134; Commonwealth v. Auker, 681
A.2d 1305, 1319 (Pa. 1996)).
12
Moments before trial, the Petitioner informed this Court that he had retained an expert
witness to investigate the Commonwealth's forensic evidence. However, the Petitioner fails to
identify what expert, if any, he retained. Immediately after the Petitioner claimed he secured an
expert, trial counsel informed this Court that, despite meeting with the Petitioner multiple times
in anticipation of trial, the Petitioner never requested that an expert be retained.
As trial counsel said during the original trial, the Petitioner failed to furnish the identity
of the witness, that counsel was not made aware of the witness' existence until the Petitioner
mentioned retaining an expert in open court, and during no point of their multiple preparation
sessions before trial did the Petitioner mention the retention of an expert. N.T. 3/26/20015 at
20-24.
The Petitioner's assertion that he had retained an expert for trial is wholly incredible. Not
only did the Petitioner fail to name the expert he had allegedly retained, he also failed to bring
the expert to Court on the date of his trial. Although the Petitioner had been preparing for trial
for more than one year, and was granted a continuance four months prior to the trial date, he
made no mention of retaining an expert witness until mere moments before trial. This Court,
therefore, has no reason reasonable basis to conclude that trial counsel was aware or should have
been aware of the existence of an expert witness at any point before the trial date. For that
reason alone, the Petitioner's claim fails.
It is clear from the trial record that the Petitioner may have disagreed with trial counsel
concerning strategy in the instant matter, and the Petitioner requested a continuance to prepare
the case with an expert that he claimed to have retained. Nonetheless, that disagreement is of
little consequence to this Court. On collateral review, this Court permitted the Petitioner to
secure two experts to review the Commonwealth's evidence. As stated above, even after a
13
thorough review of the forensic evidence seized in this case, a competent expert was unable to
provide evidence that was sufficient to overturn the verdict. Regardless of whether he actually
retained an expert on the eve of trial, the Petitioner still fails to demonstrate how an expert's
testimony would have been beneficial to his defense. Ultimately, the Petitioner fails to
demonstrate prejudice, and his claim fails.
The Petitioner next avers that original copies of the alleged video evidence were not
found on the computer recovered from the Petitioner's home, rendering the video inadmissible
under PA.R.E. l 002 (the Best Evidence Rule). Accordingly, he argues that trial counsel was
ineffective for failing to object to the admission of the video and photographic evidence
submitted to this Court, as the specific videos and photographs were not retrieved from the
Petitioner's computer.
The admission of evidence is committed to the sound discretion of the trial court, and a
trial court's ruling will not be disturbed unless that ruling reflects manifest unreasonableness, or
partiality, prejudice, bias, or ill will, or such lack of support to be clearly erroneous.
Commonwealth v. Strafford, 194 A.3d 168, 176 (Pa. Super. 2018) (citing Commonwealth v.
Huggins, 68 A.3d 962, 966 (Pa. Super. 2013)).
The best evidence rule provides that an original writing, recording, or photograph is
required in order to prove its content. Pa.R.E. 1002. The best evidence rule applies where the
contents of the item in question must be proven to make a case. Commonwealth v. Janda, 14
A.3d 147, 161 -162 (Pa. Super. 2011). Traditionally, the best evidence rule applied only to
writings, but where recordings and photographs are the only evidence of a transaction, such
evidence is dispositive, especially in cases involving matters such as copyright infringement,
14
defamation, pornography, and invasion of privacy. Pa.R.E. 1002 Comment; Commonwealth v.
Green, 162 A.3d 509, 517 (Pa. Super. 2017).
For electronically stored information, "original" means any printout, or other output
readable by sight, if it accurately reflects the information. Pa.R.E. 1001 ( d). The best evidence
rule was designed to guard against testimony about the content of physical evidence when the
original evidence has not been produced or admitted. Green, 162 A.3d at 518 (citing
Commonwealth v. Lewis, 623 A.2d 355 (Pa. 1993).
The Petitioner appears to argue that, because the files were not electronically stored on
the seized computers, it is impossible for the Commonwealth to furnish an original copy of the
video or photograph evidence used to convict him. The Petitioner's argument is without merit.
With respect to the images that were recovered, the Commonwealth submitted exact bit by bit
digital copies of the files that they received from the Petitioner. The presence of such files on the
Petitioner's hard drive is thus irrelevant to the analysis, the Commonwealth received electronic
evidence, and submitted an identical representation of that evidence to this Court during trial.
This Court did not merely consider testimony concerning video or photographic evidence, the
files themselves were submitted as evidence at trial and viewed by this Court. Under the current
legal apparatus, such copies are deemed original for evidentiary purposes.
The Petitioner alleges that trial counsel was ineffective for failing to impeach OAG
Tabak concerning his testimony that the images and videos in question were discovered on the
Petitioner's computer. A failure to impeach a key witness may be considered ineffectiveness in
the absence of a reasonable strategic basis for not impeaching. Commonwealth v. Treiber, 121
A.3d 435, 456 (Pa. 2015) (citing Commonwealth v. Small, 980 A.2d 549, 565 (Pa. 2009)). In
order to prove that counsel was ineffective for failing to impeach a witness, a petitioner must
15
satisfy the three-pronged test set forth in Pierce. Commonwealth v. Simpson, 112 A.3d 1194,
1197-1198 (Pa. 2015).
The Commonwealth concedes that OAG Tabak misspoke when he stated that, to his
understanding, two files were found to be stored on the Petitioner's computer. However, OAG
Tabak later testified that it was merely his understanding, and that the issue of fact would be
clarified by Agent Cook, who actually examined the Petitioner's computer. During his
testimony, Agent Cook described the evidence of uploaded files as "text fragments" which did
not show the data and time that the program was actually executed, but only that the text
fragments were actually discovered on the computer. Accordingly, no such misrepresentation
occurred, Tabak qualified his testimony by stating that he did not have personal knowledge of
whether the files were actually discovered on the computer, a qualification that was clarified by
Agent Cook's undisputed testimony and findings.
The Petitioner fails to demonstrate prejudice, as any discrepancy between Agents Tabak's
and Cook's testimony was minimal and did not implicate the truthfulness of Agent Tabak's
testimony. At trial, Agent Tabak stated that he believed the electronic files were recovered from
the Petitioner's computer:
BY MR. DeSIPIO:
Q. Were the two files shown in court today found in the
residence of 743 Watkins Street?
[AGENT TABAK:] A. My understanding is they were.
Q. They what?
A. They were.
Q. It's your understanding they were?
A. They were found on a computer within that residence.
Q. Which one?
A. That will be a question for the computer forensics specialist.
He's prepared to testify to that.
N.T. 3/26/2015 at 70-71.
16
Agent Tabak immediately qualified his misstatement by informing counsel and this Court
that Agent Cook was better suited to testify on what was discovered in the Petitioner's home.
Agent Tabak did not examine the evidence recovered from the apartment nor did he participate
in the search of the apartment.
Almost immediately after Agent Tabak concluded his testimony, Agent Cook testified
that he examined all forensic evidence recovered from the Petitioner's computer. During his
testimony, he stated that he did not find the physical files containing child pornography within
the Petitioner's computer. Rather, Agent Cook testified that he discovered metadata on the
computer which indicated that a user of the iMac computer downloaded and viewed the
pornographic images on the computer in question. Agent Cook further testified that
circumstantial evidence, such as photos of the Petitioner saved to the profile associated with that
username entitled "MeinCoat" and "Facepic" identified the Petitioner as the user of that profile.
At no point did Agent Cook testify that images of child pornography were found on the
computer. Instead, the images that the Petitioner seeks to challenge were recovered by the
Commonwealth after connecting with the Petitioner's computer via a peer-to-peer network and
isolating his IP address to ensure that the files were transmitted from the Petitioner's computer
alone. Had trial counsel attempted to impeach Agent Tabak on his misstatement, the outcome of
the trial would have remained the same, as any contradiction was cured by Agent Cook's
testimony.
The Petitioner alleges that the Commonwealth deliberately withheld an exhaustive
amount of discovery materials that, if provided to counsel before trial, could have been used to
impeach Commonwealth witnesses. Specifically, the Petitioner lists fifteen examples of
allegedly outstanding discovery material, including: (1) all evidence relating to the remote
17
download performed by Agent Tabak, notes taken by OAG Agents after they spoke to the
Petitioner on December 12, 2013; (2) results of a JNET Search on the Petitioner's residence; (3)
list of all law enforcement personnel who participated in the search of the Petitioner's residence;
(4) all artifacts and reports collected from a preview of the Petitioner's computers from
12/16/2013; (5) all 24 attachments to Agent Cook's forensic report; (6) contents of a DVD listed
in Agent Cook's forensic report; (7) forensic copies of all media and metadata created by law
enforcement at the time of the execution of the warrant; (8) the PARS and CFU reports
associated with the case; (9) several exhibits admitted at trial; (10) all impounded evidence
recovered via search warrant; (11) all other impounded evidence not included in the search
warrant inventory; (12) results of all keyword searches; (13) chain of custody documentation for
all impounded evidence; (14) the Petitioner's notice of appeal; and (15) the Petitioner's 1925(b)
Statement.
Pursuant to Brady v. Maryland, 373 U.S. 83 (1963) and subsequent law, a prosecutor has
an obligation to disclose all exculpatory information material to the guild or punishment of an
accused, including evidence of an impeachment nature. Commonwealth v. Ovalles, 144 A.3d
957, 965 (Pa. Super. 2016) (citing Commonwealth v. Roney, 79 A.3d 595, 607-608 (Pa. 2013)).
To establish a Brady violation, a petitioner must prove that: (1) the evidence at issue was
favorable to the accused, either because it is exculpatory or because it impeaches; (2) the
evidence was suppressed by the prosecution, either willfully or inadvertently; and (3) prejudice
ensued. Id. (citing Commonwealth v. Hutchinson, 25 A.3d 277, 310 (Pa. 2011)). Favorable
evidence is material if there is a reasonable probability that, had the evidence been disclosed to
the defense, the result of the proceeding would have been different. Id. (citing Commonwealth v.
Paddy, 15 A.3d 431, 450 (Pa. 2011)).
18
Brady does not require the disclosure of non-exculpatory information or information that
might merely form the groundwork of possible defenses. Id. Prosecutors are not required to
disclose every fruitless lead, rather the duty to disclose is limited to the information in possession
of the government bringing the prosecution, including exculpatory evidence. Id. (citing
Commonwealth v. Puksar, 951 A.2d 267, 283 (Pa. 2008)). The Commonwealth's Brady
obligation does not extend to information that is not in its possession. Commonwealth v. Santos
176 A.3d 877, 883 (Pa. Super. 2017) (citing Roney, 79 A.3d at 610.)
If the allegedly withheld evidence is not material for Brady purposes, then the failure to
obtain that evidence does not result in prejudice for ineffectiveness purposes. Commonwealth v.
Weiss, 81 A.3d 767, 791 n. 13 (Pa. 2013) (citing Kyles v. Whitley, 514 U.S. 419, 434 (1995)).
The mere possibility that an item of undisclosed information might have helped the defense, or
might have affected the outcome of the trial, does not establish materiality to warrant relief. Id
(citing Commonwealth v. Miller, 987 A.2d 638, 655 (Pa. 2009)).
The Petitioner fails to demonstrate that the above evidence was withheld by the
prosecution in anticipation of trial, that any of the above information contains any exculpatory
evidence, or even that such information is not currently in his possession. The Petitioner's Brady
claim is a classic request for a fishing expedition to search for possible exculpatory evidence,
only it's masquerading as a sixth amendment due process claim. The Petitioner fails to allege
how any of the evidence he listed is exculpatory or material. For that reason, his Brady claim
fails.
The Petitioner finally alleges that the prosecutor's failure to disclose Brady materials
constitutes prosecutorial misconduct. The proper Brady inquiry asks what course the defense
and the trial would have taken at trial had the defense not been misled by the prosecutor, and
19
what impact the misconduct had on trial counsel preparation and presentation of the case. Weiss,
81 A.3d at 810 (Castille, J., concurring) (citing United States v. Bagley, 473 U.S. 667, 683
(1985)).
To succeed on a claim of ineffective assistance of counsel based on trial counsel's failure
to object to prosecutorial misconduct, the petitioner must demonstrate that the prosecutor's
actions violated a constitutionally or statutorily protected right, such as the Sixth Amendment
right to fair trial. Commonwealth v. Busanet, 54 A.3d 35, 50 (Pa. 2012) (citing Commonwealth
v. Hanible, 30 A.3d 426, 464-465 (Pa. 2011))
Because the Petitioner failed to establish that any Brady material was withheld from
counsel leading up to trial, his attendant prosecutorial misconduct claim must also fail.
The Petitioner has failed to raise an issue or uncover any exculpatory evidence to
demonstrate ineffective assistance from trial counsel. For the foregoing reasons, the instant
petition is DENIED. The Petitioner is hereby notified that he has thirty (30) days from the date of
this Order and Opinion to file an appeal with the Superior Court.
BY THE COURT
�crl�
Barbara A. McDermott, J.
20
Commonwealth v. James McNulty, CP-51-CR-0003422-2014
PROOF OF SERVICE
I hereby certify that I am this day serving the foregoing filing upon the person(s), and in the manner
indicated below, which service satisfies the requirements of Pa. R. Crim. P. 114:
Carson B. Morris, Esq.
PA Office of Attorney General
Strawberry Square
Floor 16
Harrisburg, PA 17120
Type of Service: First-Class Mail
Brian J. Zeiger, Esq.
Levin & Zeiger, LLP
1500 John F. Kennedy Boulevard
Suite 620
Philadelphia, PA 19102
Type of Service: First-Class Mail
James McNulty
MB1420
SCI Waymart
P.O. Box 256, Route #6
Waymart, PA 18472
Type of Service: Certified Mail
Jose y
Judicial Clerk o the
Honorable Bar ara A. McDermott