Cite as 2023 Ark. App. 295
ARKANSAS COURT OF APPEALS
DIVISION III
No. CR-22-572
Opinion Delivered May 17, 2023
JONATHAN WALKER
APPELLANT APPEAL FROM THE CLARK
COUNTY CIRCUIT COURT
V. [NO. 10CR-20-107]
HONORABLE BLAKE BATSON, JUDGE
STATE OF ARKANSAS
APPELLEE AFFIRMED AS MODIFIED
KENNETH S. HIXSON, Judge
Appellant Jonathan Walker was convicted in a jury trial of thirty counts of
distributing, possessing, or viewing matter depicting sexually explicit conduct involving a
child and Walker was sentenced as a habitual offender to thirty consecutive fifteen-year
prison terms. Pursuant to Ark. Code Ann. § 5-27-602(a)(2) (Repl. 2013), a person commits
this offense “if the person knowingly possesses or views through any means, including on
the Internet, any photograph, film, videotape, computer program or file . . . or any other
reproduction that depicts a child or incorporates the image of a child engaging in sexually
explicit conduct.”1 Walker’s convictions arose from a cyber tip from an internet-service
provider that resulted in a police search of Walker’s computer equipment on which they
1
A “‘Child’ means any person under seventeen years of age.” Ark. Code Ann. § 5-27-
601(1) (Repl. 2013).
found images of juvenile males in sexually explicit poses and juvenile males engaged in
sexually explicit conduct with adult males. On appeal, Walker does not challenge the
sufficiency of the evidence supporting the convictions; rather, Walker raises these seven
arguments: (1) the trial court erred in not recusing; (2) the trial court erred in admitting the
items seized from his home because the search was illegal; (3) the trial court erred in
admitting his prior convictions from Oregon during the guilt phase of the trial; (4) the trial
court erred in admitting images from his computer for which he was not charged; (5) the
trial court erred in allowing the State to play a portion of Walker’s statement to the police
wherein his sex-offender status was discussed; (6) the trial court erred in admitting Walker’s
Oregon “pen pack” during the guilt phase of the trial; and (7) the trial court erred in refusing
Walker’s affirmative-defense jury instruction that he reasonably believed five of the persons
depicted in the images were seventeen years of age or older. We affirm Walker’s convictions,
and we modify the sentencing order as explained below.
I. Facts
On April 28, 2020, an image or file from Walker’s computer was uploaded to a
Microsoft OneDrive account. Microsoft’s internal algorithm program 2 determined, based
on the “hash value” of the file, that the image was a known catalogued image of child
2
Neither the mechanics nor the accuracy of the Microsoft internal algorithm program
was challenged at trial and neither is an issue in this appeal.
2
pornography.3 Without viewing the image and based solely on the hash value, Microsoft
reported the image, the Internet Protocol (IP) address, and the date uploaded to the National
Center for Missing and Exploited Children (NCMEC). 4 The IP address was associated with
Suddenlink Communications. NCMEC then forwarded this information, along with the
image, to the Arkansas State Police.
The Arkansas State Police has an internal task force referred to as the Internet Crimes
Against Children Task Force (ICAC). Special Agents Adam Pinner and Corwin Battle are
assigned to the task force and investigated the cyber tip from NCMEC. Agent Pinner
reviewed the image and determined it constituted child pornography. Through its
investigation, the ICAC determined that the account name associated with the IP address
was Jonathan Walker with a service and billing address at an apartment in Arkadelphia.
3
In technical terms, a hash value is an “algorithmic calculation that yields an
alphanumeric value for a file.” United States v. Stevenson, 727 F.3d 826, 828 (8th Cir. 2013).
More simply, a hash value is a string of characters obtained by processing the contents of a
given computer file and assigning a sequence of numbers and letters that correspond to the
file’s contents. In the words of one commentator, “[t]he concept behind hashing is quite
elegant: take a large amount of data, such as a file or all the bits on a hard drive, and use a
complex mathematical algorithm to generate a relatively compact numerical identifier (the
hash value) unique to that data.” Richard P. Salgado, Fourth Amendment Search and the Power
of the Hash, 119 Harv. L. Rev. F. 38, 38 (2005).
4
NCMEC is a nonprofit private entity. NCMEC’s Cyber Tipline is the nation’s
centralized reporting system for the online exploitation of children. The public and
electronic service providers can make reports of suspected online enticement of children for
sexual acts, child sexual molestation, child-sexual-abuse material, child sex tourism, child sex
trafficking, unsolicited obscene materials sent to a child, misleading domain names, and
misleading words or digital images on the Internet.
3
Agent Pinner swore out an affidavit for a search warrant for Walker’s apartment and
computer equipment. The affidavit set forth the facts constituting probable cause, which
included information that the uploaded image was of a prepubescent male depicting nudity
in a sexually suggestive pose. Based on the information in the affidavit, a search warrant was
issued.5
During the search of Walker’s apartment, the police seized several laptop computers,
including a Dell computer with a Toshiba hard drive. While Walker’s apartment was being
searched, Walker was Mirandized and gave a statement. In his statement, Walker admitted
that he lived alone at the apartment, that his wireless Internet was password protected, and
that the computers belonged to him. Walker denied possessing any child pornography.
Agent Battle subsequently conducted a forensic examination of the Toshiba hard
drive in the Dell computer seized from Walker’s apartment. According to Agent Battle’s
trial testimony, the Windows operating system had the username “Jonathan.” Agent Battle
testified that the hard drive was divided into seven partitions and that the seventh partition
of the hard drive contained hundreds of images and videos of child-sexual-abuse material,
which he stated is synonymous with child pornography. The seventh partition also
contained images of Walker, his car, and his marriage license. Agent Battle testified that
5
As will be discussed, infra, Walker filed a motion to suppress on the grounds that the
affidavit for search warrant lacked probable cause, and after a suppression hearing, Walker’s
motion was denied.
4
State’s exhibits 1–30 contained images of child-sexual-abuse material retrieved from Walker’s
computers, and these exhibits were admitted into evidence at the jury trial.6
From this evidence, the jury found Walker guilty of thirty counts of distributing,
possessing, or viewing matter depicting sexually explicit conduct involving a child, and the
jury sentenced Walker to a total of 450 years in prison. Walker now appeals.
II. Points on Appeal
A. The Trial Judge’s Refusal to Recuse Himself
Walker’s first argument on appeal is that the trial judge abused his discretion in
refusing to recuse himself. During a pretrial hearing, Walker’s attorney raised the issue of
Circuit Judge Blake Batson’s former law partnership with the prosecutor, Dan Turner. At
the pretrial hearing, Walker’s counsel argued:
My client feels that he’s being prejudiced about the fact that you and the prosecutor
used to be in business together. And he believes that . . . representation of Arnold,
Batson, Turner, and Turner is still showing up on the Internet, even if it’s not on the
sign.
Prosecutor Turner responded:
I think this court has dealt with this very issue numerous times over the last twenty
months. I don’t think that’s a basis for a requirement that the court recuse.
Judge Batson declined to recuse himself and stated:
Mr. Walker, there are specific rules this court complies with. And the fact that there
may be something on the Internet that indicates our past business relationship, it’s
not sufficient for disqualification.
6
Several of the charged counts were video files, and in support of these counts, the
State offered screen shots from the videos rather than the videos themselves.
5
Walker now assigns error to the trial judge’s refusal to recuse himself due to the trial judge’s
former partnership with Turner and the alleged appearance of impropriety.
Canon 2.11(A)(1) of the Arkansas Code of Judicial Conduct states that “[a] judge
shall disqualify himself or herself in any proceeding in which the judge’s impartiality might
be reasonably questioned, including . . .” when “[t]he judge has a personal bias or prejudice
concerning a party or a party’s lawyer[.]” Walker argues that because there was still
information online that the trial judge and the prosecutor were practicing law together
twenty months after the judge took the bench, the trial judge’s impartiality was reasonably
questioned, and there was at least an appearance of impropriety. Walker cites Burrows v.
Forrest City, 260 Ark. 712, 543 S.W.2d 488 (1976), for the proposition that a trial judge
should not remain on a case where there exists even an appearance of impropriety.7 Walker
further asserts that the trial judge’s adverse rulings indicated bias or an appearance of bias.
For these reasons, Walker contends that the trial judge’s refusal to recuse himself constituted
reversible error. We disagree.
In Owens v. State, 354 Ark. 644, 654–55, 128 S.W.3d 445, 451–52 (2003), the
supreme court set forth these standards:
A trial judge has a duty not to recuse from a case where no prejudice exists.
Thus, if there is no valid reason for the judge to disqualify himself or herself, he or
she has a duty to remain on a case. There is a presumption that judges are impartial.
The person seeking disqualification bears the burden of proving otherwise. The trial
7
Burrows was a revocation case, and the supreme court reversed and remanded for a
new trial with a new judge because, prior to the revocation hearing, the sitting judge had
requested that appellant bring his toothbrush and also made numerous other comments
during the proceedings that created the appearance of partiality.
6
judge’s decision not to recuse from a case is a discretionary one and will not be
reversed on appeal absent an abuse of that discretion. An abuse of discretion can be
shown by proving bias or prejudice on the part of the trial judge. To decide whether
there has been an abuse of discretion, this court reviews the record to determine if
prejudice or bias was exhibited. It is the appellant’s burden to demonstrate such bias
or prejudice.
(Citations omitted.)
We conclude that Walker failed to prove that the trial judge exhibited prejudice, and
we hold that the trial judge’s decision not to recuse himself was not an abuse of discretion.
In Carmical v. McAfee, we stated that a trial judge is not required to recuse himself or herself
if his or her former law partner is counsel in the proceeding at hand. 68 Ark. App. 313, 7
S.W.3d 350 (1999) (citing Dolphin v. Wilson, 328 Ark. 1, 942 S.W.2d 815 (1997)). Moreover,
absent some objective demonstration by the appellant of the trial judge’s prejudice, it is the
communication of bias by the trial judge that will cause us to reverse his or her refusal to
recuse. Carmical, supra. The mere fact that there were adverse rulings is not enough to
demonstrate bias. Id. The fact that the trial judge and the prosecutor were former law
partners did not require the trial judge’s recusal, nor was there any demonstration of bias by
the trial judge. Therefore, we reject Walker’s argument that the trial judge was required to
recuse from the case or that he abused his discretion in not recusing.
B. Suppression of Evidence
Walker next argues that the trial court erred in denying his motion to suppress the
incriminating evidence based on his claim that the search of his apartment and computer
equipment therein constituted a violation of his constitutional right against unreasonable
7
searches and seizures. Walker’s narrow argument is that, although Microsoft and NCMEC
(both private entities) had observed a hash value of a file that was catalogued as child
pornography, neither of those private entities actually opened the file to view and confirm
that the file image contained child pornography prior to providing the cyber tip to the
Arkansas State Police. Walker argues that when Agent Pinner opened the file and viewed
the image, he exceeded the scope of the private search and that the search warrant was invalid
because it was based almost entirely on this illegally obtained information.
In reviewing the denial of a motion to suppress evidence, this court conducts a de
novo review based on the totality of the circumstances, reviewing findings of historical facts
for clear error and determining whether those facts give rise to reasonable suspicion or
probable cause, giving due weight to inferences drawn by the trial court. Lewis v. State, 2023
Ark. 12. A finding is clearly erroneous, even if there is evidence to support it, when the
appellate court, after review of the entire evidence, is left with the definite and firm
conviction that a mistake has been made. Id. We defer to the superiority of the trial court
to evaluate the credibility of witnesses who testify at a suppression hearing. Id.
In the affidavit for search warrant, Agent Pinner stated:
Microsoft OneDrive made the report to NCMEC on April 28, 2020. The cyber tip
reported that one (1) image of apparent child pornography (unconfirmed) was
uploaded to a Microsoft OneDrive Account. Microsoft OneDrive provided the image
to NCMEC and I was eventually provided the image that was uploaded. The image
is of a prepubescent minor male depicting nudity in a sexually suggestive pose.
Agent Pinner’s affidavit went on to state that, with the IP address that had been provided in
the cyber tip, it was later determined that the account associated with the IP address belonged
8
to Walker. Based on Agent Pinner’s affidavit, a search warrant was issued, and the illicit
images were found on Walker’s computer during the search.
A hearing was held on Walker’s motion to suppress. At the suppression hearing,
both Agents Pinner and Battle testified about the investigation and the process by which
hash values are instrumental in detecting and investigating child pornography.
Agent Pinner testified that he was assigned to investigate the cyber tip received from
NCMEC. Pinner stated that he commonly works with such cyber tips in his investigative
duties with the ICAC. Agent Pinner explained that the cyber tip was the result of hash-value
identification from a known catalogue of images that had been previously determined to be
child-sexual-abuse material. He compared a hash value to the DNA of a person. Agent
Pinner stated that, although Microsoft and NCMEC had identified the file as containing
known child pornography by the hash value and were in possession of the file before
forwarding it to the Arkansas State Police, neither Microsoft employees nor NCMEC
employees had actually viewed the image. Agent Pinner opened the file and confirmed its
content as child pornography.
Agent Battle similarly testified that he is familiar with the cyber tipline used by
NCMEC. Agent Battle stated that it is customary for him to receive cyber tips from NCMEC
and, through those cyber tips, initiate an investigation and swear out an affidavit for a search
warrant. Agent Battle stated that hash-value identification is instrumental in the cyber tips
generated by NCMEC. Agent Battle explained that a hash value is a “digital fingerprint” of
a file, which is unique to the file and the image it contains. Agent Battle stated that NCMEC
9
maintains a database of hash values that are known to contain child-sexual-abuse material.
Thus, NCMEC is able to compare a known hash value to a file and, if the hash values match,
determine that the file contains child pornography.
Both the United States and Arkansas Constitutions prohibit unreasonable searches
and seizures not supported by probable cause or reasonable suspicion. U.S. Const. amend.
IV; Ark. Const. art. II, § 15. Such limitations do not apply to searches conducted by private
parties because, under the private-search doctrine, the prohibition against unreasonable
searches and seizures does not apply to searches conducted by private citizens. Whisenant v.
State, 85 Ark. App. 111, 146 S.W.3d 359 (2004). However, the government agency may not
then exceed the scope of the private search unless it has the right to make an independent
search. Id.
Walker argues that when law enforcement received a cyber tip from NCMEC
regarding an unopened file that was alleged—but not visually confirmed—to contain child
pornography, law enforcement exceeded the scope of the private search by opening the file.
Walker argues that law enforcement lacked probable cause from the hash value itself, and
that only by viewing the contents of the file did they have probable cause of criminal activity.
When a search warrant is based on illegally obtained information, the appellate court
examines the search warrant by excising the offending information from the search warrant
and determines whether the affidavit nevertheless supports the issuance of a search warrant.
Lauderdale v. State, 82 Ark. App. 474, 120 S.W.3d 106 (2003). Walker argues that, when
excising from Agent Pinner’s affidavit his statement that the file image was of a prepubescent
10
minor male depicting nudity in a sexually suggestive pose, there was no probable cause to
issue the search warrant. Walker thus argues that the trial court’s denial of his motion to
suppress was clearly erroneous. For the following reasons, we disagree.
In discussing the private-search doctrine in Whisenant, supra, we stated that there is
no additional intrusion by the government agency during its inspection of the materials
where the agent learned nothing that had not previously been learned during the private
search. The critical inquiry is whether the authorities obtained information with respect to
which the defendant’s expectation of privacy had not already been frustrated. United States
v. Reddick, 900 F.3d 636 (5th Cir. 2018). When the government’s conduct merely confirms
information gleaned in a private search and does not enable the government to discover
information that had not previously been learned during the private search, it does not
constitute a subsequent search. United States v. Jacobsen, 466 U.S. 109 (1984). In Jacobsen,
the Supreme Court observed that protecting the risk of misdescription by the private party
hardly enhances any legitimate privacy interest and is not protected by the Fourth
Amendment.
Both Microsoft and NCMEC determined from the hash value of one of Walker’s files
that the file contained child pornography. Agents Pinner and Battle testified at the
suppression hearing about hash-value technology and its accuracy and effectiveness in
investigating internet crimes against children. Agent Pinner compared hash-value
identification to a DNA match, and Agent Battle compared it to a fingerprint match. After
both private entities observed the hash value and determined from the hash value that the
11
file contained child pornography, the information was forwarded to the Arkansas State
Police. By opening the file and viewing its contents, Agent Pinner merely confirmed what
had already been learned in the private search; therefore, no constitutional violation
occurred.
In reaching our decision on the suppression issue, we are strongly persuaded by the
Fifth Circuit Court of Appeals’ decision in Reddick, supra. In Reddick, the defendant
uploaded digital-image files to Microsoft SkyDrive. SkyDrive uses a program to automatically
scan the hash values of user-uploaded files and compare them to the hash values of known
images of child pornography. When a match is detected between the hash value of a user-
uploaded file and a known child-pornography hash value, it creates a cyber tip and sends
the file—along with the uploader’s IP address information—to NCMEC. Microsoft sent cyber
tips to NCMEC based on the hash values of files that the defendant had uploaded to
SkyDrive. NCMEC then forwarded the cyber tip to the Corpus Christi Police Department.
Upon receiving the cyber tip, a police officer opened the suspect files and confirmed that
each contained child pornography. The police officer then applied for and received a
warrant to search the defendant’s home and seize his computer. The defendant argued that
the police officer’s warrantless opening of the files associated with the cyber tip—which were
not first opened and viewed by Microsoft or NCMEC—was an unlawful search. The Fifth
Circuit Court of Appeals disagreed.
12
Before addressing the merits of the suppression issue in Reddick, the federal appeals
court set forth the following observations regarding hash-value technology and its usefulness
in combating child pornography:
Private businesses and police investigators rely regularly on “hash values” to
fight the online distribution of child pornography. Hash values are short, distinctive
identifiers that enable computer users to quickly compare the contents of one file to
another. They allow investigators to identify suspect material from enormous masses
of online data, through the use of specialized software programs—and to do so rapidly
and automatically, without the need for human searchers. Hash values have thus
become a powerful tool for combating the online distribution of unlawful aberrant
content.
....
In technical terms, a hash value is an “algorithmic calculation that yields an
alphanumeric value for a file.” United States v. Stevenson, 727 F.3d 826, 828 (8th Cir.
2013). More simply, a hash value is a string of characters obtained by processing the
contents of a given computer file and assigning a sequence of numbers and letters
that correspond to the file’s contents. In the words of one commentator, “[t]he
concept behind hashing is quite elegant: take a large amount of data, such as a file
or all the bits on a hard drive, and use a complex mathematical algorithm to generate
a relatively compact numerical identifier (the hash value) unique to that data.”
Richard P. Salgado, Fourth Amendment Search and the Power of the Hash, 119 Harv. L.
Rev. F. 38, 38 (2005).
Hash values are regularly used to compare the contents of two files against
each other. “If two nonidentical files are inputted into the hash program, the
computer will output different results. If the two identical files are inputted, however,
the hash function will generate identical output.” Orin S. Kerr, Searches and Seizures
in a Digital World, 119 Harv. L. Rev. 531, 541 (2005). Hash values have been used to
fight child pornography distribution by comparing the hash values of suspect files
against a list of the hash values of known child pornography images currently in
circulation. This process allows potential child pornography images to be identified
rapidly, without the need to involve human investigators at every stage.
Reddick, 900 F.3d at 636–37.
13
The Reddick court concluded that the police officer did not conduct an illegal search
when he viewed images that had not been actually viewed by Microsoft or NCMEC but had
been identified by the private entities as child pornography by their hash values. The appeals
court began by stating that, under the private-search doctrine, “the critical inquiry under the
Fourth Amendment is whether the authorities obtained information with respect to which
the defendant’s expectation of privacy had not already been frustrated.” Reddick, 900 F.3d
at 638 (citing United States v. Runyan, 275 F.3d 449 (5th Cir. 2001)). The Reddick court stated
that when the police officer first received the defendant’s files, he already knew their hash
values matched the hash values of child-pornography images known to NCMEC. Reddick,
900 F.3d at 639. The court went on to state that hash-value comparison allows law
enforcement to identify child pornography with almost absolute certainty because hash
values are specific to the makeup of a particular image’s data, which can be described as a
unique digital fingerprint. Id. The court held that when the police officer opened the files,
there was no significant expansion of the search that had been conducted previously by a
private party and that his visual review of the images merely dispelled any residual doubt
about the contents of the files. Id. The federal appeals court in Reddick stated that the
government effectively learned nothing from the police officer’s viewing of the files that it
had not already learned from the private search, and that under the private-search doctrine,
the government did not violate the defendant’s Fourth Amendment rights. Id. at 640.
We also find the Sixth Circuit Court of Appeals’ decision in United States v. Miller,
982 F.3d 412 (2020), to be instructive. In Miller, the appeals court also dealt with the issue
14
of whether a police officer could view images that had been identified by private entities as
child pornography only by hash identification and not by visual inspection. The Miller court
focused on the level of certainty of the hash identification. The court wrote:
The magistrate judge, whose findings the district court adopted, found that the
technology was “highly reliable—akin to the reliability of DNA.” United States v. Miller,
2017 WL 9325815, at *10 (E.D. Ky. May 19, 2017). The evidence in one cited case
suggested that “[t]he chance of two files coincidentally sharing the same hash value is
1 in 9,223,372,036,854,775,808.” United States v. Dunning, 2015 WL 13736169, at
*2 (E.D. Ky. Oct. 1, 2015) (citation omitted). (That is 1 in 9.2 quintillion in case you
were wondering.) Another cited source suggested that the common algorithms “will
generate numerical identifiers so distinctive that the chance that any two data sets will
have the same one, no matter how similar they appear, is less than one in one billion.”
Barbara J. Rothstein et al., Managing Discovery of Electronic Information: A Pocket Guide
for Judges 38 (2d ed. Federal Judicial Center 2012).
Miller, 982 F.3d at 430. The Miller court concluded that, through the information available,
“a computer’s ‘virtual’ search of a single file creates more certainty about the file’s contents
than a person’s ‘manual’ search of the file.” Id. The Miller court applied the private-search
doctrine and rejected the defendant’s Fourth Amendment challenge. Id. at 431.8
The testimony by Agents Pinner and Battle at the suppression hearing showed that
the hash-value match that resulted in the cyber tip from private entities was akin to a DNA
match or fingerprint match. The reliability of hash-value matching to identify known child
pornography was explained at length in both Reddick and Miller, discussed above. By visually
8
We observe that Walker relies on the Ninth Circuit Court of Appeals decision in
United States v. Wilson, 13 F.4th 961 (9th Cir. 2021), asserting that the appeals court in that
case reached a different result than in Reddick or in Miller on similar facts. However, as
stated, we are persuaded by the analysis in Reddick and Miller, and we apply those holdings
to the facts herein.
15
inspecting the image provided by the private entities, Agent Pinner learned no more than
had already been learned from the hash-value analysis of the private search, and his review
of the image merely confirmed what was already known and dispelled any residual doubt
about the contents of the file. See Reddick, supra. Therefore, we conclude that under the
private-search doctrine, Agent Pinner’s opening of the file did not violate Walker’s
constitutional right against unreasonable searches and seizures, and we hold that the trial
court’s denial of Walker’s motion to suppress was not clearly erroneous.
C. Admission of Prior Crimes
Walker’s next argument is that the trial court erred by admitting Walker’s prior
convictions during the guilt phase of the trial. Prior to trial, the State filed a notice of intent
to introduce evidence pursuant to Rule 404(b) of the Arkansas Rules of Evidence. This
evidence consisted of Walker’s three 2009 Oregon convictions for encouraging child sexual
abuse in the first degree. Walker subsequently filed a motion in limine to exclude the
convictions, arguing that they were inadmissible under Rule 404(b) and also that the
evidence was more prejudicial than probative under Rule 403. After a hearing on Walker’s
motion in limine, the trial court denied the motion and allowed the State to introduce the
convictions at trial.
Rule 404(b) provides:
Other Crimes, Wrongs, or Acts. Evidence of other crimes, wrongs, or acts is not
admissible to prove the character of a person in order to show that he acted in
conformity therewith. It may, however, be admissible for other purposes, such as
proof of motive, opportunity, intent, preparation, plan, knowledge, identity, or
absence of mistake or accident.
16
The State is not entitled to introduce evidence of other offenses to persuade the jury that
the accused is a criminal and likely to commit the crimes he has been charged with. Green
v. State, 365 Ark. 478, 231 S.W.3d 638 (2006). However, if the evidence of another crime,
wrong, or act is relevant to show that the offense of which appellant is accused actually
occurred and is not introduced merely to prove bad character, it will not be excluded. Lindsey
v. State, 319 Ark. 132, 890 S.W.2d 584 (1994). In dealing with issues relating to the
admission of evidence pursuant to Rule 404(b), a trial court’s ruling is entitled to great
weight, and this court will not reverse absent an abuse of discretion. Green, supra.
Walker argues that the trial court abused its discretion in admitting the prior
convictions under Rule 404(b) because this evidence was not independently relevant to prove
some material point at issue but was rather introduced merely to prove he is a criminal. We
disagree.
The statutory elements of distributing, possessing, or viewing matter depicting
sexually explicit conduct involving a child—with which Walker was charged in this case—are
very similar to the elements of encouraging child sexual abuse in the first degree under the
2009 version of the Oregon statute upon which Walker was convicted. 9 Moreover, the
record reveals factual similarities between Walker’s Oregon convictions and the charges
herein. Here, the proof showed that Walker possessed multiple images on his computer of
9
At the time of Walker’s 2009 Oregon convictions, the elements of Or. Rev. Stat. §
163.684 prohibited possessing photographs or other visual recordings of sexually explicit
conduct involving a child.
17
juvenile males in sexually explicit poses and juvenile males engaged in sexually explicit
conduct with adult males. In the Oregon case, the investigation began when a public library
reported that a printed copy of an adult male sodomizing a juvenile was discovered in a
restroom. The police confirmed that Walker’s fingerprints were on the photograph, and a
subsequent search of a flash drive in Walker’s possession uncovered 120 images of nude
juveniles, juveniles in sexually explicit poses, and a juvenile engaging in sexual acts. Walker
admitted to the Oregon authorities that he had downloaded these images from a computer.
We conclude that the Oregon convictions were probative of Walker’s knowledge and
intent under Rule 404(b). Walker’s defense at trial was that he simply did not possess any
of the illegal images attributed to him, as he stated in his opening argument and argued in
his directed-verdict motion and closing argument. In Walker’s custodial interview with the
police, Walker denied possessing child pornography on his computer equipment. Therefore,
the prior convictions for similar conduct were relevant to establish Walker’s knowledge and
intent to commit these crimes. The supreme court has held that Rule 404(b) evidence is
admissible to prove knowledge and intent of the criminal defendant due to similar conduct.
See, e.g., Davis v. State, 362 Ark. 34, 207 S.W.3d 474 (2005) (similar incident of sexual assault
admitted to show intent); Fells v. State, 362 Ark. 77, 207 S.W.3d 498 (2005) (victim of similar,
but earlier, rape by defendant allowed to prove intent, motive, or plan); see also Nelson v. State,
365 Ark. 314, 229 S.W.3d (2006) (affirming the admission of multiple prior drug
convictions to show intent when Nelson claimed he was simply in the car and the drugs
18
found there belonged to another passenger.) For these reasons, we hold that the trial court’s
decision to admit the prior convictions under Rule 404(b) was not an abuse of discretion.
However, as Walker points out in his brief, even if evidence is relevant under Rule
404(b), Arkansas Rule of Evidence 403 provides that evidence may be excluded if its
probative value is substantially outweighed by the danger of unfair prejudice. The standard
of review for the admission of Rule 403 evidence is whether the trial court abused its
discretion. Harmon v. State, 286 Ark. 184, 690 S.W.2d 125 (1985). Walker argues that, even
if the evidence of his prior convictions had some probative value, the evidence was unfairly
prejudicial under Rule 403. We, however, disagree with this argument as well. In Rounsaville
v. State, 374 Ark. 356, 288 S.W.3d 213 (2008), the supreme court stated that evidence
offered by the State in a criminal trial is likely to be prejudicial to the defendant to some
degree, otherwise it would not be offered. On this record, we find no abuse of discretion in
the trial court’s determination that the probative value of Walker’s prior convictions was not
substantially outweighed by the danger of unfair prejudice. Therefore, we find no error in
the admission of the prior crimes.
D. Admission of Uncharged Images
In Walker’s pretrial motion in limine, he also argued that the State should be
prohibited from introducing other images seized from his computer for which he was not
charged. After the hearing on Walker’s motion, the trial court denied that portion of
Walker’s motion and ruled that these other images were admissible, and Walker now asserts
that this was erroneous.
19
During Agent Battle’s trial testimony, he explained that child-sexual-abuse material is
the same thing as child pornography. Agent Battle testified that State’s exhibits 1–30
contained images of child-sexual-abuse material, and these exhibits were admitted as evidence
of Walker’s guilt on the charged offenses. Agent Battle explained further that child-
exploitative material is material depicting a child that may be in a provocative or sexual pose,
but the child is clothed. Over Walker’s objection, the State was permitted to admit exhibits
31–45, for which Walker was not charged and that consisted of fifteen images from Walker’s
computer containing child-exploitative material.
Walker argues that the introduction of these uncharged images violated Rule 404(b)
because they served no legitimate purpose and were introduced only to show his propensity
for viewing child-exploitative material. Walker also argues that this evidence was
inadmissible because it was extremely prejudicial.
The mere fact that a photograph is inflammatory or is cumulative is not, standing
alone, sufficient reason to exclude it. Lewis v. State, 2023 Ark. 12. However, if a photograph
serves no valid purpose and could be used only to inflame the jurors’ passions, it should be
excluded. Id.
The State argues that the images of child-exploitative material were relevant to show
Walker’s predilection for sexualized images of prepubescent boys and to show knowledge,
intent, absence of mistake, or accident under Rule 404(b), and we agree. In Lewis, supra, the
supreme court affirmed the admission of additional uncharged pornographic images, stating
that “[g]iven Lewis’s defense that he lacked knowledge, the admission of the additional
20
images was relevant to show knowledge, intent, and absence of mistake or accident.” Lewis,
2023 Ark. 12, at 19–20; see also Steele v. State, 2014 Ark. App. 257 (holding that evidence of
computer images of child pornography, for which Steele was not charged with possessing,
was relevant to show knowledge, intent, and absence of mistake and was thus properly
admitted in prosecution for distributing, possessing, or viewing child pornography on his
computer). Moreover, the fifteen additional images introduced in this case that contained
child-exploitative material were not unfairly prejudicial because they were less inflammatory
than the thirty images depicting child-sexual-abuse material that had already been introduced
and for which Walker was being charged. For these reasons, we hold that the trial court did
not abuse its discretion in admitting the uncharged images at trial.
E. Admission of Walker’s Statement to the Police
Pertaining to Sex-Offender Registration
Walker next argues that the trial court erred in allowing the State to play the portion
of his custodial statement to the police where the officer incorrectly alleged that Walker was
delinquent in his sex-offender registration. Walker again cites Rule 404(b) and argues a
violation of that evidentiary rule and further argues that any probative value of this evidence
was substantially outweighed by the danger of unfair prejudice.
During the search of Walker’s apartment, Walker gave a Mirandized statement to
Agent Pinner. Prior to the introduction of the recording of the statement at trial, Walker
objected to the portions in which his sex-offender status was discussed, and the trial court
overruled the objection. In the custodial interview that was played to the jury, Agent Pinner
21
asked whether Walker had ever been arrested for child pornography, and Walker replied no.
Agent Pinner then asked whether Walker was a registered sex offender and whether he had
failed to register in Arkansas, and Walker replied no to both questions. Later in the
interview, Agent Pinner again questioned whether Walker was a sex offender in Oregon and
whether he was delinquent there, and Walker denied that accusation, indicating that he was
current on his Oregon sex-offender registration. Agent Pinner then suggested that “your
problem right now” is that “you have not registered in the state of Arkansas.” Walker replied,
“Okay.”
We conclude that any error in admitting the discussion pertaining to Walker’s sex-
offender status was harmless. We may declare an evidentiary error harmless if the evidence
of guilt is overwhelming and the error is slight. Johnston v. State, 2014 Ark. 110, 431 S.W.3d
895. As we have already explained, the trial court committed no error in admitting Walker’s
three prior Oregon convictions for encouraging child sexual abuse in the first degree, so the
jury knew about Walker’s sex-offender status from competent evidence independent of the
police interview. Moreover, any possible error with respect to whether Walker had registered
as a sex offender in this state was slight when compared to the overwhelming evidence of his
guilt for the crimes charged. Therefore, no reversible error occurred under this point.
F. Admission of Walker’s Oregon Pen Pack
Walker next argues that the trial court erred in admitting his Oregon “pen pack”
during the guilt phase of the trial. Walker argues that any marginal probative value of the
contents of the pen pack was grossly outweighed by the danger of unfair prejudice and
22
confusing the issues. In particular, Walker points out that his pen pack contained a reference
to a drug-possession case, information that he was indigent, and information about his
mandatory mental-health treatment for sexually deviant behavior.
We conclude that this argument is not preserved for review. When the State
introduced evidence of Walker’s convictions at trial (which had already been ruled
admissible prior to trial) it stated, “[I]t is in the form of a pen pack.” Walker objected,
arguing:
With regard to this, the court did make a decision that it could be admissible. Our
objection would be to the way it’s being admitted at this point in time . . . . Whether
or not the document could come in is not an issue, but how it comes in . . . . I believe
the keeper of the records would have to be here for this to be introduced.
At trial, Walker’s only objection to the pen pack was, in effect, for lack of foundation and
that it should not be admitted without the record keeper to introduce it. Walker does not
make that argument on appeal; rather, his argument on appeal is that the specific
information in the pen pack was unduly prejudicial. Our law is well established that in order
to preserve a challenge for our review, the movant must apprise the trial court of the specific
basis on which the motion is made. Stewart v. State, 320 Ark. 75, 894 S.W.2d 930 (1995).
Parties may not change their arguments on appeal and are limited to the scope and nature
of their arguments made below. Id. Because Walker has changed his argument on appeal,
we will not address it.
G. Affirmative-Defense Jury Instruction
23
Walker next argues that the trial court erred in denying his request for an affirmative-
defense jury instruction based on Ark. Code Ann. § 5-27-602(c), which provides, “It is an
affirmative defense to a prosecution under this section that the defendant in good faith
reasonably believed that the person depicted in the matter was seventeen (17) years of age or
older.” Walker requested this jury instruction with respect to only five of the thirty images
for which he was charged. Walker argues that the jury instruction should have been given
with respect to those five charges because, at the very least, those images contained the
slightest evidence that they could involve persons seventeen years of age or older.
A party is entitled to a jury instruction when it is a correct statement of the law and
when there is some basis in the evidence to support giving the instruction. Vidos v. State,
367 Ark. 296, 239 S.W.3d 467 (2006). We will not reverse a trial court’s decision to give an
instruction unless the court abused its discretion. Id.
We hold that the trial court did not abuse its discretion in denying the affirmative-
defense jury instruction. Walker’s defense at trial was that he did not possess any of the
illegal images attributed to him, as he stated in his opening argument and argued in his
directed-verdict motion and closing argument. In Walker’s custodial interview with the
police, Walker denied possessing child pornography on his computer equipment. From the
evidence presented, there was no basis in the evidence to conclude that Walker reasonably
believed that some of the images found on his computer depicted persons seventeen years of
age or older. Therefore, this argument is without merit.
H. Illegal Sentence – Sexually Dangerous Person
24
Finally, in his reply brief, Walker raises an issue that a portion of his sentence was
illegal. Normally, an appellant may not raise an issue for the first time in his reply brief. See
Adams v. State, 2020 Ark. App. 501, 612 S.W.3d 191. However, we may address an illegal
sentence sua sponte, Muhammad v. State, 2021 Ark. 129, 624 S.W.3d 300, and when an error
has nothing to do with the issue of guilt or innocence and relates only to punishment, it may
be corrected in lieu of reversing and remanding. Bangs v. State, 310 Ark. 235, 835 S.W.2d
294 (1992). For the following reasons, we conclude that a portion of Walker’s sentence was
illegal.
In the sentencing order, the trial court checked the yes box for: “Defendant is alleged
to be a sexually dangerous person and is ordered to undergo an evaluation at a facility
designated by A.D.C. pursuant to A.C.A. § 12-12-918.” However, this designation in the
sentencing order was erroneous. Arkansas Code Annotated section 12-12-918 (Supp. 2021
2021) provides, in relevant part:
(a)(1) In order to classify a person as a sexually dangerous person, a prosecutor
may allege on the face of an information that the prosecutor is seeking a determination
that the defendant is a sexually dangerous person.
(2)(A) If the defendant is adjudicated guilty, the court shall enter an order
directing an examiner qualified by the Sex Offender Assessment Committee to issue
a report to the sentencing court that recommends whether or not the defendant
should be classified as a sexually dangerous person.
(Emphasis added.) Here, the State did not allege on the face of the original information or
on the face of the amended information that it was seeking a determination that Walker is
25
a sexually dangerous person. Therefore, we modify and correct the sentencing order to delete
this designation.
III. Conclusion
In conclusion, we find merit in none of Walker’s arguments on appeal, and we affirm
his convictions for thirty counts of distributing, possessing, or viewing matter depicting
sexually explicit conduct involving a child. However, we modify the sentencing order as
explained above.
Affirmed as modified.
MURPHY and BROWN, JJ., agree.
Lassiter Cassinelli, by: Michael Kiel Kaiser, for appellant.
Leslie Rutledge, Att’y Gen., by: Joseph Karl Luebke, Ass’t Att’y Gen., and Karen
Virginia Wallace, Ass’t Att’y Gen., for appellee.
26