State v. Rael

The slip opinion is the first version of an opinion released by the Chief Clerk of the Supreme Court. Once an opinion is selected for publication by the Court, it is assigned a vendor-neutral citation by the Chief Clerk for compliance with Rule 23- 112 NMRA, authenticated and formally published. The slip opinion may contain deviations from the formal authenticated opinion. 1 IN THE SUPREME COURT OF THE STATE OF NEW MEXICO 2 Opinion Number: __________________ 3 Filing Date: March 4, 2024 4 NO. S-1-SC-38300 5 STATE OF NEW MEXICO, 6 Plaintiff-Petitioner, 7 v. 8 DAVID RAEL, 9 Defendant-Respondent. 10 ORIGINAL PROCEEDING OF CERTIORARI 11 Mary L. Marlowe Sommer, District Judge 12 Hector H. Balderas, Attorney General 13 Marko David Hananel, Assistant Attorney General 14 Santa Fe, NM 15 for Petitioner 16 Bennett J. Baur, Chief Public Defender 17 Caitlin C.M. Smith, Assistant Appellate Defender 18 Santa Fe, NM 19 for Appellee 1 OPINION 2 VIGIL, Justice. 3 {1} This appeal arises from a prosecution under the Sexual Exploitation of 4 Children Act (the Act), NMSA 1978, §§ 30-6A-1 to -4 (1984, as amended through 5 2016), legislation that this Court previously forecast would create its fair share of 6 interpretative issues. See State v. Myers, 2011-NMSC-028, ¶¶ 1, 19, 150 N.M. 1, 7 256 P.3d 13 (stating that determining “the meaning of certain elements of the Act 8 and applying the elements to differing fact situations” would prove “challeng[ing to] 9 our courts”). We first discuss the relevant statutory provisions, as this sets the stage 10 for our analysis and conclusions. 11 {2} Pornography is defined as a prohibited sexual act1 which is depicted on a 1 Section 30-6A-2(A) (“[P]rohibited sexual act means: (1) sexual intercourse, including genital-genital, oral-genital, anal-genital or oral-anal, whether between persons of the same or opposite sex; (2) bestiality; (3) masturbation; (4) sadomasochistic abuse for the purpose of sexual stimulation; or (5) lewd and sexually explicit exhibition with a focus on the genitals or pubic area of any person for the purpose of sexual stimulation.”) 1 visual or print medium 2 and is obscene.3 Black’s Law Dictionary (11th ed. 2019) 2 1405 (defining pornography). When a child under eighteen years of age is depicted, 3 it is child pornography. See id. Consistent with the purpose of the Act to protect 4 children from “the harm to the child that flows from trespasses against the child’s 5 dignity when treated as a sexual object,” State v. Myers, 2009-NMSC-016, ¶ 17, 146 6 N.M. 128, 207 P.3d 1105 (internal quotation marks and citation omitted), Section 7 30-6A-3 makes it a crime to possess, distribute, or manufacture child pornography.4 2 Section 30-6A-2(B) (“[V]isual or print medium means: (1) any film, photograph, negative, slide, computer diskette, videotape, videodisc or any computer or electronically generated imagery; or (2) any book, magazine or other form of publication or photographic reproduction containing or incorporating any film, photograph, negative, slide, computer diskette, videotape, videodisc or any computer generated or electronically generated imagery.”) 3 Section 30-6A-2(E). (“[O]bscene means any material, when the content if taken as a whole: (1) appeals to a prurient interest in sex, as determined by the average person applying contemporary community standards; (2) portrays a prohibited sexual act in a patently offensive way; and (3) lacks serious literary, artistic, political or scientific value.”) 4 Section 30-6A-3 was amended following the pertinent events of this case. See 2016 N.M. Laws, ch. 2, § 1. The 2016 amendments, including those adding a subsection and relettering others, do not affect our substantive analysis. For clarity and ease of reference, we refer to the current version of the statute throughout this opinion. For simplicity’s sake, we will use the term “child pornography” in describing crimes of sexual exploitation of children defined in Section 30-6A-3. 2 1 {3} Section 30-6A-3(A) criminalizes the possession of child pornography, as a 2 fourth-degree felony, and Section 30-6A-3(C) criminalizes the distribution of child 3 pornography, as a third-degree felony. In identical language, these two subsections 4 make it a crime to “intentionally possess” or “intentionally distribute” pornography 5 if that person knows or has reason to know that the obscene medium 6 depicts any prohibited sexual act or simulation of such act and if that 7 person knows or has reason to know that one or more of the participants 8 in that act is a child under eighteen years of age. 9 Section 30-6A-3(A), (C) (emphases added). 10 {4} The most serious of the child pornography crimes is found in Section 30-6A- 11 3(E), which provides that it is a second-degree felony to manufacture child 12 pornography. Section 30-6A-3(E) provides, in pertinent part, 13 It is unlawful for a person to intentionally manufacture any obscene 14 visual or print medium depicting any prohibited sexual act or 15 simulation of such an act if one or more of the participants in that act is 16 a child under eighteen years of age. 17 The Act elsewhere broadly defines the term “manufacture” to mean “the production, 18 processing, copying by any means, printing, packaging or repackaging of any 19 [prohibited] visual or print medium.” Section 30-6A-2(D). 20 {5} The statutory element “knows or has reason to know,” which is required for 21 possession and distribution, is not an element of manufacturing. The absence of this 22 element makes for the core issue in this case: under the Act, what is the statutory 3 1 mental state or mens rea requirement for manufacturing? The Court of Appeals 2 engrafted the “knows or has reason to know” element onto the crime of 3 manufacturing child pornography. State v. Rael, 2021-NMCA-040, ¶ 32, 495 P.3d 4 598. We reject this construction of Section 30-6A-3(E) and hold that the mens rea 5 for manufacturing child pornography consists of “intentionally” manufacturing 6 pornography that “intentionally” depicts a child under eighteen years of age and that 7 in fact depicts a child that is under eighteen years of age. See § 30-6A-3(E). 8 {6} The Court of Appeals also held that the State presented insufficient evidence 9 of Defendant’s mens rea to support Defendant’s convictions. Rael, 2021-NMCA- 10 040, ¶¶ 41-51. We disagree with this conclusion as well. 11 {7} Accordingly, we reverse the Court of Appeals and reinstate Defendant’s 12 convictions. 13 I. BACKGROUND 14 A. Factual Background and District Court 15 {8} Defendant was initially charged in a criminal information filed in the district 16 court with four counts of manufacturing child pornography, one count of distributing 17 child pornography, and one count of possession of child pornography. One count of 18 manufacturing child pornography was dismissed at the start of the trial, and the trial 19 went to the district court in a bench trial without a jury. After the bench trial the 4 1 district court filed findings of fact and conclusions of law, concluding that the “State 2 proved beyond a reasonable doubt Defendant’s guilt” of all remaining charges. 3 Defendant was sentenced to a total of thirty-one and one-half years, with all counts 4 to run concurrently, resulting in an actual sentence of nine years in the Department 5 of Corrections. 6 {9} The evidence presented was as follows. The New Mexico Attorney General’s 7 Office operates the New Mexico Internet Crimes Against Children Task Force (the 8 Task Force). Special Agent Owen Peña works for the Task Force and testified that 9 the Task Force conducts undercover online investigations of peer-to-peer, file- 10 sharing networks. He was qualified by the court as an expert witness in peer-to-peer 11 investigations and testified as follows. 12 {10} Peer-to-peer, file-sharing networks allow people to share files with others on 13 the same network, with each computer in the network serving as both a terminal to 14 download materials and as a server for other computers to download materials. Such 15 networks are popular and legal except when they are used for the illegal distribution 16 of materials such as child pornography. To use a file-sharing network, the user must 17 download the file-sharing software—relevant here is DownloadHQ—and then share 5 1 files to continue accessing the network.5 When accessing files, DownloadHQ has a 2 preview window that allows users to view, or watch, a portion of the video file before 3 selecting which files to download. 4 {11} When conducting investigations, the Task Force uses specialized software to 5 search the file-sharing networks and locate individuals sharing child pornography. 6 This is accomplished by using common search terms to locate suspected child 7 pornography files and then comparing a suspected file’s “hash values” to those of 8 known child pornography files in a database. See State v. Knight, 2019-NMCA-060, 9 ¶ 4, 450 P.3d 462 (“[H]ash values . . . are alphanumeric values assigned to every 10 unique file.”). Once confirmed that a suspected file contains hash values matching 11 known child pornography, the software then selects the user sharing the content and 12 determines the Internet Protocol (IP) address and general geographic location. 13 {12} Special Agent Peña testified that while he was conducting an investigation, 14 the software identified an IP address in New Mexico sharing files with hash values 15 matching potential child pornography. The IP address belonged to Defendant. 16 Special Agent Peña detailed how he made a direct connection to Defendant’s 17 computer, browsed the files listed in Defendant’s shared files folder, and 5 DownloadHQ is a version of the file-sharing program Ares. Witnesses and trial counsel referred to DownloadHQ and Ares interchangeably. For consistency, we use DownloadHQ throughout this opinion. 6 1 downloaded one of the files. The downloaded file was named “(pthc)black gay man 2 fucking a 13 year old boy (hot!!)” (“thirteen-year-old-boy” video). According to 3 Special Agent Peña, the acronym “pthc” in the file name stands for “pre-teen 4 hardcore.” Special Agent Peña reviewed the downloaded file and confirmed it was 5 child pornography. Defendant later stipulated at trial that the “thirteen-year-old-boy” 6 video contains “prohibited sexual acts as defined in Section 30-6A-2(A)(1)” and is 7 “obscene as that term is defined in Section 30-6A-2(E).” 8 {13} Special Agent Peña obtained a grand jury subpoena allowing him to get 9 subscriber information for the IP address. He forwarded that information to Sergeant 10 (now Commander) Oliver Morris of the Los Alamos Police Department who 11 determined that Defendant’s physical address was associated with the IP address. 12 Commander Morris then obtained a search warrant which he executed with Special 13 Agent Peña. During the search, a Gateway computer and a Toshiba external hard 14 drive were seized from Defendant’s bedroom. 15 {14} Special Agent Peña testified that during the execution of the search warrant, 16 the Gateway computer had DownloadHQ running, and searches for “teen sex” and 17 “extreme sex” were active. Special Agent Peña further testified that the username 18 for the DownloadHQ account on the computer was the same username Defendant 19 previously used to download the “thirteen-year-old-boy” video. He explained that 7 1 when Defendant downloaded files, they were directed to the C.drive “downloads” 2 folder in the Gateway computer instead of the default DownloadHQ folder. 3 Defendant therefore knew where the downloaded files were stored since he changed 4 where the downloads were automatically directed. Special Agent Peña added that 5 Defendant modified the software settings so that, using the software, he could make 6 five uploads and fifteen downloads at once. Finally, Special Agent Peña testified that 7 when OS Triage—a program that allows law enforcement to do an onsite preview 8 of the data on a computer—was run on the Gateway computer, it showed several 9 child pornography related searches in the browser history and that the search-term 10 keyword “young” had been used. 11 {15} After the search warrant was executed, Defendant agreed to an interview with 12 Commander Morris and Special Agent Peña at the Los Alamos Police Department. 13 Before the interview, Defendant stated he understood his Miranda rights and signed 14 a Miranda waiver form. The interview was video-recorded, and it took place before 15 the Gateway computer and Toshiba external hard drive were forensically examined. 16 At trial, the seventy-eight-minute video-recorded interview was admitted into 17 evidence without objection. 18 {16} Throughout that interview, Defendant made several admissions. Defendant 19 said he was the owner of the Gateway computer and the Toshiba external hard drive. 8 1 Defendant admitted he was generally the exclusive user of the Gateway computer, 2 he was “pretty much” responsible for its contents, his roommates did not know the 3 password to the computer, his internet was secured by a username and password, 4 and he used CCleaner—an antiforensic program—daily. Defendant described how 5 he was somewhat familiar with computers and that he would help friends who were 6 having computer issues. Defendant also stated that he was familiar with 7 DownloadHQ which he had been using for about two and one-half years. He 8 understood it was a program used to share files in that he would select files to 9 download from other users and that other users would initiate uploads of files from 10 his computer. He knew child pornography was illegal. 11 {17} In general, Defendant claimed that if the file name of a video suggested it 12 contained child pornography, he would not download it. When questioned about the 13 child pornography files on his computer, Defendant admitted to having opened and 14 viewed files containing child pornography; however, he claimed that he deleted the 15 files after determining their content. Special Agent Peña asked Defendant why he 16 would download the files in the first place, and Defendant responded that the files 17 must have been under a different file name. Special Agent Peña then read off the file 18 names for some of the files found in Defendant’s shared file folder. These included 19 “2 brothers fucking 14 year old sister,” “2 girls 2 14 15 yo fucking hardcore” and 9 1 “maverick men two fucking bitching boy in bathroom.” Special Agent Peña asked 2 Defendant, “Don’t you think you would’ve got rid of those ones?” and Defendant 3 responded, “I thought I did.” Special Agent Peña informed Defendant that all told, 4 there were thirty-seven suspected child pornography files linked to his DownloadHQ 5 account. Defendant again responded that they must have been under different file 6 names. Later in the interview, Defendant claimed that if child pornography files were 7 still on his computer, it was because at times he would get drunk, “pass out,” and 8 forget to delete them. 9 {18} With regard to his search history, Defendant admitted to using certain search 10 terms, which included “teen,” and stated that “there’s probably search stuff in there 11 but I don’t typically look at child [pornography].” Defendant nevertheless admitted 12 that he had, at various times, inadvertently downloaded child pornography, but upon 13 watching them and learning they depicted children, he turned them off before any 14 sex acts occurred and deleted them. 15 {19} Defendant offered two examples of videos he claimed to have deleted 16 immediately upon learning children were involved: a video showing three naked 17 thirteen-year-old girls dancing and a video of a naked girl in a bathtub. These two 18 videos that Defendant described matched the videos we refer to herein as the 19 “Alicia” video, and the “lingerie” video. Finally, Defendant admitted that he 10 1 recognized the file name “KitKatClub,” but maintained that he recalled the video as 2 being adult pornography and not child pornography. 3 {20} After the interview, Defendant’s Gateway computer and Toshiba external 4 hard drive were taken to the Regional Computer Forensics Laboratory for forensic 5 analysis. Detective Christopher Brown of the New Mexico Regional Computer 6 Forensics Laboratory conducted the forensic analysis. He was qualified by the court 7 as an expert in computer forensics and testified as to the results. His testimony 8 related to the “Alicia” video and the “lingerie” video, which Defendant admitted he 9 watched, and a third video referred to at trial as the “Kimmy” video. Detective 10 Brown testified that all three videos contain child pornography. These videos are the 11 basis for Defendant’s three convictions for manufacturing child pornography. As 12 pertains to the file names, Detective Brown testified that three terms are particularly 13 indicative of child pornography: “pthc” and “ls” and “lolita.” 14 {21} The “Alicia” video is named “!fuckingdaughteralicia(3)(2)256.mpg.” 15 Detective Brown testified that the video is in two folders on the Toshiba external 16 hard drive and that it was downloaded on two separate dates: March 15, 2013, and 17 April 5, 2013. Detective Brown confirmed that the “Alicia” video depicts “a young 18 prepubescent female starting out in a tub, and it eventually transitions to her being 19 naked and, I believe, performing an act of oral sex” on an adult male. 11 1 {22} The “lingerie” video is named “(ls-magazine-ls-models lsm-07-01-02-bonus- 2 red lingerie 11y 12y 13y-video.avi.” Detective Brown testified that this video is on 3 the Toshiba external hard drive and that artifacts from the video were found on the 4 Gateway computer. Forensic evaluation indicated the video was viewed on the 5 Gateway computer and stored on the internal hard drive. The video begins with three 6 naked girls dancing and touching each other’s genitals. Special Agent Peña testified 7 that two of the girls are prepubescent and one of the girls is pubescent but still very 8 young. Early in the video, the camera focuses on the genital area of a prepubescent 9 girl. 10 {23} The “Kimmy” video is named “(pthc lolifuck) kimmy-superbig cock fucking 11 little girl.avi.” Detective Brown said this video is in two folders on the Toshiba 12 external hard drive: part of the path to one folder included “davidhome,” and part of 13 the path to the other included “porn.” The video also had two different download 14 dates: May 22, 2013, and May 29, 2013. Detective Brown testified that this video 15 depicts a female child being vaginally penetrated by an adult male. 16 {24} Next, Detective Brown testified about the video Defendant recalled during his 17 interview with Special Agent Peña and Commander Morris—the “KitKatClub” 18 video. The video served as the basis for Defendant’s charge of possession of child 19 pornography. The “KitKatClub” video, named “xxx - kitkat club avantgarde extreme 12 1 8.mpg,” depicts a “small child, and there is a male rubbing her genital area.” 2 Detective Brown testified that forensic evidence indicated it was downloaded by 3 Defendant on June 15, 2013, using DownloadHQ and stored on the Gateway 4 computer hard drive. 5 {25} Detective Brown also testified about the “thirteen-year-old-boy” video 6 investigated by Special Agent Peña, which was the basis for the charge of 7 distributing child pornography. Although he could not locate the video on any of 8 Defendant’s devices, Detective Brown testified that other forensic evidence revealed 9 that the video was downloaded using DownloadHQ onto the Gateway computer at 10 some point. Detective Brown explained that the DownloadHQ application kept an 11 encrypted log of files downloaded and shared, and that the log included the “thirteen- 12 year-old-boy” video file name, “(pthc)black gay man fucking a 13 year old boy 13 (hot!!) 314.avi.” When asked how the “thirteen-year-old-boy” video could have been 14 downloaded but not found on any of Defendant’s devices, Detective Brown clarified 15 that the video may have been deleted and overwritten or deleted and antiforensic 16 programs may have been run to remove traces of it. 17 {26} Detective Brown testified that he was able to recover and decrypt from 18 Defendant’s DownloadHQ application a partial list of names of the files downloaded 19 to Defendant’s Gateway computer, together with a partial list of names of the files 13 1 Defendant made available to others through the DownloadHQ application. Detective 2 Brown read the following names of the downloaded files recovered: (1) “Virgin sex 3 after school 13,” (2) “pthc black gay man fucking a 13 year old boy hot!!314” 4 (consistent with the file named in Defendant’s conviction for distributing child 5 pornography), (3) “pthc 11 year whores to 15 year 2 mpeg3GP,” (4) “2 brothers 6 fucking 14 year old sister!”, (5) “kitkat club avant-garde extreme 8” (consistent with 7 the file named in Defendant’s conviction for possession of child pornography), and 8 (6) “2 girl 2 15 and 14 years fucking hardcore.” Detective Brown also read recovered 9 names of files that were shared: (1) “pthc 2010 15 year fucking my sister excellent,” 10 (2) “fucking my cute 15 year old sister porn sex xxx fuck suck anal 2,” (3) “maria 11 teen young preteen fuck Lolita sex full version,” and (4) “young student girl fucked 12 Lolita teen porn rape sex nude queen william edward 1.” 13 {27} Detective Brown concluded his testimony with an explanation of the 14 CCleaner program, an “anti-forensic program” that is generally used by people who 15 do not want their information seen or recovered. It is an antiforensic program that is 16 “directed to go and delete files in a way that they should not be able to be recovered.” 17 He testified CCleaner was on the Gateway computer and that it “had been run 18 recently” and previously “thousands of times.” Defendant said in his interview that 19 he used the cleaner “every day.” Detective Brown also testified that CCleaner 14 1 included advanced settings for deleting certain data and that Defendant’s CCleaner 2 was configured to target certain DownloadHQ search terms. The few search terms 3 that he recovered included “xxx,” “young cheerleaders,” and “teen sex.” 4 {28} The defense then called its only witness, Steven Gary Burgess, who was 5 qualified by the court as an expert in computer forensics. Mr. Burgess testified that 6 he located “several hundred” videos on the hard drive of the Gateway computer and 7 the Toshiba external hard drive of which three or four were “illicit videos.” 8 {29} Of the files that contained “illicit videos,” Mr. Burgess testified there was no 9 indication that those files had been viewed. Granted, this was based off the media 10 players on the Gateway computer itself, not the media player within DownloadHQ. 11 Mr. Burgess also testified that he recovered eleven thousand DownloadHQ search 12 terms from the Gateway computer and examined them for five search terms that 13 were indicative of child pornography. Mr. Burgess testified that none of the common 14 child pornography search terms appeared in the search history. Mr. Burgess 15 concluded that the search terms used were not indicative of searching for child 16 pornography but instead “would be used for any kind of pornography.” 17 {30} Mr. Burgess also testified about the programs found on the Gateway 18 computer. He testified that although he had only used DownloadHQ a few times, it 19 is generally possible for a user to download a multitude of files at once, making it 15 1 possible for a person to download a file without knowing its contents. Mr. Burgess 2 stated that he believed a program called Backup Now was being used on the Gateway 3 computer and that it allows users to back up or copy an entire volume of files without 4 having to individually select each file. Finally, Mr. Burgess testified that he did not 5 “find any evidence proving that CCleaner had been used.” 6 {31} The district court convicted Defendant of one count of possession of child 7 pornography (the “KitKatClub” video), one count of distribution of child 8 pornography (the “thirteen-year-old-boy” video), and three counts of manufacturing 9 child pornography by copying (the “Alicia” video, the “lingerie” video, and the 10 “Kimmy” video). All three of the manufacturing counts were based on Defendant 11 copying the videos from the Gateway computer to the Toshiba external hard drive. 12 {32} Defendant appealed, requesting that the Court of Appeals clarify the necessary 13 elements for each of his convictions and challenging the sufficiency of the evidence 14 to support his convictions. Rael, 2021-NMCA-040, ¶ 1. 15 B. Court of Appeals 16 {33} The Court of Appeals noted that the “knows or has reason to know” element 17 contained in Section 30-6A-3(A) and (C) for the crimes for possession and 18 distribution of child pornography is absent from the statute for the crime of the 19 manufacture of child pornography, § 30-6A-3(E). Rael, 2021-NMCA-040, ¶ 27. 16 1 This distinction, the Court of Appeals said, could be an indication that the 2 Legislature did not intend manufacturing child pornography to have any mens rea 3 requirement because “the plain language [prohibiting the manufacture of child 4 pornography] does not provide any scienter requirement.” Id. Concluding that a 5 legislative intent was not expressed in “unambiguous ‘language negating a mental 6 state,’” the Court of Appeals determined to look to other indicia of the Legislature’s 7 intent. Id. ¶¶ 27-28 (quoting State v. Nozie, 2009-NMSC-018, ¶¶ 26, 30, 146 N.M. 8 142, 207 P.3d 1119 (stating that the Court must determine whether “there is [a] clear 9 intent on the part of the Legislature to omit a mens rea element” from a crime 10 because it is presumed that criminal intent is an essential element of a crime)). 11 {34} The “other indicia of legislative intent” which the Court of Appeals looked to 12 were the severity of the punishment and whether reading Section 30-6A-3(E) 13 (manufacturing) without the “knows or has reason to know” mens rea requirements 14 of Section 30-6A-3(A) and (C) (possession and distribution) would lead to an absurd 15 and unreasonable result. Rael, 2021-NMCA-040, ¶¶ 29-30. In addition, the Court of 16 Appeals invoked the objective of avoiding challenges of unconstitutionality in its 17 interpretation of Section 30-6A-3(E). Id. ¶ 31. The result was that the Court of 18 Appeals inserted the “knows or has reason to know” element of the crimes of 19 possession and distribution of child pornography into the elements of the crime of 17 1 manufacturing child pornography. Id. ¶¶ 22, 28-32. The Court of Appeals therefore 2 determined that in addition to the other elements of manufacturing child 3 pornography, the State is required to prove “[t]he defendant knew or had reason to 4 know that [the] medium depicts [pornography]” and that “[t]he defendant knew or 5 had reason to know that one or more of the participants in that act is a child under 6 eighteen years of age.” Id. ¶ 32. 7 {35} Turning its attention to the sufficiency of the evidence, the Court of Appeals 8 determined that the State presented insufficient evidence that Defendant knew or had 9 reason to know the videos contained child pornography. Id. ¶¶ 39, 43-44, 49-50. In 10 other words, the Court concluded there was insufficient evidence to prove that 11 Defendant acted with the mens rea required to convict him of possession, 12 distribution, or the manufacture of child pornography. Id. ¶ 39. The Court of Appeals 13 therefore reversed all of Defendant’s convictions. 14 {36} We granted the State’s petition for writ of certiorari which raises two 15 questions: (1) what is the mens rea requirement for manufacturing child 16 pornography, and (2) did the State present sufficient evidence of Defendant’s mens 17 rea to support Defendant’s convictions. 18 1 II. DISCUSSION 2 {37} We are first called upon to determine whether Section 30-6A-3(E), which 3 prohibits the manufacture of child pornography, has a mens rea requirement, and if 4 so, what that mental state is. Finally, we determine whether the evidence is sufficient 5 to support the convictions. 6 A. Standard of Review and Rules of Statutory Interpretation 7 {38} “Interpretation of a statute is a matter of law,” as is the “determination of 8 whether the language of a statute is ambiguous.” State v. Rivera, 2004-NMSC-001, 9 ¶ 9, 134 N.M. 768, 82 P.3d 939 (internal quotation marks and citations omitted). Our 10 review is therefore de novo. Id. 11 {39} Legislative intent is this Court’s touchstone when interpreting a statute. See 12 State v. Padilla, 2008-NMSC-006, ¶ 10, 143 N.M. 310, 176 P.3d 299. “The starting 13 point in every case involving the construction of a statute is an examination of the 14 language utilized by the Legislature in drafting the pertinent statutory provisions.” 15 Rivera, 2004-NMSC-001, ¶ 10 (brackets, internal quotation marks, and citation 16 omitted); see also 2A Norman J. Singer & J.D. Shambie Singer, Statutes & Statutory 17 Construction § 46:3 at 178 (7th ed. 2014) (“[C]ourts consider statutory text to be the 18 best evidence of legislative intent or will.”). 19 1 {40} As a “cardinal canon” of statutory interpretation, we presume “that a 2 legislature says in a statute what it means and means in a statute what it says.” See 3 Conn. Nat’l Bank v. Germain, 503 U.S. 249, 253-54 (1992). This and other linguistic 4 canons serve as “aids for analyzing [a statute’s] text and context [and providing] 5 ‘guides to solving the puzzle of textual meaning.’” Kisor v. McDonough, 995 F.3d 6 1347, 1349 & n.3 (Fed. Cir. 2021) (Prost, C.J., concurring) (quoting Antonin Scalia 7 & Bryan A. Garner, Reading Law: The Interpretation of Legal Texts 59 (Thomson 8 West 2012). The consideration of linguistic canons is not a step beyond a plain- 9 meaning analysis but is part and parcel of such an analysis. See, e.g., Thomas v. 10 Reeves, 961 F.3d 800, 823 (5th Cir. 2020) (mem.) (en banc) (per curiam) (Willett, 11 J., concurring in the judgment) (determining the statutory meaning to be clear based 12 on the application of linguistic canons). 13 {41} Further, where “a statute contains language which is [determined to be] 14 unambiguous, we must give effect to that language and refrain from further statutory 15 interpretation,” Rivera, 2004-NMSC-001, ¶ 10 (internal quotation marks and 16 citation omitted), at least where our plain-meaning interpretation does not “lead to 17 injustice, absurdity, or contradiction.” Padilla, 2008-NMSC-006, ¶ 7 (internal 18 quotation marks and citation omitted). In such circumstances, the first and foremost 19 interpretative canon identified in Germain—that a legislature is presumed to say 20 1 what it means and mean what it says—“is also the last: judicial inquiry is complete.” 2 503 U.S. at 253-54 (internal quotation marks and citations omitted); accord United 3 States v. Browne, 505 F.3d 1229, 1250 (11th Cir. 2007) (allowing that when 4 “construing a criminal statute, we begin with the plain language” and go no further 5 absent ambiguous language). 6 B. The Mens Rea for Manufacturing Child Pornography 7 {42} “Typically, criminal liability is premised upon a defendant’s culpable 8 conduct, the actus reus, coupled with a defendant’s culpable mental state, the mens 9 rea.” Padilla, 2008-NMSC-006, ¶ 12. In order to determine what mens rea, if any, 10 is required for manufacturing child pornography, we begin with the words of the 11 statute. In pertinent part, Section 30-6A-3(E) states: 12 It is unlawful for a person to intentionally manufacture any obscene 13 visual or print medium depicting any prohibited sexual act or 14 simulation of such an act if one or more of the participants in that act is 15 a child under eighteen years of age. 16 The object of the statute is not to prohibit manufacturing pornography per se but to 17 prohibit manufacturing pornography “if one or more of the participants . . . is a child 18 under eighteen years of age.” Id. In other words, the object of the statute is to prohibit 19 manufacturing child pornography. Nonetheless, the statute is ambiguous as to the 20 mens rea required to commit the crime of manufacturing child pornography. One 21 reading of the statute is that it prohibits the act of “intentionally” manufacturing 21 1 pornography (i.e., “any obscene visual or print medium depicting any prohibited 2 sexual act or simulation of such an act”) but that such prohibited manufacturing does 3 not require “intentionally” depicting a child under eighteen years of age. Under this 4 reading, if the pornography depicts a child under eighteen years of age, the crime is 5 complete, regardless of the defendant’s intent. This reading makes manufacturing 6 child pornography a strict liability offense. 7 {43} Strict liability crimes are crimes “for which liability is imposed irrespective 8 of the defendant’s knowledge or intentions, that is, crimes without a mens rea 9 requirement.” Laurie L. Levenson, Good Faith Defenses: Reshaping Strict Liability 10 Crimes, 78 Cornell L. Rev. 401, 417 (1993); see State v. Harrison, 1992-NMCA- 11 139, ¶ 18, 115 N.M. 73, 846 P.2d 1082 (“A strict liability crime is one which imposes 12 a criminal sanction for an unlawful act without requiring a showing of criminal 13 intent.”). Strict liability crimes generally arise from the legislative exercise of police 14 powers to achieve some societal good, with relatively slight penalties. Santillanes v. 15 State, 1993-NMSC-012, ¶¶ 26-27, 115 N.M. 215, 849 P.2d 358. On the other hand, 16 crimes which require mens rea are those that punish conduct which warrants “moral 17 condemnation and social opprobrium.” Id. ¶ 27; see Nozie, 2009-NMSC-018, ¶ 26 18 (stating “moral condemnation and social opprobrium” typically do not attach to strict 22 1 liability crimes (internal quotation marks and citation omitted)). We reject reading 2 manufacturing child pornography as a strict liability crime for two reasons. 3 {44} First, we do not assume that the Legislature intended to create a strict liability 4 crime even if a criminal statute does not expressly set forth a mens rea requirement. 5 Santillanes, 1993-NMSC-012, ¶ 11. Rather, we follow the well-established rule that 6 we presume mens rea is a necessary element of the crime unless the statute clearly 7 shows that the Legislature wanted to dispense with it. Id. This has been our rule in 8 New Mexico since at least 1917. State v. Gonzalez, 2005-NMCA-031, ¶ 12, 137 9 N.M. 107, 107 P.3d 547 (“Since at least 1917, we have followed the common law 10 that where an act is prohibited and punishable as a crime, it is construed as also 11 requiring the existence of a criminal intent.”). See also Ruan v. United States, 142 S. 12 Ct. 2370, 2377 (2022) (“[W]hen we interpret criminal statutes, we normally start 13 from a longstanding presumption, traceable to the common law, that [the legislature] 14 intends to require a defendant to possess a culpable mental state.” (internal quotation 15 marks and citation omitted)). Our courts have construed a criminal statute to require 16 criminal intent—knowledge—where none was expressed in the statute. See, e.g., 17 State v. Ramos, 2013-NMSC-031, ¶¶ 21, 24-25, 305 P.3d 921 (holding that although 18 not expressed in the statute, violating an order of protection requires proof that a 19 defendant knows of the order of protection and of the protected person’s presence 23 1 within the protected zone); Nozie, 2009-NMSC-018, ¶ 30 (holding that although it 2 is not expressed in the statute, knowledge that the victim is a police officer is an 3 essential element of the crime of aggravated battery on a police officer); State v. 4 Valino, 2012-NMCA-105, ¶¶ 15, 17, 287 P.3d 372 (holding that notwithstanding the 5 absence of statutory language requiring it, knowledge that the victim is a health care 6 worker is an essential element of the crime of battery on a health care worker); State 7 v. Gonzalez, 2005-NMCA-031 ¶¶ 1, 18 (holding that despite no statutory expression 8 requiring knowledge of contraband, a person entering a jail must knowingly possess 9 contraband as an essential element of bringing contraband into a jail). 10 {45} We end this portion of our discussion by noting that the text of Section 30- 11 6A-3(E) does not clearly express a legislative intent to dispense with a mens rea 12 requirement for the crime of manufacturing child pornography⸻leaving as 13 ambiguous the extent of the required mens rea. We nevertheless presume criminal 14 intent is a necessary element of the crime. 15 {46} Second, a statute that prohibits manufacturing child pornography is 16 unconstitutional if it is construed as a strict liability criminal offense. Where a statute 17 is capable of being interpreted in two ways, one that is constitutional and one 18 unconstitutional, we adopt the version that is constitutional. State ex rel. State 19 Engineer v. Romero, 2022-NMSC-022, ¶ 16, 521 P.3d 56. Although child 24 1 pornography is not protected by the First Amendment of the United States 2 Constitution, see United States v. Williams, 553 U.S. 285, 288 (2008), the power to 3 criminalize child pornography does have limitations, see id. at 289. One limitation 4 is that if a strict liability crime chills the exercise of free expression, it is 5 unconstitutional. Smith v. California, 361 U.S. 147, 151-52 (1959). The Smith Court, 6 anticipating that a bookseller facing strict criminal liability would be restricted in 7 distributing constitutionally protected material, concluded that a bookseller without 8 some “knowledge of the contents” of the allegedly obscene material could not be 9 punished. Id. at 153. Similarly, in New York v. Ferber, 458 U.S. 747, 765 (1982), 10 the Court explicitly ruled that while criminal statutes may constitutionally ban the 11 sexually explicit depictions of minors, “criminal responsibility may not be imposed 12 without some element of scienter on the part of the defendant.” Id. However, the 13 Court did not specify what level of mens rea is required. 14 {47} The statute in this case could be construed in two different ways. On the one 15 hand, we might conclude that the statute prohibits intentionally producing 16 pornography but does not require the producer to have intentionally depicted minors 17 under eighteen years of age. That construction would be both unconstitutional and 18 at odds with legislative intent. Our obligation is “to follow the well-established 19 principle of statutory construction that statutes should be construed, if possible, to 25 1 avoid constitutional questions.” Romero, 2022-NMSC-022, ¶ 16 (internal quotation 2 marks and citation omitted). 3 {48} We therefore consider whether the crime of manufacturing child pornography 4 requires both “intentionally” manufacturing pornography and “intentionally” 5 depicting a child under eighteen years of age. We discern no grammatical or other 6 obstacle to including “intentionally” in the depiction of a minor under eighteen years 7 of age for the prohibited manufacture of child pornography. Textually, Section 30- 8 6A-3(E) prohibits intentionally manufacturing pornography “if one or more of the 9 participants in [the prohibited sexual] act is a child under eighteen years of age.” The 10 specific deterrent purpose of the statute is to prohibit manufacturing child 11 pornography, and requiring an offender to have “knowingly” used the depiction of 12 a child under the age of eighteen years of age for the manufactured pornography falls 13 squarely within its specific deterrent purpose. See Nozie, 2009-NMSC-018, ¶ 30 14 (requiring knowledge that the victim is a police officer furthers the specific deterrent 15 purpose expressed by the statute criminalizing battery on a police officer). Further, 16 by presuming a legislative intent to require an offender’s intent to depict a child 17 under eighteen years of age, we avoid a construction rendering the statute 18 unconstitutional. 26 1 {49} We therefore apply the expressed mens rea requirement of intent to both 2 statutory elements: the intentional mental state attaches not only in the 3 manufacturing but also in the depiction of a child under eighteen years of age. That 4 is to say, the crime consists of the actus reus of intentionally manufacturing 5 pornography coupled with the mens rea of intentionally depicting a child under 6 eighteen years of age. Because manufacturing child pornography under Section 30- 7 6A-3(E) requires “some element of scienter on the part of the defendant,” Ferber, 8 458 U.S. at 765, Section 30-6A-3(E) complies with the First Amendment and is 9 constitutional. 10 {50} Our construction of New Mexico’s statute criminalizing the manufacture of 11 child pornography is consistent with the United States Supreme Court’s 12 interpretation of the Protection of Children Against Sexual Exploitation Act of 1977, 13 as amended, 18 U.S.C. § 2252. In U.S. v. X-Citement Video, Inc., 513 U.S. 64, 66- 14 67 (1994), the defendant challenged the constitutionality of 18 U.S.C. §§ 2252(a)(1)- 15 (2), which prohibits “knowingly” transporting, shipping, receiving, distributing, or 16 reproducing a visual depiction if it “involves the use of a minor engaging in sexually 17 explicit conduct.” The Court summarized the statute’s legislative history as 18 “persuasively indicat[ing] that Congress intended that the term ‘knowingly’ apply to 19 the requirement that the depiction be of sexually explicit conduct” while it was “a 27 1 good deal less clear . . . that Congress intended that the requirement extend also to 2 the age of the performers.” X-Citement, 513 U.S. at 77. The Court warned that 3 statutes “completely bereft of a scienter requirement as to the age of the performers 4 would raise serious constitutional doubts.” Id. at 78. Therefore, it was “incumbent 5 upon [the X-Citement Court] to read the statute to eliminate those doubts so long as 6 such a reading is not plainly contrary to the intent of Congress.” Id. The Court relied 7 upon the plain language of the statute and canons of statutory construction and 8 concluded that the “knowingly” element applied to the conduct involved, the 9 depiction of sexual content, and the age of the performers. Id. at 77-78; see also 10 Williams, 553 U.S. at 294 (concluding that “knowingly” at the beginning of the 11 federal pandering child pornography statute applied to all parts of the statute). “[A] 12 scienter requirement as to the age of the performers” delineates the boundary 13 between constitutionally protected speech and unprotected speech. X-Citement, 513 14 U.S. at 78. 15 {51} We hold that the mens rea required to violate Section 30-6A-3(E) is (1) to 16 intentionally manufacture pornography that (2) intentionally depicts a child under 17 eighteen years of age. In addition, the pornography must, in fact, depict a child that 18 is under eighteen years of age. Further, the mens rea requirements apply to all the 19 methods for manufacturing as defined in Section 30-6A-2(D) (defining manufacture 28 1 as “the production, processing, copying by any means, printing, packaging or 2 repackaging of any visual or print medium depicting any [pornography] or 3 simulation of [pornography] if one or more of the participants in that act is a child 4 under eighteen years of age”). We now evaluate the sufficiency of the evidence 5 supporting Defendant’s convictions for the possession, distribution, and 6 manufacture of child pornography under Section 30-6A-3(A), (C) and (E). 7 C. Sufficiency of the Evidence 8 {52} In evaluating the sufficiency of the evidence supporting Defendant’s 9 convictions, we must determine whether the evidence supports a finding that 10 Defendant had the requisite mens rea to be convicted of possessing, distributing, and 11 manufacturing child pornography. We conclude the evidence supports a finding that 12 Defendant actually knew all the videos contained child pornography. Any discussion 13 of whether he should have known is not necessary. 14 {53} The Court of Appeals concluded Defendant’s possession conviction was not 15 supported by sufficient evidence that Defendant knew or had reason to know the 16 “KitKatClub” video contained child pornography when he possessed it. Rael, 2021- 17 NMCA-040, ¶ 42. The Court of Appeals reasoned that because the video’s file name 18 had no terms specific to child pornography, and although Defendant admitted to 29 1 knowing that a particular search can result in the return of child pornography, this 2 was different from “knowing a search will return [child pornography].” Id. ¶¶ 41-42. 3 {54} The Court of Appeals also concluded that there was insufficient evidence to 4 support Defendant’s distribution conviction because there was a lack of evidence 5 suggesting he knew or had reason to know that the “thirteen-year-old-boy” video 6 contained child pornography. Id. ¶ 44. This was because the file name of the video 7 contained neither “the search terms that Defendant admitted using nor the terms that 8 were actively being searched when law enforcement executed the search warrant.” 9 Id. The Court of Appeals elaborated, “While the full title to the [“thirteen-year-old- 10 boy”] video suggests that it depicts an underage person as a participant in a 11 prohibited sexual act, the State did not present any evidence that Defendant was 12 familiar with the video’s full title or content when he distributed it.” Id. 13 {55} Last, applying its “knows or has reason to know” mens rea requirements of 14 Section 30-6A-3(A) to Defendant’s convictions for manufacturing child 15 pornography under Section 30-6A-3(E), the Court of Appeals concluded that there 16 was insufficient evidence that Defendant knew or had reason to know that the 17 “Alicia” video, the “lingerie” video, or the “Kimmy” video contained child 18 pornography when each copy was made. Rael, 2021-NMCA-040, ¶¶ 45, 50. The 19 Court of Appeals again reasoned that this was because the three digital video file 30 1 names did not contain “any of the search terms Defendant admitted to using” and 2 because “the State did not present any evidence that Defendant was familiar with the 3 title[s] or content” of the files. Id. ¶¶ 48-50. 4 {56} Seeking affirmance of the Court of Appeals, Defendant argues that no rational 5 factfinder could have found the evidence sufficient to prove beyond a reasonable 6 doubt that he intentionally possessed, distributed, or manufactured the child 7 pornography videos found on his computing devices or that he knew or had reason 8 to know of the videos’ contents. Defendant maintains that the presence of the 9 unlawful videos on his digital devices and his conduct in downloading, sharing, and 10 copying the videos were the products of mere “inadverten[ce]” and “happenstance” 11 and thus were beyond the scope of Section 30-6A-3. However, as will be shown, 12 Defendant’s assertions of “accidental conduct” ring hollow in light of the persuasive 13 circumstantial evidence presented at trial. 14 1. Standard of review 15 {57} In assessing the sufficiency of the evidence presented in a bench trial, the 16 appellate court’s role is well settled. 17 First it reviews the evidence [resolving all conflicts and indulging all 18 permissible inferences] with deference to the findings of the trial court; 19 then it determines whether the evidence, viewed in this manner, could 20 justify a finding by any rational trier of fact that each element of the 21 crime charged has been established beyond a reasonable doubt. 31 1 Myers, 2009-NMSC-016, ¶ 13 (alteration in original) (citation omitted). Regardless 2 of the type of trial involved—bench or jury trial—appellate review remains highly 3 deferential because the reviewing court “resolve[s] all disputed facts in favor of the 4 State, indulge[s] all reasonable inferences in support of the verdict, and disregard[s] 5 all evidence and inferences to the contrary.” State v. Largo, 2012-NMSC-015, ¶ 30, 6 278 P.3d 532 (internal quotation marks and citation omitted); see also State v. 7 Garcia, 2011-NMSC-003, ¶ 5, 149 N.M. 185, 246 P.3d 1057 (cautioning an 8 appellate court to refrain from “second-guess[ing] the [factfinder’s] decision 9 concerning the credibility of witnesses, reweigh[ing] the evidence, or substitut[ing] 10 its judgment for that of the [factfinder]” (alterations 1, 3, and 4 in original) (internal 11 quotation marks and citation omitted)). So long as a rational factfinder “could have 12 found beyond a reasonable doubt the essential facts required for a conviction, we 13 will not upset [the factfinder’s] conclusions.” Id. (internal quotation marks and 14 citation omitted). 15 2. Defendant’s mens rea was proven by sufficient evidence 16 {58} “Evidence is sufficient to sustain a conviction when there exists substantial 17 evidence of a direct or circumstantial nature to support a verdict beyond a reasonable 18 doubt with respect to every element essential to a conviction.” State v. Smith, 2016- 19 NMSC-007, ¶ 19, 367 P.3d 420 (internal quotation marks and citation omitted). 32 1 “Substantial evidence,” in turn, “is relevant evidence that a reasonable mind might 2 accept as adequate to support a conclusion.” Largo, 2012-NMSC-015, ¶ 30 (internal 3 quotation marks and citation omitted). 4 {59} It is also settled that the “determination of the weight and effect of the 5 evidence, including all reasonable inferences to be drawn from both the direct and 6 circumstantial evidence, is a matter reserved for the determination of the trier of 7 facts.” State v. Bloom, 1977-NMSC-016, ¶ 5, 90 N.M. 192, 561 P.2d 465. In cases 8 where a defendant’s intent is at issue, but there is no admissible expression of intent 9 by the defendant, the factfinder is required to draw reasonable inferences from all 10 the evidence and surrounding circumstances to determine whether that defendant 11 acted with a criminal intent. See State v. Green, 1993-NMSC-056, ¶ 21, 116 N.M. 12 273, 861 P.2d 954 (stating that intent “can seldom be proven by direct evidence”); 13 Holguin v. Sally Beauty Supply Inc., 2011-NMCA-100, ¶ 22, 150 N.M. 636, 264 14 P.3d 732 (stating that intent “must ordinarily be proved circumstantially by 15 inferences from the facts and circumstances of each case” in the absence of a 16 voluntary statement of the requisite intent by a mentally competent defendant). This 17 is another way of saying, “A material fact may be proven by inference.” State v. 18 Brown, 1984-NMSC-014, ¶ 12, 100 N.M. 726, 676 P.2d 253. 33 1 {60} Evaluated under the foregoing principles and our standard of review, the 2 evidence is overwhelming that Defendant intended his possession, distribution, and 3 manufacture and knew that all five of the videos he was convicted of possessing, 4 distributing, or manufacturing depicted child pornography. 5 {61} Defendant admitted he was the owner and exclusive user of the Gateway 6 computer and the Toshiba external hard drive. He was familiar with DownloadHQ, 7 which he had been using for two and one-half years to share files. He would select 8 files to download from other users, and other users would initiate uploads of files 9 from his computer. In order to obtain files, Defendant would enter search terms, and 10 a responsive list was produced. The OS Triage program, which allows law 11 enforcement to do an onsite preview of data on a computer, showed several child- 12 pornography-related searches in the browser history of Defendant’s Gateway 13 computer. From the list produced by the search terms, Defendant would determine 14 which files to download to his Gateway computer. DownloadHQ has a preview 15 window that allows users to view a portion of the video prior to selecting which files 16 to download. Defendant redirected his downloads from the default DownloadHQ 17 folder to the C drive “downloads” folder in the Gateway computer. All told, there 18 were thirty-seven suspected child pornography files linked to Defendant’s 19 DownloadHQ account. Forensic analysis of Defendant’s DownloadHQ application 34 1 also retrieved a partial list of file names downloaded to the Gateway computer and 2 a partial list of files Defendant made available to others through the DownloadHQ 3 application. Each of the file names of these downloads and uploads had terms 4 descriptive of child pornography. In the foregoing context, we now turn to the 5 specific videos at issue. 6 {62} Defendant was convicted for possessing the “KitKatClub” video which, 7 without dispute, depicts child pornography. It is one of the videos Defendant 8 admitted in his interview that he watched and downloaded but claimed it contained 9 adult pornography. Defendant also claimed he deleted the video when he learned 10 that children were involved. However, forensic evidence indicated that the 11 “KitKatClub” video was stored on the Gateway computer hard drive. Defendant’s 12 viewing the video, choosing to download the video, and redirecting where the video 13 was to be stored in the Gateway computer are all circumstances from which a 14 factfinder could reasonably conclude that Defendant intentionally possessed the 15 “KitKatClub” video, knowing it contained child pornography. See State v. Flick, 790 16 N.W.2d 295, 305-06 (Mich. 2010) (contrasting the accidental conduct of one who 17 views an “unsolicited depiction” of child pornography on a computer screen and 18 immediately “undert[akes] efforts to remove the depiction” from the intentional 19 conduct of one who takes “many . . . affirmative steps . . . to gain actual physical 35 1 control” of child pornography and knowingly possesses it). The fact that the file 2 name of the video has no terms specific to child pornography, which the Court of 3 Appeals said was determinative, Rael, 2021-NMCA-040, ¶¶ 41-42, does not negate 4 these facts. 5 {63} Defendant’s conviction for distributing child pornography arises from Special 6 Agent Peña’s discovery during his investigation that the DownloadHQ application 7 in Defendant’s computer was distributing the “thirteen-year-old-boy” video. The 8 Court of Appeals reversed this conviction because it concluded there was no 9 evidence that Defendant was familiar with the video’s file name or content when it 10 was distributed. Id. ¶ 44. We disagree. Again, there is no dispute that the video 11 depicts child pornography. Although the video was not located on Defendant’s 12 computer or hard drive, forensic evidence revealed that the video was downloaded 13 to Defendant’s Gateway computer using the DownloadHQ application. Forensic 14 evidence also revealed an encrypted log of files downloaded and shared, and the log 15 included the “thirteen-year-old-boy” video file name. The evidence therefore shows 16 that as a result of Defendant entering search terms, DownloadHQ produced a list of 17 files, and from that list, Defendant chose to download the “thirteen-year-old-boy” 18 video to his computer. There is no dispute that the file name contains terms specific 19 to child pornography, and a fair inference is that Defendant knew what the file name 36 1 was when he downloaded it. Defendant also knew that the DownloadHQ application 2 would then share that file with other users of the DownloadHQ application. From 3 this evidence, and reasonable inferences from that evidence, a factfinder could 4 reasonably conclude that Defendant intentionally distributed the “thirteen-year-old- 5 boy” video knowing it contained child pornography. 6 {64} We now turn to Defendant’s convictions for manufacturing child pornography 7 by copying three videos of child pornography from his Gateway computer to his 8 Toshiba external hard drive. These are the “Alicia” video, the “lingerie” video, and 9 the “Kimmy” video. The Court of Appeals reversed these convictions, concluding 10 that there was no evidence that Defendant was familiar with the file names or content 11 of the videos. Rael, 2021-NMCA-040, ¶¶ 48-50. Again, we disagree. The “Alicia” 12 video is the second video Defendant admitted in his interview that he downloaded 13 but claimed he deleted upon seeing it depicted children. There is no dispute that it 14 depicts child pornography. Further, the file name of the “Alicia” video has terms 15 specific to child pornography, and the evidence is that it was copied on two separate 16 dates from Defendant’s Gateway computer to Defendant’s Toshiba external hard 17 drive. The “lingerie” video also depicts child pornography. Forensic evidence 18 showed it was viewed from the Windows Media Player on Defendant’s Gateway 19 computer, kept on the internal hard drive, and copied to Defendant’s Toshiba 37 1 external hard drive. The “Kimmy” video depicts child pornography, and its file name 2 contains terms specific to child pornography. It was copied from Defendant’s 3 Gateway computer to Defendant’s Toshiba external hard drive on two different 4 dates. This evidence, and reasonable inferences from the evidence are sufficient for 5 a factfinder to reasonably conclude that Defendant intentionally copied these videos 6 with the intent to copy child pornography because he knew they depicted child 7 pornography. 8 {65} Two additional factors are supportive of our conclusion that Defendant knew 9 all five videos contained child pornography. 10 {66} First, Defendant said he used CCleaner daily, and Detective Brown confirmed 11 it “had been run recently” and previously “thousands of times.” Detective Brown 12 explained it is “used by a lot of people that generally do not want their information 13 being recovered or seen” as it is an antiforensic program that is “directed to go and 14 delete files in a way that they should not be able to be recovered.” He further 15 explained that Defendant’s CCleaner was configured to target certain DownloadHQ 16 search terms. In fact, when asked how the “thirteen-year-old-boy” video may have 17 been downloaded but not found on any of Defendant’s devices, Detective Brown 18 explained that the video may have been deleted and overwritten or deleted and 19 antiforensic programs may have been run to remove traces of it. In addition, 38 1 Detective Brown testified that he was able to recover and decrypt a partial list of file 2 names downloaded to Defendant’s Gateway computer and shared from Defendant’s 3 Gateway computer using Defendant’s DownloadHQ application and that the names 4 of all those files contained terms specific to child pornography. Defendant knows 5 child pornography is illegal. Defendant’s daily use of CCleaner, his downloads of 6 videos named for and containing child pornography, and his use of search terms 7 specific to child pornography is a combination fatal to Defendant’s argument that he 8 did not know the videos he was convicted of possessing, distributing, and copying 9 depicted child pornography. See United States v. Clark, 24 F.4th 565, 576-77 (6th 10 Cir. 2022) (relying, in part, on the defendant’s use of “two evidence destruction 11 programs” on his computer in concluding that the defendant “knowingly distributed 12 illegal images and videos . . . on a peer-to-peer network”); State v. Schuller, 843 13 N.W.2d 626, 637 (Neb. 2014) (“It seems reasonable to infer that [the defendant] 14 deleted the files to hide evidence of his earlier knowing possession [of child 15 pornography].”). 16 {67} Second, Defendant’s credibility was tested and contradicted in several 17 material respects. Defendant claimed that if the file name of a video suggested it 18 contained child pornography, he would not download it. But, when confronted with 19 the fact that the shared folder in his computer had files with names clearly stating 39 1 they contained child pornography, Defendant claimed he thought he had deleted 2 them. Defendant then claimed that files might not have been deleted because 3 sometimes he got drunk, passed out, and forgot to delete them. He also admitted he 4 downloaded child pornography files but claimed he deleted those files after 5 determining their content. Another time he claimed that upon learning videos 6 depicted children, he turned them off before any sex acts occurred and deleted them. 7 The district court as the factfinder was not required to give any credibility to 8 Defendant’s explanations. State v. Jason L., 2000-NMSC-018, ¶ 10, 129 N.M. 119, 9 2 P.3d 856 (“Conflicts in the evidence, even within the testimony of a witness, are 10 to be resolved by the fact finder at trial.”). The fact that the district court convicted 11 Defendant establishes that it rejected Defendant’s explanations and excuses, and on 12 appeal we are not free to reweigh the evidence and come to a contrary conclusion by 13 accepting those explanations and excuses as true. State v. Garcia, 2011-NMSC-003, 14 ¶ 5. 15 {68} For the foregoing reasons, we conclude that the evidence supports findings 16 that Defendant (1) intentionally possessed the “KitKatClub” video, knowing that it 17 depicts pornography and knowing that one of the participants is a small child, under 18 eighteen years of age; (2) intentionally distributed the “thirteen-year-old-boy” video, 19 knowing that it depicts pornography and knowing that one of the participants it 40 1 depicts is a young boy under eighteen years of age; and (3) intentionally 2 manufactured child pornography by copying the “Alicia” video, the “lingerie” video, 3 and the “Kimmy” video, intending for all the copies to depict a child or children 4 under eighteen years of age. We therefore affirm Defendant’s convictions. 5 III. CONCLUSION 6 {69} The opinion of the Court of Appeals is reversed. The case is remanded to the 7 district court for enforcement of the judgment and sentence it imposed. 8 {70} IT IS SO ORDERED. 9 10 MICHAEL E. VIGIL, Justice 11 WE CONCUR: 12 13 C. SHANNON BACON, Chief Justice 14 15 DAVID K. THOMSON, Justice 16 17 BRIANA H. ZAMORA, Justice 18 19 BRETT R. LOVELESS, Judge 20 Sitting by designation 41