COURT OF APPEALS OF VIRGINIA
Present: Judges Frank, Kelsey and Senior Judge Overton
Argued by teleconference
RAY KROMER
OPINION BY
v. Record No. 1900-04-2 JUDGE ROBERT P. FRANK
JUNE 14, 2005
COMMONWEALTH OF VIRGINIA
FROM THE CIRCUIT COURT OF THE CITY OF RICHMOND
Beverly W. Snukals, Judge
Jennifer M. Newman (C. David Whaley; Morchower, Luxton &
Whaley, on brief), for appellant.
Kathleen B. Martin, Assistant Attorney General (Judith Williams
Jagdmann, Attorney General, on brief), for appellee.
Ray Kromer, appellant, was convicted, in a bench trial, of fifteen counts of misdemeanor
possession of child pornography in violation of Code § 18.2-374.1:1.1 On appeal, he contends
the evidence was insufficient to sustain his convictions. We hold the evidence was sufficient and
affirm.
BACKGROUND
On March 26, 2003, Richmond police responded to a fire at a residence on Hanover
Avenue in Richmond. After finding chemicals and explosives on the second floor, police called
Special Agent Robert Ritchie of the F.B.I. to “take a look at the scene.” Ritchie, a bomb
technician, questioned appellant about the materials. Appellant responded that he “was making
pyrotechnic devices, rockets and other pyrotechnic type devices.” Appellant gave written
1
Such an offense is now a Class 6 felony. The offense was a Class 1 misdemeanor on
March 26, 2003, the date alleged in the indictments.
consent for police to search the residence. Concerned about terrorism, Ritchie also wanted to
examine the contents of a computer located inside the residence for “explosive recipes” and
possible visits to websites that “might indicate he [appellant] was making explosive mixtures and
not just pyrotechnic mixtures.” Appellant consented to a search of the computer.
Police removed the explosives and the computer on March 27, 2003. After initially
securing the residence on March 26, 2003, police guarded the residence until the next day when
officers removed the computer. They did not see anyone come or go during that time.
According to Ritchie, appellant gave his father a key to the residence “so he [appellant] could
still get into the house after he was released.”
Police took the computer to Officer Jeff Deem, a computer forensics specialist. Deem
examined the computer in June 2003 for bomb-related information. He began by removing the
hard drive and creating a “true and accurate copy of the media.” Deem found information
concerning child pornography and obtained a second search warrant before examining the
computer further.
Deem conducted a forensic examination of the computer using Ncase software and
certain key words connected to child pornography such as “lolita” and “underage.” He received
more than one hundred hits. He looked for files or photographs, and located numerous images
that were possibly child pornography.
Deem identified fifteen photographs at trial as being the ones he recovered from the
computer. Each picture was labeled with its file name as well as the path to the file’s location on
the computer. Deem testified the files were downloaded sometime between December 28, 2002
and January 3, 2003. The pictures were located in a file-sharing program called “KaZaA.” The
folder appeared on a desktop shortcut link titled “my shared folder.” The folder contained files
such as “kids/girl13yearsold.jpg” and “11_11and 13yearand mom.jpg.” The default setting for
-2-
KaZaA is to share files with other users via the Internet, although this computer’s setting had
been manipulated not to share files. Deem testified that there was no way to tell who
downloaded the pictures or who used the computer at any given time.
Deem testified that the “systems registry” showed “R. Clark Kromer” was a registered
owner of the Windows XP software. Another application on the computer showed a user name
of “clarkkromer.” The computer was not password protected, and anyone could have access to
it. Deem testified that there is no evidence to suggest that anyone other than appellant used the
computer.
Kenneth Pew, an electrical engineer, testified that accessing the photographs was a
six-step process and that there were over five hundred photographs on the photo directory. Pew
could not testify about the shortcut link on the desktop because he did not have the hardware to
examine the actual desktop. However, in addressing the issue of desktop icons, he testified that
when one opened a desktop link, a list of files within that folder would appear on the screen.
Appellant made a motion to strike the Commonwealth’s evidence, arguing that there was
no evidence that appellant owned or used the computer at the time that the images were
downloaded. Appellant conceded that the images were taken from the computer. The court
denied the motion, finding that under a “totality of the circumstances” approach, the evidence
was sufficient to find appellant guilty beyond a reasonable doubt.
ANALYSIS
Appellant argues that the evidence at trial was insufficient to convict him of possession of
child pornography. Specifically, he contends that the Commonwealth failed to prove he
-3-
knowingly possessed the images contained within the computer.2 For the reasons that follow, we
affirm.
In order to convict a person of possession of child pornography, the Commonwealth must
prove beyond a reasonable doubt that the individual “knowingly possesse[d] sexually explicit
visual material utilizing or having as a subject a person less than 18 years.” Code
§ 18.2-374.1:1. Appellant correctly points out that this statute does not define possession, nor
does any opinion of Virginia’s appellate courts. Thus, in this case of first impression, we must
define “possession” in the context of computer electronics, Internet technology, and intangible
images.
We take guidance from the federal case of United States v. Tucker, 305 F.3d 1193 (10th
Cir. 2002), cert. denied, 537 U.S. 1223 (2003). The appellant in Tucker was convicted of one
count of child pornography in violation of 18 U.S.C. § 2252A(a)(5)(B). The government’s
computer expert discovered child pornography files on both the hard drive and in the cache files
of Tucker’s computer. Tucker conceded that he knew that when he visited a Web page, the
images on that page would be sent to his browser’s cache and thereby saved on his hard drive.
Id. at 1204.
The Tucker court found that Tucker had control over the files present in his Web browser
cache file. Id. The court held:
Tucker . . . intentionally sought out and viewed child pornography
knowing that the images would be saved on his computer. Tucker
may have wished that his Web browser did not automatically cache
viewed images on his computer’s hard drive, but he concedes he
knew the Web browser was doing so. Tucker continued to view
child pornography knowing that the pornography was being saved,
if only temporarily, on his computer. In such circumstances, his
possession was voluntary. Since he knew his browser cached the
2
Appellant does not dispute that the images were sexually explicit, the subjects being
less than eighteen years of age.
-4-
image files, each time he intentionally sought out and viewed child
pornography with his Web browser he knowingly acquired and
possessed the images.
Id. at 1205 (footnote omitted).
While the facts in Tucker differ from the facts here, we adopt the court’s definition of
possession of computer images. There is no question here that the images were downloaded and
saved, and even linked to the desktop through a shortcut. We, therefore, begin with the premise
that someone here “sought out” child pornography. It is clear that someone “acquired” the
offensive images and brought them into appellant’s home from “cyberspace.” See United States
v. Perez, 247 F. Supp. 2d 459, 484 n.12 (S.D.N.Y. 2003) (noting that without evidence that
pornography was specifically downloaded and saved to a defendant’s computer, the offending
images “‘may well have been located in cyberspace, not in [the defendant’s] home’” (quoting
United States v. Zimmerman, 277 F.3d 426, 435 (3d Cir. 2002))). Thus, our inquiry is one of
who possessed the images after they were already procured. Our analysis is whether the
evidence sufficiently connects the appellant to the computer and the images.
While this appears to be a case consigned to the new and evolving area of computer
technology, we examine this case under familiar principles of constructive possession of
contraband. We do not need to determine whether appellant was the person who downloaded the
pornographic images, rather, we determine whether appellant knew the images existed and, if so,
did he exercise dominion and control over them after they were downloaded?3
When the sufficiency of the evidence is challenged on appeal, we review the evidence “in
the light most favorable to the Commonwealth, granting to it all reasonable inferences fairly
deducible therefrom.” Bright v. Commonwealth, 4 Va. App. 248, 250, 356 S.E.2d 443, 444
3
We note that while the evidence shows that the images were downloaded between
December 28, 2002 and January 3, 2003, the appellant was charged with possessing the images
on March 26, 2003.
-5-
(1987). The trial court’s judgment will not be set aside unless plainly wrong or without evidence
to support it. Josephs v. Commonwealth, 10 Va. App. 87, 99, 390 S.E.2d 491, 497 (1990)
(en banc). Under this standard, “a reviewing court does not ‘ask itself whether it believes that
the evidence at the trial established guilt beyond a reasonable doubt.’” Myers v.
Commonwealth, 43 Va. App. 113, 118, 596 S.E.2d 536, 538 (2004) (citation omitted and
emphasis in original). It asks instead whether “‘any rational trier of fact could have found the
essential elements of the crime beyond a reasonable doubt.’” Kelly v. Commonwealth, 41
Va. App. 250, 257, 584 S.E.2d 444, 447 (2003) (quoting Jackson v. Virginia, 443 U.S. 307, 319
(1979)) (emphasis in original). Thus, we do not “substitute our judgment for that of the trier of
fact” even if our opinion were to differ. Wactor v. Commonwealth, 38 Va. App. 375, 380, 564
S.E.2d 160, 162 (2002).
In order to convict a person of illegal possession of contraband, “proof of actual
possession is not required; proof of constructive possession will suffice.” Maye v.
Commonwealth, 44 Va. App. 463, 483, 605 S.E.2d 353, 363 (2004). To support a conviction
based upon constructive possession, “the Commonwealth must point to evidence of acts,
statements, or conduct of the accused or other facts or circumstances which tend to show that the
defendant was aware of both the presence and character of the [contraband] and that it was
subject to his dominion and control.” Drew v. Commonwealth, 230 Va. 471, 473, 338 S.E.2d
844, 845 (1986) (citation omitted). Ownership or occupancy of the premises on which the
contraband was found is a circumstance probative of possession. Archer v. Commonwealth, 26
Va. App. 1, 12, 492 S.E.2d 826, 832 (1997).
“Circumstantial evidence is as competent and is entitled to as much weight as direct
evidence, provided it is sufficiently convincing to exclude every reasonable hypothesis except
that of guilt.” Breeden v. Commonwealth, 43 Va. App. 169, 177, 596 S.E.2d 563, 567 (2004).
-6-
“The Commonwealth is not required to prove that there is no possibility that someone else may
have planted, discarded, abandoned or placed the [contraband]” where the contraband is
discovered. Brown v. Commonwealth, 15 Va. App. 1, 10, 421 S.E.2d 877, 883 (1992) (en banc).
“To resolve the issue, the Court must consider the totality of the circumstances established by the
evidence.” Williams v. Commonwealth, 42 Va. App. 723, 735, 594 S.E.2d 305, 311 (2004).
Appellant’s reasonable hypothesis of innocence is that others, family members or friends,
could have used the computer and downloaded the images. As we earlier indicated, whether
appellant or someone else downloaded the images is not determinative of our analysis. The issue
is whether appellant knowingly possessed the images after they were previously downloaded into
the computer. The issue of who originally procured the offensive images is of no concern to our
analysis.
The trial court found that appellant had exclusive control of the residence. Appellant
gave consent to search the residence, and he admitted ownership of certain pyrotechnics found
on the premises. The court further found “the registration on the computer tied to his name,”
along with appellant’s name being associated with the computer during the time when the
computer made one hundred “hits” on child pornography. The court concluded that, most
importantly, the computer had “quick desktop access” to the folder containing the images. Using
a totality of the circumstances approach, the court found the evidence sufficient to show
appellant had control of the residence and the computer.
We conclude that the evidence supports the trial court’s findings. There is no dispute that
the computer contained pornographic images in a KaZaA shared file that could be easily
accessed through a desktop link. The computer was seized from a residence to which appellant
had a key. Appellant gave a key to his father so that he would be able to enter the premises at a
later date, indicating that appellant had control over the residence. Appellant also admitted that
-7-
the chemical mixtures were his and that he was making “pyrotechnic devices” at the residence.
The police did not see anyone else come to or go away from the residence from March 26 until
they completed their search on March 27. The reasonable inference is that appellant lived at this
residence.
The systems registry on the computer revealed “R. Clark Kromer” as a registered owner
of the Windows XP software. Another application showed a user name of “clarkkromer.” The
KaZaA software default setting had been manually set to disallow file sharing, establishing the
user’s control and management of the files. The evidence showed that the files had been
downloaded between December 28, 2002 and January 3, 2003. The desktop shortcut, entitled
“my shared folder,” created easy access to files such as “kids/girl13yearsold.jpg” and “11_11and
13yearand mom.jpg,” making the existence of those files obvious to anyone who clicked on that
link. The images, accessible to the user through that desktop shortcut, were conveniently located
and readily viewable. The record supports the reasonable inference that appellant used the
computer and had knowledge and control over its contents.
Appellant cites Perez, for the proposition that “one cannot be guilty of possession for
simply having viewed an image on a web site, thereby causing the image to be automatically
stored in the browser’s cache, without having purposely saved or downloaded the image.”
Appellant did not contest at trial that the images were deliberately downloaded into the
computer. Because appellant did not make this argument below, we will not consider it for the
first time on appeal. See Rule 5A:18; see also Buck v. Commonwealth, 247 Va. 449, 452-53,
443 S.E.2d 414, 417 (1994) (holding that the same argument must have been raised, with
specificity, at trial before it can be considered on appeal).
We are not suggesting that anyone who ever uses a computer containing sexually explicit
images of children is guilty of possessing child pornography. Here, the reasonable inference is
-8-
that appellant owned the residence and was the user/owner of the computer. While appellant
contends the images were “hidden” in the computer, the facts defeat his argument. The desktop
shortcut indicates that the appellant manipulated the images to be easily accessible and
continuously available. Under the specific facts of this case, it is clear that appellant possessed
the computer and the images contained therein.
For the foregoing reasons, the decision of the trial court is affirmed.
Affirmed.
-9-