Kromer v. Commonwealth

                               COURT OF APPEALS OF VIRGINIA


Present: Judges Frank, Kelsey and Senior Judge Overton
Argued by teleconference


RAY KROMER
                                                                     OPINION BY
v.        Record No. 1900-04-2                                  JUDGE ROBERT P. FRANK
                                                                     JUNE 14, 2005
COMMONWEALTH OF VIRGINIA


                  FROM THE CIRCUIT COURT OF THE CITY OF RICHMOND
                               Beverly W. Snukals, Judge

                 Jennifer M. Newman (C. David Whaley; Morchower, Luxton &
                 Whaley, on brief), for appellant.

                 Kathleen B. Martin, Assistant Attorney General (Judith Williams
                 Jagdmann, Attorney General, on brief), for appellee.


          Ray Kromer, appellant, was convicted, in a bench trial, of fifteen counts of misdemeanor

possession of child pornography in violation of Code § 18.2-374.1:1.1 On appeal, he contends

the evidence was insufficient to sustain his convictions. We hold the evidence was sufficient and

affirm.

                                          BACKGROUND

          On March 26, 2003, Richmond police responded to a fire at a residence on Hanover

Avenue in Richmond. After finding chemicals and explosives on the second floor, police called

Special Agent Robert Ritchie of the F.B.I. to “take a look at the scene.” Ritchie, a bomb

technician, questioned appellant about the materials. Appellant responded that he “was making

pyrotechnic devices, rockets and other pyrotechnic type devices.” Appellant gave written



          1
       Such an offense is now a Class 6 felony. The offense was a Class 1 misdemeanor on
March 26, 2003, the date alleged in the indictments.
consent for police to search the residence. Concerned about terrorism, Ritchie also wanted to

examine the contents of a computer located inside the residence for “explosive recipes” and

possible visits to websites that “might indicate he [appellant] was making explosive mixtures and

not just pyrotechnic mixtures.” Appellant consented to a search of the computer.

       Police removed the explosives and the computer on March 27, 2003. After initially

securing the residence on March 26, 2003, police guarded the residence until the next day when

officers removed the computer. They did not see anyone come or go during that time.

According to Ritchie, appellant gave his father a key to the residence “so he [appellant] could

still get into the house after he was released.”

       Police took the computer to Officer Jeff Deem, a computer forensics specialist. Deem

examined the computer in June 2003 for bomb-related information. He began by removing the

hard drive and creating a “true and accurate copy of the media.” Deem found information

concerning child pornography and obtained a second search warrant before examining the

computer further.

       Deem conducted a forensic examination of the computer using Ncase software and

certain key words connected to child pornography such as “lolita” and “underage.” He received

more than one hundred hits. He looked for files or photographs, and located numerous images

that were possibly child pornography.

       Deem identified fifteen photographs at trial as being the ones he recovered from the

computer. Each picture was labeled with its file name as well as the path to the file’s location on

the computer. Deem testified the files were downloaded sometime between December 28, 2002

and January 3, 2003. The pictures were located in a file-sharing program called “KaZaA.” The

folder appeared on a desktop shortcut link titled “my shared folder.” The folder contained files

such as “kids/girl13yearsold.jpg” and “11_11and 13yearand mom.jpg.” The default setting for

                                                   -2-
KaZaA is to share files with other users via the Internet, although this computer’s setting had

been manipulated not to share files. Deem testified that there was no way to tell who

downloaded the pictures or who used the computer at any given time.

       Deem testified that the “systems registry” showed “R. Clark Kromer” was a registered

owner of the Windows XP software. Another application on the computer showed a user name

of “clarkkromer.” The computer was not password protected, and anyone could have access to

it. Deem testified that there is no evidence to suggest that anyone other than appellant used the

computer.

       Kenneth Pew, an electrical engineer, testified that accessing the photographs was a

six-step process and that there were over five hundred photographs on the photo directory. Pew

could not testify about the shortcut link on the desktop because he did not have the hardware to

examine the actual desktop. However, in addressing the issue of desktop icons, he testified that

when one opened a desktop link, a list of files within that folder would appear on the screen.

       Appellant made a motion to strike the Commonwealth’s evidence, arguing that there was

no evidence that appellant owned or used the computer at the time that the images were

downloaded. Appellant conceded that the images were taken from the computer. The court

denied the motion, finding that under a “totality of the circumstances” approach, the evidence

was sufficient to find appellant guilty beyond a reasonable doubt.

                                           ANALYSIS

       Appellant argues that the evidence at trial was insufficient to convict him of possession of

child pornography. Specifically, he contends that the Commonwealth failed to prove he




                                               -3-
knowingly possessed the images contained within the computer.2 For the reasons that follow, we

affirm.

          In order to convict a person of possession of child pornography, the Commonwealth must

prove beyond a reasonable doubt that the individual “knowingly possesse[d] sexually explicit

visual material utilizing or having as a subject a person less than 18 years.” Code

§ 18.2-374.1:1. Appellant correctly points out that this statute does not define possession, nor

does any opinion of Virginia’s appellate courts. Thus, in this case of first impression, we must

define “possession” in the context of computer electronics, Internet technology, and intangible

images.

          We take guidance from the federal case of United States v. Tucker, 305 F.3d 1193 (10th

Cir. 2002), cert. denied, 537 U.S. 1223 (2003). The appellant in Tucker was convicted of one

count of child pornography in violation of 18 U.S.C. § 2252A(a)(5)(B). The government’s

computer expert discovered child pornography files on both the hard drive and in the cache files

of Tucker’s computer. Tucker conceded that he knew that when he visited a Web page, the

images on that page would be sent to his browser’s cache and thereby saved on his hard drive.

Id. at 1204.

          The Tucker court found that Tucker had control over the files present in his Web browser

cache file. Id. The court held:

                 Tucker . . . intentionally sought out and viewed child pornography
                 knowing that the images would be saved on his computer. Tucker
                 may have wished that his Web browser did not automatically cache
                 viewed images on his computer’s hard drive, but he concedes he
                 knew the Web browser was doing so. Tucker continued to view
                 child pornography knowing that the pornography was being saved,
                 if only temporarily, on his computer. In such circumstances, his
                 possession was voluntary. Since he knew his browser cached the

          2
         Appellant does not dispute that the images were sexually explicit, the subjects being
less than eighteen years of age.

                                                -4-
               image files, each time he intentionally sought out and viewed child
               pornography with his Web browser he knowingly acquired and
               possessed the images.

Id. at 1205 (footnote omitted).

       While the facts in Tucker differ from the facts here, we adopt the court’s definition of

possession of computer images. There is no question here that the images were downloaded and

saved, and even linked to the desktop through a shortcut. We, therefore, begin with the premise

that someone here “sought out” child pornography. It is clear that someone “acquired” the

offensive images and brought them into appellant’s home from “cyberspace.” See United States

v. Perez, 247 F. Supp. 2d 459, 484 n.12 (S.D.N.Y. 2003) (noting that without evidence that

pornography was specifically downloaded and saved to a defendant’s computer, the offending

images “‘may well have been located in cyberspace, not in [the defendant’s] home’” (quoting

United States v. Zimmerman, 277 F.3d 426, 435 (3d Cir. 2002))). Thus, our inquiry is one of

who possessed the images after they were already procured. Our analysis is whether the

evidence sufficiently connects the appellant to the computer and the images.

       While this appears to be a case consigned to the new and evolving area of computer

technology, we examine this case under familiar principles of constructive possession of

contraband. We do not need to determine whether appellant was the person who downloaded the

pornographic images, rather, we determine whether appellant knew the images existed and, if so,

did he exercise dominion and control over them after they were downloaded?3

       When the sufficiency of the evidence is challenged on appeal, we review the evidence “in

the light most favorable to the Commonwealth, granting to it all reasonable inferences fairly

deducible therefrom.” Bright v. Commonwealth, 4 Va. App. 248, 250, 356 S.E.2d 443, 444


       3
       We note that while the evidence shows that the images were downloaded between
December 28, 2002 and January 3, 2003, the appellant was charged with possessing the images
on March 26, 2003.
                                            -5-
(1987). The trial court’s judgment will not be set aside unless plainly wrong or without evidence

to support it. Josephs v. Commonwealth, 10 Va. App. 87, 99, 390 S.E.2d 491, 497 (1990)

(en banc). Under this standard, “a reviewing court does not ‘ask itself whether it believes that

the evidence at the trial established guilt beyond a reasonable doubt.’” Myers v.

Commonwealth, 43 Va. App. 113, 118, 596 S.E.2d 536, 538 (2004) (citation omitted and

emphasis in original). It asks instead whether “‘any rational trier of fact could have found the

essential elements of the crime beyond a reasonable doubt.’” Kelly v. Commonwealth, 41

Va. App. 250, 257, 584 S.E.2d 444, 447 (2003) (quoting Jackson v. Virginia, 443 U.S. 307, 319

(1979)) (emphasis in original). Thus, we do not “substitute our judgment for that of the trier of

fact” even if our opinion were to differ. Wactor v. Commonwealth, 38 Va. App. 375, 380, 564

S.E.2d 160, 162 (2002).

       In order to convict a person of illegal possession of contraband, “proof of actual

possession is not required; proof of constructive possession will suffice.” Maye v.

Commonwealth, 44 Va. App. 463, 483, 605 S.E.2d 353, 363 (2004). To support a conviction

based upon constructive possession, “the Commonwealth must point to evidence of acts,

statements, or conduct of the accused or other facts or circumstances which tend to show that the

defendant was aware of both the presence and character of the [contraband] and that it was

subject to his dominion and control.” Drew v. Commonwealth, 230 Va. 471, 473, 338 S.E.2d

844, 845 (1986) (citation omitted). Ownership or occupancy of the premises on which the

contraband was found is a circumstance probative of possession. Archer v. Commonwealth, 26

Va. App. 1, 12, 492 S.E.2d 826, 832 (1997).

       “Circumstantial evidence is as competent and is entitled to as much weight as direct

evidence, provided it is sufficiently convincing to exclude every reasonable hypothesis except

that of guilt.” Breeden v. Commonwealth, 43 Va. App. 169, 177, 596 S.E.2d 563, 567 (2004).

                                               -6-
“The Commonwealth is not required to prove that there is no possibility that someone else may

have planted, discarded, abandoned or placed the [contraband]” where the contraband is

discovered. Brown v. Commonwealth, 15 Va. App. 1, 10, 421 S.E.2d 877, 883 (1992) (en banc).

“To resolve the issue, the Court must consider the totality of the circumstances established by the

evidence.” Williams v. Commonwealth, 42 Va. App. 723, 735, 594 S.E.2d 305, 311 (2004).

       Appellant’s reasonable hypothesis of innocence is that others, family members or friends,

could have used the computer and downloaded the images. As we earlier indicated, whether

appellant or someone else downloaded the images is not determinative of our analysis. The issue

is whether appellant knowingly possessed the images after they were previously downloaded into

the computer. The issue of who originally procured the offensive images is of no concern to our

analysis.

       The trial court found that appellant had exclusive control of the residence. Appellant

gave consent to search the residence, and he admitted ownership of certain pyrotechnics found

on the premises. The court further found “the registration on the computer tied to his name,”

along with appellant’s name being associated with the computer during the time when the

computer made one hundred “hits” on child pornography. The court concluded that, most

importantly, the computer had “quick desktop access” to the folder containing the images. Using

a totality of the circumstances approach, the court found the evidence sufficient to show

appellant had control of the residence and the computer.

       We conclude that the evidence supports the trial court’s findings. There is no dispute that

the computer contained pornographic images in a KaZaA shared file that could be easily

accessed through a desktop link. The computer was seized from a residence to which appellant

had a key. Appellant gave a key to his father so that he would be able to enter the premises at a

later date, indicating that appellant had control over the residence. Appellant also admitted that

                                               -7-
the chemical mixtures were his and that he was making “pyrotechnic devices” at the residence.

The police did not see anyone else come to or go away from the residence from March 26 until

they completed their search on March 27. The reasonable inference is that appellant lived at this

residence.

       The systems registry on the computer revealed “R. Clark Kromer” as a registered owner

of the Windows XP software. Another application showed a user name of “clarkkromer.” The

KaZaA software default setting had been manually set to disallow file sharing, establishing the

user’s control and management of the files. The evidence showed that the files had been

downloaded between December 28, 2002 and January 3, 2003. The desktop shortcut, entitled

“my shared folder,” created easy access to files such as “kids/girl13yearsold.jpg” and “11_11and

13yearand mom.jpg,” making the existence of those files obvious to anyone who clicked on that

link. The images, accessible to the user through that desktop shortcut, were conveniently located

and readily viewable. The record supports the reasonable inference that appellant used the

computer and had knowledge and control over its contents.

       Appellant cites Perez, for the proposition that “one cannot be guilty of possession for

simply having viewed an image on a web site, thereby causing the image to be automatically

stored in the browser’s cache, without having purposely saved or downloaded the image.”

Appellant did not contest at trial that the images were deliberately downloaded into the

computer. Because appellant did not make this argument below, we will not consider it for the

first time on appeal. See Rule 5A:18; see also Buck v. Commonwealth, 247 Va. 449, 452-53,

443 S.E.2d 414, 417 (1994) (holding that the same argument must have been raised, with

specificity, at trial before it can be considered on appeal).

       We are not suggesting that anyone who ever uses a computer containing sexually explicit

images of children is guilty of possessing child pornography. Here, the reasonable inference is

                                                 -8-
that appellant owned the residence and was the user/owner of the computer. While appellant

contends the images were “hidden” in the computer, the facts defeat his argument. The desktop

shortcut indicates that the appellant manipulated the images to be easily accessible and

continuously available. Under the specific facts of this case, it is clear that appellant possessed

the computer and the images contained therein.

       For the foregoing reasons, the decision of the trial court is affirmed.

                                                                                     Affirmed.




                                                -9-