RENDERED: OCTOBER 28, 2021
TO BE PUBLISHED
Supreme Court of Kentucky
2019-SC-0663-DG
MICHAEL FIELDS APPELLANT
ON REVIEW FROM COURT OF APPEALS
V. NO. 2017-CA-1980
SCOTT CIRCUIT COURT NO. 10-CR-00190
COMMONWEALTH OF KENTUCKY APPELLEE
OPINION OF THE COURT BY JUSTICE HUGHES
AFFIRMING
An investigation by the Office of the Attorney General cybercrimes unit
led investigators to discover child pornography files on Michael Fields’s desktop
computer and external hard drive. After a jury trial he was convicted of four
counts of possession of matter portraying a sexual performance by a minor,
Kentucky Revised Statute (KRS) 531.335, and sentenced to ten years in prison
by the Scott Circuit Court. On appeal, the Court of Appeals found no error and
affirmed. Fields contends that the trial court improperly disqualified his sole
expert witness, erred by denying his motion for directed verdict, and
impermissibly admitted various photos and reports as evidence. On
discretionary review, this Court concludes that the trial court committed no
reversible error and thus affirms the judgment.
FACTS AND PROCEDURAL HISTORY
Fields used Limewire, a now-defunct file-sharing program, to download
and share music, videos and images. His goal was to acquire over 10,000
songs. In downloading files, Fields also amassed several thousand clips of
adult pornography. According to Fields, if another Limewire user had music he
liked, he would download every file in the other user’s library—Fields did not
preview or search through the entire library prior to downloading. Instead,
Fields used the “select all” command to highlight all the user’s files and hit the
download button, downloading hundreds of files at a time. Fields intended to
sort and catalogue the files later—retaining the files he wanted and deleting the
others—but he was downloading so many files it became difficult to keep up.
Fields steadfastly maintains that he had no idea child pornography was
amongst the thousands of files he downloaded from Limewire. He was aware of
the adult pornography, some of which he viewed with his wife.
In January 2010 Investigator Tom Bell of the cybercrimes branch of the
Attorney General’s office investigated online computers that were advertising,
via peer-to-peer networks, that they had files available for sharing that
matched known signatures of child pornography. Bell identified an IP address
advertising approximately 156 files with these known child pornography
signatures.1 The IP address, which belonged to Fields, was using the file-
1 As explained in United States v. Dodd, 598 F.3d 449, 451-53 (8th Cir. 2010),
even if a user admits to knowing receipt and possession of illegal materials, he may
have no knowledge that his computer was equipped to distribute said materials. But
the precise function of a file sharing program, like Limewire, is to share, in other
words, to distribute. Id. The Commonwealth and Investigator Bell never suggested
2
sharing software Limewire. Bell executed a search warrant at Fields’s home in
March 2010, seizing a laptop from the living room, a desktop computer from
the bedroom, an external hard drive and numerous CDs and DVDs. An initial
forensic examination of Fields’s computers and external hard drive tagged 126
images and 41 videos as suspected child pornography. On September 3, 2010
a Scott County grand jury indicted Fields on 105 counts of possession of
matter portraying a sexual performance by a minor. Given how long the case
had been pending, prior to the 2017 trial Bell conducted a supplemental
examination of Fields’s computers and external hard drive and concluded that
the devices contained 48 images and 7 videos of child pornography.2 He
explained that his supplemental review revealed that some of the images and
videos did not meet the child pornography criteria, citing reasons such as the
questionability of the subject’s age, the subject being clothed, or the absence
sexual activity. The indictment was later amended on May 5, 2017 to ten
counts, two counts related to videos and eight counts related to images.
Fields was originally represented by private counsel. In 2014 private
counsel obtained an order from the Scott Circuit Court allowing a computer
expert to conduct an independent forensic examination of Fields’s two
that Fields attempted or actually distributed child pornography, only that the files
were made available through the underlying functions of a peer-to-peer file sharing
program.
2 The trial court record shows numerous continuations of the trial due to
various reasons, including scheduling conflicts, medical issues of attorneys involved in
the case, Fields’s medical issues, and Fields’s private counsel’s withdrawal from the
case in 2016.
3
computers. Over a year passed, and private counsel withdrew, citing
differences with Fields as to trial strategy and communication. The
Department of Public Advocacy was subsequently appointed to represent
Fields. One month before trial, the trial court granted defense counsel’s motion
for funding to hire a computer expert for Fields. This expert was a different
expert than the one hired by private counsel; it is unclear whether private
counsel’s expert ever examined Fields’s computers.
At trial the Commonwealth’s sole witness was Investigator Bell. Bell
explained how peer-to-peer file sharing programs like Limewire work, namely
that users make files available to other users. Bell noted that the files forming
the basis for the indictment had titles containing child pornography buzzwords,
like “Lolita,” “kiddie,” “pthc,”3 “pedo,” and others. He also acknowledged that
titles for non-pornography files sometimes included these terms. Bell testified
that he conducted a forensic review of Fields’s computers,4 but found no
evidence that Fields performed searches using child pornography terms.
Instead, the data obtained from Fields’s computer was consistent with bulk
downloading. Because the evidence did not show that Fields was specifically
3 Bell indicated that this acronym stands for “preteen hard core.”
4 Fields had a laptop and a desktop computer. The files that formed the basis
for the indictment were found on the desktop computer or an external hard drive that
was connected to the desktop computer. Fields’s wife testified that the desktop
computer was located in their bedroom. She knew Fields used Limewire to download
adult pornography and testified that they watched it together. She estimated that over
100 adult pornography videos were downloaded to the desktop computer and external
hard drive. However, she denied any knowledge of child pornography. Although two
computers were examined, child pornography was discovered on only the desktop
computer and for the sake of clarity we refer to a single computer throughout this
opinion.
4
seeking out child pornography on Limewire, the Commonwealth’s case hinged
on whether Fields knew that his large collection of downloads contained child
pornography. The testimony established that file titles are often misleading
and inaccurate, so to “know” that he had child pornography, Fields would have
had to preview or open the files on his desktop computer.5
The Commonwealth introduced Exhibits 1-10, which were either images
or videos of suspected child pornography that corresponded with Counts 1-10
of the indictment. The Commonwealth introduced each image by having Bell
read the file name before briefly displaying the image or video to the jury.
Investigator Bell’s evidence on Fields’s file viewing was primarily
circumstantial. He testified that Fields used Real Player, Windows Media
Player, and other video and image viewing programs to open files with
provocative names, some of which included child pornography buzzwords.
But, on cross-examination, Bell admitted that none of the provocatively named
files viewed with those programs were necessarily child pornography.6
5 Limewire had a preview function, but Bell admitted that he found no evidence
that Fields used it to preview any of the files included in the indictment.
6 Bell’s report explained that these recently viewed images and videos were not
present at the time the computer and hard drive were seized, but the data indicated
that the files had been present on the computer or hard drive at some earlier point in
time. Bell also stated that the files were “mostly empty files, so there’s nothing you
can view.” He did not provide an extensive explanation as to why Fields’s recently
viewed files could not be viewed during his examination or why they were no longer
present on the computer or hard drive, but stated that the file names were highly
suggestive of child pornography despite being inaccessible. On cross-examination,
Bell acknowledged that the files included in the lists of recently viewed files,
Commonwealth’s Exhibits 11-14, were no longer on the computer and therefore were
separate and apart from the 48 images and 7 videos that Bell found on Fields’s
computer and hard drive during the forensic examination.
5
In a final effort to prove that Fields knew he had child pornography, on
the second day of trial, Bell provided the Commonwealth with a new exhibit
extracting highly technical information from his previously provided report. As
to the images that formed the basis for Counts 2, 4, 6 and 9, Bell testified that
Fields’s computer history reflected that those files had been opened. In
support of that assertion, Bell noted that Fields’s File Explorer history logged
those four files with the prefix “file:///C:.” The File Explorer in Windows
allows a user to view the information on their computer in a hierarchical
structure of drives, folders and files. If the preview pane feature of File
Explorer is enabled a user can quickly preview a file, such as a photo, without
opening it by single clicking on the file’s name or icon.7 Bell testified that the
three-forward-slash prefix meant that the files had been “opened.”
On cross-examination, Bell backtracked slightly, acknowledging that he
could not prove that Fields “opened” the four files in the traditional sense –
none of the files were opened in the video or image viewing programs, such as
Windows Media Player and Photo Viewer, that the computer would use by
default to open image or video files. Instead, Bell posited that the three-
forward-slash prefix meant that Fields viewed the child pornography files with
File Explorer’s preview pane. Fields attempted to refute this theory with
information from Bell’s report showing that Fields’s computer history logged a
three-forward-slash prefix for multiple items in relatively quick succession –
7 Georgetown University, Working with the File Explorer in Windows 10,
https://uis.georgetown.edu/file-explorer/. (Last visited Sept. 29, 2021).
6
ten seconds, twenty seconds, etc. But Bell adamantly insisted that the three-
forward-slash prefix proved that Fields personally interacted with the files,
giving him knowledge of their contents.
In an effort to counter Bell’s testimony, Fields attempted to present his
own computer forensics expert, Matthew Considine from Cyber Agents, Inc.
While testifying about his qualifications, Considine admitted that he had not
previously performed a forensic evaluation of a computer involving Limewire
during his professional career. However, Considine testified that he had a
four-year degree in digital forensics and had two class sessions about Limewire
during his education. He also testified that he had personal experience using
the program “as a child.” Based on Considine’s lack of professional experience
involving Limewire, the trial court sustained the Commonwealth’s objection to
him testifying as an expert and excluded his testimony. Fields subsequently
presented Considine’s testimony by avowal, testimony which focused on
Limewire and the discrepancy between file titles and their actual contents.
Considine also discussed how users can search for files and that irrelevant
results often appear while searching. Importantly, Fields’s counsel failed to
ask Considine anything about Bell’s report, the three-forward-slash prefix’s
meaning in Windows, or how the File Explorer in Windows functions.
Based on the above-described testimony, the jury convicted Fields of
knowingly possessing the four child pornography files that Bell testified were
logged with the three forward slashes and therefore “viewed” by Fields. After
the verdict, Fields hired private counsel who represented him in post-trial
7
proceedings and at sentencing. The trial court sentenced Fields to two and
one-half years on each count, to run consecutively, for a total sentence of ten
years in prison.
ANALYSIS
Fields presents four arguments: the trial court (1) improperly denied a
directed verdict; (2) erred in excluding Matthew Considine as an expert witness;
(3) improperly admitted various exhibits, and (4) improperly admitted the ten
images and videos that formed the basis of the ten-count indictment.
I. The trial court properly denied Fields’s motion for directed
verdict.
Fields argues the trial court erred in denying his motion for directed
verdict, asserting that his “knowing possession” of the child pornography files
was wholly unsupported.8 Possession of matter portraying a sexual
performance by a minor is defined by KRS 531.335(1):
On appeal to the Court of Appeals, the Commonwealth stated that it was
8
unclear from the record whether the directed verdict issue was properly preserved.
While the Commonwealth does not make that argument to this Court, we note the
Court of Appeals’ discussion regarding preservation:
The record before us does not contain Fields’s initial motion for
directed verdict. The video recording in the record cuts off at the close of
the Commonwealth’s case. At that time, the court dismissed the jury
and informed the parties that the court was taking a break “so you
[Fields] can go ahead and make your motion.” The recording of the
proceedings resumes with the defense calling its first witness, Donna
Fields. However, at the close of all evidence, Fields stated to the trial
court that he was renewing his motion for directed verdict and argues
that no fact finder could determine the “knowingly” element required by
KRS 531.335 based on the sheer number of files that Fields had
downloaded. Therefore, we treat the issue as preserved for appeal. A
motion for a directed verdict made at the close of the Commonwealth’s
case is not sufficient to preserve error unless renewed at the close of all
the evidence.
8
A person is guilty of possession or viewing of matter portraying a
sexual performance by a minor when, having knowledge of its
content, character, and that the sexual performance is by a minor,
he or she:
(a) Knowingly has in his or her possession or control any matter
which visually depicts an actual sexual performance by a
minor person; or
(b) Intentionally views any matter which visually depicts an
actual sexual performance by a minor person.
Fields was indicted under subsection (a), which criminalizes the possession of
such material, not the viewing of the material. “Sexual performance” means
sexual conduct by a minor, which includes “[t]he exposure, in an obscene
manner, of the unclothed . . . female genitals, pubic area or buttocks, or the
female breast . . . .” KRS 531.300. The images that formed the basis for
Counts 2, 4, 6 and 9 undoubtedly meet these statutory requirements.
A trial court’s ruling on a motion for directed verdict is reviewed under
the following standard:
On a motion for directed verdict, the trial court must draw
all fair and reasonable inferences from the evidence in favor of the
Commonwealth. If the evidence is sufficient to induce a reasonable
juror to believe beyond a reasonable doubt that the defendant is
guilty, a directed verdict should not be given. For the purposes of
ruling on the motion, the trial court must assume that the
evidence for the Commonwealth is true, but reserving to the jury
questions as to the credibility and weight to be given to such
testimony. On appellate review, the test of a directed verdict is, if
under the evidence as a whole, it would be clearly unreasonable for
a jury to find guilt, only then the defendant is entitled to a directed
verdict of acquittal.
Fields v. Commonwealth, No. 2017-CA-001980-MR, 2019 WL 3851636, *1, *3
n.11 (Ky. App. August 16, 2019) (citing Kimbrough v. Commonwealth, 550 S.W.2d 525,
529 (Ky. 1977)).
9
Hunter v. Commonwealth, 587 S.W.3d 298, 310 (Ky. 2019) (quoting
Commonwealth v. Benham, 816 S.W.2d 186, 187 (Ky. 1991)). Based on the
testimony presented at trial, it was not clearly unreasonable for the jury to find
Fields guilty.
In Crabtree v. Commonwealth, 455 S.W.3d 390, 394 (Ky. 2014), the
defendant was convicted of sixty-seven counts of possession of matter
portraying a sexual performance by a minor, KRS 531.335, for partially
downloaded pornography videos and images found on his computer. This
Court discussed the necessary evidence in cases involving KRS 531.335:
the essential elements are (1) knowingly having possession or
control (2) of a visual depiction (3) of an actual sexual performance
by a minor, and (4) having knowledge of its contents. The statute
contains two separate mental states: the defendant must know the
content of the images and videos (i.e., that they depict a sexual
performance by a minor) and the defendant must knowingly
possess the images or videos.
Id. at 396. We explained that “[t]he crime requires only the knowing possessing
of child pornography, regardless of the purpose. The mens rea requirements of
KRS 531.335 are satisfied by showing that the defendant knew the videos were
child pornography and that he knowingly possessed them.” Id. at 402. Thus
in the case before us the issue is whether sufficient proof was offered that
Fields knew the four images for which he was convicted were child
pornography and that he knowingly possessed them.
We first consider whether there was sufficient proof that Fields had
knowledge of the content of the four photos. As noted, the Commonwealth’s
proof was presented through Bell’s expert testimony. Bell explained how peer-
10
to-peer file-sharing programs, like Limewire, work, namely that users make
files available to other users. Bell noted that the files that were the basis for
Fields’s indictment had lewd titles, containing child pornography buzzwords
like “Lolita,” “kiddie,” “pthc,” “pedo,” and others. However, Bell admitted that
titles for non-child-pornography files sometimes include these terms.
Bell testified that he conducted a forensic review of Fields’s computer,
but found no evidence that Fields performed searches using child pornography
terms. Instead, the data obtained from Fields’s computer was consistent with
bulk downloading. Under KRS 531.335, the Commonwealth’s case rested in
part on whether Fields knew that his large collection of Limewire downloads
contained child pornography. Because file titles are often misleading and
inaccurate, to “know” that he had child pornography, Fields would have had to
open or preview the files on his desktop computer.
Bell’s evidence on Fields’s file viewing was largely circumstantial. He
primarily relied on the three-forward-slash theory to posit that Fields viewed
the four files he was ultimately convicted of possessing. On the second day of
trial Bell provided the Commonwealth with a new exhibit extracting highly
technical information from his previously provided report. As to the images
that formed the basis for Counts 2, 4, 6 and 9, Bell testified that Fields’s
computer reflected that those files had been opened. While he backtracked
slightly on cross-examination by noting that he could not prove that Fields
“opened” the files in a traditional sense because they were not opened in photo
11
or video applications or programs, he still rested on the three-forward-slash
theory to support his assertion that Fields viewed the files in some way.
Attempting to refute Bell’s theory about the files being viewed, Fields
highlighted additional information from Bell’s report showing that many other
presumably non-offending files were “opened” within just a minute of each
other. Bell acknowledged that many files were opened in a short amount of
time. This is consistent with Fields’s testimony that if any child pornography
was on his computer, it was not “knowingly” because it was part of a bulk
download of other material. Nevertheless, Bell insisted that the three-forward-
slash prefix proved that Fields personally interacted with the child pornography
files, giving him knowledge of their contents.
Fields testified at trial and maintained that the images and videos
underlying the indictment were downloaded through Limewire unbeknownst to
him. He testified that he used Limewire to obtain music and adult
pornography. He stated that if he saw that another Limewire user had music
that he liked, he would simply download every file that the user had available,
including adult pornography. Fields denied having any knowledge that child
pornography was also downloaded with the music and adult pornography. He
stated that he “didn’t really pay attention” to file names and that he “didn’t see
anything that alarmed” him. He asserts that he was unaware of the presence
of child pornography on his computer. Despite initially arguing in a pretrial
hearing that the images were merely “erotica” or did not depict individuals
12
under the age of eighteen, Fields no longer contests that the files underlying
the indictment constitute child pornography.
Fields contrasts his case to Crabtree, arguing that he did not
purposefully download files that he knew contained child pornography and the
record reflects nothing else proving that he had knowledge of the contents of
the files. He testified that he did not read the individual file titles because he
downloaded items in bulk. We agree that, in this respect, Fields’s case is
distinguishable from Crabtree. In Crabtree the Court determined that the
defendant at least had constructive knowledge of the content of the child
pornography videos because he had to have seen the file names while
individually downloading files. 455 S.W.3d at 398. Expert testimony in that
case established that a Limewire user would see provocative file names before
individually downloading files, and once “download” was selected the software
would ask whether the user wanted to download the named file and, to do so,
he would have to select “yes.” Id. Crabtree knew how to download files on
Limewire and he knowingly downloaded individual files he knew contained
child pornography. Id. at 401.9
Notably, the Crabtree Court held that “direct proof of knowledge is not
necessary. ‘Proof of actual knowledge can be by circumstantial evidence.’” Id.
at 399 (quoting Love v. Commonwealth, 55 S.W.3d 816, 825 (Ky. 2001)). The
9 In addition, Crabtree admitted to police that he viewed one of the child
pornography videos although, interestingly, he was acquitted of the charge related to
that particular video. Id. at 398.
13
Court held that the trial court properly relied on circumstantial evidence in
denying a directed verdict. Id. at 400-01. That evidence was Crabtree’s
admission that he viewed one of the child pornography videos, along with the
direct evidence of the file names, which were reliable indicators of the content
of the other downloads Crabtree made from Limewire. Id. at 400.
Fields maintains that he downloaded files from Limewire in bulk and that
he never saw the individual file names. Unlike Crabtree, the Commonwealth
did not present evidence that Fields had downloaded individual files. However,
as Bell highlighted, the file names in the indictment were riddled with child
pornography buzzwords. The file names also included language such as
“young,” “sex,” “underage,” “porn,” and “intercourse,” which were indicative of
their content even to those unfamiliar with child pornography buzzwords.
These file names were viewable by Fields, even if among numerous other file
names.
Additionally, Fields moved the four files at issue to the recycle bin. Bell
testified that the four files were moved to the recycle bin approximately one
month after initially downloaded. One of the files was placed on the external
hard drive which the detectives found plugged into Fields’s desktop
computer.10 This is further evidence tending to show Fields’s knowing
possession of child pornography. Bell also presented reports that suggested
that Fields recently viewed other files with lewd names and child pornography
10 Fields testified that he did not intentionally place any files on the external
hard drive.
14
buzzwords, although Bell could not specifically attest that those files actually
contained child pornography. While this evidence is largely circumstantial,
knowledge can be shown through circumstantial evidence. Crabtree, 455
S.W.3d at 399.
Most detrimental to Fields’s defense, and therefore the evidence that best
supported the trial court’s denial of the motion for directed verdict, was Bell’s
testimony that the pornographic images underlying Counts 2, 4, 6, and 9 of the
indictment were opened and viewed. The Commonwealth presented numerous
reports created by Bell, one of which was a report from the File Explorer history
on Fields’s computer that showed that the four images related to Counts 2, 4, 6
and 9 contained the three-forward-slash prefix, which according to Bell meant
the files were viewed. Significantly, Fields neither cross-examined Bell to
undermine this testimony nor did he offer a witness with an alterative
explanation for the three-forward-slash prefix on the files.
“Circumstantial evidence has its limits. The proof must do more than
point the finger of suspicion. Moreover, ‘a conviction obtained by
circumstantial evidence cannot be sustained if the evidence is as consistent
with innocence as with guilt.’” Id. at 408 (internal quotations and citations
omitted). The Commonwealth presented direct proof, through Bell’s testimony,
of when the images were downloaded, when they were moved to the recycle bin
or hard drive, and when the files were opened or otherwise accessed. We
recognize Fields’s argument that some of Bell’s testimony is not unassailable,
i.e., other explanations may exist, but Fields did not properly counter that
15
testimony during cross-examination, nor did he present a witness that could
contradict the information and explanations Bell provided.
Additionally, when weighing Bell’s testimony and Fields’s defense, a juror
could doubt Fields’s credibility in asserting that he never saw the file names,
never saved the one image to an external hard drive, and never interacted with
the four files. Further, a reasonable juror could infer that Fields saw the file
names in the approximately one month’s time that they were on his computer
prior to being moved to the recycle bin or specifically saved to the external hard
drive.
The issue on directed verdict was whether sufficient evidence was
presented for a reasonable juror to determine that Fields knowingly possessed
child pornography. The trial court was required to view the evidence in the
light most favorable to the Commonwealth. Because there was direct evidence
that the four files had been viewed (in addition to circumstantial evidence
described above), the jury had sufficient evidence to infer that Fields knew that
the child pornography files were on his computer and that he knew what the
files contained. The Commonwealth met its burden and Fields was not entitled
to a directed verdict under our controlling standard. Benham, 816 S.W.2d at
187.
II. The trial court did not abuse its discretion in disqualifying
Matthew Considine as an expert witness but Considine’s
testimony would have had no impact on the verdict even if the
jury heard it.
Fields argues that the trial court erroneously excluded the testimony of
his expert witness, Matthew Considine, thereby improperly denying him the
16
opportunity to present a defense. Considine testified for approximately six
minutes before the Commonwealth objected to his qualifications as an expert.
At that time, the trial court excused the jury and allowed the parties to
question Considine regarding his qualifications.
The questioning focused on Limewire. Considine had not used Limewire
in his professional capacity but testified that he had experience using the
program “as a child” in 2007 or 2008. He added that any other direct
experience with Limewire was “not for cases, but for [his] own education.”
Considine had no specific education courses on peer-to-peer networking but
testified that he had one or two class sessions in college that dealt with
Limewire. He also testified that he considered his co-worker, Trent Strutman,
an expert regarding Limewire. He stated that Strutman was available on-the-
job to answer any questions Considine had and that he had previously
consulted with Strutman regarding peer-to-peer networks.
Considine testified that he had conducted an examination on a computer
previously that had Limewire installed on it, but then contradicted that by
saying that the only computer with Limewire that he had ever examined was
“the computer in this case.” While Considine may have possessed relevant
experience and qualifications in general forensic computer investigations,
nothing suggested he qualified as an expert in Limewire or peer-to-peer sharing
networks.
Based on Considine’s lack of professional experience with Limewire, the
trial court concluded that he did not qualify as an expert but allowed his
17
testimony by avowal for the purposes of appeal. That testimony, discussed
below, was confined to Limewire. The Court of Appeals affirmed the exclusion
of Considine as an expert, agreeing that he lacked expertise with respect to the
use of Limewire. Stated succinctly, the Court of Appeals concluded that
Considine had only two years of professional experience, no certifications, no
specialized training, and his direct experience with Limewire was primarily
informal and during childhood.
Expert testimony is admissible if it meets the requirements of Kentucky
Rule of Evidence (KRE) 702, which states
If scientific, technical, or other specialized knowledge will assist the
trier of fact to understand the evidence or to determine a fact in
issue, a witness qualified as an expert by knowledge, skill,
experience, training, or education, may testify thereto in the form
of an opinion or otherwise, if:
(1) The testimony is based upon sufficient facts or data;
(2) The testimony is the product of reliable principles and
methods; and
(3) The witness has applied the principles and methods
reliably to the facts of the case.
The standard by which a trial court should assess the reliability of expert
testimony was set out in Daubert v. Merrell Dow Pharmaceuticals, Inc., 509 U.S.
579 (1993). Under the Daubert standard, the trial court must make a
preliminary determination “whether the expert is proposing to testify to (1)
scientific knowledge that (2) will assist the trier of fact to understand or
determine a fact in issue.” Id. at 592. The trial court thus serves as
gatekeeper to prevent the admission of pseudoscientific, unreliable evidence.
Garrett v. Commonwealth, 534 S.W.3d 217, 221 (Ky. 2017). The topics of
18
Considine’s proposed testimony were scientific in nature and had the potential
of assisting the jury in understanding Limewire and peer-to-peer networks.
However, Considine, despite his degree, did not qualify as an expert on these
particular topics.
KRE 702 requires that a witness is “qualified as an expert by knowledge,
skill, experience, training, or education.” Further, “[t]he decision to qualify a
witness as an expert rests in the sound discretion of the trial court.” Kemper v.
Gordon, 272 S.W.3d 146, 154 (Ky. 2008) (citing Owensboro Mercy Health Sys.
v. Payne, 24 S.W.3d 675, 677 (Ky. App. 1999)). A trial court’s determination of
whether a witness is qualified as an expert is reviewed for abuse of discretion.
Smith v. Commonwealth, 454 S.W.3d 283, 285-86 (Ky. 2015) (citing Brown v.
Commonwealth, 416 S.W.3d 302, 309 (Ky. 2013)). “The test for abuse of
discretion is whether the trial judge's decision was arbitrary, unreasonable,
unfair, or unsupported by sound legal principles.” Commonwealth v. English,
993 S.W.2d 941, 945 (Ky. 1999).
The gist of Fields’s defense was that he unknowingly downloaded some
files containing child pornography in a bulk download through Limewire, a
peer-to-peer network, and then unknowingly transferred those files to his
computer. Considine had minimal experience with Limewire and no
professional experience with the program prior to this trial. While he
possessed some knowledge of Limewire and how the software allows users to
share and download files, his knowledge was sparse and his proposed
testimony incorrectly focused on conducting searches in Limewire, which was
19
essentially irrelevant given the Commonwealth’s theory and Fields’s defense.
He also stated that the only computer with Limewire he ever examined was
Fields’s computer. As noted, Considine’s training and education on Limewire
was limited to two college class sessions on the software and he had not had
formal training regarding Limewire or even peer-to-peer sharing generally.
Overall, he lacked the requirements to be deemed an expert in Limewire under
KRE 702. Given his lack of knowledge and experience, we cannot say the trial
court abused its discretion in declining to qualify Considine as an expert
witness on that topic.
Fields cites a series of federal products-liability cases which hold that
expert testimony was improperly excluded where the proposed witness is an
expert in the subject area but lacks specialized knowledge of the particular
product at issue.11 Fields analogizes those cases to the trial court’s finding
that Considine lacked sufficient experience with Limewire, a particular
computer software. He argues that the trial court should have instead focused
its analysis on Considine’s general training and experience and specialized
knowledge in computer forensics. However, Considine lacked any recognized
qualifications in computer forensics generally. He had no certifications,
although he was in the process of obtaining certification in Encase, the
computer forensics software used by Bell. Further, he only had two years of
11 See, e.g., CNA Ins. Co. v. Hyundai Merch. Marine, Co., 2011 WL 5181464, *1,
*2 (W.D. Ky. Oct. 31, 2011); Holbrook v. Lykes Bros. S.S. Co., 80 F.3d 777, 782 (3d Cir.
1996).
20
professional experience in computer forensics generally and had never offered
an expert opinion at trial although he had “consulted” for trials.
Even if we were to agree with Fields that any “underqualification” on
Considine’s part should have gone to the weight of his testimony rather than
constituting grounds for excluding that testimony altogether, the result in this
case would have been no different. Considine’s proposed testimony focused on
Limewire, bulk downloads from the program, how Limewire searches were
conducted, the discrepancy between file titles and their contents and other
Limewire-centric issues. Simply put, this testimony would not have
established anything that conflicted with the Commonwealth’s version of what
had occurred. The real point of contention was whether Fields had viewed,
interacted with the pornographic images and that was not a Limewire issue,
but rather the significance of the three-forward-slash reflected in the
computer’s history as to the four images for which he was convicted.
Defense counsel failed to elicit any experience Considine may have had
with Windows computers or the File Explorer generally, which is the type of
expertise that could have successfully countered Bell’s testimony regarding
Fields viewing or opening the four files at issue. In order to counter Bell’s
testimony regarding the File Explorer and Windows, Fields needed an expert in
Windows, not Limewire because it was incumbent for his defense to offer proof
that he did not view the files, even in the preview pane of File Explorer.
Considine’s education in computer forensics and efforts to become certified in
Encase likely meant that he possessed some knowledge regarding Bell’s reports
21
and testimony but this information was never presented to the trial court. This
omission is likely due to the fact that the proposed defense testimony was
focused on a different subject—the workings of Limewire as opposed to the
truly relevant issue of whether Fields had viewed the four images.
Thus, even if the trial court’s refusal to allow Considine to testify as an
expert witness was error, it was harmless. Considine’s avowal testimony
contained no information that would have successfully countered Bell’s
testimony regarding the three-forward-slash prefix and File Explorer testimony
used to establish that Fields viewed the four files. Despite having Bell’s reports
and having heard his trial testimony, Fields’s counsel did not ask Considine
anything about Bell’s report or the three-forward-slash prefix meaning in
Windows or whether previewing a file in File Explorer could constitute viewing
the file for purposes of KRS 531.335. Considine might have had the relevant
knowledge to refute Bell’s theory, but neither Considine nor defense counsel
were adequately prepared to discuss that aspect of Bell’s report.12
As a result of the trial court’s exclusion of Considine as an expert
witness, Fields argues that his right to present a defense was impermissibly
infringed. He insists the jury was not permitted to hear evidence central to his
claim of innocence because Considine’s testimony was fundamental to counter
12 In his concurrence, Judge Acree noted that Fields’s counsel had more than
enough time to secure an expert whose credentials were no longer in the
developmental stage. The Department of Public Advocacy sought expert funds, but it
was so close to trial that it likely lessened the possibility of obtaining an expert who
was both fully qualified and prepared for trial.
22
Bell’s testimony, a somewhat curious position since, as discussed, Considine’s
testimony never addressed the Commonwealth’s proof that Fields had viewed
the images at issue. This Court has held that the rules of evidence cannot be
applied “so as to completely bar all avenues for presenting a viable defense,”
but they can be used “so as to properly channel the avenues available for
presenting a defense.” Mills v. Commonwealth, 996 S.W.2d 473, 489 (Ky. 1999)
(overruled on other grounds by Padgett v. Commonwealth, 312 S.W.3d 336 (Ky.
2010)). The trial court did not deny Fields the opportunity to present a
defense, it merely excluded the testimony of one particular witness after
determining that he was not qualified to render an expert opinion on the topic
he planned to address.
III. The trial court properly admitted Commonwealth’s Exhibits 11-
14 and 18 regarding Fields’s computer activity.
Next Fields argues that the trial court improperly admitted certain
exhibits offered by the Commonwealth. During its case-in-chief, the
Commonwealth introduced Exhibits 1 through 10, which were the files
underlying each count of the indictment. Exhibits 11 through 14 were taken
from the registry examined on Fields’s computer as follows:
Exhibit 11 – “Recent Docs – JPG”
Exhibit 12 – “Recent Docs – MPG”
Exhibit 13 – “Real Player Most Recent Clips”
Exhibit 14 – “Microsoft Media Player Recent File List”
These exhibits were part of Bell’s forensic analysis of Fields’s computer.
Bell testified that they were lists of the most recent files opened in their native
23
programs, i.e., Media Player or Real Player. Bell did not find the specific files
listed in the exhibits during his investigation, nor could he definitively state
that they contained child pornography. However, he testified that these files
were “concerning” because the titles contained similar buzzwords to known
child pornography files. Bell had previously testified about some of the
buzzwords and their meaning. Exhibit 18 was a list of the four files Bell
testified had been viewed, which he indicated to the Commonwealth were
pulled from his overall report. At trial, Fields objected to the introduction of
Exhibits 11-14 because none of the file names in these Exhibits were part of
the indictment. Additionally, Fields argued that the Commonwealth could not
prove that any of the files listed in the exhibits actually contained child
pornography. Over Fields’s objection, the trial court admitted the exhibits into
evidence.
The Court of Appeals affirmed the admission, pointing to Fields’s
insistence that he downloaded files from Limewire in bulk and therefore never
saw the file names or viewed files that would have alerted him to the presence
of child pornography on his computer. According to the Court of Appeals,
Exhibits 11-14 refute that assertion. The Exhibits were not admitted to show
that the files contained child pornography, but rather to show that, based on
the file names, one would expect these files to contain child pornography. A
reasonable juror could infer that Fields saw the file names prior to opening
them in the associated program, thus discrediting his testimony that he had
never seen and had never been alerted to file names indicative of child
24
pornography on his computer. Exhibit 18 was admitted to show four files
referenced in the indictment had actually been downloaded, opened and viewed
on Fields’s computer. Although Fields may have obtained the files in a bulk
download, these four files were in fact opened and viewed individually.
Accordingly, the Court of Appeals concluded that the trial court did not abuse
its discretion in admitting the exhibits.
Evidentiary rulings are reviewed for an abuse of discretion. English, 993
S.W.2d at 945. KRE 403 states
Although relevant, evidence may be excluded if its probative value
is substantially outweighed by the danger of undue prejudice,
confusion of the issues, or misleading the jury, or by
considerations of undue delay, or needless presentation of
cumulative evidence.
All evidence is subject to the balancing test of KRE 403:
There are three basic inquiries that the trial court must undertake
when determining admissibility of relevant evidence under Rule
403. First, the trial court must assess the probative worth of the
proffered evidence; second, it must assess the risk of harmful
consequences (i.e., undue prejudice) of the evidence if admitted;
and last, it must evaluate whether the probative value is
substantially outweighed by the harmful consequences.
Hall v. Commonwealth, 468 S.W.3d 814, 823 (Ky. 2015) (citations omitted).
Fields asserts that, absent support in the record that he, in fact, opened
and viewed the files contained in Commonwealth’s Exhibits 11-14 and 18,
those exhibits were completely irrelevant and served no purpose other than to
inflame and unduly prejudice the jury. The Commonwealth argues that the
exhibits were properly admitted because they were relevant to rebut Fields’s
defense of unknowing possession of child pornography. We agree.
25
Although the file names in Exhibits 11-14 were not the same file names
as the files listed in Counts 2, 4, 6, and 9 of the indictment, the files had
similar names which were indicative of child pornography, both through
buzzwords and the plain meaning of the language in the titles. It is immaterial
whether the files actually contained child pornography because the
Commonwealth’s purpose in admitting the exhibits was to show that similar
files were opened by someone using the computer, most likely Fields. Likewise,
Exhibit 18 constituted proof that someone (Fields) viewed four of the ten files in
the indictment, rendering the exhibit highly relevant to the charged crime. It
was admissible because it was extracted from Bell’s forensics report generated
after examining Fields’s desktop computer and it contained the file names of
four files that formed the basis of the indictment. The Commonwealth, through
Bell, introduced the names of all ten files in the indictment and displayed those
images and videos in the court room. Hearing the four specific file names
contained in Exhibit 18 once more could not have inflamed the jury any further
than actually seeing the images and videos.
Fields also contends that the Court of Appeals’ reasoning is based on
unsupported factual conclusions regarding his interaction with the subject
files, but the Commonwealth presented evidence that Fields accessed four of
the files, those listed in Exhibit 18. As for the lists in Exhibits 11-14 they were
directly related to countering Fields’s assertions that he had never seen and
never been alerted to file names indicative of child pornography on his
computer, regardless of whether the files actually contained child pornography.
26
Contrary to Fields’s argument, it is immaterial whether he searched for
the files listed in Exhibits 11-14 and 18, or whether he searched for child
pornography on Limewire at all, because the Commonwealth offered proof that
Fields opened, previewed, or in some way accessed the four files in the
indictment for which he was ultimately convicted. Fields offered no proof to
rebut the assertion that these files were opened, other than highlighting that
the files were apparently “viewed” within seconds of many other innocuous
files.
Fields now argues that Exhibit 18 states nothing about the files being
opened or viewed, it only states when the files were “last visited.” Bell
acknowledged that the “last visited” timestamp sometimes can be updated
upon the running of various default programs, such as malware, virus scans,
or any number of programs that run by default. But Exhibit 18 accompanied
Bell’s testimony that the four files were in fact opened given the three-forward-
slash prefix. Fields asserts that it was critical for the jury to view “last visited”
data for all records in the database, but he was able to elicit “last visited”
information from Bell during cross-examination and had Bell acknowledge that
the four images in Exhibit 18 were opened within seconds of many other files
that did not contain child pornography.
Exhibits 11-14 and 18 were admissible as evidence because they were
relevant to rebut Fields’s defense of unknowing possession of child
pornography. Exhibits 11-14 were relevant to show that files with
pornography-suggestive names were opened on Fields’s computer, even if those
27
particular files could not be determined to contain child pornography. Exhibit
18 reflected the four files for which Fields was convicted. In sum, the trial
court did not abuse its discretion in admitting these exhibits as evidence.
IV. The trial court properly admitted the images and videos that
formed the basis for the indictment.
Fields’s final assertion of error is based on the trial court’s admission,
over his objection, of the ten images and videos underlying each count in the
indictment. On appeal to the Court of Appeals, the Commonwealth argued
that the claim was not properly preserved for review. The Court of Appeals
agreed and declined to review the claim on the merits. Acknowledging that
preservation was a close call, the Court of Appeals determined that Fields’s
objections to the images were based solely on whether the images rose to the
level of child pornography under KRS 531.335, not whether the photos were
admissible under KRE 403. Additionally, Fields did not request palpable error
review pursuant to Rule of Criminal Procedure 10.26. Fields argues that the
claim was properly preserved, and the Court of Appeals should have remanded
to the trial court for specific findings of fact.
On April 7, 2017 the Commonwealth indicated that it would submit the
ten images that it intended to display at trial for an in camera review by the
trial court. Fields did not raise an objection at that time. The trial court
conducted a review and determined that the images could be shown to the
jury. At a pretrial hearing on May 8, 2017 the parties discussed the
admissibility of the ten images and videos supporting each count in the
indictment. However, there were two separate arguments regarding
28
admissibility. First, the Commonwealth moved to introduce, under KRE
404(b), other suspected images of child pornography found on Fields’s
computer that were not charged in the indictment. Fields’s counsel argued
that the introduction of the images would be prejudicial but agreed to discuss
that issue at a separate time.
The second issue discussed at the hearing was Fields’s objection to the
introduction of the ten images and videos based on whether they constituted
“child pornography” under KRS 531.335. Fields’s counsel challenged whether
the images and videos were admissible at all because he argued they
constituted “erotica” and not child pornography. Fields also stated it was too
difficult to determine if the individuals contained in the images and videos were
under the age of 18 and asked that the images be excluded. The
Commonwealth noted that the trial court had already conducted an in camera
review of the ten items in the indictment. In response to the objection, the trial
court simply stated “I can’t as a matter of law rule that it is not [child
pornography.]”
We note that during this pretrial hearing all parties and the trial court
expressed confusion as to exactly what motions the Commonwealth and Fields
made and what the trial court was being asked to rule upon. The motions
appeared to be whether the ten images depicted (1) sexual performances (2) by
minors, as required by KRS 531.335. Ultimately, the Commonwealth showed
the videos and images contained in the indictment to the jury and Fields did
not raise an objection to the presentation of the images and videos at trial.
29
We agree that whether Fields’s argument was properly preserved for
appeal is a close call, but regardless of preservation we find no error in the
admission of the images and videos.
Fields argues that the trial court should have issued specific findings
under KRE 403 and Hall, 468 S.W.3d at 824, as to whether the probative value
of the display of child pornography was outweighed by undue prejudice. Hall
involved the excessive display of crime scene and autopsy photographs in a
murder case. It did not involve a determination of an ultimate issue in the
case, i.e., whether the images constituted an element of the crime. In this case,
because of the offense charged, the jury had to determine whether the
Commonwealth proved that Fields knowingly possessed the child pornography
files and that he had knowledge of what those files contained. KRS 531.335(1)
requires a finding that Fields possessed “matter portraying a sexual
performance by a minor.” So, it follows that the Commonwealth had to prove
that the images and videos portrayed a sexual performance by minors. Fields,
at one point, disputed whether the images and videos displayed sexual
performances and whether the individuals in the images and videos were
minors. Therefore, the jury was tasked with answering those factual
questions.13 The fact that this evidence, which may inflame the jury, would be
introduced in this case “follows from the nature of the crime and does not
13 The jury instructions included the definitions of “sexual performance” and
“sexual conduct by a minor” to aid the jury in determining whether the images and
videos satisfied the requirements of KRS 531.335.
30
make the evidence inadmissible.” Little v. Commonwealth, 272 S.W.3d 180,
188 (Ky. 2008).
Relevant evidence “may be excluded if its probative value is substantially
outweighed by the danger of undue prejudice . . . .” KRE 403. Probative
photos are admissible “unless they are so inflammatory that their probative
value is substantially outweighed by their prejudicial effect.” Adkins v.
Commonwealth, 96 S.W.3d 779, 794 (Ky. 2003). The probative value of the
images in this case cannot be denied. “The ‘probative value’ or ‘probative
worth’ of evidence is a measure of how much the evidence tends to make the
fact it is introduced to prove more or less probable.” Hall, 468 S.W.3d at 823.
Here, the images constitute physical evidence of the crime itself, and while
undoubtedly prejudicial, this was not “undue prejudice,” KRE 403, and the
prejudice did not outweigh their probative value. Because the images were
relevant and highly probative of the child pornography charges, they were
properly admitted into evidence and presented to the jury at trial.
CONCLUSION
For the foregoing reasons, we affirm the Court of Appeals opinion
upholding the judgment and sentence of the Scott Circuit Court.
All sitting. All concur.
31
COUNSEL FOR APPELLANT:
Michael Jay O’Hara
David Bryan Sloan
Jessica Nadine Wimsatt
O’Hara, Taylor, Sloan & Cassidy
COUNSEL FOR APPELLEE:
Daniel J. Cameron
Attorney General of Kentucky
Mark Daniel Barry
Assistant Attorney General
32