AI Case Brief
Generate an AI-powered case brief with:
Estimated cost: $0.001 - $0.003 per brief
Full Opinion
OPINION OF THE COURT
The question presented for our review is whether the evidence proffered at defendantâs trial was legally sufficient to support his convictions for promoting a sexual performance by a child (Penal Law § 263.15) and possessing a sexual performance by a child (Penal Law § 263.16). We must consider, among other issues, the evidentiary significance of âcache files,â or temporary Internet files automatically created and stored on a defendantâs hard drive, and the defendantâs awareness of the presence of such files. We conclude that where the evidence fails to show that defendant had such awareness, the People have not met their burden of demonstrating defendantâs knowing procurement or possession of those files. We further conclude that merely viewing Web images of child pornography does not, absent other proof, constitute either possession or procurement within the meaning of our Penal Law.
L
The following evidence was adduced at defendantâs trial. On May 26, 2005, defendant James D. Kent, a professor of public administration at a Dutchess County college, received a new office computer through a campus-wide technology upgrade. The files stored on the hard drive of the old computer were transferred to the new computer. On April 5, 2007, a student employee of the collegeâs information technology (IT) department went to defendantâs office in response to his complaints that his computer was malfunctioning. While running a virus scan of the computerâs hard drive, the employee discovered a work folder containing numerous â.jpgâ or picture files, displayed as âthumbnails,â of scantily clad, prepubescent girls in provocative poses. When the virus scan failed to correct the computerâs unresponsiveness, the employee removed defendantâs hard drive and took it back to the IT office, where supervisors learned of the images. College administrators informed defendant that these images had been found on his computer, but defendant denied any knowledge of them. Approximately two
Barry Friedman, an investigator in the computer forensic lab of the New York State Police, conducted a forensic analysis of defendantâs hard drive using EnCase Software (EnCase). Investigator Friedman explained that EnCase searches both allocated space, which contains data (including saved items or items sent to the ârecycle binâ) that is readily accessible to a user, and unallocated space, which contains material deleted from the allocated space and is inaccessible to a user. Defendantâs computer contained Real Player, a downloadable media program used to play videos and music that maintains a âplayâ history. The computer also had two Internet browsers: Internet Explorer and Mozilla Firefox. In addition to the default profile provided by Mozilla Firefox, a second profile under the name of âJimâ had been created.
The allocated space under the Jim profile on Mozilla Firefox contained a temporary Internet file known as a Web âcache.â A cache contains images or portions of a Web page that are automatically stored when that page is visited and displayed on the computer screen; if the user visits the Web page again at a later date, the images are recalled from the cache rather than being pulled from the Internet, allowing the page to load more quickly. The cache under the Jim profile contained a .jpg image of a child pornography Web site called âSchool Backyardâ that depicted children engaged in sexual intercourse with adults.
According to the EnCase software, the âSchool Backyardâ page had been accessed on the morning of February 21, 2007. Within minutes of accessing âSchool Backyard,â three other pages were accessedâtwo images of a young girl sitting in the front seat of her car with her wrists bound and a Web page labeled âPedolandââwhich were also stored in the Web cache. The cache contained several other Web pages labeled, among other things, âBest CP Sites Portal, the Best Lolita CP Sites,â that provided links to child pornography Web sites. Additionally, the Real Player history included links to numerous videos with file names indicating that they contained child pornography that were accessed, some on multiple occasions, between 2005 and 2007. There was no evidence that defendant was aware either of the cache function of his computer or that any of these files were stored in the cache.
âWell, this last batch pretty much tears it. While, as somebodyâs father, Iâm pretty appalled by this stuff, I also donât want to get arrested for having it. So letâs do thisâif this is a legitimate research project, letâs write it up and tell the deans (and preferably also the cops) what weâre doing and why. Otherwise, letâs drop it in the most pronto possible fashion.
âI donât even think I can mail the disk to you, or anyone else, without committing a separate crime. So Iâll probably just go ahead and wipe them. You have the URLs if you want to pursue it.
âSee you sooner or later, no doubt. Kent.â
From the unallocated space on the computer, EnCase retrieved a video containing child pornography that had previously been downloaded and saved to the allocated space under the file name âArina.â EnCase also discovered over 130 .jpg images depicting children engaged in oral sex and sexual intercourse with dogs, adults and other children, children being penetrated by objects, and the lewd exhibition of the exposed genitals of female children. Like the âArinaâ video, each of these images had been downloaded and stored in the allocated space of defendantâs computer at some point between May 26, 2005 (the date that
Defendant was indicted on two counts of promoting a sexual performance by a child (Penal Law § 263.15) and 141 counts of possessing a sexual performance by a child (Penal Law § 263.16). Counts 1 and 142 related, respectively, to defendantâs alleged procurement and possession of the âSchool Backyardâ Web page; counts 2 and 143 related, respectively, to defendantâs alleged procurement and possession of the âArinaâ video; counts 3 through 141 charged defendant with possession of the .jpg images recovered from the unallocated space of the hard drive. During defendantâs six-day nonjury trial, County Court denied defendantâs trial motions for dismissal of the indictment. At the close of the trial, County Court granted the Peopleâs motion to conform the pleadings to the proof by amending count 2 of the indictment to reflect May 18, 2005 as the date of the alleged procurement of the âArinaâ video. Thereafter, County Court found defendant guilty of both procurement counts (1 and 2) and 134 of the 141 possession counts, including counts 142 and 143.
The Appellate Division affirmed County Courtâs judgment (see People v Kent, 79 AD3d 52, 73 [2d Dept 2010]). Addressing the evidentiary significance of the presence of Internet files stored in a cache, as well as the significance of defendantâs knowledge or lack of knowledge regarding the cache function of his computer, the court undertook a review of both federal and state approaches to these issues (see id. at 65-66). Noting that â[t]he consistent thread in these cases is the need to distinguish inadvertent or unintentional acquisition or possession of the offensive material from knowing or intentional procurement and possession,â the court stated its preliminary âagreement with the underlying premise that the mere existence of an image
The court adopted the view, however, that âa Web page stored in the cache is evidence of past procurement of the images on that page. Specifically, the cached Web page from the âSchool Backyardâ site is evidence that the Web page was accessed and displayed on the defendantâs computer screenâ (id. at 67). That defendant knowingly accessed the page was demonstrated by a totality of evidence including defendantâs pattern of Internet browsing for child pornography Web sites, his Real Player history, and his messages to âEB.â acknowledging his possession of child pornography (id. at 67-68). The court further held that the evidence was legally sufficient to prove defendantâs knowing possession of the images on the âSchool Backyardâ page, finding that defendant âknowingly accessed the Web page and displayed it on his computer screen . . . establishing his dominion and control over the imagesâ (id. at 68).
The court also found that the evidence was legally sufficient to support defendantâs 134 other convictions, because those counts were based on âimages which, at one time, had been downloaded and saved in the allocated space of the hard drive and subsequently deletedâ (id. at 68-69). With respect to count 2, for promotion of the âArinaâ video, the court found that âthe totality of the direct and circumstantial evidence of. . . defendantâs extensive use of his office computer to obtain and view child pornography was a sufficient basis from which the fact-finder could infer that [he] acquired the video, and thus, committed an act of procurementâ (id. at 70).
A Judge of this Court granted defendant leave to appeal (17 NY3d 797 [2011]) and we now modify by reversing defendantâs convictions on counts 1 and 142 for promotion and possession of the âSchool Backyardâ Web page and, as so modified, affirm.
IL
Recognizing that â[t]he public policy of the state demands the protection of children from exploitation through sexual performancesâ (L 1977, ch 910, § 1), the Legislature enacted article 263 of the Penal Law âto eradicate the social evil of child pornographyâ (People v Keyes, 75 NY2d 343, 348 [1990]). With limited exception (see People v Fraser, 96 NY2d 318 [2001]), we have not had occasion to determine the extent to which the current statutory scheme applies to child pornography distributed
Penal Law § 263.15 provides that â[a] person is guilty of promoting a sexual performance by a child when, knowing the character and content thereof, he produces, directs or promotes any performance which includes sexual conduct by a child less than seventeen years of age.â To âpromoteâ means, among other things, âto procureâ (Penal Law § 263.00 [5]),
For purposes of both the promotion and possession statutes, âperformanceâ is defined as âany play, motion picture, photograph or danceâ (Penal Law § 263.00 [4]). We have held that digital computer images are photographs within the meaning of section 263.00 (4) (see Fraser, 96 NY2d at 327-328). âSexual conduct,â as used in both statutes, âmeans actual or
Defendant argues that merely âaccessing and displayingâ Web images of child pornography does not constitute procurement for purposes of Penal Law § 263.15. Defendant further contends that his possession convictions are invalid because Penal Law § 263.16 criminalizes the possession of tangible items only and that, absent proof that defendant was aware of his computerâs cache function, he could not have knowingly possessed any item stored in the cache. For the reasons that follow, we agree with defendantâs first proposition. We also agree that where a promotion or possession conviction is premised on cached images or files as contraband, the People must prove, at a minimum, that the defendant was aware of the presence of those items in the cache. We hold, however, that regardless of a defendantâs awareness of his computerâs cache function, the files stored in the cache may constitute evidence of images that were previously viewed; to possess those images, however, the defendantâs conduct must exceed mere viewing to encompass more affirmative acts of control such as printing, downloading or saving.
Federal courts have held that for digital images to constitute evidence of knowing possession of child pornography, such images must be connected to something tangible (e.g., the hard drive), as they are when stored in a cache, and that the defendant must be aware of that connection (see United States v Romm, 455 F3d 990, 1000 [9th Cir 2006] [âto possess the images in the cache, the defendant must, at a minimum, know that the unlawful images are stored on a disk or other tangible material in his possessionâ]; United States v Tucker, 305 F3d 1193, 1205 [10th Cir 2002] [âSince (the defendant) knew his browser cached the image files, each time he intentionally sought out and viewed child pornography with his Web browser he knowingly acquired and possessed the imagesâ]). At least two state courts have adopted the federal approach (see Worden v State, 213 P3d 144, 147-149 [Alaska 2009]; Barton v State, 286 Ga App 49, 52-53, 648 SE2d 660, 663 [2007]).
Like the federal courts to address the issue, we agree that where no evidence shows defendant was aware of the presence of the cached files, such files cannot underlie a prosecution for promotion or possession. This is necessarily so because a defendant cannot knowingly acquire or possess that which he or she does not know exists (see United States v Kuchinski, 469 F3d 853, 863 [2006] [to prosecute a defendant who lacks knowledge about the cache for possession of files stored therein âturns abysmal ignorance into knowledge and a less than valetudinarian grasp into dominion and controlâ]).
However, cached images can serve as evidence of defendantâs prior viewing of images that were, at one time, resident on his computer screen. Such evidence, like a pattern of browsing for child pornography, is relevant to the mens rea of both crimes by showing that a defendant did not inadvertently access an illicit image or site or was not mistaken as to its content.
Nonetheless, that such images were simply viewed, and that defendant had the theoretical capacity to exercise control over them during the time they were resident on the screen, is not enough to constitute their procurement or possession. We
The federal statute regulating conduct related to child pornography, 18 USC § 2252A, provides a useful contrast. Section 2252A was amended in 2008 to provide that any person who either âknowingly possesses, or knowingly accesses with intent to view, any book, magazine, periodical, film, videotape, computer disk, or any other material that contains an image of child pornographyâ is subject to a fine and imprisonment (see 18 USC § 2252A [a] [5] [B] [emphasis added], as amended by Pub L 110-358, § 203, 122 US Stat 4002, 4004). Neither provision of the Penal Law at issue here contains comparable language targeted toward the âpull technologyâ by which one accesses and views Internet images. The words that are employedââprocuresâ and âpossessesââwould not, in ordinary speech, encompass the act of viewing (see State v Barger, 349 Or 553, 563, 247 P3d 309, 314 [2011] [âLooking for something on the Internet is like walking into a museum to look at picturesâ the pictures are where the person expected them to be, and he can look at them, but that does not in any sense give him possession of themâ]).
Here, the âSchool Backyardâ Web page was automatically stored in the cache in allocated space that was accessible to defendant. The People did not demonstrate that defendant knew that the page, or any other, for that matter, had been cached. While the cached page provided evidence that defendant previously viewed the site, the People presented no evidence that defendant downloaded, saved, printed or otherwise manipulated or controlled the image while it was on his screen. That defendant accessed and displayed the site, without more, is not enough. Thus, the evidence was insufficient to show that defendant knowingly possessed the âSchool Backyardâ Web page, either in the form of the cached file or as an image on his screen. It follows, therefore, that there was not sufficient evidence that defendant procured the âSchool Backyardâ page; defendant did
We agree with the Appellate Division, however, that defendant was properly convicted of promotion and possession of the âArinaâ video, and possession of 132 images of child pornography recovered from the unallocated space on his computer. Investigator Friedmanâs testimony established that at some point defendant downloaded and/or saved the video and the images, thereby committing them to the allocated space of his computer, prior to deleting them. Thus, viewing the evidence in the light most favorable to the People, a rational fact-finder could conclude that defendant acquired the video and exercised control over it and the images (see People v Contes, 60 NY2d 620, 621 [1983]). That defendant did so knowingly was conclusively established by, among other things, copious evidence of his persistent pattern of browsing for child pornography sites; his meticulous cataloguing of thumbnail images of young, provocatively dressed girls; his deletion of illegal images and retention of legal ones; and defendantâs messages to âP.B.â discussing the pornographic content of the images and sites defendant perused.
Defendant also contends that County Court erred in permitting the People to amend count 2 of the indictment and that counsel provided ineffective assistance. We have considered these arguments and find them to be without merit.
Accordingly, the order of the Appellate Division should be modified by dismissing counts 1 and 142 of the indictment and remitting to County Court for resentencing and, as so modified, affirmed.
. As the Appellate Division noted, it is unclear whether these messages were ever sent.
. County Court found defendant not guilty of counts 24, 28, 49, 97, 101, 102 and 140.
. âPromoteâ is additionally defined in that section as to âmanufacture, issue, sell, give, provide, lend, mail, deliver, transfer, transmute, publish, distribute, circulate, disseminate, present, exhibit or advertise, or to offer or agree to do the sameâ (Penal Law § 263.00 [5]).
. One legal commentator has described the distinction between these two approaches, deemed respectively, the âPresent Possessionâ approach and âthe Evidence Ofâ approach, as follows:
âThe first approach places legal significance on the images found in a cache . . . The second, alternative approach places legal significance on the images that the computer user sought out and placed on his computer screen. This approach holds that the copies of the images found in a cache constitute evidence of some prior (but no less real) knowing possessionâ (Ty E. Howard, Donât Cache Out Your Case: Prosecuting Child Pornography Possession Laws Based on Images Located in Temporary Internet Files, 19 Berkeley Tech LJ 1227, 1254, 1255 [Fall 2004]).