AI Case Brief
Generate an AI-powered case brief with:
Estimated cost: $0.001 - $0.003 per brief
Full Opinion
dissenting.
Today, the majority holds that a person who goes onto the Internet, purposefully searches out pictures of child pornography, and displays those pictures on a computer for as long as he or she wishes does not possess or control the pictures. Not only are the factual and legal premises on which the majority’s opinion rests suspect, but the majority’s decision fails to recognize that today’s iPhone is yesterday’s photograph. There is no difference between a person who uses his iPhone to pull an image of child pornography off the Internet and then passes that image, displayed on his iPhone, around for his friends to see and a person who passes a photograph of the same image to his friends. Both persons possess or control the image. The fact that the person has not saved the image to his iPhone does not mean that the person does not possess or control it. The majority errs in holding otherwise.
The relevant facts can be summarized briefly. Defendant taught music to elementary school children. As a result of an investigation involving one of defendant’s students, the Clackamas County Sheriffs office analyzed the contents of defendant’s laptop and home computers.
The state charged defendant with 20 counts of encouraging child sexual abuse in the second degree, based on 10 of the 500 images of child pornography found on his laptop and on 10 of the 450 images of child pornography found on his home computer. See ORS 163.686(l)(a)(A)(i).
The majority concludes, however, that the evidence was not sufficient to permit a reasonable trier of fact to find one element of the offense — that defendant “possesse[d] or controlled]” the pictures of child pornography that he had sought out on the Internet. According to the majority, all that the evidence permitted the trial court to find was that defendant “viewed” child pornography, and that, the majority reasons, is no crime. At bottom, the majority’s opinion rests on the proposition that going onto the Internet and pulling up pictures of child pornography is no different from visiting a museum and viewing the paintings displayed there. In both situations, the majority reasons, the person views but does not possess or control the pictures.
I have no disagreement with the general proposition that a person does not possess or control every image that he or she sees. Nor do I disagree with the specific example that the majority uses — that a person who goes to a museum and views a painting does not possess or control the painting. The majority errs, however, in assuming that a computer user stands in the same position as a visitor to a museum. This case arises on defendant’s motion for a judgment of acquittal, and the question is whether the trier of fact reasonably could have inferred that defendant possessed or controlled the images that he sought out on the Internet and displayed on his computer screen.
On that point, the trier of fact reasonably could have found that, when a person uses a computer to display an image from an Internet website, the data is transferred from the website to the person’s computer. The person’s computer automatically saves a copy of the data from the website to a temporary Internet file on the computer, and the computer displays on the computer screen a graphic image of that data (whether text or a picture). Put in lay terms, the person’s computer copies the data from the website and uses that data to re-create on the person’s computer screen the image
A computer user is not passively viewing a picture as a museum patron does, or so the trier of fact could find.
In the same vein, if a computer user watches a child pornography video on the Internet, as one would watch a video on YouTube, the computer user can start the video, stop
Admittedly, the images from the Internet that are displayed on a computer screen (whether a photograph or a video) are not permanent, but we have never suggested that permanence is necessary to establish either possession or control. See State v. Fries, 344 Or 541, 546-47, 185 P3d 453 (2008) (observing that only momentary or fleeting contacts may be insufficient as a matter of law to establish control); cf. State v. Hall, 269 Or 63, 65-66, 68, 523 P2d 556 (1974) (a person who temporarily sat on a bag of marijuana when the police entered a room possessed the marijuana). It also may be true that a computer user does not have exclusive possession or control over images (whether photographs or movies) taken from the Internet. But, again, the court has never held that possession or control must be exclusive; rather, it has recognized that two persons may possess property jointly. See State v. Downing, 185 Or 689, 698, 205 P2d 141 (1949) (jury reasonably could infer that the defendant and his accomplice jointly possessed a stolen watch). And the fact that one person who jointly possesses property has the power to dispose of the property completely (as when a person with joint possession of a bank account spends all the money) does not mean that both persons did not have joint possession of the property while it existed.
Ultimately, the majority appears to acknowledge that analogizing a computer user to a museum visitor may not be completely accurate. It appears to recognize that, once a person accesses an image on the Internet, “the image in fact exists, in digital form, in the user’s computer.” 349 Or at 583 n 10. The majority reasons, however, that
*590 “from the user’s point of view, the experience of viewing images on the web is not different from viewing images in a museum: The ordinary computer user speaks of visiting or ‘going to’ websites, and has no sense that web images are ‘in’ the user’s own computer until the user affirmatively saves them.”
Id. (emphasis in original).
The majority’s reasoning fails to distinguish two related but separate issues. It is certainly true that, on this record, no reasonable trier of fact could find that defendant knew why, as a technical matter, he was able to control the images of child pornography that he drew from the Internet and displayed on his computer screen.
Even if, as the majority reasons, the evidence was insufficient to permit the trier of fact to find that defendant knew why he could control the images he accessed, it was more than sufficient for a reasonable trier of fact to find that defendant could and did exercise control over those images. The level of control over the Internet images that defendant displayed on his computer screen made his relationship to those images markedly different from that of a person who goes, say, to the Brancacci Chapel so that he can view (from a distance) Masaccio’s frescos. Put differently, the factual
Beyond that, the legal premise underlying the majority’s opinion is suspect. In analyzing what the statutory phrase “possesses or controls” means, the majority reasons that an alternative way of proving the crime of second-degree encouraging child sexual abuse demonstrates that a person who searches the Internet for child pornography and displays those images on his or her computer screen does not “posses[s] or contro[l]” the images. Specifically, the majority notes that a person may commit the crime of second-degree encouraging child sexual abuse in one of two ways. ORS 163.686 makes it a crime if, with the requisite mental state, a person either (1) “possesses or controls” a visual recording of child pornography or (2) “pays, exchanges or gives anything of value to obtain or view” a visual recording of child pornography. ORS 163.686(l)(a)(A)(i) and (ii).
Given those alternative ways of committing second-degree encouraging child sexual abuse, the majority reasons:
“Whatever ‘knowingly possess[ing] or controlfling]’ recordings of child sexual abuse might mean in subparagraph (l)(a)(A)(i), it involves something different than simply ‘obtaining]’ or ‘view[ing]’ digital images: The legislature clearly has chosen to criminalize the act of ‘view[ing]’ or ‘obtaining]’ visual recordings of sexually explicit conduct involving children under ORS 163.686(l)(a)(A)(ii) only if that act is accompanied by the payment, exchange, or giving of something ‘of value,’ an element that is not required under ORS 163.686(l)(a)(A)(i).”
State v. Barger, 349 Or 553, 561, 247 P3d 309 (2011) (emphasis and brackets in original).
Later in Barger, the majority recognizes that other jurisdictions have held that a person who searches the Internet for child pornography and displays those images on his or her computer possesses or controls those images. Id. at 567 n 13; see, e.g., People v. Josephitis, 914 NE2d 607, 616-17 (Ill App Ct 2009) (so holding); Commonwealth v. Diodoro, 970 A2d
The majority misperceives the statutory context that informs its understanding of the phrase “possesses or controls.” Subparagraph (ii) of ORS 163.686(l)(a)(A) provides that a person commits the crime of encouraging child sexual abuse in the second degree if the person “[k]nowingly pays, exchanges or gives anything of value to obtain or view * * * [a] visual recording of sexually explicit conduct involving a child * * *.” Textually, the act that the statute prohibits is “pay[ing], exchanging] or giving] anything of value” for a particular purpose. The crime is complete when a person pays to obtain or view child pornography, without regard to whether the person in fact ever obtains or views it. It is the payment, not the receipt of the bargained-for consideration, that subparagraph (ii) prohibits. Cf. ORS 167.007 (similarly providing that a person who pays to engage in sexual conduct commits the crime of prostitution without regard to whether that person ever gets the benefit of the bargain).
The fact that a would-be purchaser never obtains or views child pornography is immaterial to proving a violation of subparagraph (ii) of ORS 163.686(l)(a)(A). For that reason, the context on which the majority relies is equally immaterial to determining what the phrase “possesses or controls” means in subparagraph (i) of that statute. Were there any doubt about the matter, the majority’s conclusion reveals the difficulty with its interpretation. As noted, relying on the alternative method of proving second-degree encouraging child sexual abuse, the majority distinguishes cases from
Subparagraph (ii), of course, makes it a crime to pay “to obtain or view” visual recordings of child pornography. ORS 163.686(l)(a)(A)(ii) (emphasis added). If the majority’s statutory interpretation were correct, then our statutes also would “effectively announce that [‘obtaining’] child pornography is not, by itself, unlawful.” However, “obtain” means “to gain or attain possession or disposal of usu. by some planned action or method.” Webster’s Third New Int’l Dictionary 1559 (unabridged ed 2002). Under the majority’s reasoning, obtaining — i.e., possessing — child pornography “is not, by itself, unlawful.” Not only is that conclusion antithetical to the rest of the statute, but it also demonstrates that the majority misreads the statutory context, from which it “particularly derive[s]” its understanding of the phrase “possesses or controls.” See 349 Or at 582-83 (so stating).
Properly interpreted, the prohibition against second-degree encouraging child sexual abuse is directed at two separate acts: (1) possessing or controlling visual recordings of child pornography and (2) paying, exchanging, or giving anything of value in order to obtain or view visual recordings of child pornography. The legislature intended to cast a broad net in prohibiting the abuse of children resulting from the creation and dissemination of child pornography. The majority errs in reading the legislature’s effort to reach a broader range of conduct (paying to obtain or view child pornography) as a way of narrowing a related but separate type of conduct (possessing or controlling child pornography) that the statute also prohibits. In sum, I disagree with both the factual and legal premises on which the majority’s holding rests. I would hold that the trial court and the Court of Appeals correctly interpreted the statutory prohibition against possessing or controlling child pornography.
The remaining question is whether a reasonable trier of fact could find that defendant possessed or controlled 10 of the approximately 450 images of child pornography
Regarding the four zip file images, the trial court reasonably could find that another person sent defendant a zip file containing images of child pornography, that defendant received the file on his home computer, that he was aware that the zip file contained child pornography, and that he accepted the zip file. Given that evidence, I would hold that, in accepting the zip file, defendant exercised possession or control of both the file and its contents. In that respect, defendant’s receipt of the zip file was no different from a person who receives a package in the mail knowing its contents. That evidence was sufficient for a reasonable trier of fact to find that defendant possessed both the file and its contents.
The four images contained on a thumbnail page present a more difficult issue, but not because of any question whether defendant possessed or controlled those images. Typically, a thumbnail page displays several rows of small pictures or thumbnails. The page functions much like a menu in a restaurant. It displays a series of offerings, only some of which a user may wish to select. If a user wants to see a larger image of a particular thumbnail, he or she can click on the thumbnail and cause a larger image to appear on the computer screen. For the reasons discussed above, I would hold that, when a computer user displays a thumbnail page on the computer, he or she possesses or controls all the images or thumbnails on the page.
To be sure, there may be factual questions regarding the computer user’s state of mind: A user may not act knowingly regarding every thumbnail that appears on a web page.
Regarding the remaining two images from defendant’s home computer, the evidence would permit a reasonable trier of fact to find that defendant selected two of the thumbnails so that he could see a larger image. For the reasons explained above, I would hold that defendant’s ability to manipulate and maintain those images on his computer screen constituted “control” within the meaning of ORS 163.686. Cf. State v. Blake, 348 Or 95, 102, 228 P3d 560 (2010) (explaining that “[t]he ability to manipulate a bank account using a computer is sufficient to constitute ‘dominion and control * * *.’ ”).
The 10 images found on defendant’s laptop present two issues. The first is whether a reasonable trier of fact could find that defendant possessed or controlled them. All 10 pictures were images that defendant purposefully retrieved from the Internet, or so a reasonable trier of fact could find, and I would hold for the reasons explained above that defendant possessed or controlled those images. The only remaining issue is whether a reasonable trier of fact could find that the state had established venue in Clackamas County.
On that issue, the evidence at trial showed that defendant bought his laptop computer approximately six to eight months before the officers seized it. During that time,
On review, the state argues that venue is not an element of an offense that the state has to prove beyond a reasonable doubt but that, even if it is, there was sufficient evidence from which the trial court could have found that defendant accessed all 10 images on his laptop while in Clackamas County. There is no need to reach the larger question that the state raises. In my view, the evidence was sufficient for a reasonable trier of fact to find that venue lay in Clackamas County.
Specifically, a reasonable trier of fact could find that, after defendant bought the laptop, he used that computer instead of his home computer; that is, that the laptop took the place of the computer that defendant had used exclusively at his home. A reasonable trier of fact also could find that, given the nature of the subject matter, it was unlikely that defendant would have used his laptop computer to access child pornography outside the privacy of his home or perhaps a motel (or some other private place) if he were travelling. There is, however, no evidence that defendant ever strayed outside of Clackamas County during the six to eight months that he owned the laptop, much less that he went to some secluded place outside of Clackamas County where he could have used his laptop to privately access child pornography. Given that evidence, a reasonable trier of fact could find that defendant accessed the Internet from his home in Clackamas County to search for the 10 images of child pornography that the officers later found on his laptop. See State v. Cervantes, 319 Or
Defendant argues, however, that he could have left Clackamas County while he owned the laptop, that he could have taken the laptop with him, that he could have found a private place somewhere outside the county, and that, while outside the county, he could have used his laptop to access child pornography on the Internet. Without any evidence that defendant ever left Clackamas County during the time that he owned the laptop and without any evidence that, even if defendant had left Clackamas County, he went to some secluded place where he could use his laptop to look for child pornography, defendant’s argument reduces to nothing more than speculation. But, even if a trier of fact reasonably could have drawn all the inferences that defendant urges, that is not the only reasonable inference that the trier of fact could draw on this record.
Beyond that, ORS 131.325 provides, in part, that, “[i]f an offense is committed within the state and it cannot readily be determined within which county the commission took place, * * * [the] trial may be held in the county in which the defendant resides * * Under that statute, even if one assumed that defendant might have gone to Multnomah, Lane, or Malheur County to access child pornography on his laptop, venue still would be appropriate in Clackamas County if it could not readily be determined which county defendant was in when he went on the Internet. Venue in Clackamas County would be defeated only if a trier of fact were willing to speculate that defendant had gone outside the state during the time he owned the laptop and accessed child pornography in some state other than Oregon. Without some evidence that defendant in fact left the state, it is difficult to see how a trier of fact reasonably could draw that inference. But, even if that were a permissible inference, nothing in this record compels it. In my view, the Court of Appeals erred in holding that the state had failed to establish venue in Clackamas County.
I would uphold the trial court’s rulings both as to venue and as to possession or control. Accordingly, I would
As this court explained in State v. Bray, 342 Or 711, 715 n 3, 160 P3d 983 (2007), a hard drive contains both allocated and unallocated space. Allocated space contains data that has been saved to the hard drive. Id. When files are deleted from the allocated space, the deleted files remain on the unallocated space on the computer’s hard drive and, depending on whether the computer later writes over that data, can be recovered. Id.
ORS 163.686(1) provides, in part:
“A person commits the crime of encouraging child sexual abuse in the second degree if the person:
“(a)(A)(i) Knowingly possesses or controls any photograph, motion picture, videotape or other visual recording of sexually explicit conduct involving a child for the purpose of arousing or satisfying the sexual desires of the person or another person; [and]
“(B) Knows or is aware of and consciously disregards the fact that creation of the visual recording of sexually explicit conduct involved child abuse[.]”
The state’s expert did not explain whether, when a computer user first accesses the Internet, the image displayed on the screen reflects data stored in the computer’s temporary memory or whether the image reflects the data saved to a temporary Internet file on the computer’s hard drive. For the purposes of this case, the difference is irrelevant. In both circumstances, the image displayed on the computer screen exists as a result of data maintained in the computer separately from the data available on the Internet.
Possession involves the question of a person’s relation to an object, which ordinarily is determined both by legal definitions of property and societal conventions. See State v. Casey, 346 Or 54, 61, 203 P3d 202 (2009) (considering the usual relationship between a homeowner and a guest in determining whether the homeowner constructively possessed property that the guest temporarily left in the house). In a museum, not only does the museum have exclusive possession of the objects displayed there, but a visitor to a museum typically is governed by a set of rules that strictly limit the visitor’s ability to do anything other than passively view the objects on display. Put differently, the analogy on which the majority’s opinion rests is not an apt one.
The portability of an iPhone, iPad, or Droid simply illustrates the control that a computer user possesses over an Internet image displayed on a computer screen. The control arises from the fact, which the trier of fact could have inferred from this record, that the data generating the image is copied to and resides independently in the user’s computer. Maintaining an image on the screen, as in the example, does not evidence a greater degree of control than exists when a person calls the image to the screen in the first place. In both situations, the image remains on the screen until the person chooses to navigate away from the web page.
As the majority notes, the record is not sufficient to permit a reasonable trier of fact to find that defendant knew that his computer saved every web page that he visited to a temporary Internet file and maintained those saved files in the allocated space on his computer until those files were either manually or automatically deleted. But that proposition matters only if possession or control is limited to saved files.
To be sure, the state’s expert was not able to say whether defendant purposefully opened the zip file or whether defendant’s software did so automatically. The state’s expert was also not able to say whether, assuming that the file contained 70 images of child pornography, defendant would have in fact looked at all of them. But both those factual issues are immaterial to whether defendant possessed or controlled the file once he received it.
Given the majority’s holding that defendant did not possess or control these images, the majority does not reach the question whether the evidence is also insufficient to find venue. Because I would hold that the evidence was sufficient to find possession or control, it is necessary to reach venue.