Beaver v. the State

767 S.E.2d 503, 330 Ga. App. 496
CourtCourt of Appeals of Georgia
DecidedDecember 25, 2014
DocketA14A1509
StatusPublished
Cited by2 cases

This text of 767 S.E.2d 503 (Beaver v. the State) is published on Counsel Stack Legal Research, covering Court of Appeals of Georgia primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Beaver v. the State, 767 S.E.2d 503, 330 Ga. App. 496 (Ga. Ct. App. 2014).

Opinion

McMillian, Judge.

Following a jury trial in November 2012, Gregory Beaver was convicted of 15 counts of sexual exploitation of children and sentenced to 20 years, 15 to serve. Beaver timely filed a motion for new trial, which the trial court denied. On appeal, Beaver asserts that (1) the evidence was insufficient to sustain his convictions and (2) the trial court erred in allowing the jury to view portions of pornographic videos recovered from his computer. Finding no error, we affirm.

Viewed in the light most favorable to the jury’s verdict, 1 the evidence shows that Forsyth County Sheriff’s Office Investigator Jeffrey Roe conducted investigations over the Internet as a member of the Internet Crimes Against Children Task Force. As part of his investigations, Roe worked to identify computers that contained suspected child pornography. In particular, the task force members looked for “file sharing” programs, which allow computers on the same network to access content from other computers. LimeWire, which was later confirmed to have been installed on the computer used by Beaver, was such a program. At trial, Roe explained how LimeWire works, including how users search for and download particular files. He also explained that each file has a “hash value,” which is a numerical value unique to every file, much like a digital fingerprint. As a result of his investigation, Roe identified an IP 2 address that was utilizing the LimeWire program to access files that he suspected contained child pornography. The IP address belonged to Judy Vess, Beaver’s mother. At that time, Beaver was living at his mother’s home, along with his wife, Christina Deal, and her young daughter.

Roe then handed the information over to local investigator Katria Johnson, who executed a search warrant at Vess’s home in May 2010. GBI forensic computer specialist Vickie Adams examined two computers found at that address. The one in Vess’s office did not contain any evidence of child pornography. However, the computer found inside Beaver’s bedroom was ultimately found to contain known child pornography 3 in five separate locations: a folder labeled *497 “Chrissie music folder,” a Lime Wire saved folder, the recycle bin, a folder containing incomplete downloads, and the computer’s unallocated space. Adams was able to determine that approximately 54 pictures and 23 videos had been downloaded between May 2009 and May 2010.* ** 4 She testified as to the dates and times of the downloads, and short portions of some of the videos were briefly displayed to the jurors.

At trial, Deal testified that she and Beaver met in March 2009, and he moved in with her the following month. At the time, she was living with her parents and her infant daughter. She and Beaver married in June 2009 and continued living in a converted garage in the back of her parents’ home. In 2008, Deal’s brother and father had built her a computer so that she could go back to school. She explained that she downloaded Lime Wire right after she received the computer so that she could download music. However, once Beaver moved in with her, whenever she wanted to download new music, she would ask Beaver to download it for her. Although her computer was password protected, Beaver knew the password.

Beaver was not employed and would stay at home and use the computer daily. Deal began working in September 2009 and would sometimes not return home until after her shift ended at midnight. She often saw Beaver using the computer when she woke up in the morning and again when she went to bed at night. In January 2010, they moved to Vess’s house where she, Beaver, and her daughter shared a bedroom. She brought her computer with them, and Beaver continued to use it daily.

Beaver was arrested not too long after they moved in with Vess, but returned at approximately midnight on March 18, 2010. 5 Deal testified that she was upset when Beaver immediately began using the computer again as soon as he came home and stayed on the computer after she went to sleep. The State presented stipulated evidence that Beaver was in fact incarcerated three separate times after he married Deal: (1) from August 3, 2009 to August 13, 2009; (2) from December 1, 2009 to December 22, 2009; and (3) from February 27, 2010 to March 18, 2010. No files containing child pornography that were located on the computer found in Beaver’s bedroom were downloaded during any of those three periods of incarceration, but *498 one such file was downloaded just hours after Beaver was released from jail on March 18, 2010. The jury convicted Beaver on all counts, and the trial court denied his subsequent motion for new trial. This appeal followed.

1. We first address Beaver’s challenge as to the sufficiency of the evidence.

When a criminal defendant challenges the sufficiency of the evidence supporting his or her conviction, the relevant question is whether, after viewing the evidence in the light most favorable to the prosecution, any rational trier of fact could have found the essential elements of the crime beyond a reasonable doubt. The jury, not this Court, resolves conflicts in the testimony, weighs the evidence, and draws reasonable inferences from basic facts to ultimate facts. As long as there is some competent evidence, even though contradicted, to support each fact necessary to make out the State’s case, the jury’s verdict will be upheld.

(Citations and punctuation omitted; emphasis in original.) Wright v. State, 302 Ga. App. 332, 332 (690 SE2d 654) (2010).

Beaver claims that the State failed to exclude every other reasonable hypothesis save that of his guilt pursuant to OCGA § 24-4-6. 6 However,

[qjuestions as to the reasonableness of hypotheses are generally to be decided by the jury which heard the evidence and where the jury is authorized to find that the evidence, though circumstantial, was sufficient to exclude every reasonable hypothesis save that of guilt, that finding will not be disturbed unless the verdict of guilt is insupportable as a matter of law.

(Citation and punctuation omitted.) Wright, 302 Ga. App. at 333.

Beaver argues that there are other reasonable hypotheses to explain how the child pornography came to be on the computer. Namely, a computer virus could have been responsible for downloading the files, or other people, including Deal’s two brothers ■— who *499 were computer savvy, did not like him, and had access to the computer — could have downloaded the files. However, Adams, a GBI expert in computer forensics, explained that, although there were viruses on the computer, which were “very common,” there was no evidence that a virus had downloaded any of the illegal files.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Patch v. the State
786 S.E.2d 882 (Court of Appeals of Georgia, 2016)
State of West Virginia v. William B. Shingleton
790 S.E.2d 505 (West Virginia Supreme Court, 2016)

Cite This Page — Counsel Stack

Bluebook (online)
767 S.E.2d 503, 330 Ga. App. 496, Counsel Stack Legal Research, https://law.counselstack.com/opinion/beaver-v-the-state-gactapp-2014.