Kromer v. Commonwealth

613 S.E.2d 871, 45 Va. App. 812, 2005 Va. App. LEXIS 227
CourtCourt of Appeals of Virginia
DecidedJune 14, 2005
Docket1900042
StatusPublished
Cited by23 cases

This text of 613 S.E.2d 871 (Kromer v. Commonwealth) is published on Counsel Stack Legal Research, covering Court of Appeals of Virginia primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Kromer v. Commonwealth, 613 S.E.2d 871, 45 Va. App. 812, 2005 Va. App. LEXIS 227 (Va. Ct. App. 2005).

Opinion

FRANK, Judge.

Ray Kromer, appellant, was convicted, in a bench trial, of fifteen counts of misdemeanor possession of child pornography in violation of Code § 18.2-374.1:!. 1 On appeal, he contends the evidence was insufficient to sustain his convictions. We hold the evidence was sufficient and affirm.

BACKGROUND

On March 26, 2003, Richmond police responded to a fire at a residence on Hanover Avenue in Richmond. After finding chemicals and explosives on the second floor, police called Special Agent Robert Ritchie of the F.B.I. to “take a look at the scene.” Ritchie, a bomb technician, questioned appellant about the materials. Appellant responded that he “was making pyrotechnic devices, rockets and other pyrotechnic type devices.” Appellant gave written consent for police to search the residence. Concerned about terrorism, Ritchie also wanted to examine the contents of a computer located inside the *815 residence for “explosive recipes” and possible visits to websites that “might indicate he [appellant] was making explosive mixtures and not just pyrotechnic mixtures.” Appellant consented to a search of the computer.

Police removed the explosives and the computer on March 27, 2003. After initially securing the residence on March 26, 2003, police guarded the residence until the next day when officers removed the computer. They did not see anyone come or go during that time. According to Ritchie, appellant gave his father a key to the residence “so he [appellant] could still get into the house after he was released.”

Police took the computer to Officer Jeff Deem, a computer forensics specialist. Deem examined the computer in June 2003 for bomb-related information. He began by removing the hard drive and creating a “true and accurate copy of the media.” Deem found information concerning child pornography and obtained a second search warrant before examining the computer further.

Deem conducted a forensic examination of the computer using Ncase software and certain key words connected to child pornography such as “lolita” and “underage.” He received more than one hundred hits. He looked for files or photographs, and located numerous images that were possibly child pornography.

Deem identified fifteen photographs at trial as being the ones he recovered from the computer. Each picture was labeled with its file name as well as the path to the file’s location on the computer. Deem testified the files were downloaded sometime between December 28, 2002 and January 3, 2003. The pictures were located in a file-sharing program called “KaZaA.” . The folder appeared on a desktop shortcut link titled “my shared folder.” The folder contained files such as “kids/girll3yearsold.jpg” and “11 — Hand 13yea-rand momjpg.” The default setting for KaZaA is to share files with other users via the Internet, although this computer’s setting had been manipulated not to share files. Deem testi *816 fied that there was no way to tell who downloaded the pictures or who used the computer at any given time.

Deem testified that the “systems registry” showed “R. Clark Kromer” was a registered owner of the Windows XP software. Another application on the computer showed a user name of “clarkkromer.” The computer was not password protected, and anyone could have access to it. Deem testified that there is no evidence to suggest that anyone other than appellant used the computer.

Kenneth Pew, an electrical engineer, testified that accessing the photographs was a six-step process and that there were over five hundred photographs on the photo directory. Pew could not testify about the shortcut link on the desktop because he did not have the hardware to examine the actual desktop. However, in addressing the issue of desktop icons, he testified that when one opened a desktop link, a list of files within that folder would appear on the screen.

Appellant made a motion to strike the Commonwealth’s evidence, arguing that there was no evidence that appellant owned or used the computer at the time that the images were downloaded. Appellant conceded that the images were taken from the computer. The court denied the motion, finding that under a “totality of the circumstances” approach, the evidence was sufficient to find appellant guilty beyond a reasonable doubt.

ANALYSIS

Appellant argues that the evidence at trial was insufficient to convict him of possession of child pornography. Specifically, he contends that the Commonwealth failed to prove he knowingly possessed the images contained within the computer. 2 For the reasons that follow, we affirm.

*817 In order to convict a person of possession of child pornography, the Commonwealth must prove beyond a reasonable doubt that the individual “knowingly possesse[d] sexually explicit visual material utilizing or having as a subject a person less than 18 years.” Code § 18.2-374.1:1. Appellant correctly points out that this statute does not define possession, nor does any opinion of Virginia’s appellate courts. Thus, in this case of first impression, we must define “possession” in the context of computer electronics, Internet technology, and intangible images.

We take guidance from the federal case of United States v. Tucker, 305 F.3d 1193 (10th Cir.2002), cert. denied, 537 U.S. 1223, 123 S.Ct. 1335, 154 L.Ed.2d 1082 (2003). The appellant in Tucker was convicted of one count of child pornography in violation of 18 U.S.C. § 2252A(a)(5)(B). The government’s computer expert discovered child pornography files on both the hard drive and in the cache files of Tucker’s computer. Tucker conceded that he knew that when he visited a Web page, the images on that page would be sent to his browser’s cache and thereby saved on his hard drive. Id. at 1204.

The Tucker court found that Tucker had control over the files present in his Web browser cache file. Id. The court held:

Tucker ... intentionally sought out and viewed child pornography knowing that the images would be saved on his computer. Tucker may have wished that his Web browser did not automatically cache viewed images on his computer’s hard drive, but he concedes he knew the Web browser was doing so. Tucker continued to view child pornography knowing that the pornography was being saved, if only temporarily, on his computer. In such circumstances, his possession was voluntary. Since he knew his browser cached the image files, each time he intentionally sought out and viewed child pornography with his Web browser he knowingly acquired and possessed the images.

Id. at 1205 (footnote omitted).

While the facts in Tucker differ from the facts here, we adopt the court’s definition of possession of computer images. *818

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Shawn Matthew Kearns v. Commonwealth of Virginia
Court of Appeals of Virginia, 2025
Michaud Arour Yancey v. Commonwealth of Virginia
Court of Appeals of Virginia, 2024
Jerry Wayne Remines v. Commonwealth of Virginia
Court of Appeals of Virginia, 2022
Anthony Wayne Edmonds v. Commonwealth of Virginia
Court of Appeals of Virginia, 2022
Jaeyoung Lee v. Commonwealth of Virginia
Court of Appeals of Virginia, 2021
Ashby Coleman v. Commonwealth of Virginia
Court of Appeals of Virginia, 2016
David Louis Volpe v. Commonwealth of Virginia
Court of Appeals of Virginia, 2016
Robert Jeffrey Kobman v. Commonwealth of Virginia
777 S.E.2d 565 (Court of Appeals of Virginia, 2015)
Michael Thomas Terlecki v. Commonwealth of Virginia
772 S.E.2d 777 (Court of Appeals of Virginia, 2015)
Ethan Aubrey Bliss v. Commonwealth of Virginia
Court of Appeals of Virginia, 2014
Connie Beth Klewer v. Commonwealth of Virginia
Court of Appeals of Virginia, 2012
Ervin v. Commonwealth
704 S.E.2d 135 (Court of Appeals of Virginia, 2011)
People v. Kent
79 A.D.3d 52 (Appellate Division of the Supreme Court of New York, 2010)
Chapman v. Commonwealth
697 S.E.2d 20 (Court of Appeals of Virginia, 2010)
Alfred Lee Spivey v. Commonwealth of Virginia
Court of Appeals of Virginia, 2007
Commonwealth v. Diodoro
932 A.2d 172 (Superior Court of Pennsylvania, 2007)
Barton v. State
648 S.E.2d 660 (Court of Appeals of Georgia, 2007)
Ramaan Alfred Burton v. Commonwealth
Court of Appeals of Virginia, 2007

Cite This Page — Counsel Stack

Bluebook (online)
613 S.E.2d 871, 45 Va. App. 812, 2005 Va. App. LEXIS 227, Counsel Stack Legal Research, https://law.counselstack.com/opinion/kromer-v-commonwealth-vactapp-2005.