Midkiff v. Commonwealth

678 S.E.2d 287, 54 Va. App. 323, 2009 Va. App. LEXIS 294
CourtCourt of Appeals of Virginia
DecidedJune 30, 2009
Docket2393073
StatusPublished
Cited by9 cases

This text of 678 S.E.2d 287 (Midkiff v. Commonwealth) is published on Counsel Stack Legal Research, covering Court of Appeals of Virginia primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Midkiff v. Commonwealth, 678 S.E.2d 287, 54 Va. App. 323, 2009 Va. App. LEXIS 294 (Va. Ct. App. 2009).

Opinion

WALTER S. FELTON, JR., Chief Judge.

Following a jury trial, David Midkiff (“appellant”) was convicted of one count of possession of child pornography and eighteen counts of possession of child pornography, second or subsequent offense, in violation of Code § 18.2-374.1:1. On appeal, he contends the trial court erred in denying his motion to suppress evidence seized from his home. He argues that the search warrant was invalid and that the trial court erred in applying the Leon 1 good-faith exception to find the search pursuant to that warrant was valid. He also contends the trial court erred by admitting into evidence photographic images *327 copied from his computer’s hard drive, arguing that doing so violated the best evidence rule. For the following reasons, we affirm the judgment of the trial court.

I. BACKGROUND

“In reviewing the denial of a motion to suppress based on the alleged violation of an individual’s Fourth Amendment rights, we consider the facts in the light most favorable to the Commonwealth. The burden is on the defendant to show that the trial court committed reversible error.” Ward v. Commonwealth, 273 Va. 211, 218, 639 S.E.2d 269, 272 (2007) (citation omitted).

On August 3, 2006, pursuant to a search warrant issued earlier that day, Sergeant Rodney Thompson of the Bedford County Sheriffs Office and Investigator Boyd Arnold of the Pittsylvania County Sheriffs Office searched appellant’s house for child pornography. Appellant was not home at the time the search warrant was executed. 2 However, the officers located a telephone number on his phone’s “caller ID” inside his house and called him. They told appellant where they were and their purpose for being there. Appellant advised the officers that he had “purchas[ed] memberships to child pornography websites” and that child pornography was stored in “his computer.” He told them where that computer was located in his house. The officers then seized the computer and sent it to the Department of Forensic Science in Richmond to determine whether child pornography was stored on the computer’s hard drive. There, Kristen Scott, a digital evidence forensic scientist, located files containing suspected child pornography on the computer’s hard drive. She copied those files to a data DVD. Those files were later copied to a CD from the data DVD.

In his motion to suppress the evidence seized from his home, appellant argued that the affidavit presented by the *328 officers to the magistrate was so stale that it failed to provide probable cause to believe the items to be seized were located in his house and that the magistrate’s reliance on that information to issue the search warrant was unreasonable. He also argued that the affidavit for the search warrant was so defective as to make unreasonable any claim by the officers of good-faith reliance on the warrant under Leon. The trial court found the information in the affidavit to be stale, resulting in the warrant being defective. It nevertheless denied appellant’s motion to suppress the seized evidence, finding that the officers relied in good faith on the judicially issued warrant.

At trial, the trial court admitted into evidence twelve photographic images and a CD containing four digital image files and three digital movie files, which had been reproduced from a CD which had been made from the DVD copy of the data found on the hard drive of appellant’s computer. Appellant objected to the admissibility of that evidence, arguing that admitting those images violated the best evidence rule. He asserted that the best evidence rule required that the seized computer and its hard drive be brought into court and that any image files to be used as evidence be reproduced in court directly from that hard drive.

II. ANALYSIS

A. The Motion to Suppress

Appellant contends: (1) “the Trial Court Err[ed] in Refusing to Suppress the Evidence Seized at [his] Home on the Basis That the Information in the Affidavit for [the] Search Warrant was Deficient in That it Failed to State a Temporal Nexus or a Nexus With [his] Residence,” and (2) “the Trial Court Err[ed] in It’s [sic] Application of the Good Faith Exception to the Search Warrant Requirement to Salvage the Search of [his] Home.”

“The Fourth Amendment of the United States Constitution requires that a search warrant be based upon probable cause.” Sowers v. Commonwealth, 49 Va.App. 588, 595, *329 643 S.E.2d 506, 510 (2007). “[T]o support probable cause for a warrant to search a residence, an affidavit must establish, with a fair probability, a link between contraband and the residence to be searched.” Id. at 596, 643 S.E.2d at 510.

Here, the affidavit for the search warrant, sworn before the magistrate by Sergeant Thompson on August 3, 2006, provided:

[Sergeant] Rodney Thompson received a case report and evidence CD from Suffolk County, N.Y. Police Department in reference to Operation Hardcore. In Feb. 2005, an undercover investigation into the Child Pornographic Website was begun. On 04/20/05, the Websites containing Child Pornography were seized and logs were recovered which recorded customer logon and Website activities. On 08/25/05, a forensic evaluation was performed by Det. Rory Forrestal with the Suffolk Co. Police Department of access logs (httpd-access.log and httpd-ss-request.log) pertaining to IP address 12.96.220.190. Forensic review showed this IP Address was downloading Child Pornography material from a computer having this IP address assigned. IP address is registered to Peoples Mutual Telephone Co. and an Administrative Subpoena was issued on 06/21/2005. The results advised that the IP address was registered to DAVID MIDKIFF of P.O. Box 85, Gretna, VA and physical address 123 Franklin Blvd., Gretna, VA 24557 and telephone number 434-656-9100. User Name: davldm. Autotrack records indicate DAVID WILLIS MIDKIFF (DOB: 06/10/1953) resides at 123 N. Franklin Street, Gretna, VA 24557. Address is located within Pittsylvania County. Investigators know from training and experience that individuals who possess, manufacture, or distribute child pornography are collectors and tend to keep their collection and not destroy it. Bedford County Sheriffs Office and Operation Blue Ridge Thunder are the Internet Crimes Against Children Task Force for the Commonwealth of Virginia and State of West Virginia. They are responsible for investigating crimes involving the Internet where the Sexual Exploitation of Children has occurred.

*330 The affidavit described the place to be searched and listed the things to be searched for, including digital images of child pornography and any computers found in appellant’s residence.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Nathan Elmore Thomas v. Commonwealth of Virginia
Court of Appeals of Virginia, 2024
Pegasystems Inc. v. Appian Corporation
Court of Appeals of Virginia, 2024
Commonwealth of Virginia v. Christian Jason Rowe
Court of Appeals of Virginia, 2024
Taylor Amil Wallace v. Commonwealth of Virginia
Court of Appeals of Virginia, 2024
Commonwealth of Virginia v. Alexander Raines Peyton
Court of Appeals of Virginia, 2019
Midkiff v. Com.
694 S.E.2d 576 (Supreme Court of Virginia, 2010)

Cite This Page — Counsel Stack

Bluebook (online)
678 S.E.2d 287, 54 Va. App. 323, 2009 Va. App. LEXIS 294, Counsel Stack Legal Research, https://law.counselstack.com/opinion/midkiff-v-commonwealth-vactapp-2009.