People of Michigan v. Douglas Tyler Lone

CourtMichigan Court of Appeals
DecidedSeptember 29, 2022
Docket359140
StatusUnpublished

This text of People of Michigan v. Douglas Tyler Lone (People of Michigan v. Douglas Tyler Lone) is published on Counsel Stack Legal Research, covering Michigan Court of Appeals primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
People of Michigan v. Douglas Tyler Lone, (Mich. Ct. App. 2022).

Opinion

If this opinion indicates that it is “FOR PUBLICATION,” it is subject to revision until final publication in the Michigan Appeals Reports.

STATE OF MICHIGAN

COURT OF APPEALS

PEOPLE OF THE STATE OF MICHIGAN, UNPUBLISHED September 29, 2022 Plaintiff-Appellee,

v No. 359140 Ingham Circuit Court DOUGLAS TYLER LONE, LC No. 20-000485-FH

Defendant-Appellant.

Before: K. F. KELLY, P.J., and LETICA and RICK, JJ.

PER CURIAM.

Defendant appeals as of right his jury trial convictions of aggravated possession of child sexually abusive material, MCL 750.145c(4)(b), using a computer to commit a crime, MCL 752.796, and felon in possession of a firearm (felon-in-possession), MCL 750.224f. As a habitual offender, third offense, MCL 769.11, defendant was sentenced to 159 to 240 months’ imprisonment for aggravated possession of CSAM, 100 to 240 months’ imprisonment for using a computer to commit a crime, and 57 to 120 months’ imprisonment for felon-in-possession. We affirm.

I. BASIC FACTS AND PROCEDURAL HISTORY

This case arises from the downloading of child sexually abusive material (CSAM) containing images of children and animals. Google employees determined that child pornography was downloaded to a Google account and reported the information to the National Center for Missing and Exploited Children, a nonprofit organization that works with technology companies and the public to report child pornography and related internet crimes to law enforcement. The nonprofit’s cyber tip was investigated by Michigan State Police Detective Thomas Gladney, an expert on the “BitTorrent network and child pornography.” Detective Gladney testified that an internet service provider gave the subscriber’s home a unique internet protocol (IP) address. IP addresses essentially act like a phone number for a location with internet access, and every device within the home typically uses the assigned IP address. Google keeps a meticulous record of every e-mail account that is created and accessed on their infrastructure as well as the IP address from which the access occurred. Google also offers different services, including Google drive that

-1- provided for cloud storage of documents and photographs from many different devices. This feature could be set up automatically, meaning a picture taken on an individual’s cell phone would, as a matter of course, be backed up to the Google drive.

Through the organization charged with keeping track of IP addresses, the Google e-mail account owner, the phone number, and the execution of search warrants, Detective Gladney determined that defendant was the owner of the Google e-mail address that downloaded CSAM. Through the IP address, the detective was able to correlate the account to defendant’s residence on Solomon Drive. Google also provided IP addresses that corresponded to the Holiday Inn Hotel in Jackson, Michigan between November 5 and 13, 2019. Child pornography was also downloaded through defendant’s e-mail account from the Holiday Inn IP addresses, and the detective confirmed that defendant was a registered guest of the hotel during that time period.

Through a search warrant, Detective Gladney was given a complete copy of the contents of defendant’s Google drive and found CSAM. He testified that such material was “essentially synonymous with child pornography;” it consisted of both pictures and videos of individuals under the age of 18 engaged in sex acts. Detective Gladney received training to identify pre or post pubescent individuals by examining areas such as the chest, genitals, and armpits as well as height, size, and overall appearance to detect the stage of growth or development. He opined that the files found on defendant’s Google drive consisted of CSAM,1 and he stop counting once he found more than 50 photos or videos.

As a result of his investigation, on May 19, 2020, Detective Gladney executed a search warrant on defendant’s home residence seeking items that stored digital data such as flash drives, cell phones, and computers. Defendant and his live-in girlfriend were present during the search and secured. The search uncovered a gun holster and magazines containing ammunition in the master bedroom. The actual gun was recovered in the bedroom occupied by defendant’s seven- year-old son, although the child was not present during the search warrant execution.2

Defendant waived his Miranda3 rights and agreed to speak with Detective Gladney. Defendant admitted that he lived in the home with his girlfriend, and he had an iPhone and iMac computer. Defendant gave three emails addresses that he used and admitted that he performed contract work at the Holiday Inn in Jackson sometime before Christmas. Defendant acknowledged that he accessed his Google drive account the day before the search warrant execution but denied seeing any child pornography there. Defendant claimed that he only watched “just normal pornography.” After being apprised of the detective’s knowledge acquired through the course of the investigation, defendant admitted that he downloaded child pornography from different

1 It was also evident from the names of the files or videos that they contained prepubescents. 2 To the detective, defendant initially denied that there was a gun in the home and admitted that he was not allowed to possess a firearm. He later stated that family members brought a firearm and magazines to his home, but he believed they took it with them. 3 Miranda v Arizona, 384 US 436; 86 S Ct 1602; 16 L Ed 2d 694 (1966).

-2- internet websites, that the downloads occurred on his cell phone while he was in his home, and that he masturbated while watching the child pornography.4

Defendant’s now former live-in girlfriend testified that the couple resided together in the Solomon Drive home. Defendant’s minor child sometimes lived with them.5 The girlfriend delineated the sleeping arrangements in the home, the location of various computers and electronic devices, and the predominant and shared users of the electronics. She also testified that defendant had his own business performing home renovations. Sometimes he was required to work overnight, and she admitted that he stayed at a hotel in Jackson because of work around Halloween. While the girlfriend also admitted that she downloaded and watched pornography, she asserted that it was merely mainstream pornography and did not involve children. She also testified that she never downloaded any pornography to defendant’s cell phone or his Google drive. The girlfriend did not learn of the full extent of the type of pornography defendant viewed until after the search warrant execution. Before that, she once found a flash drive with “concerning things” on it. The girlfriend destroyed the flash drive a couple of months before the execution of the search warrant. She asked defendant about its contents, and he told her that the material was not what he intended to download. Defendant admitted the flash drive was his and that he was aware of its content.

Following additional police testimony addressing the investigation and execution of the search warrant, the prosecutor rested. Defense counsel moved for dismissal of the charge of using a computer to commit a crime, citing the prosecutor’s failure to demonstrate that defendant accessed a computer on May 19, 2020; rather the proofs indicated that any content had been on defendant’s devices for several months. The prosecutor countered that the statute did not require active use of a cell phone on a particular date, but rather that the content was in defendant’s possession. Alternatively, the prosecutor sought to amend the information to reflect the time period during which defendant admitted to usage; specifically, defendant admitted to the detective that he used the phone the day before the execution of the search warrant.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Miranda v. Arizona
384 U.S. 436 (Supreme Court, 1966)
People v. Minch
825 N.W.2d 560 (Michigan Supreme Court, 2012)
People v. Flick; People v. Lazarus
487 Mich. 1 (Michigan Supreme Court, 2010)
People v. Milbourn
461 N.W.2d 1 (Michigan Supreme Court, 1990)
People v. Burgenmeyer
606 N.W.2d 645 (Michigan Supreme Court, 2000)
People v. Schrauben
886 N.W.2d 173 (Michigan Court of Appeals, 2016)
People v. Henry
889 N.W.2d 1 (Michigan Court of Appeals, 2016)
People v. Beverly
225 N.W. 481 (Michigan Supreme Court, 1929)
People of Michigan v. Kerri Lynn Thorne
912 N.W.2d 560 (Michigan Court of Appeals, 2017)
People of Michigan v. Keenan Barbee
923 N.W.2d 601 (Michigan Court of Appeals, 2018)
People of Michigan v. Christopher Allan Oros
917 N.W.2d 559 (Michigan Supreme Court, 2018)
Turner v. People
33 Mich. 363 (Michigan Supreme Court, 1876)
People v. Williams
811 N.W.2d 88 (Michigan Court of Appeals, 2011)
People v. Bowling
830 N.W.2d 800 (Michigan Court of Appeals, 2013)
People v. Gaines
306 Mich. App. 289 (Michigan Court of Appeals, 2014)

Cite This Page — Counsel Stack

Bluebook (online)
People of Michigan v. Douglas Tyler Lone, Counsel Stack Legal Research, https://law.counselstack.com/opinion/people-of-michigan-v-douglas-tyler-lone-michctapp-2022.