People v. Conner CA6

CourtCalifornia Court of Appeal
DecidedOctober 23, 2023
DocketH049879
StatusUnpublished

This text of People v. Conner CA6 (People v. Conner CA6) is published on Counsel Stack Legal Research, covering California Court of Appeal primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
People v. Conner CA6, (Cal. Ct. App. 2023).

Opinion

Filed 10/23/23 P. v. Conner CA6 NOT TO BE PUBLISHED IN OFFICIAL REPORTS California Rules of Court, rule 8.1115(a), prohibits courts and parties from citing or relying on opinions not certified for publication or ordered published, except as specified by rule 8.1115(b). This opinion has not been certified for publication or ordered published for purposes of rule 8.1115.

IN THE COURT OF APPEAL OF THE STATE OF CALIFORNIA

SIXTH APPELLATE DISTRICT

THE PEOPLE, H049879 (Monterey County Plaintiff and Respondent, Super. Ct. No. SS151256A)

v.

BRANDON CONNER,

Defendant and Appellant.

Defendant Brandon Conner was placed on two years’ felony probation after a jury convicted him of one count of possessing child pornography. On appeal he contends that insufficient evidence supports the conviction and that trial counsel was ineffective for not objecting to testimonial hearsay. Finding no prejudicial error, we will affirm. I. TRIAL COURT PROCEEDINGS Defendant was originally charged in 2015 with distributing child pornography (Pen. Code, § 311.2, subd. (c)) and possessing child pornography (Pen. Code, § 311.11, subd. (a)). He was convicted of those charges after a jury trial. A different panel of this court reversed the judgment in 2019 due to admission of testimonial hearsay that violated defendant’s right to confrontation. (People v. Conner (Sep. 26, 2019, H045304) [nonpub. opn.].) The district attorney amended the information on remand to charge a single count of possessing child pornography (Pen. Code, § 311.11, subd. (a)). The jury in defendant’s second trial found him guilty as charged. The following evidence was presented at defendant’s second trial. A. TESTIMONY OF STEVEN GUIDI Retired Monterey County district attorney’s office investigator Steven Guidi testified about investigating defendant. He used a program called E-Phex in March 2015 to scan the Gnutella and Gnutella2 peer-to-peer Internet networks for people sharing “files of interest.” (Guidi did not define the phrase “files of interest” during his testimony.) He explained that E-Phex “grabs a list of internet protocol addresses that are suspected of sharing files of interest.” It uses an automated process to request a list of files that are being shared by computers at those internet protocol (IP) addresses. The program then attempts to download any files of interest from those computers. Guidi testified about an E-Phex report spreadsheet that was admitted into evidence at trial. The report is based on E-Phex scans of an IP address associated with defendant over the course of five days, March 12 to 16, 2015. The report has a separate tab for each day the program scanned the computer using that IP address. Each tab has columns noting the name of each file being shared by the target computer; the SHA value1 for each file being shared by the target computer; and the size of each file. All of the files listed in the report were being shared from the same Global Unique Identifier or “GUID”2 running the LimeRunner software program. The computer containing software with that particular GUID was sharing over 1,000 files each day. Some of the file names for those files contained the notation “PTHC,” which Guidi testified was a commonly used child pornography abbreviation meaning “[p]reteen hardcore.” Guidi testified that in order to share a file on the Gnutella network, a user must possess the entire file. A file cannot be shared if it has been deleted. Guidi was not aware of LimeRunner ever automatically downloading a file, meaning that a user must

1 As described by Guidi, a file’s “fingerprint” is its “SHA” or “hash” value, an alphanumeric representation based on the file’s contents rather than its file name. 2 Guidi explained that a GUID is a 32-character unique address assigned to each program running on a network (such as Gnutella) “so that the program can interact with the other programs and know who is talking.” 2 choose to initiate a download. He noted that LimeRunner can run in the background on a computer if the user does not actively exit the program, and merely clicking the “ ‘X’ in the upper right-hand corner” would not necessarily close the program. E-Phex was able to download full or partial copies of six videos from the target computer. The parties stipulated that each of those videos was “clearly and plainly child pornography within the meaning of Penal Code section 311.11.” Based on those downloads, law enforcement obtained and executed a search warrant at defendant’s house in Greenfield. Guidi testified that defendant was home when he executed the search warrant. Defendant told Guidi that he and his wife had access to a desktop computer located in an upstairs office area. Guidi testified that defendant gave him the password for the desktop computer. Law enforcement used osTriage, an “on-scene triage program,” to search that computer as well as two laptops in the house. Files of interest were located on the desktop computer. The triage search did not find any complete files containing child pornography. But the search uncovered “LNK” shortcut files that had the same file names as some of the files of interest recorded during the E-Phex browses. Guidi explained that LNK files are referred to as “pointer files” because they point to where a file is actually saved; they are “not the actual file itself” but rather “a way for you to get there without having to go to the folders and work your way through all of those folders.” There was also a “Preview-T” file with “PTHC” as part of the file name. Guidi explained that when using a Gnutella network program like LimeRunner, incomplete downloads are placed into an “incomplete” folder until the download is completed. Incomplete files use the naming convention: “T, hyphen, the file size, and then the file name.” If a user wishes to preview a file while it is being downloaded, LimeRunner “will create a LNK file that is titled Preview, hyphen, T,” and then the file name. From the presence of the Preview-T file, Guidi concluded a user had previewed that file as it was 3 being downloaded. Guidi could not conclude from the foregoing that someone successfully downloaded any files, only that someone had attempted to do so. The triage software did not locate LimeRunner on the computer. Law enforcement used EnCase software to conduct a forensic examination of the seized desktop computer. Guidi explained that when a file is saved on a computer, a reference to the file’s location is saved on the hard drive’s file directory. When a file is deleted, the computer deletes the file directory location for the file as well as its metadata (information about a computer file that includes the file name, file size, date created, and other data). But the file (or parts thereof) can remain on the computer in unallocated space. The EnCase software searches both allocated and unallocated spaces on a hard drive. EnCase can “carve” data on a hard drive, meaning “going into a computer and looking for those files that have been deleted or portions thereof, being able to take part of that data and put it in a format that’s viewable or readable, whether it be a photo, video, or document.” The EnCase search found two relevant categories of information. First, the search found evidence that LimeRunner had previously been installed on the computer. The software was installed in 2011 and last accessed in April 2015. The directory for saving files downloaded from LimeRunner was “users, Conner family, documents, and then Brandon.” And the GUID for LimeRunner matched the GUID of the software that was sharing the files Guidi found in March 2015 using E-Phex. There was no evidence of a search history for terms associated with child pornography. Second, the software was able to carve 14 images from unallocated space on the desktop computer that were associated with videos E-Phex had downloaded from the same GUID.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Miranda v. Arizona
384 U.S. 436 (Supreme Court, 1966)
Crawford v. Washington
541 U.S. 36 (Supreme Court, 2004)
People v. Redmond
457 P.2d 321 (California Supreme Court, 1969)
People v. Ledesma
729 P.2d 839 (California Supreme Court, 1987)
People v. Riel
998 P.2d 969 (California Supreme Court, 2000)
People v. Bolin
956 P.2d 374 (California Supreme Court, 1998)
People v. Ochoa
966 P.2d 442 (California Supreme Court, 1999)
United States v. James Lowe
795 F.3d 519 (Sixth Circuit, 2015)
People v. Sanchez
374 P.3d 320 (California Supreme Court, 2016)

Cite This Page — Counsel Stack

Bluebook (online)
People v. Conner CA6, Counsel Stack Legal Research, https://law.counselstack.com/opinion/people-v-conner-ca6-calctapp-2023.