People v. Mahoney

220 Cal. App. 4th 781, 163 Cal. Rptr. 3d 468, 2013 WL 5648729, 2013 Cal. App. LEXIS 835
CourtCalifornia Court of Appeal
DecidedOctober 17, 2013
DocketE055162
StatusPublished
Cited by8 cases

This text of 220 Cal. App. 4th 781 (People v. Mahoney) is published on Counsel Stack Legal Research, covering California Court of Appeal primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
People v. Mahoney, 220 Cal. App. 4th 781, 163 Cal. Rptr. 3d 468, 2013 WL 5648729, 2013 Cal. App. LEXIS 835 (Cal. Ct. App. 2013).

Opinion

*783 Opinion

RAMIREZ, P. J.

A jury convicted defendant, Clark Alexander Mahoney, Jr., of possessing child pornography or child erotica. 1 (Pen. Code, § 311.11, subd. (a).) 2 He was granted probation and appeals, claiming there was insufficient evidence that the crime occurred within the statute of limitations, there was insufficient evidence to support the verdict, section 311.11, subdivision (a) is void for vagueness and the trial court erroneously failed to give the jury a unanimity instruction. We reject his contentions and affirm, while directing the trial court to correct errors in the minutes of the sentencing hearing that the parties agree need to be corrected.

Facts 3

On January 4, 2010, defendant lived alone at his home, where he kept, inter alia, the four computers discussed below. By way of stipulation, the parties agreed to the chain of custody of those computers from the time of their seizure from defendant’s house to the time they were analyzed by the prosecution and defense experts.

The prosecution expert testified that Internet Explorer automatically logs in to Internet history every Web page the computer user goes to, and saves into temporary Internet files the images on every Web page the user views, including the graphics that make up the banners on Web pages. If a computer user is not savvy, he or she may be unaware that the images from every Web page viewed are saved.

On one of the computers removed from defendant’s home on January 4, 2010, a Compaq brand (Compaq) computer, the prosecution expert found 12 thumbnail-size 4 computer-generated images 5 of children having sex with adults. The images had been saved to a folder on the hard drive on October

*784 19, 2009, and December 7, 2009, and, subsequently, the folder had been deleted. The prosecution’s expert could not determine whether any of the 12 images had been viewed or how they had been deleted. The fact that these images had the same creation, 6 modification and last access date suggests that they appeared on the screen while the computer user was viewing a Web site, but the prosecution expert could not say that the computer user opened any images beyond viewing them within Internet Explorer. The images had been saved to temporary Internet files. The fact that the December 7 creation time was within four minutes of the last access time suggested that they were consistent with advertisements on a Web page. The evidence relating to these images was not admitted to prove the charged offense, but as evidence of defendant’s intent or mental state as to it. Also on the Compaq were 188 thumbnail images of girls in bikinis or panties with their legs spread, with the focal point of the images being their genitals or buttocks, nine of which were shown to the jury. The images had been saved by the Compaq’s operating system to temporary Internet space on the hard drive by the computer user visiting the Web site on which the images appeared on October 19 and December 7, 2009, and on January 3, 2010, then the images had been deleted. The standard user name of “Compaq_administrator” was associated with these images. A Web page for that user name was for defendant. The images would have come across the computer’s monitor, but it could not be determined whether anyone had actually viewed them. They were in temporary Internet space, in deleted folders, meaning the images had to have been displayed on a Web page and the computer user had to have visited that Web page. Also on the Compaq was a Web banner graphic for a child pornography image named “Real Preteen” that had eventually been deleted. A banner graphic is saved to the hard drive when the computer user goes to the Web site where the graphic appears. It had been in a temporary Internet file, meaning the image had to have been displayed on a Web page and the computer user had to have visited that Web page. The same user name as previously mentioned was associated with this graphic as were the above mentioned dates. Also on the Compaq were three images of females under the age of 18 years, two of whom were engaging in sex acts with adults and the other of whom was naked, on a bed, with her legs apart. Those images had also been deleted. The above mentioned user name was associated with them, as were the above mentioned dates. They were in temporary Internet files, meaning the images had to have been displayed on a Web page and the computer user had to have visited that Web page. On the Compaq there were also 200 more images of girls in underwear and bikinis similar to those described above, which were in unallocated clusters, meaning they had been deleted, therefore, it could not be determined when they were created or deleted. Also on the Compaq were Google Internet searches for Web pages *785 associated with child model sites and child erotica-type content, with which the above mentioned user name was associated and “the user profile identified [defendant] as having the email address associated with [this user name].” They were in unallocated space. The Compaq also contained indicia of a peer-to-peer sharing network that had been used on the computer and a movie file with a title consistent with child pornography content that had been partially downloaded, suggesting that the computer user had either cancelled the download, or deleted it after it had been completed. The text in the network program included, inter alia, the words, “masturbation, orgasm, panties, . . . vagina, pom, kiddie, incest, preteen [and] fuck.” The prosecution expert opined that the images found on the Compaq’s hard drive had been displayed on its monitor.

On a Hewlett Packard brand (HP) laptop computer taken from defendant’s home on December 4, 2010, were 64 thumbnail-size images of child pornography or child erotica—nine of them, which depicted young or preteen girls in various states of undress, most wearing bikinis or panties, which could be viewed by the computer user on the screen, were shown to the jury. Because they were in unallocated space, meaning they had been deleted, it could not be determined when they were created or deleted. The 64 images had been saved to the hard drive before being deleted. The images could be consistent with an advertising page or the opening page from a model’s Web site showing the content of that Web site. The prosecution’s expert was not able to say that these images were displayed on the HP’s monitor, because they were in unallocated clusters; however, they were consistent with the images he found on the Compaq’s hard drive, which he opined had been on its monitor, and with the images he found on the Apple brand (Apple) computer’s hard drive (discussed below), some of which had been enlarged by the computer user. The HP laptop also contained Web banner graphics of four very small images that had been spliced together to make one large, long image of preteen girls in various states of undress. A banner graphic is saved to a hard drive when a computer user goes to the Web site that contains the graphic.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

People v. Armas CA4/1
California Court of Appeal, 2022
People v. Westmontgomery CA4/2
California Court of Appeal, 2021
People v. Stringer CA6
California Court of Appeal, 2020
Sepulveda v. Covello
S.D. California, 2020
People v. Brown
11 Cal. App. 5th 332 (California Court of Appeal, 2017)
People v. Shepherd CA5
California Court of Appeal, 2015
People v. Long CA4/1
California Court of Appeal, 2015

Cite This Page — Counsel Stack

Bluebook (online)
220 Cal. App. 4th 781, 163 Cal. Rptr. 3d 468, 2013 WL 5648729, 2013 Cal. App. LEXIS 835, Counsel Stack Legal Research, https://law.counselstack.com/opinion/people-v-mahoney-calctapp-2013.