Redkovsky v. State

CourtCourt of Special Appeals of Maryland
DecidedFebruary 27, 2019
Docket1478/17
StatusPublished

This text of Redkovsky v. State (Redkovsky v. State) is published on Counsel Stack Legal Research, covering Court of Special Appeals of Maryland primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Redkovsky v. State, (Md. Ct. App. 2019).

Opinion

Vyacheslav Redkovsky v. State of Maryland, No. 1478, Sept. Term 2017. Opinion filed on February 27, 2019, by Berger, J.

CRIMINAL LAW - SUFFICIENCY OF THE EVIDENCE – § 11-208(a)(4)(i) OF THE CRIMINAL LAW ARTICLE – DISTRIBUTION OF CHILD PORNOGRAPHY

A showing of specific intent is not required to sustain a conviction for distribution of child pornography under § 11-208(a)(4)(i) of the Criminal Law Article. Here, an appellant used a peer-to-peer file-sharing program which made files on his laptop available for others to download. Via this file-sharing program, videos depicting child pornography were transferred from appellant’s computer to a law enforcement officer’s computer. This evidence was sufficient to sustain appellant’s conviction for distribution of child pornography. Circuit Court for Washington County Case No.: 21-K-16-53003 REPORTED

IN THE COURT OF SPECIAL APPEALS

OF MARYLAND

No. 1478

September Term, 2017

______________________________________

VYACHESLAV REDKOVSKY

v.

STATE OF MARYLAND ______________________________________

Meredith, Berger, Kehoe,

JJ. ______________________________________

Opinion by Berger, J. ______________________________________

Filed: February 27, 2019

Pursuant to Maryland Uniform Electronic Legal Materials Act (§§ 10-1601 et seq. of the State Government Article) this document is authentic.

2019-02-28 09:37-05:00

Suzanne C. Johnson, Clerk A jury in the Circuit Court for Washington County convicted appellant, Vyacheslav

Redkovsky, of four counts of distribution of child pornography and four counts of

possession of child pornography. As to two of the distribution charges, the trial court

sentenced appellant to consecutive ten-year sentences, with all but six years of each

sentence suspended, and merged the remaining counts for sentencing purposes. On appeal,

appellant challenges the sufficiency of the evidence to sustain his convictions.

We conclude that the evidence was sufficient and affirm the judgments of the trial

court.

BACKGROUND

Corporal Roger Schwarb of the Maryland State Police (“MSP”) testified that in

February of 2016, he was assigned to the MSP division of the Internet Crimes Against

Children Task Force (“Task Force”). In connection with his duties on the Task Force,

Corporal Schwarb investigated internet child pornography on BitTorrent, a peer-to-peer

file-sharing protocol.1 BitTorrent allows users to download material, while also sharing

material from the users’ files.

Corporal Schwarb explained the basic process for accessing a peer-to-peer network.

First, a user must download a “client,” which is a free, publicly-available computer

“BitTorrent” is defined as “[a] peer-to-peer file transfer protocol for sharing large 1

amounts of data over the internet, in which each part of a file downloaded by a user is transferred to other users.” https://en.oxforddictionaries.com/definition/bittorrent (last visited February 13, 2019). According to Corporal Schwarb, “some businesses use it for document sharing. Some people may have heard of [] Napster back in the day where it was [used to] . . . download music.” program. uTorrent is a popular client, which allows users to access the BitTorrent network.

Corporal Schwarb explained that the client searches for files on the network by using a

“torrent,” which is similar to a library “indexing card.”2 A torrent contains text identifying

the files associated with that torrent, including the number of files associated with that

torrent, the size of the files and their location. The torrent does not contain any files or

images; it only contains data with file descriptions. Each torrent is assigned a “hash,”

which is a specific number, similar to an electronic “thumbprint.”3 Once the user

downloads a particular torrent, that torrent is saved in the user’s client.

Corporal Schwarb explained that, for example, a user who is interested in Lassie

movies could search for a torrent using the term “Lassie,” and the user will receive a list of

torrent files associated with that search term. The BitTorrent client then searches the

peer-to-peer network to find the info hashes for files associated with that torrent. If there

are “a hundred images of that torrent for Lassie, it will go out, you’ll get those hundred

images,” and “[y]ou’ve essentially downloaded all the files associated with that torrent.”

2 See Downloading With BitTorrent, http://help.utorrent.com/customer/en/portal/articles/178825-downloading-with-bittorrent (last visited February 13, 2019). 3 See Downloading With BitTorrent, http://help.utorrent.com/customer/en/portal/articles/179175-glossary?b_id=3883 (defining “Hash” as “[a] ‘fingerprint’ of data assumed to be unique to the data. Because of the assumed uniqueness of the data, it is used to verify that a piece of data is indeed uncorrupted (since the corrupted data’s hash would not match its expected hash)”) (last visited February 13, 2019).

2 Corporal Schwarb’s state computer used a software program specifically designed

to allow law enforcement to operate undercover, searching BitTorrent for child

pornography files located in Maryland.4 On February 13, 2016, Corporal Schwarb’s state

computer generated a summary log identifying search results for a specific torrent

associated with known child pornography info hashes. Three files associated with that

torrent downloaded to the state computer from the IP address “24.170.239.94.” Corporal

Schwarb explained that the software program allows law enforcement to obtain a “single

source download,” from only one IP address at a time.5 Corporal Schwarb viewed three of

the downloaded files: [(1) “000015.mpg;” (2) “000018.avi” and (3) “000019.avi”], and

observed that those files depicted child pornography.

On March 12, 2016, Corporal Schwarb’s state computer’s activity log identified an

additional file, “!(PTHC)Composite01-fatherandhis12yotwinsdaughters-13m19s.avi,”

which had again downloaded to his computer from the IP address 24.170.239.94 via the

BitTorrent network. Corporal Schwarb reviewed the March 12, 2016 video file and

observed that it depicted child pornography. Corporal Schwarb copied to a CD the three

video files downloaded to his computer on February 13, 2016 and the one video file

downloaded on March 12, 2016 from the IP address 24.170.239.94. The four video files

contained on the CD were played for the jury and admitted as evidence. The parties

4 The software program also allows law enforcement to receive files from a peer-to-peer network without sharing files from the law enforcement computers. 5 Typically, BitTorrent clients obtain portions of files from multiple sources at once.

3 stipulated that each of the four video files identified by Corporal Schwarb depicted

someone under the age of 15 engaged in sexual conduct.

Corporal Schwarb testified that he researched the IP address 24.170.239.94 on the

public website, American Registry for Internet Numbers (ARIN), and learned that the IP

address 24.170.239.94 was registered to Antietam Cable. Corporal Schwarb sent a

subpoena to Antietam Cable for the subscriber information associated with the IP address

24.170.239.94. Antietam Cable responded that the subscriber to the account for that IP

address was Slava Redkovsky located at 1034 Mount Aetna Road, Hagerstown, Maryland.6

At 4:50 a.m. on April 6, 2016, Corporal Schwarb assisted members of the Task

Force in the execution of a search warrant at 1034 Mount Aetna Road.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Jackson v. Virginia
443 U.S. 307 (Supreme Court, 1979)
United States v. Shaffer
472 F.3d 1219 (Tenth Circuit, 2007)
United States v. Collins
642 F.3d 654 (Eighth Circuit, 2011)
United States v. Chiaradio
684 F.3d 265 (First Circuit, 2012)
United States v. Max Budziak
697 F.3d 1105 (Ninth Circuit, 2012)
United States v. Bennie Richardson, IV
713 F.3d 232 (Fifth Circuit, 2013)
Chow v. State
903 A.2d 388 (Court of Appeals of Maryland, 2006)
Starr v. State
951 A.2d 87 (Court of Appeals of Maryland, 2008)
State v. Suddith
842 A.2d 716 (Court of Appeals of Maryland, 2004)
Wenger v. State
292 S.W.3d 191 (Court of Appeals of Texas, 2009)
Cox v. State
28 A.3d 687 (Court of Appeals of Maryland, 2011)
Shand v. State
672 A.2d 630 (Court of Appeals of Maryland, 1996)
State v. Tremaine
315 S.W.3d 769 (Missouri Court of Appeals, 2010)
Williams v. State
917 A.2d 1213 (Court of Special Appeals of Maryland, 2007)
State v. Lyons
9 A.3d 596 (New Jersey Superior Court App Division, 2010)
Grimm v. State
135 A.3d 844 (Court of Appeals of Maryland, 2016)
Mulley v. State
137 A.3d 1091 (Court of Special Appeals of Maryland, 2016)
United States v. Dean Stitz
877 F.3d 533 (Fourth Circuit, 2017)
Lindsey v. State
176 A.3d 741 (Court of Special Appeals of Maryland, 2018)
United States v. Timothy Ryan
885 F.3d 449 (Seventh Circuit, 2018)

Cite This Page — Counsel Stack

Bluebook (online)
Redkovsky v. State, Counsel Stack Legal Research, https://law.counselstack.com/opinion/redkovsky-v-state-mdctspecapp-2019.