Vyacheslav Redkovsky v. State of Maryland, No. 1478, Sept. Term 2017. Opinion filed on February 27, 2019, by Berger, J.
CRIMINAL LAW - SUFFICIENCY OF THE EVIDENCE – § 11-208(a)(4)(i) OF THE CRIMINAL LAW ARTICLE – DISTRIBUTION OF CHILD PORNOGRAPHY
A showing of specific intent is not required to sustain a conviction for distribution of child pornography under § 11-208(a)(4)(i) of the Criminal Law Article. Here, an appellant used a peer-to-peer file-sharing program which made files on his laptop available for others to download. Via this file-sharing program, videos depicting child pornography were transferred from appellant’s computer to a law enforcement officer’s computer. This evidence was sufficient to sustain appellant’s conviction for distribution of child pornography. Circuit Court for Washington County Case No.: 21-K-16-53003 REPORTED
IN THE COURT OF SPECIAL APPEALS
OF MARYLAND
No. 1478
September Term, 2017
______________________________________
VYACHESLAV REDKOVSKY
v.
STATE OF MARYLAND ______________________________________
Meredith, Berger, Kehoe,
JJ. ______________________________________
Opinion by Berger, J. ______________________________________
Filed: February 27, 2019
Pursuant to Maryland Uniform Electronic Legal Materials Act (§§ 10-1601 et seq. of the State Government Article) this document is authentic.
2019-02-28 09:37-05:00
Suzanne C. Johnson, Clerk A jury in the Circuit Court for Washington County convicted appellant, Vyacheslav
Redkovsky, of four counts of distribution of child pornography and four counts of
possession of child pornography. As to two of the distribution charges, the trial court
sentenced appellant to consecutive ten-year sentences, with all but six years of each
sentence suspended, and merged the remaining counts for sentencing purposes. On appeal,
appellant challenges the sufficiency of the evidence to sustain his convictions.
We conclude that the evidence was sufficient and affirm the judgments of the trial
court.
BACKGROUND
Corporal Roger Schwarb of the Maryland State Police (“MSP”) testified that in
February of 2016, he was assigned to the MSP division of the Internet Crimes Against
Children Task Force (“Task Force”). In connection with his duties on the Task Force,
Corporal Schwarb investigated internet child pornography on BitTorrent, a peer-to-peer
file-sharing protocol.1 BitTorrent allows users to download material, while also sharing
material from the users’ files.
Corporal Schwarb explained the basic process for accessing a peer-to-peer network.
First, a user must download a “client,” which is a free, publicly-available computer
“BitTorrent” is defined as “[a] peer-to-peer file transfer protocol for sharing large 1
amounts of data over the internet, in which each part of a file downloaded by a user is transferred to other users.” https://en.oxforddictionaries.com/definition/bittorrent (last visited February 13, 2019). According to Corporal Schwarb, “some businesses use it for document sharing. Some people may have heard of [] Napster back in the day where it was [used to] . . . download music.” program. uTorrent is a popular client, which allows users to access the BitTorrent network.
Corporal Schwarb explained that the client searches for files on the network by using a
“torrent,” which is similar to a library “indexing card.”2 A torrent contains text identifying
the files associated with that torrent, including the number of files associated with that
torrent, the size of the files and their location. The torrent does not contain any files or
images; it only contains data with file descriptions. Each torrent is assigned a “hash,”
which is a specific number, similar to an electronic “thumbprint.”3 Once the user
downloads a particular torrent, that torrent is saved in the user’s client.
Corporal Schwarb explained that, for example, a user who is interested in Lassie
movies could search for a torrent using the term “Lassie,” and the user will receive a list of
torrent files associated with that search term. The BitTorrent client then searches the
peer-to-peer network to find the info hashes for files associated with that torrent. If there
are “a hundred images of that torrent for Lassie, it will go out, you’ll get those hundred
images,” and “[y]ou’ve essentially downloaded all the files associated with that torrent.”
2 See Downloading With BitTorrent, http://help.utorrent.com/customer/en/portal/articles/178825-downloading-with-bittorrent (last visited February 13, 2019). 3 See Downloading With BitTorrent, http://help.utorrent.com/customer/en/portal/articles/179175-glossary?b_id=3883 (defining “Hash” as “[a] ‘fingerprint’ of data assumed to be unique to the data. Because of the assumed uniqueness of the data, it is used to verify that a piece of data is indeed uncorrupted (since the corrupted data’s hash would not match its expected hash)”) (last visited February 13, 2019).
2 Corporal Schwarb’s state computer used a software program specifically designed
to allow law enforcement to operate undercover, searching BitTorrent for child
pornography files located in Maryland.4 On February 13, 2016, Corporal Schwarb’s state
computer generated a summary log identifying search results for a specific torrent
associated with known child pornography info hashes. Three files associated with that
torrent downloaded to the state computer from the IP address “24.170.239.94.” Corporal
Schwarb explained that the software program allows law enforcement to obtain a “single
source download,” from only one IP address at a time.5 Corporal Schwarb viewed three of
the downloaded files: [(1) “000015.mpg;” (2) “000018.avi” and (3) “000019.avi”], and
observed that those files depicted child pornography.
On March 12, 2016, Corporal Schwarb’s state computer’s activity log identified an
additional file, “!(PTHC)Composite01-fatherandhis12yotwinsdaughters-13m19s.avi,”
which had again downloaded to his computer from the IP address 24.170.239.94 via the
BitTorrent network. Corporal Schwarb reviewed the March 12, 2016 video file and
observed that it depicted child pornography. Corporal Schwarb copied to a CD the three
video files downloaded to his computer on February 13, 2016 and the one video file
downloaded on March 12, 2016 from the IP address 24.170.239.94. The four video files
contained on the CD were played for the jury and admitted as evidence. The parties
4 The software program also allows law enforcement to receive files from a peer-to-peer network without sharing files from the law enforcement computers. 5 Typically, BitTorrent clients obtain portions of files from multiple sources at once.
3 stipulated that each of the four video files identified by Corporal Schwarb depicted
someone under the age of 15 engaged in sexual conduct.
Corporal Schwarb testified that he researched the IP address 24.170.239.94 on the
public website, American Registry for Internet Numbers (ARIN), and learned that the IP
address 24.170.239.94 was registered to Antietam Cable. Corporal Schwarb sent a
subpoena to Antietam Cable for the subscriber information associated with the IP address
24.170.239.94. Antietam Cable responded that the subscriber to the account for that IP
address was Slava Redkovsky located at 1034 Mount Aetna Road, Hagerstown, Maryland.6
At 4:50 a.m. on April 6, 2016, Corporal Schwarb assisted members of the Task
Force in the execution of a search warrant at 1034 Mount Aetna Road. Corporal Schwarb
arrived at the residence and spoke with appellant in the driveway, as appellant prepared to
leave for work. Appellant provided his house keys to the Task Force and the Task Force
searched the home. Corporal Schwarb observed that there appeared to be only one person
living in the house. Corporal Schwarb determined that appellant’s WiFi network was
secured, as it required a password to access the WiFi network. The Task Force seized a
black Toshiba laptop and three hard drives from a custom built, “tricked out” computer
tower.
Elsewhere in the record, the account holder is identified as “Slavic” Redkovsky 6
rather than “Slava” Redkovsky. Travis Knode, the lead network engineer for Antietam Cable, testified that, between February 23 and March 12, 2016, the IP address, “24.170.239.94” was linked to the cable modem located at 1034 Mount Aetna Road, Hagerstown, and the account holder for that address was Slavic Redkovsky. Knode defined an IP (Internet Protocol) address as “a 32-bit unique identifier for devices that need to route traffic on the Internet.” 4 State Trooper First Class Chris Reid of the Task Force interviewed appellant at his
residence immediately following the search. The audio-recording of the interview was
played for the jury at trial. In the interview, appellant acknowledged to Trooper Reid that
he had a password protected wireless internet cable service provided by Antietam Cable.
Appellant stated that he had a custom desktop computer, which he built as “a hobby.” He
also had two laptops: a broken HP laptop, which he was in the process of fixing, and a
working Toshiba laptop. Appellant explained that he bought the laptops on eBay “super
cheap,” and that he had tried to “fix them up.” According to appellant, he was the only
person who had used the Toshiba laptop.
Appellant described himself as having “maybe a little more than average”
knowledge of computers. Appellant stated that he understood a peer-to-peer file-sharing
program to be one where “you like upload it to a server or something, and then if it’s on a
server, somebody else can go on and download it.” Appellant stated that he understood
that peer-to-peer file sharing involved sharing files with other people. Appellant indicated
that he had heard of BitTorrent, but did not think that he had ever used it. Appellant
acknowledged that he had used the uTorrent program on his Toshiba laptop and expected
that uTorrent was probably still on that laptop.
When asked by Trooper Reid if he ever looked up pornography, appellant
responded: “Uh, I can’t say that I haven’t, but not on a file sharing program.” Appellant
stated that he typically “would just Google for [pornography].” Appellant indicated to
Trooper Reid that he did not expect that the Task Force would find any pornography on his
laptop. Trooper Reid asked appellant if the Task Force would find any child pornography
5 on appellant’s computer, and he responded, “Gee, I hope not.” According to appellant, he
“didn’t have any of that stuff on [his] computer” and “[didn’t] want anything to do with
child porn.”
Steven Gibson, a computer forensic analyst with the Department of Homeland
Security Investigations, testified as an expert in computer forensics and data analysis.
Gibson assisted in the execution of the search warrant at 1034 Mount Aetna Road by
previewing devices to identify items of evidentiary value. On or about April 13, 2016,
Gibson conducted a forensic analysis on multiple devices seized from appellant’s
residence, including a Toshiba laptop computer. Gibson observed that the peer-to-peer
filing-sharing program, uTorrent, was installed on the Toshiba laptop and remained in
active use. The most recent recorded logon date for the Toshiba laptop was April 6, 2016.
In the course of Gibson’s forensic analysis of the Toshiba laptop, he did not find any file
names or visual images that matched the March 12, 2016 video provided to him by
Corporal Schwarb. Gibson’s findings were recorded in a forensic report, and the State
introduced that report in evidence.
One year later, on or about April 18, 2017, Gibson conducted a subsequent analysis
of the Toshiba laptop using GriFi Analyze, a digital imaging software tool, which had not
previously been available to him. Using the four video files provided by Corporal Schwarb,
Gibson searched the Toshiba laptop using a “hashset” from the info hashes and the file
names, but found no filenames on the Toshiba laptop matching the filenames of the four
video files identified by Corporal Schwarb.
6 In May of 2017, Gibson conducted a visual search of the files on the Toshiba
laptop’s thumbcache,7 which is a hidden folder where users can view thumbnail-size
images of their videos. Gibson identified three thumbcache images that matched images
from the three video files downloaded on February 13, 2016 by Corporal Schwarb. Gibson
took a “screen shot of it for comparison view so [one] can see the exact frame where the
thumb cache image is matching to that exact frame of the video.” The three “screenshot”
images were admitted in evidence at trial.
In the course of his visual file search, Gibson also discovered a complete video file
located in the “unallocated” space of the Toshiba laptop, which matched the fourth video
downloaded by Corporal Schwarb on March 12, 2016. Gibson explained that the
unallocated space is the area containing deleted files that have been emptied from the
computer’s “trash can.” Gibson was unable to determine when the video on the Toshiba
laptop was created or whether it had ever been viewed; he could only determine that
someone had deleted it. Gibson explained that deleted files may be recovered from a
computer so long as they have not been overwritten.
DISCUSSION
Appellant contends that the evidence against him was insufficient to support his
convictions for distribution of child pornography because he did not “actively transfer or
7 According to Gibson, “[a] thumbcache is basically a marker to help you find images and videos quicker on your computer,” by showing “a small picture” of the contents of the file. Once a particular folder is opened, a thumbcache is created from an image contained within that file.
7 distribute the videos to the State’s computer and did not knowingly make the videos
available for download[.]” Appellant is not challenging the sufficiency of the evidence as
to his convictions for possession of child pornography. The State argues that appellant’s
claim is not preserved because he failed to raise before the trial court the argument that he
now advances on appeal. Alternatively, if the argument was preserved, the State contends
that there was sufficient evidence to show that appellant knowingly distributed child
pornography by making the video files available for other users of the file-sharing network
to download.
Preservation
The State contends that appellant’s argument for acquittal was limited to “arguing
that there was insufficient evidence that it was he who distributed the child pornography
files to the State’s computer.” (Emphasis added). At the close of the State’s case, the
appellant moved for judgment of acquittal arguing:
Your Honor, at this time, I make a motion for judgment of acquittal, specifically with counts one through four - distribution. The legal definition says distribution is to transfer possession. I would argue that the State has not met [its] burden of showing that [appellant] transferred possession to the State. And I’d ask the [c]ourt to grant the motion.
The prosecutor responded:
Your Honor, at this point, the State has shown that [appellant] has transferred possession. He transferred digital files to Corporal Schwarb. The showing that it was indeed [appellant] in this particular matter is the fact that the files in question linked back to [appellant’s] IP address.
Furthermore, that didn’t stop. It also further went to the fact that not only did it link to his IP address, but a device that
8 he readily identified as being his own. I - - indicated he was the only occupant, didn’t frequently have visitors. It was his laptop. There were no other - there were no other - - there would be anticipated no other users of it. Had either one of the videos saved - - still saved on his particular device as well - - or artifacts, in other words, thumb[]cache indicative of the other three files.
Following counsel’s arguments, the court ruled: “Your motion is denied, counsel.”
Pursuant to Maryland Rule 4-324 (a), a criminal defendant who moves for judgment
of acquittal must “state with particularity all reasons why the motion should be granted[,]”
and “is not entitled to appellate review of reasons stated for the first time on appeal.” Starr
v. State, 405 Md. 293, 302 (2008) (citations omitted). Thus, “the issue of sufficiency of
the evidence is not preserved when [the defendant]’s motion for judgment of acquittal is
on a ground different than that set forth on appeal.” Mulley v. State, 228 Md. App. 364,
388-89 (2016) (citations omitted). We have recognized, however, that a motion for
judgment of acquittal may be sufficient to preserve an issue where the acquittal argument
generally includes the issue raised on appeal. See Williams v. State, 173 Md. App. 161,
168 (2007) (finding that defendant’s argument in support of acquittal that he was not in
possession of a rental car that he was charged with failing to return, was sufficient to
preserve his challenge that he lacked the required element of intent); Shand v. State, 103
Md. App. 465, 488-89 (1995) (defendant’s argument that proof as to the elements of assault
was lacking sufficiently preserved challenge for review); aff’d on other grounds, 341 Md.
661 (1996).
Appellant’s argument in support of his motion for acquittal challenged the State’s
evidence relating to the element of transferring possession. The State argues that
9 appellant’s argument was confined to challenging the evidence as to his identity as the
source of the child pornography sent to the State’s computer. We disagree. It was the
prosecutor who addressed the sufficiency of the evidence linking appellant to the laptop
and IP address. The State’s argument on that point did not limit the scope of appellant’s
motion. We, therefore, conclude that appellant’s argument challenging the element of
transferring possession, though general, sufficiently encompassed the argument he raises
on appeal: that the evidence was insufficient to establish that he transferred possession of
child pornography files via the peer-to-peer file-sharing network. Appellant’s argument in
support of his motion for judgment of acquittal was sufficient to preserve his claim for
appellate review.
Sufficiency of the Evidence
We review a challenge to the sufficiency of the evidence to determine “‘whether,
after viewing the evidence in the light most favorable to the prosecution, any rational trier
of fact could have found the essential elements of the crime beyond a reasonable doubt.’”
Grimm v. State, 447 Md. 482, 494-95 (2016) (quoting Cox v. State, 421 Md. 630, 656-57
(2011)); accord Jackson v. Virginia, 443 U.S. 307, 319 (1979). “Because the fact-finder
possesses the unique opportunity to view the evidence and to observe first-hand the
demeanor and to assess the credibility of witnesses during their live testimony, we do not
re-weigh the credibility of witnesses or attempt to resolve any conflicts in the evidence.”
Tracy v. State, 423 Md. 1, 12 (2011) (citation omitted).
“[T]he question is not whether the [trier of fact] could have made other inferences
from the evidence or even refused to draw an inference, but whether the inference [it] did
10 make was supported by the evidence.” State v. Suddith, 379 Md. 425, 437 (2004) (citation
and internal quotation marks omitted). We, therefore, “defer to any reasonable inferences
a jury could have drawn in reaching its verdict, and determine whether there is sufficient
evidence to support those inferences.” Lindsey v. State, 235 Md. App. 299, 311, cert.
denied, 458 Md. 593 (2018).
Appellant was convicted of violating Md. Code (1985, 2012 Repl. Vol.), Criminal
Law Article, § 11-207(a)(4)(i), which prohibits an individual from knowingly distributing
or possessing, with the intent to distribute any matter, visual representation, or performance
that depicts a minor engaged in sexual conduct. For purposes of that section, “knowingly”
is defined as “having knowledge of the character and contents of the matter,” § 11-201(c),
and “distribute” means to “transfer possession.” § 11-201(b).
Appellant contends that § 11-207(a)(4)(i) requires that the State establish that he
had the specific intent to deliberately and intentionally distribute child pornography.
Appellant argues that the State failed to carry its burden of showing specific intent because
it failed to demonstrate that he “actively” transferred or distributed child pornography to
the State’s computer and knowingly made those videos available for download. The State
responds that a showing of specific intent is not required to sustain a conviction under
§ 11-207(a)(4)(i) because “knowingly,” as used in that statute is defined in § 11-201(c).
Though proof of specific intent was not required, the State submits that in this case, the
evidence established that appellant had specific intent to distribute the child pornography
videos because he admitted that he understood that the file-sharing program that he
11 installed on his laptop shared his files with other users on the network and made those files
available for download.
Appellant cites Chow v. State, 393 Md. 431 (2006), in support of his argument that
in order to sustain a conviction under § 11-207(a)(4)(i), the State was required to show that
he had the specific intent to knowingly distribute child pornography. In Chow, the Court
of Appeals determined that
[t]he sale of handguns is not itself illegal. It is the manner of the sale or rental, etc., that may make it illegal. The phrase used here “knowingly participates in the illegal sale . . .” contemplates that the actor must know that he or she is committing an “illegal sale.” We find this to be indicative of a mens rea requirement of specific intent for violations of § 449(f).
Chow, 393 Md. at 471.
Appellant contends that the Court’s application of “knowingly” in Chow applies
equally to the application of “knowingly” under § 11-207(a)(4)(i). Specifically, he
contends that § 11-207(a)(4)(i) requires proof that he knew that he was distributing child
pornography when he downloaded the peer-to-peer file-sharing network which allowed his
computer files to be accessed and downloaded by other users. As the State points out, in
Chow, the Court of Appeals defined “knowingly” in the context of a firearms statute for
which there was no statutory definition of the term. Here, unlike Chow, “knowingly” is
defined by statute in § 11-201(c), and that definition does not require a showing of specific
intent.
While no reported Maryland decision has addressed the question of whether the use
of peer-to-peer file-sharing networks which allow users to obtain and download child
12 pornography files from another user’s computer constitutes knowing distribution under §
11-207(a)(4)(i), both parties note that many state and federal courts have upheld
convictions for distribution of child pornography where the evidence was sufficient to
show that the defendant shared child pornography files using a peer-to-peer file-sharing
network with the understanding that the network permitted others to download files from
the defendant’s computer.
In United States v. Shaffer, 472 F.3d 1219, 1223 (10th Cir. 2007), the defendant
challenged the sufficiency of the evidence supporting his conviction for distribution of
child pornography under a federal statute which made it unlawful “for a person knowingly
to distribute child pornography by any means, including by computer.” In that case, the
defendant used a peer-to-peer network to download images of child pornography to his
computer and store them in a shared folder accessible to other network users. Id. at
1220-21. Similar to the argument raised by appellant here, Shaffer argued that he was not
guilty of distribution because he did not “actively” or “personally” transfer possession of
the files to another, but rather, he was “only a passive participant in the process.” Id.
Concluding that the defendant had distributed child pornography in the sense of
“transferring” it to others, then-Judge Gorsuch explained:
[Though the defendant] may not have actively pushed pornography on [other users of the peer-to-peer file-sharing network], ... he freely allowed them access to his computerized stash of images and videos and openly invited them to take, or download, those items. It is something akin to the owner of a self-serve gas station. The owner may not be present at the station, and there may be no attendant present at all. And neither the owner nor his or her agents may ever pump gas. But the owner has a roadside sign letting all passersby know that,
13 if they choose, they can stop and fill their cars for themselves, paying at the pump by credit card. Just because the operation is self-serve, or ... [as defendant suggests], passive, we do not doubt for a moment that the gas station owner is in the business of “distributing,” “delivering,” “transferring[,]” or “dispersing” gasoline; the raison d’être of owning a gas station is to do just that. So, too, a reasonable jury could find that [the defendant] welcomed people to his computer and was quite happy to let them take child pornography from it.
Id. at 1223-24.
The majority of federal circuit courts have followed the Tenth Circuit’s reasoning
and sustained convictions for distribution of child pornography where the defendant
understood the purpose of a peer-to-peer file-sharing network and used that network to
download and share child pornography with other users. See United States v. Ryan, 885
F.3d 449, 452-53 (7th Cir. 2018) (evidence that the defendant had a “sophisticated
understanding of computers and software” and that he knew that child pornography files
on his computer were accessible to others via a peer-to-peer file-sharing program was
sufficient to sustain his conviction for knowingly distributing child pornography); United
States v. Stitz, 877 F.3d 533, 538 (4th Cir. 2017) (“where files have been downloaded from
a defendant’s shared folder, use of a peer-to-peer file-sharing program constitutes
‘distribution’” [under federal law]); United States v. Richardson, 713 F.3d 232, 236 (5th
Cir. 2013) (“we conclude that downloading images and videos containing child
pornography from a peer-to-peer computer network and storing them in a shared folder
accessible to other users on the network amounts to distribution under [federal
law]”); United States v. Budziak, 697 F.3d 1105, 1109 (9th Cir. 2012) (evidence was
sufficient to support conviction for distributing child pornography where “the defendant
14 maintained child pornography in a shared folder, knew that doing so would allow others to
download it, and another person actually downloaded it”); United States v. Chiaradio, 684
F.3d 265, 282 (1st Cir. 2012) (“[w]hen an individual consciously makes files available for
others to take and those files are in fact taken, distribution has occurred”); United States v.
Collins, 642 F.3d 654, 656-657 (8th Cir. 2011) (evidence that defendant was
“knowledgeable about computers” and had a peer-to-peer file-sharing program on his
computer with stored images of child pornography supported his conviction for attempting
to knowingly distribute child pornography).
Many state courts have also upheld distribution of child pornography convictions in
cases involving distribution via peer-to-peer networks. In State v. Lyon, 9 A.3d 596, 597
(N.J. Sup. Ct. App. Div. 2010), the trial court found that the defendant’s passive
participation in a peer-to-peer file-sharing program where child pornography was
downloaded from his computer, did not constitute offering and distributing child
pornography under the New Jersey statute. On appeal, the New Jersey appellate court
rejected “defendant’s omission and passive conduct argument.” Id. at 603. The appellate
court determined that the term “knowingly,” which was not defined in the New Jersey
distribution statute, was intended by that state’s legislature to include the conduct of using
a file sharing network to “provide and offer child pornography he possessed in his shared
folder.” Id. at 602-603. See also People v. Rowe, 318 P.3d 57, 61 (finding that evidence
that defendant knowingly stored sexually exploitative photos and videos of children in a
shared folder on a peer-to-peer file-sharing network for others to download was sufficient
to support conviction for sexual exploitation of a child by “offering” sexually exploitative
15 material), cert. denied, 2013 WL 4008636 (Colo. 2013); Maddox v. State, 816 S.E.2d 796,
802 (Ga. Ct. App. 2018) (evidence was sufficient to sustain conviction for distribution of
child pornography where defendant admitted that he stored child pornography in his
computer’s shared folder and that the purpose of the file-sharing program that he
downloaded was to share his files with other users); State v. Tremaine, 315 S.W.3d 769,
772 (Mo. Ct. App. 2010) (finding that evidence was sufficient for jury to find that the
defendant offered to disseminate child pornography where he used a peer-to-peer file-
sharing network in a way that made child pornography files available “for widespread
sharing” over the network, and he invited others to download those items from
him); Wenger v. State, 292 S.W.3d 191, 200 (Tex. App. 2009) (evidence that defendant
used a file sharing program, which he understood shared files from his computer with other
users, was sufficient to support conviction for knowingly “disseminating” child
pornography); Kelley v. Commonwealth, 771 S.E.2d 672, 675 (Va. 2015) (finding that
evidence that defendant’s use of peer-to-peer file-sharing network and understanding that
the program enabled other users to download his files supported conviction for knowing
distribution of child pornography).
In this case, appellant was a savvy computer user who, as a hobby, repaired broken
computers and built a customized desktop computer with multiple hard drives. Appellant
admitted downloading and installing the client, uTorrent, required for using a peer-to-peer
file-sharing network. Appellant indicated that he understood that peer-to-peer file-sharing
programs worked by uploading files from one computer and making them available for
others to download.
16 The evidence demonstrated that four child pornography videos downloaded to
Corporal Schwarb’s state computer from a single source: the appellant’s IP address. The
State presented forensic evidence showing that images identified in three thumbcaches on
appellant’s Toshiba laptop matched still shot images of the three video files downloaded
on February 13, 2016 from appellant’s IP address to Corporal Schwarb’s computer. A
fourth video file, located in the unallotted space on the Toshiba laptop, matched the child
pornography video downloaded on March 12, 2016, from appellant’s IP address to
Corporal Schwarb’s computer.
Viewing the evidence in the light most favorable to the State, we conclude that the
evidence was sufficient for a jury to reasonably find that, based on appellant’s
understanding of the peer-to-peer file-sharing programs, and his use of the uTorrent client
which made files on his Toshiba laptop available for other users to download, appellant
knowingly transferred four videos depicting child pornography to Corporal Schwarb’s state
computer. Accordingly, the evidence was sufficient to support the appellant’s convictions
for distribution of child pornography.
JUDGMENT OF THE CIRCUIT COURT FOR WASHINGTON COUNTY AFFIRMED. COSTS TO BE PAID BY APPELLANT.