Rogers v. State

113 S.W.3d 452, 2003 Tex. App. LEXIS 4857, 2003 WL 21337991
CourtCourt of Appeals of Texas
DecidedJune 11, 2003
Docket04-02-00451-CR
StatusPublished
Cited by36 cases

This text of 113 S.W.3d 452 (Rogers v. State) is published on Counsel Stack Legal Research, covering Court of Appeals of Texas primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Rogers v. State, 113 S.W.3d 452, 2003 Tex. App. LEXIS 4857, 2003 WL 21337991 (Tex. Ct. App. 2003).

Opinion

OPINION

Opinion by

SANDEE BRYAN MARION, Justice.

This appeal raises novel issues regarding privacy rights with regard to computers. Charles L. Rogers (“Rogers”) was convicted of possession of child pornography pursuant to a plea bargain agreement and was placed on ten years community supervision. Rogers filed written motions to suppress and a motion to dismiss, which the trial court ruled on prior to trial. On appeal, Rogers contends that the trial court erred in denying his motions. We overrule Rogers’s contentions and affirm the trial court’s judgment.

BACKGROUND

On August 7, 2000, Rogers brought his computer into Help Me Computers, because he could not get his computer system to function properly. The computer repair technician “booted” up the computer system and determined that the computer system had a virus. This virus was determined to be an ICQ Trojan virus, which infects all executable files. Executable files are needed by the computer to make a program open or close.

*455 A standard virus eradication program was run. As a result of the virus, damage occurred to the system registry which also required repair. The technician discovered that many areas had been corrupted, including the backup in the computer system. Rogers was contacted by the computer repair technician and advised of what had been found (damage and corruption of the backup in the system) and what needed to be done. Rogers was advised that his only option to fix the problem on his computer was to wipe the hard drive and reload it.

At this point, Rogers requested that some files be backed up. According to the technician, Rogers was adamant about having two main things backed up: (1) all of the documents on the system; and (2) all of the photos on the system. Rogers specifically asked that all his photos be backed up on his computer. He told the technician “I have a lot of pictures on my hard drive. I want all my photos backed up.” On the same day, Rogers went by the computer repair shop and brought in the programs to reload and a list of items he wanted backed up on his computer system. Fox Rover (a news downloading program) was included on the list of items/programs to be backed up. Additionally, Rogers called the technician later the same day and specifically instructed the technician to back up Image Expert and all jpeg files.

According to the computer repair technician, proper procedure in the computer repair industry requires “verification of data that has been backed up so that when you return the data to the customer, you don’t overcharge him for some that was not properly done.” In backing up files, the technician was required to double check the information being backed up. In verifying that the programs opened after the repairs, the technician opened the Fox Rover program. This program was pointing to a Lolita site which is site terminology for child pornography on the internet. As the technician was going through the verification process in backing up the jpeg files in the Agent folder (the directory for the Fox Rover program, which Rogers had specifically requested be backed up on his computer), the technician detected some photographs that he thought might be child pornography. The technician then came across a photo of a child that he was certain was child pornography. The technician later found “well over a hundred picture files that were child pornography in the Agent folder.”

During the initial investigation by Detective Lowry, a determination was made that the images on Rogers’s computer contained child pornography. At this time, the computer was shut down, seized, and taken directly to the property room of the SAPD. A forensic search of the computer was later undertaken after a search warrant was obtained.

Motions to Suppress

Rogers filed two motions to suppress. The first motion sought to suppress all physical evidence, including all evidence seized from Rogers’s computer hard drive, that was obtained prior to the issuance of a search warrant. The second motion sought to suppress all evidence seized as a result of a search of Rogers’s computer because the search warrant relied on in conducting the search was not lawful.

1. Issues on Appeal

In its brief, the State initially contends that Rogers has failed to preserve his appellate complaints regarding the motions to suppress because Rogers fails to identify which images were obtained at each stage, i.e., which images the technician initially discovered, which images the *456 technician discovered after speaking with Detective Lowry, which images were discovered after the search warrant was obtained, etc. Furthermore, the State notes that only one image was used to obtain Rogers’s conviction based on his guilty plea, and Rogers has failed to identify at which stage this image was discovered.

The determination of which images were discovered at each stage is not relevant to our review of the trial court’s order in this appeal. The State’s argument ignores the reality that the trial court denied the motion to suppress regardless of the stage at which various images were obtained. A defendant is not required to have the evidence contested in a motion to suppress admitted as a prerequisite to an appeal from the denial of a motion to suppress following a guilty plea. See Gonzales v. State, 966 S.W.2d 521, 524 (Tex.Crim.App.1998); Cloer v. State, 88 S.W.3d 285, 290 (Tex.App.-San Antonio 2002, no pet.). “By contributing to the State’s leverage in the plea bargaining process, ‘we may presume that at least to some extent the State has ‘used’ the contested evidence to obtain [Rogers’] plea.’ ” Cloer, 88 S.W.3d at 290. If this court were to hold in this appeal that the trial court only erred in denying the motions to suppress at particular stages, then proof of which images were discovered at each stage might be a relevant consideration on remand, but it is not a relevant consideration for purposes of this appeal.

2. Standard of Review

We review a trial court’s ruling on a motion to suppress under an abuse of discretion standard. Guzman v. State, 955 S.W.2d 85, 88-89 (Tex.Crim.App.1997). We ‘view the evidence in the light most favorable to the trial court’s ruling, and we afford almost total deference to the trial court’s determination of historical facts that the record supports, especially when the fact findings are based on an evaluation of the witnesses’ credibility and demeanor. Id. We review de novo the court’s application of the law to the facts. Id.

3. Reasonable Expectation of Privacy

The trial court entered written conclusions of law, stating, “In this case, defendant lost [his] expectation of privacy not only when he voluntarily turned over his computer to the repair shop for analysis, but more specifically when he made the specific request (which is acknowledged by the defendant in his own statement) that all the jpeg files (photos) be backed up.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Mark P. Howerton v. the State of Texas
Court of Appeals of Texas, 2025
Peyton Cole Smith v. the State of Texas
Court of Appeals of Texas, 2025
Antonio Salinas v. the State of Texas
Court of Appeals of Texas, 2021
Jose Leonel Oseguera-Viera v. State
Court of Appeals of Texas, 2019
Troy Levi Burwell v. State
576 S.W.3d 826 (Court of Appeals of Texas, 2019)
David Vincent Akins Jr. v. State
573 S.W.3d 290 (Court of Appeals of Texas, 2019)
State v. Rodriguez
521 S.W.3d 1 (Court of Criminal Appeals of Texas, 2017)
State v. Cardwell
778 S.E.2d 483 (Court of Appeals of South Carolina, 2015)
Kane, Devon Alexander
Court of Appeals of Texas, 2015
Devon Alexander Kane v. State of Texas
458 S.W.3d 180 (Court of Appeals of Texas, 2015)
Carlos Gutierrez Jr. v. State
419 S.W.3d 547 (Court of Appeals of Texas, 2013)
Orval Roger Miller Jr. v. State
Court of Appeals of Texas, 2011
Miller v. State
335 S.W.3d 847 (Court of Appeals of Texas, 2011)
Brooks Edward Payne v. State
Court of Appeals of Texas, 2010
BRACKENS v. State
312 S.W.3d 831 (Court of Appeals of Texas, 2010)
Raymond Dominic Brackens v. State
Court of Appeals of Texas, 2009
Karl Keith Noland v. State of Texas
Court of Appeals of Texas, 2008
John David Signorelli v. State
Court of Appeals of Texas, 2008
Aragon v. State
229 S.W.3d 716 (Court of Appeals of Texas, 2007)
C. Tom Zaratti v. State
Court of Appeals of Texas, 2006

Cite This Page — Counsel Stack

Bluebook (online)
113 S.W.3d 452, 2003 Tex. App. LEXIS 4857, 2003 WL 21337991, Counsel Stack Legal Research, https://law.counselstack.com/opinion/rogers-v-state-texapp-2003.