State of Tennessee v. Charles D. Sprunger

CourtCourt of Criminal Appeals of Tennessee
DecidedApril 5, 2013
DocketE2011-02579-CCA-R3-CD
StatusPublished

This text of State of Tennessee v. Charles D. Sprunger (State of Tennessee v. Charles D. Sprunger) is published on Counsel Stack Legal Research, covering Court of Criminal Appeals of Tennessee primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
State of Tennessee v. Charles D. Sprunger, (Tenn. Ct. App. 2013).

Opinion

IN THE COURT OF CRIMINAL APPEALS OF TENNESSEE AT KNOXVILLE Assigned on Briefs January 29, 2013

STATE OF TENNESSEE v. CHARLES D. SPRUNGER

Appeal from the Criminal Court for Cumberland County No. 09-0212 David A. Patterson, Judge

No. E2011-02579-CCA-R3-CD - Filed April 5, 2013

Following a jury trial, the defendant, Charles D. Sprunger, was convicted of sexual exploitation of a minor, a Class B felony, and sentenced as a Range I offender to eight years at 100%. On appeal, he argues that the evidence is insufficient to support his conviction and that the trial court erred in sentencing him. After review, we affirm the judgment of the trial court.

Tenn. R. App. P. 3 Appeal as of Right; Judgment of the Criminal Court Affirmed

A LAN E. G LENN, J., delivered the opinion of the Court, in which J EFFREY S. B IVINS and R OGER A. P AGE, JJ., joined.

Jeffrey A. Vires, Crossville, Tennessee (on appeal); and James S. Smith, Jr., Rockwood, Tennessee (at trial), for the appellant, Charles D. Sprunger.

Robert E. Cooper, Jr., Attorney General and Reporter; Leslie E. Price, Senior Counsel; Randall A. York, District Attorney General; and Gary McKenzie and Amanda M. Hunter, Assistant District Attorneys General, for the appellee, State of Tennessee.

OPINION

FACTS

On July 6, 2009, the defendant was indicted by a Cumberland County Grand Jury for aggravated sexual exploitation of a minor based on the discovery on his computer of more than 100 images of minors engaging in sexual activity after he took the computer to a repair business. The trial court subsequently amended the indictment, reducing the charge to sexual exploitation of a minor. At the defendant’s August 19, 2010 trial, Tammy Arellano testified that in July 2008 she was working for a certified public accountant in Crossville. The accountant’s stepson, McKinley Tabor, rented a space in the office for his computer repair business. Ms. Arellano said that her desk was positioned in a manner so that anyone coming to Tabor’s office had to pass by her. She said that the usual practice for Tabor’s customers was to leave their computers with their name and telephone number on a table located in front of her against the wall beside Tabor’s office. On July 8, 2008, the defendant came in with his computer, saying he had talked to Tabor on the phone. The defendant placed the computer on the designated table and attached a note with his name and phone number.

McKinley Tabor, an outsourced IT manager, testified that he provided computer repair and consulting services, primarily for corporations. He also had a small office where individuals brought their computers for repair. On July 4, 2008, Tabor received a phone call from a man who identified himself as “Chuck” and said that he needed Tabor to restore data from the hard drive of his computer. Tabor told the man to bring the computer to his office the following Monday morning. The man telephoned Tabor at 1:00 p.m. that Monday and gave him the password so he could start the computer. While the computer was starting up, Tabor and the man discussed what material he wanted Tabor to restore. Tabor then noticed an icon on the computer indicating that files were waiting to be written to CD. The man asked Tabor to restore a specific program, as well as a Microsoft Money file. While the man was still on the phone, Tabor opened a folder on the computer to see if it contained the missing program. However, the folder actually contained photographs of “what appeared . . . to be pre-pubescent girls engaged in sexually suggestive poses and one of them appeared to be engaged in a sex act with an adult.” Tabor told the man he would call him back later and then notified the police. After the police arrived, the folder containing the files waiting to be written to CD was opened, and it contained images of the same nature as the ones Tabor had found earlier. Tabor turned the computer over to Investigator Haynes.

Investigator John Haynes with the Cumberland County Sheriff’s Department testified that he went to Tabor’s repair shop on July 8, 2008, to investigate “a computer there with . . . possible child pornography images on it.” Tabor hooked up the computer and “brought up a page of images that appeared to be young people, eight, ten, twelve, fourteen years old, engaged in various sex acts and some in erotic poses.” Investigator Haynes identified in court the computer he received from Tabor’s shop and said that he subsequently delivered it to the Tennessee Bureau of Investigation (“TBI”) for forensic analysis.

Melanie Garner, a special agent criminal investigator in the Technical Unit of the TBI, testified that she became a certified computer examiner in 2007. She conducted a forensic analysis on the defendant’s computer and found several folders containing sexually explicit images of young children. The images were found in a backup folder dated April 7, 2008,

-2- on the main drive of the computer under “owners documents.” The images were shown to the jury. Garner also found images of a young girl stored in a temporary folder waiting to be written to a CD. Garner identified a DVD containing a portion of the images retrieved from the original hard drive of the computer. Eight images were found in one folder and 120 images in another folder. She said that the images had a “fingerprint,” meaning “basically a number, but it’s a very long number and it’s a unique fingerprint to that hard drive. And so that is how you verify that it’s the same image.” The fingerprint of the images linked them to the defendant’s computer.

Garner said that, in her expert opinion, the images recovered from the defendant’s computer were not the result of a virus. She elaborated that she had never seen a virus organized in a manner that would create different folders on a computer and that the files were found in a backup folder, “which is not typical if the virus is going to attack a computer, not typical that it will attack your backup folder.” Further, a number of the images were located in an “allocated,” meaning “that space where these are deleted out of the recycle bin, they are put in an allocated,” and Garner had never seen a virus attack an allocated space. For a file to take this path and end up in an allocated, an individual had to physically take control of the computer. Garner said that she was “very confident” because of the verification of the fingerprint of the hard drive that all of the images came from the defendant’s computer.

On cross-examination, asked if it would have been simpler for a hacker to have put the images on the computer rather than a virus, Garner said that “it would not be simpler.” She said there was no evidence that a hacker had placed anything on the hard drive of the defendant’s computer “[b]ecause you can see in the operating system of the computer.”

Investigator Haynes, recalled by the State, testified that after he took the computer from Tabor’s place of business, ownership of the computer was established as belonging to the defendant. A search warrant was obtained and executed at the defendant’s residence, which was located in a “completely secluded” area surrounded by “woods, underbrush. It look[ed] like you just force fed a house into the area somehow. It [was] completely grown up.” Investigator Haynes, along with Investigator Norris and Deputy Rogers, executed the warrant and told the defendant they had taken possession of his computer from Tabor’s shop and were there to look for anything that contained other child pornography. The defendant told the officers that they would not “find any more,” which Investigator Haynes thought “a bit odd, . . . indicat[ing] you’ve got all you’re going to get.” Deputy Rogers transported the defendant to the sheriff’s department, and Investigators Haynes and Norris conducted the search.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Jackson v. Virginia
443 U.S. 307 (Supreme Court, 1979)
State of Tennessee v. Christine Caudle
388 S.W.3d 273 (Tennessee Supreme Court, 2012)
State of Tennessee v. Susan Renee Bise
380 S.W.3d 682 (Tennessee Supreme Court, 2012)
State v. Tuggle
639 S.W.2d 913 (Tennessee Supreme Court, 1982)
Carroll v. State
370 S.W.2d 523 (Tennessee Supreme Court, 1963)
State v. Anderson
835 S.W.2d 600 (Court of Criminal Appeals of Tennessee, 1992)
State v. Evans
838 S.W.2d 185 (Tennessee Supreme Court, 1992)
State v. Pappas
754 S.W.2d 620 (Court of Criminal Appeals of Tennessee, 1987)
Bolin v. State
405 S.W.2d 768 (Tennessee Supreme Court, 1966)
State v. Grace
493 S.W.2d 474 (Tennessee Supreme Court, 1973)

Cite This Page — Counsel Stack

Bluebook (online)
State of Tennessee v. Charles D. Sprunger, Counsel Stack Legal Research, https://law.counselstack.com/opinion/state-of-tennessee-v-charles-d-sprunger-tenncrimapp-2013.