State of Tennessee v. Eugene O. Dale

CourtCourt of Criminal Appeals of Tennessee
DecidedAugust 19, 2013
DocketE2012-02418-CCA-R3-CD
StatusPublished

This text of State of Tennessee v. Eugene O. Dale (State of Tennessee v. Eugene O. Dale) is published on Counsel Stack Legal Research, covering Court of Criminal Appeals of Tennessee primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
State of Tennessee v. Eugene O. Dale, (Tenn. Ct. App. 2013).

Opinion

IN THE COURT OF CRIMINAL APPEALS OF TENNESSEE AT KNOXVILLE June 25, 2013 Session

STATE OF TENNESSEE v. EUGENE O. DALE

Appeal from the Criminal Court for Hamilton County No. 269938 Barry A. Steelman, Judge

No. E2012-02418-CCA-R3-CD - Filed August 19, 2013

Appellant, Eugene O. Dale, pleaded guilty to sexual exploitation of a minor, where the number of materials possessed was greater than fifty and less than one hundred, a Class C felony, subject to a reserved certified question of law that challenged the trial court’s denial of appellant’s motion to suppress evidence. The trial court imposed the agreed-upon sentence of eight years with a release eligibility of thirty-five percent. On appeal, appellant argues that the warrant authorizing the search of his computer was not supported by probable cause because the affidavit for the search warrant relied upon unconstitutionally obtained information. Following our review of the parties’ arguments, the record, and the applicable law, we affirm the trial court’s judgment.

Tenn. R. App. P. 3 Appeal as of Right; Judgment of the Criminal Court Affirmed

R OGER A. P AGE, J., delivered the opinion of the court, in which J OHN E VERETT W ILLIAMS and R OBERT W. W EDEMEYER, JJ., joined.

James A. H. Bell and Edward L. Holt, Jr., Knoxville, Tennessee, for the appellant, Eugene O. Dale.

Robert E. Cooper, Jr., Attorney General and Reporter; Kyle Hixson, Assistant Attorney General; William H. Cox, III, District Attorney General; and Charles D. Minor, Leslie Ann Longshore, and Boyd Patterson, Assistant District Attorneys General, for the appellee, State of Tennessee.

OPINION I. Facts

In November 2007, appellant took his computer to the computer department at Staples for repair. He left the computer at Staples after signing a work order requesting that the computer technicians discover the source of the viruses or spyware on the computer. While working on appellant’s computer, a Staples computer technician, Joshua Westover, discovered what he believed to be child pornography on appellant’s computer. A Staples employee contacted the police, and Chattanooga Police Officer Charles Darling viewed the images at Staples and confiscated the computer. Pursuant to a search warrant obtained by Hamilton County Sheriff’s Department Detective James Usry, the Tennessee Bureau of Investigation (“TBI”) examined appellant’s computer and found over fifty images of identifiable child pornography. Subsequently, the Hamilton County grand jury returned a presentment charging appellant with sexual exploitation of a minor, where the number of materials possessed was greater than one hundred, which is a Class B felony under Tennessee Code Annotated section 39-17-1003.

Appellant filed a motion to suppress the evidence discovered as a result of two separate searches of his computer. In the motion, he argued that the Staples computer technician who discovered the illegal images was acting as an agent of the government, which, if true, would render the technician’s examination of appellant’s computer a search under search and seizure law. Appellant argued in the alternative that should the trial court rule that the technician’s examination was permissible as a private party search, the police officer’s search of the computer prior to seizing it exceeded the scope of the private party search. Appellant contended that the affidavit in support of the search warrant relied on information obtained from the police officer’s illegal search, and without that information, there could not be a showing of probable cause to support the issuance of a search warrant.

At the suppression hearing, Joshua Westover testified that in November 2007, he was working as a computer technician at Staples. He was nineteen years old at the time, and all of his computer training had been done through Staples. He agreed that his ability to identify child pornography would be the capability of any ordinary person, as he had not received any specific training in that regard. Mr. Westover explained that Staples’ policy regarding suspect images was that the computer technician would notify a manager. The manager would call “corporate,” who would work with the manager to determine the next step.

Mr. Westover testified that the instance underlying this case was the first and only time he saw suspect images on a client’s computer that led to police involvement. He said that the department’s lead technician was the person who interacted with appellant. Mr. Westover did not recall appellant giving the lead technician any limitations about what they could review on the computer. The lead technician prepared a work order that Mr. Westover interpreted as meaning that he needed to locate the virus on appellant’s computer and find

-2- out why it had a virus in November 2007 when, in August 2007, it had undergone a “system restore,” which involved returning the computer to its factory defaults, and had an anti-virus program installed. Mr. Westover ran a program on the computer called SUPERAntiSpyware Pro that locates viruses and spyware and gives a detailed description of the location of infected files. The program showed Mr. Westover that the virus was located in “My Documents” in a folder labeled “PVT.” Mr. Westover opened the “PVT” folder and saw “thumbnails,” which he defined as “preview[s] of what the file looks like.” He said that “all the pictures [in the folder] were listed” with the thumbnails. Mr. Westover explained that the files in question were “allocated,” meaning that the user had to save them and place them in the folder. He testified that after he reviewed the folder, he minimized the window and called a manager. He showed the folder to his manager, who called “corporate” and law enforcement.

When Officer Darling arrived, Mr. Westover told him that he had seen what he assumed to be child pornography on appellant’s computer. When asked whether Officer Darling asked Mr. Westover to show him all of the images, he replied, “[The images] were already exposed, but yes.” Mr. Westover testified that Officer Darling informed him that he was looking for “one specific type of image” that portrayed a person who was “clearly underage and [also portrayed] sexual penetration” in order to identify an image as child pornography. Officer Darling found images that met his criteria, and he asked Mr. Westover additional questions about the file. Officer Darling wanted to know whether the images had been taken by a camera and downloaded onto the computer or downloaded from websites, but Mr. Westover was not able to make that determination. In addition, Officer Darling wanted to know when the images were downloaded, and Mr. Westover determined that the images were downloaded after appellant had the computer’s system restored in August 2007. Mr. Westover testified that some time later, he gave a written statement to Detective Usry.

On cross-examination, Mr. Westover testified that the “PVT” folder was created two days before appellant brought his computer to Staples. He explained that the files in the folder would have been intentionally placed there. Mr. Westover said that when he opened the “PVT” folder, the thumbnails showed females between the ages of five and thirteen, and all of the images were “sexual.” He explained that the images showed “see-through bathing suits, oral sex, penetration sex, [and] just nude images.” Mr. Westover testified that he did not “stare at the pictures long enough to . . . look at every image” but that he looked long enough “[t]o recognize that it was child porn.”

On re-direct examination, Mr. Westover said that he looked at the dates of the files by changing the folder from showing the images as thumbnails to showing a list of the images. The list included the properties of the files.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Grimes
244 F.3d 375 (Fifth Circuit, 2001)
Smith v. Maryland
442 U.S. 735 (Supreme Court, 1979)
State of Tennessee v. Travis Kinte Echols
382 S.W.3d 266 (Tennessee Supreme Court, 2012)
State v. Day
263 S.W.3d 891 (Tennessee Supreme Court, 2008)
State v. Yeargan
958 S.W.2d 626 (Tennessee Supreme Court, 1997)
State v. Talley
307 S.W.3d 723 (Tennessee Supreme Court, 2010)
State v. Munn
56 S.W.3d 486 (Tennessee Supreme Court, 2001)
State v. Williams
185 S.W.3d 311 (Tennessee Supreme Court, 2006)
United States v. Barth
26 F. Supp. 2d 929 (W.D. Texas, 1998)
State v. Odom
928 S.W.2d 18 (Tennessee Supreme Court, 1996)

Cite This Page — Counsel Stack

Bluebook (online)
State of Tennessee v. Eugene O. Dale, Counsel Stack Legal Research, https://law.counselstack.com/opinion/state-of-tennessee-v-eugene-o-dale-tenncrimapp-2013.