State of Tennessee v. Re'Licka Dajuan Allen

CourtCourt of Criminal Appeals of Tennessee
DecidedFebruary 12, 2009
DocketE2007-01018-CCA-R3-CD
StatusPublished

This text of State of Tennessee v. Re'Licka Dajuan Allen (State of Tennessee v. Re'Licka Dajuan Allen) is published on Counsel Stack Legal Research, covering Court of Criminal Appeals of Tennessee primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
State of Tennessee v. Re'Licka Dajuan Allen, (Tenn. Ct. App. 2009).

Opinion

IN THE COURT OF CRIMINAL APPEALS OF TENNESSEE AT KNOXVILLE March 26, 2008 Session

STATE OF TENNESSEE v. RE´LICKA DAJUAN ALLEN

Direct Appeal from the Criminal Court for Knox County No. 77455 Mary Beth Leibowitz, Judge

No. E2007-01018-CCA-R3-CD - Filed February 12, 2009

Defendant, Re’Licka Dejuan Allen, was indicted on two counts of aggravated exploitation of a minor and one count of sexual exploitation of a minor. The State refused to comply with Defendant’s requests for discovery by withholding the contents of Defendant’s computer hard drive and other computer materials alleged to contain incriminating evidence. The State refused to disclose the requested discovery despite the trial court’s issuance of two protective orders, the ruling of the appellate court on interlocutory appeal, and a third protective order by the trial court requiring disclosure. After a final hearing, the trial court suppressed the evidence and dismissed the indictment against Defendant. The State argues on appeal that the trial court erred in suppressing the evidence based upon the perceived threat of federal prosecution to defense counsel. Following our review of the parties’ briefs, the record, and the applicable law, we reverse the judgment of the trial court, reinstate the indictment and remand for trial.

Tenn. R. App. P. 3 Appeal as of Right; Judgment of the Criminal Court Reversed and Remanded.

JERRY L. SMITH , J., delivered the opinion of the court, in which ROBERT W. WEDEMEYER , J., joined and J. C. McLin, J., dissenting.

James A. H. Bell, Knoxville, Tennessee, for the appellant, Re’Licka Dajuan Allen.

Robert E. Cooper, Jr., Attorney General and Reporter; Rachel West Harmon, Assistant Attorney General; Randall E. Nichols, District Attorney General; and Kevin J. Allen, Assistant District Attorney General, for the appellee, State of Tennessee.

OPINION I. BACKGROUND

Defendant was charged in a three-count indictment alleging sexual and aggravated sexual exploitation of a minor stemming from the possession of child pornography. Defendant’s case was consolidated with another case presented by the State on interlocutory appeal. The facts of Defendant’s underlying offenses were summarized in the appellate court’s opinion as follows:

[The defendant] was charged by the Knox County Grand Jury on June 17, 2003, with one count of sexual exploitation of a minor for possessing materials that included a minor engaged in sexual activity, and with two counts of aggravated sexual exploitation of a minor for possessing, with the intent to transport and with the intent to distribute, materials that included a minor engaged in sexual activity, in violation of Tennessee Code Annotated section 39-17-1004. Both cases involved material located on Defendants’ computers. In [the defendant’s] case, the material was originally discovered by a computer repair technician at a store where [the defendant] had taken his computer for repair. The technician informed his manager of his discovery, and the manager in turn contacted Knox County law enforcement.

State v. Richard Allen Butler, No. E2004-00359-CCA-R9-CD, 2005 WL 735080, at *1 (Tenn. Crim. App., at Knoxville, Mar. 30, 2005) perm. app. denied (Tenn. Aug. 22, 2005), abrogated by State v. Pickett, 211 S.W.3d 696 (Tenn. Jan. 22, 2007).

After the charges were filed, Defendant filed a motion for discovery, which included a request that the State provide him with copies of the computer hard drive and other computer materials. The State refused Defendant’s discovery request but offered instead to make Defendant’s computer hard drive available for inspection at the Sheriff’s Department. Thereafter, Defendant filed a motion to compel discovery. At a hearing on his motion to compel, Defendant’s computer expert testified that simply being allowed access to Defendant’s computer hard drive at the Sheriff’s Department would not permit him to conduct a sufficient evaluation. The defense expert’s testimony was summarized in this court’s opinion as follows:

In [Defendant’s] case, a hearing on his motion to compel was held at which the State presented one witness, Carlton Bryant, an attorney employed at the Knox County Sheriff’s Department. Bryant testified that his understanding of the law was that the sheriff’s department could not allow counsel to take a copy of the computer hard drive from the department because the sexual exploitation statute did not contain any exemption for defense counsel to be given child pornography. He said they would, however, accommodate counsel and counsel’s computer experts by mirror-imaging the hard drive and allowing them to examine the copy while it remained in the “custody and control” of the department. He testified that they contemplated setting aside a conference room for that purpose and would arrange a schedule that was convenient for counsel and his experts.

Herbert Mack, [Defendant’s] expert computer witness, described in detail the various programs and viruses by which material can be both deliberately and

2 inadvertently downloaded into a computer and estimated that it would take him approximately one week of intensive twelve-to fourteen-hour days to complete an examination of [Defendant’s] computer hard drive. He testified he would probably require the assistance of support personnel from his office and, in addition, would need to consult regularly with counsel with respect to whether any sexually explicit files he found on the computer qualified as child pornography. He said that, given the large number of images allegedly contained on the computer, he would not be able to remember the specifics of the information without taking the computer hard drive from the sheriff’s department.

Mack expressed concern about working from a “mirror image” rather than the hard drive itself, testifying that the computer programs in existence did not create true mirror images:

A. Well, the question-what I heard before was providing me with a mirror image. Okay. If we’re talking about me working on the original computer, no, I don’t need another computer as long as I can, you know, load my tools and take my tools off. If what you’re going to give me is a mirror image, my concern there is that I’m not getting all of the data that’s there.

Q. And why is that? If it’s a mirror image wouldn’t you just get everything that’s in the mirror?

A. No, sir.

Q. Why not?

A. A mirror image is a misnomer, okay. The computer programs that you have right now, okay, are for the purpose of recovering good data. Okay. So if a file has been ordered damaged or erased it’s not going to be on the image.

Mack conceded that his examination of the actual hard drive would entail reconnecting the original personal computer equipment, turning the computer on, and loading his software file-searching tools, and he agreed that in the process of booting up the Windows operating system the contents of the hard drive would be changed. However, according to his testimony, booting the computer would not alter either the file creation date or last accessed date of the images in question. Mack testified he was familiar with “EnCase,” a forensic examination software utility available exclusively to law enforcement, but he was not aware that it had been approved by several federal district and appellate courts as a “non-invasive forensic examination tool.”

Id. at *2-3.

3 In addition to the testimony above, Mack further testified that the risk of transmitting inaccurate information was high if defense counsel was dependent upon Mack to tell defense counsel what he had seen on a computer disk image.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

State v. Pickett
211 S.W.3d 696 (Tennessee Supreme Court, 2007)
State v. Garland
617 S.W.2d 176 (Court of Criminal Appeals of Tennessee, 1981)
State Ex Rel. Tuller v. Crawford
211 S.W.3d 676 (Missouri Court of Appeals, 2007)
State v. Scott
678 S.W.2d 50 (Tennessee Supreme Court, 1984)
United States v. Knellinger
471 F. Supp. 2d 640 (E.D. Virginia, 2007)

Cite This Page — Counsel Stack

Bluebook (online)
State of Tennessee v. Re'Licka Dajuan Allen, Counsel Stack Legal Research, https://law.counselstack.com/opinion/state-of-tennessee-v-relicka-dajuan-allen-tenncrimapp-2009.