State v. Ballard

2012 NMCA 43
CourtNew Mexico Court of Appeals
DecidedMarch 8, 2012
Docket30,187
StatusPublished
Cited by6 cases

This text of 2012 NMCA 43 (State v. Ballard) is published on Counsel Stack Legal Research, covering New Mexico Court of Appeals primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
State v. Ballard, 2012 NMCA 43 (N.M. Ct. App. 2012).

Opinion

I attest to the accuracy and integrity of this document New Mexico Compilation Commission, Santa Fe, NM '00'04- 09:22:24 2012.05.09 Certiorari Granted, May 2, 2012, No. 33,565

IN THE COURT OF APPEALS OF THE STATE OF NEW MEXICO

Opinion Number: 2012-NMCA-043

Filing Date: March 8, 2012

Docket No. 30,187

STATE OF NEW MEXICO,

Plaintiff-Appellee,

v.

WILLARD BALLARD,

Defendant-Appellant.

APPEAL FROM THE DISTRICT COURT OF CURRY COUNTY Stephen K. Quinn, District Judge

Gary K. King, Attorney General Santa Fe, NM M. Anne Kelly, Assistant Attorney General Albuquerque, NM

for Appellee

Jacqueline L. Cooper, Chief Public Defender Kimberly Chavez Cook, Assistant Appellate Defender Santa Fe, NM

for Appellant

OPINION

SUTIN, Judge.

{1} Defendant Willard Ballard took his laptop computer and two external hard drives to a coworker’s home and asked the coworker to install a software upgrade. After Defendant later told the coworker that he had child pornography on the computer and asked the coworker to erase the memory, the coworker viewed the pornography and then made the

1 computer and hard drives available for police viewing. The police seized the computer and the two external hard drives that were in the coworker’s possession. The police then searched for child pornography and found it in multiple files, following which the police obtained a search warrant permitting the computer and the external hard drives to be sent for forensic analysis. Twenty-five files, consisting of or containing twenty-five separate images, constituted the basis for charging Defendant with twenty-five counts of sexual exploitation of children (possession) contrary to NMSA 1978, Section 30-6A-3(A) (2007).

{2} Convicted of all twenty-five counts, Defendant appeals, claiming (1) based on double jeopardy grounds the twenty-five counts merge into one count consisting of a unitary course of conduct; (2) the district court erroneously denied his motion to suppress the contents of the external hard drive that contained the images; (3) because Apprendi v. New Jersey, 530 U.S. 466, 547 (2000) prohibits judicial fact-finding that directly affects sentencing, the district court erred when it reviewed evidence to determine the number of victims; (4) the district court erred in failing to grant Defendant’s motion to dismiss where no corpus delicti existed without Defendant’s extrajudicial statements to police; and (5) the district court erred in reconsidering Defendant’s sentence sua sponte absent intervening circumstances providing a basis for amendment of the sentence. We hold on the double jeopardy point that the twenty-five counts should have been merged into five counts, requiring reversal of twenty counts on which Defendant was convicted, and we hold that the court did not err in regard to the remaining points.

BACKGROUND

{3} Defendant asked his coworker, Daniel Etlicher, to do software updates on his laptop computer because Defendant did not have access to the internet where he lived and therefore could not download the updates himself. Defendant gave the computer and two external hard drives to Mr. Etlicher. Approximately two weeks later, Defendant called Mr. Etlicher, but Mr. Etlicher did not answer because he was eating dinner. Mr. Etlicher later received a text message from Defendant asking Mr. Etlicher to call Defendant. Mr. Etlicher called Defendant. During their conversation, Mr. Etlicher overheard Defendant tell another person that there was child pornography on the computer. Mr. Etlicher asked, “Are you serious?” After acknowledging to Mr. Etlicher that he had child pornography on his computer, Defendant stated that when he downloaded a pornography file he got everything that came with it. Defendant asked Mr. Etlicher to erase the memory on the two external hard drives.

{4} Mr. Etlicher took the computer and external hard drives to work and met with his supervisor. In the presence of his supervisor, Mr. Etlicher turned on the computer and one of the first files that opened on one of the hard drives was one captioned as “child pornography.” The two looked at the file, closed it, and the supervisor called the police.

{5} Officer Daniel Mailman responded to the call. When the officer arrived at the workplace, the computer was on, and Mr. Etlicher showed the officer the same file that he and his supervisor had viewed earlier, which was described by the officer as a brief video

2 of a male and female of approximately eleven to thirteen years of age engaged in sexual activity. The officer told Mr. Etlicher to turn the computer off, and the officer seized the computer and external hard drives.

{6} Officer Mailman took the computer and external hard drives to his supervisor, Sergeant Max Stansell, who was aware of the investigation as to possible child pornography. Sergeant Stansell testified that it took him about five minutes, viewing approximately ten files, on the computer to find a file that he could positively identify as a child engaged in sexual activity with an adult. He then sealed the computer, placed it in evidence, and obtained a warrant for forensic evaluation. The computer and external hard drives were sent to Rocky Mountain Information Network (RMIN) for forensic evaluation.

{7} Defendant gave Sergeant Stansell a statement in which Defendant said he downloaded some files while he was in Illinois and admitted that he knew there were more than ten files containing child pornography. He said further that he had downloaded the files from a peer-to-peer computer program, that he was an “avid” user of the hard drives, and that he knew what was on them and where the items were on the hard drives.

{8} A computer forensics analyst with RMIN, Christopher Tschupp, testified that he made a bit-for-bit copy of the laptop hard drive and of the two external hard drives. Mr. Tschupp testified that this process makes an exact copy of all of the material on the hard drives so that the copy can be analyzed without disturbing the original evidence. More particularly, Mr. Tschupp reported that twenty-five files had been “created” or “downloaded” on five occasions. The State based its charges on possession of twenty-five files of downloaded images, divided into possession of eight files consisting of video clips and seventeen files consisting of still images. Of the twenty-five counts with which Defendant was charged, images for Counts 1-3 and 9-25 were downloaded April 7, 2007; the image for Count 8 was downloaded April 17, 2007; images for Counts 4 and 6 were downloaded May 11, 2007; the image for Count 7 was downloaded May 21, 2007; and the image for Count 5 was downloaded May 25, 2007. Defendant established on cross- examination of Mr. Tschupp that, as characterized by Defendant, the “E-Mule” program allegedly used by Defendant to download the files was “peer-to-peer” software on the laptop that allowed for direct file sharing from computer to computer upon entering keyword searches and did not involve purchasing or selecting files from a specific source. Mr. Tschupp testified as to each of the twenty-five images of children engaged in sexual activity that were displayed for the jury from two digital video discs (DVDs) made from the bit-for- bit copy prepared by Mr. Tschupp from the laptop and external hard drives. All of the illicit images Defendant downloaded were contained on only one of his external hard drives at the time the computer and hard drives were seized.

DISCUSSION

The Suppression Issue

Free access — add to your briefcase to read the full text and ask questions with AI

Related

State v. Santos
New Mexico Court of Appeals, 2017
State v. Olsson and Ballard
2014 NMSC 012 (New Mexico Supreme Court, 2014)
State v. Olsson
2014 NMSC 12 (New Mexico Supreme Court, 2014)
Fire Insurance Exchange v. Oltmanns
2012 UT App 230 (Court of Appeals of Utah, 2012)
State v. Ballard
2012 NMCA 043 (New Mexico Court of Appeals, 2012)

Cite This Page — Counsel Stack

Bluebook (online)
2012 NMCA 43, Counsel Stack Legal Research, https://law.counselstack.com/opinion/state-v-ballard-nmctapp-2012.