State v. Barger

247 P.3d 309, 349 Or. 553, 2011 Ore. LEXIS 3
CourtOregon Supreme Court
DecidedJanuary 6, 2011
DocketCC 200721991, 200801740; CA A138678, A138679; SC S058345
StatusPublished
Cited by24 cases

This text of 247 P.3d 309 (State v. Barger) is published on Counsel Stack Legal Research, covering Oregon Supreme Court primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
State v. Barger, 247 P.3d 309, 349 Or. 553, 2011 Ore. LEXIS 3 (Or. 2011).

Opinions

[555]*555GILLETTE, J. pro tempore

This criminal case involves the following question: Can a person be found guilty of “possessing] or control[ling]” digital images of sexually explicit conduct involving a child, as that phrase in used in ORS lGS.GSGGXa),1 based on evidence showing only that the person searched for and found such images through the Internet on his or her computer? Although the trial court in the present case acknowledged that “the world of the Internet presses * * * the boundaries of what we normally understand to be possession and control,” it ultimately concluded that a jury could find defendant guilty under ORS 163.686(l)(a) based solely on such evidence. As we explain below, we disagree with that conclusion: The statute requires something more than simply accessing and looking at incorporeal material of the kind involved here to “possess” or “control” that material. Accordingly, we reverse both the circuit court judgment and the Court of Appeals decision affirming that judgment.

In the course of investigating a report that defendant had sexually abused a child, a City of Eugene Police Officer, Sullivan, talked to defendant’s wife, who told him that there was some “weird” material on the couple’s home computer. Defendant’s wife showed the computer to Sullivan, who looked at the computer’s web-address history and saw three addresses that, based on their titles, seemed suspicious.

A few weeks later, the Eugene police asked defendant’s wife if she would allow them to take the computer and examine it. She consented. Thereafter, Eugene police detective Williams, who was certified in computer forensics, took possession of the computer, made a copy of the hard drive, and used certain forensic software to examine that hard drive.2 Based on Williams’s findings, defendant was charged with eight counts of Encouraging Child Sexual Abuse in the Second Degree, ORS 163.686, by possessing or controlling a visual recording of sexually explicit conduct involving a child. [556]*556Each charge was based on a separate digital image that Williams found in the computer’s “temporary internet file cache.”

As Williams later explained at defendant’s jury trial, temporary Internet files found in a computer are the product of an automatic function of a computer’s web browser. Whenever a computer user visits a web page, the browser creates a copy of the web page and stores it in a temporary Internet file “cache,” where it remains until the space is used up and written over, or it is erased. If a user calls up the same web page at some later date, the browser simply accesses the copy from the temporary files, rather than going through the slower process of downloading the same information from the web page. Computer users with ordinary skills would not necessarily be aware of that function or know how to go about accessing information stored in the temporary Internet file cache.

Williams testified that, when he received the computer, only one of the three addresses that had triggered Sullivan’s suspicions remained in the web-address registry but that, by examining other Internet activity files, he was able to identify two other suspicious web addresses that someone had accessed in the recent past. Williams stated that he checked all three websites and that all appeared to contain pornographic images of prepubescent girls and girls in their early teens.3

Williams testified that he then searched for similar images that might be stored on the computer’s hard drive, using certain words and phrases commonly used in child pornography. He acknowledged that he did not find any images of that kind that had been purposefully copied and saved in any user’s personal files. He did, however, discover sexually explicit images of prepubescent girls in the computer’s temporary Internet file cache.

[557]*557The prosecution then presented the specific evidence that it asserts established defendant’s guilt of the eight charges of Encouraging Child Sexual Abuse. The evidence included the eight digital images, all of which Williams had discovered in the temporary Internet file cache of defendant’s computer, and which were the bases of the charges. Williams acknowledged that there was nothing about the images that identified what website they had come from and that there was no way to know with absolute certainty whether the images had been accessed intentionally by a user or “were the result of pop-up windows or browser redirects.” Williams further explained, however, that pornographic pop-ups and redirects occur almost exclusively when a computer user visits another pornographic website.

After presenting Williams’s testimony, the state rested. Defendant then moved for a judgment of acquittal, arguing that there was no evidence that the eight images at issue had made their way onto the hard drive through any intentional or knowing action by him and that, even if it was possible to infer that defendant had accessed the images through web browsing, that inference was insufficient to establish defendant’s knowing possession or control of those images. The trial judge denied defendant’s motion, and the jury ultimately returned guilty verdicts on all eight charges. On defendant’s appeal, the Court of Appeals affirmed without opinion. State v. Barger, 233 Or App 621, 226 P3d 718 (2010). We allowed defendant’s petition for review.

Before this court, defendant argues that, although the state’s evidence might support an inference that he had accessed and viewed the images at issue, the evidence would not support an inference that he ever knowingly “possessed] or controlled]” them within the meaning of ORS 163.686(l)(a).

Because there is no evidence in the record suggesting that defendant knew about the computer’s automatic caching function or how to access material in the cache, the state does not now argue, and never has argued, that defendant “knowingly possessed] or control[led]” the images at issue insofar as they existed in his computer’s temporary [558]*558Internet file cache. Instead, the state’s position is a more simple one. It argues that, because defendant’s computer gave him the capability to print, save, e-mail, and otherwise manipulate the images in question, his actions of intentionally accessing one or more websites that contained the proscribed images, thus causing those images to be displayed on his computer screen, constituted “possession] and control[ ]” in the required sense. The question for this court thus is a narrow one: Can a computer user be found to have knowingly “possessed] or control[led]” digital images of child sexual abuse, within the meaning of ORS 163.686(l)(a)(A)(i), based solely on evidence showing that, at some time in the past, he intentionally accessed those digital images using his computer’s Internet browser and — by reasonable inference— looked at them?4

Free access — add to your briefcase to read the full text and ask questions with AI

Related

State v. Kenneth G.
Connecticut Appellate Court, 2026
State v. Cortes
374 Or. 461 (Oregon Supreme Court, 2025)
State v. Ballantyne
543 P.3d 1152 (Court of Appeals of Kansas, 2024)
ISSAC WOODS v. State
District Court of Appeal of Florida, 2021
State v. Carey-Martin
430 P.3d 98 (Court of Appeals of Oregon, 2018)
State v. Linson
2017 SD 31 (South Dakota Supreme Court, 2017)
State v. Shifflett
398 P.3d 383 (Court of Appeals of Oregon, 2017)
State v. Barnthouse
380 P.3d 952 (Oregon Supreme Court, 2016)
Hardin v. Popoff
379 P.3d 593 (Multnomah County Circuit Court, Oregon, 2016)
State v. Barnthouse
350 P.3d 536 (Court of Appeals of Oregon, 2015)
State v. Pugh
297 P.3d 27 (Court of Appeals of Oregon, 2013)
State v. Tilden
288 P.3d 567 (Court of Appeals of Oregon, 2012)
State v. Reeves
280 P.3d 994 (Court of Appeals of Oregon, 2012)
People v. Kent
970 N.E.2d 833 (New York Court of Appeals, 2012)
State v. Urbina
278 P.3d 33 (Court of Appeals of Oregon, 2012)
State v. Dillard
256 P.3d 160 (Court of Appeals of Oregon, 2011)
State v. Barger
253 P.3d 1030 (Oregon Supreme Court, 2011)
State v. Ritchie
248 P.3d 405 (Oregon Supreme Court, 2011)

Cite This Page — Counsel Stack

Bluebook (online)
247 P.3d 309, 349 Or. 553, 2011 Ore. LEXIS 3, Counsel Stack Legal Research, https://law.counselstack.com/opinion/state-v-barger-or-2011.