State v. Dexter

651 S.E.2d 900, 186 N.C. App. 587, 2007 N.C. App. LEXIS 2313
CourtCourt of Appeals of North Carolina
DecidedNovember 6, 2007
DocketCOA06-1611
StatusPublished
Cited by9 cases

This text of 651 S.E.2d 900 (State v. Dexter) is published on Counsel Stack Legal Research, covering Court of Appeals of North Carolina primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
State v. Dexter, 651 S.E.2d 900, 186 N.C. App. 587, 2007 N.C. App. LEXIS 2313 (N.C. Ct. App. 2007).

Opinion

*589 ELMORE, Judge.

On 13 July 2006, a jury found Tad William Dexter (defendant) guilty of nine counts of third-degree sexual exploitation of a minor. The trial judge sentenced defendant to several suspended sentences of six to eight months, an active sentence of sixty days, intensive supervision for six months, and thirty-six months of supervised probation. Defendant appeals the trial court’s denial of a motion to suppress and a motion to dismiss.

On 3 August 2003, an individual who identified herself as Mary Watson submitted the following text to the FBI from the e-mail address sandall_66@yahoo.com:

There is a Yahoo group called “hssp” that is actually child porn all the way. It is actually “groups.yahoo.com/group/hsppp.” I have reported this group to https://web.cybertip.org/cyberTipIIhtml to see if they can do anything about it. The user is someone I know. It makes me sick and I will continue to do whatever I can to stop this sick sick practice. The user name is “hard_one_in_hand2002.” He is a 42 year old male who (according to his Internet files) loves to look at young girls. This guy has to be stopped — he makes me sick. He and I currently share a house and should he find out I reported this, I do not know what he would do. His name is Tad Dexter — he lives [in] Oriental, NC. I am afraid of him.... I have copied most of the cd’s he has downloaded pictures on. If anyone calls me, please be careful as to how a message is left. He is planning on reformatting his computer soon. I know he joined a paysite called www.lolitateen.com the other day. He is really a sick man. I can only image [sic] what he will do should he find out this information came from me. He runs a business in this community and has made several remarks to me about some of his customers’ daughters (15 & 16 year olds). Thanks for your help.

The FBI attempted several times to contact Mary Watson using the telephone number that she had included with her e-mail. The FBI later learned that Mary Watson goes by “Lisa,” her middle name, 1 and worked at a restaurant in Pamlico County. The FBI contacted Lisa Watson at the restaurant on 15 August 2002, and Watson told the FBI that she had not filed a complaint against her boyfriend, that she did not know if he possessed child pornography, that she had not heard *590 of the profile “hard_one_in_hand2002,” and was unaware of any Yahoo groups trading in child pornography. However, Watson verified that her e-mail address was sandall_66@yahoo.com and that her boyfriend was Tad Dexter.

Later on 15 August 2002, the FBI learned the following: (1) a Yahoo profile of “hard_one_in_hand2002” did exist and had been modified that day; (2) the website www.lolitateens.com existed and declared itself to have “the youngest barely legal teens!”; (3) defendant resided at the address given by Watson in her e-mail; (4) defendant was forty-two years old on 3 August 2002; (5) defendant had been arrested for a number of sexual crimes in New Jersey, North Carolina, and Virginia, including indecent exposure, obscene literature and exhibitions, assault on a female, and indecent liberties with a child.

The North Carolina State Bureau of Investigation (the SBI) issued a subpoena to Yahoo for subscriber information on the login name, hard_one_in_hand@yahoo.com.” On 23 September 2002, Yahoo told the SBI that the login name was issued to “Tad Dexter of Oriental, North Carolina, 28571.”

SBI Special Agent Hans J. Miller submitted an affidavit for a search warrant to search defendant’s residence for evidence of minors visually depicted while engaged in sexually explicit conduct. 2 In his explanation of probable cause, Special Agent Miller stated that he believed that Mary Watson and Lisa Watson were the same person because investigators were able to verify most of the facts that she gave in her e-mail. Special Agent Miller explained that, based on his training and experience, he knew that “it is common for witnesses in a domestic situation to recant reports or disclosures of criminal activity in order to protect the criminal offender.”

Agents from the SBI, the FBI, and officers from the Pamlico County Sheriffs Department and Craven County Sheriff’s Office searched defendant’s home on 2 October 2002. Defendant shared his home with Watson and two of her children, and each of the four inhabitants had a computer. Special Agent Miller observed that defendant’s computer, located in his bedroom, was still running when they entered the home. Several chat windows were open, and one of the chat dialogues showed that “T. W. Dexter” had written, “thanks for the pics” or “thanks for the pictures.” There was a picture layered underneath the chat windows, which Special Agent Miller described as “a picture of what appeared to be an under age girl, under 18, in a *591 spread eagle position lying on a couch with her legs spread open and her arms back. She was wearing skimpy underwear, possibly could be a thong.” Special Agent Miller noted that the time displayed on the computer screen was within a few minutes of the actual time according to his watch.

The officers seized three computer towers, a hard disk drive, CDs and CD cases, VHS tapes, a plastic bag containing marijuana, marijuana paraphernalia, floppy disks, a printed web page, a note with handwritten passwords, a lock box with key and contents, a CD entitled “personal movies,” and a digital disk drive from inside defendant’s computer. The officers recovered a large number of images of suspected child pornography, but did not file charges based on those images because the State was not certain that the individuals in the photographs were under age.

The State ultimately filed charges based on eighteen images recovered from defendant’s computer. These images were all temporary Internet files stored in a temporary Internet folder. Special Agent Miller testified that if one receives an image by e-mail through a regular e-mail client (e.g., Outlook), the image files do not normally become temporary Internet files. This may happen if one uses a web-based e-mail client such as Yahoo or AOL, through which one accesses e-mail through a website. If one received a link to a website via e-mail or chat, a temporary Internet file is only created if the user clicks on the link and visits the website.

Some of the image files were found in active temporary Internet folders, which defendant could have accessed at any time. Other image files were found in the “recovered folders” of defendant’s hard drive using forensic software. Special Agent Miller explained that “when you take a hard drive and reformat it and it had contained data, forensic software allows you to recover the data that was once there” but is “not easily seen by someone without specialized software.” The time stamps on the image files from the recovered folders of defendant’s hard drive indicate that the images were viewed in late September of 2002.

I. The Motion to Suppress

Defendant first argues that the trial court erred by denying defendant’s motion to suppress the use of any evidence obtained pursuant to the search warrant issued 2 October 2002.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

State v. Reber
Court of Appeals of North Carolina, 2024
State v. Bowman
Court of Appeals of North Carolina, 2023
State v. Neal
689 S.E.2d 244 (Court of Appeals of North Carolina, 2009)
State v. Thomas
676 S.E.2d 56 (Court of Appeals of North Carolina, 2009)
State v. Riffe
661 S.E.2d 899 (Court of Appeals of North Carolina, 2008)
State v. Hinkle
659 S.E.2d 34 (Court of Appeals of North Carolina, 2008)
State v. Ellis
657 S.E.2d 51 (Court of Appeals of North Carolina, 2008)
State v. Little
654 S.E.2d 760 (Court of Appeals of North Carolina, 2008)

Cite This Page — Counsel Stack

Bluebook (online)
651 S.E.2d 900, 186 N.C. App. 587, 2007 N.C. App. LEXIS 2313, Counsel Stack Legal Research, https://law.counselstack.com/opinion/state-v-dexter-ncctapp-2007.