State v. Fielding

2014 Ohio 3105
CourtOhio Court of Appeals
DecidedJuly 15, 2014
Docket13AP-654,13AP-655
StatusPublished
Cited by21 cases

This text of 2014 Ohio 3105 (State v. Fielding) is published on Counsel Stack Legal Research, covering Ohio Court of Appeals primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
State v. Fielding, 2014 Ohio 3105 (Ohio Ct. App. 2014).

Opinion

[Cite as State v. Fielding, 2014-Ohio-3105.]

IN THE COURT OF APPEALS OF OHIO

TENTH APPELLATE DISTRICT

State of Ohio, :

Plaintiff-Appellee, : No. 13AP-654 (C.P.C. No. 12CR-2800) v. : No. 13AP-655 (C.P.C. No. 13CR-1564) Matthew N. Fielding, : (REGULAR CALENDAR) Defendant-Appellant. :

D E C I S I O N

Rendered on July 15, 2014

Ron O'Brien, Prosecuting Attorney, and Seth L. Gilbert, for appellee.

Tyack, Blackmore, Liston & Nigh Co., L.P.A., and Jonathan T. Tyack, for appellant.

APPEALS from the Franklin County Court of Common Pleas.

BROWN, J. {¶ 1} In this consolidated appeal, defendant-appellant, Matthew N. Fielding, appeals the judgment of the Franklin County Court of Common Pleas in case No. 12CR- 2800, in which the court found him guilty, pursuant to a bench trial, of three counts of pandering sexually oriented matter involving a minor in violation of R.C. 2907.322(A)(5), felonies of the fourth degree; and the judgment of the Franklin County Court of Common Pleas in case No. 13CR-1564, in which the court found him guilty, pursuant to a bench trial, of three counts of pandering sexually oriented matter involving a minor in violation of R.C. 2907.322(A)(5), felonies of the fourth degree, and one count of pandering sexually oriented matter involving a minor in violation of R.C. 2907.322(A)(1), a felony of the second degree. Nos. 13AP-654 and 13AP-655 2

{¶ 2} Upper Arlington Police Officer John Priest, an investigator and computer forensics examiner assigned to the multi-jurisdictional Internet Crimes Against Children ("ICAC") Task Force, monitors peer-to-peer file-sharing networks, including Gnutella, for distribution of child pornography. Peer-to-peer networks such as Gnutella allow users both to share with other network users files they have created or downloaded and to access files created or downloaded by other network users. The Gnutella network is accessible through a number of free file-sharing programs available for download on the internet, including the Shareaza program. {¶ 3} On June 22, 2010, Officer Priest was searching for files containing titles indicative of child pornography via a software program utilized by law enforcement known as "Roundup." "Roundup" permits the downloading of files from a remote computer onto an investigative computer accessible only to law enforcement. Officer Priest identified a particular internet protocol address ("IP address") that contained file names commonly associated with child pornography.1 Officer Priest established a direct connection with the computer associated with the IP address, downloaded a video file from that computer, and confirmed that the file contained child pornography. He subsequently determined that the computer associated with the IP address belonged to an AT&T internet customer. {¶ 4} Based on these findings, Officer Priest prepared an investigative subpoena, which was signed by a Franklin County Municipal Court judge, to obtain from AT&T the subscriber information associated with the IP address. In response to the subpoena, AT&T, via a facsimile transmission, identified appellant as the internet subscriber assigned to the IP address in question and provided appellant's home address, home telephone number, and e-mail address. Officer Priest forwarded this information to a fellow ICAC Task Force member, Detective Jane Junk of the Columbus Division of Police, who thereafter obtained a search warrant for appellant's residence. {¶ 5} Detective Junk and Franklin County Sheriff's Office Detective Marcus Penwell, another member of the ICAC Task Force, executed the search warrant at

1 Officer Priest defined an IP address as "a series of numbers that identify a physical location, much like a

mailbox and a postal address identifies a physical location[,] that's used to direct Internet traffic to a specific router or house where the router exists." (Apr. 4, 2013 Tr., 25.) Nos. 13AP-654 and 13AP-655 3

appellant's residence on September 7, 2010. Pursuant to the search, a laptop computer and an external hard drive were seized from a bedroom office. Subsequent forensic analysis of both devices revealed multiple files containing child pornography. {¶ 6} As a result, a Franklin County Grand Jury returned two separate eight- count indictments against appellant. The first, issued on June 5, 2012 in case No. 12CR- 2800, charged appellant with four counts of pandering sexually oriented matter involving a minor in violation of R.C. 2907.322(A)(1), second-degree felonies, stemming from four separate files allegedly transferred onto the external hard drive on August 1, 2007, July 23, May 21, and April 19, 2008 (Counts 1, 2, 3, and 4), and four counts of pandering sexually oriented matter involving a minor in violation of R.C. 2907.322(A)(5), fourth- degree felonies, arising out of the September 7, 2010 discovery of those files on the external hard drive (Counts 5, 6, 7, and 8). The second indictment, returned on March 21, 2013 in case No. 13CR-1564, charged appellant with four counts of pandering sexually oriented matter involving a minor in violation of R.C. 2907.322(A)(1), second-degree felonies, stemming from four separate files allegedly downloaded onto the laptop computer on June 22, July 8, July 11-12, and June 21, 2010 (Counts 1, 2, 3 and 4), and four counts of pandering sexually oriented matter involving a minor in violation of R.C. 2907.322(A)(5), fourth-degree felonies, arising out of the September 7, 2010 discovery of those files on the laptop computer (Counts 5, 6, 7, and 8).2 {¶ 7} Appellant filed a pre-trial motion to suppress under both case numbers. Appellant argued that law enforcement illegally obtained his subscriber information from AT&T; accordingly, the subscriber information, as well as all derivative evidence, including the search of his residence, all evidence seized during the search, and all statements appellant made during the search, should be suppressed. Following consolidation of the cases, the matter proceeded for hearing on the motion to suppress. At the conclusion of the hearing, the trial court denied the motion. {¶ 8} Appellant waived his right to a jury trial and agreed to have the consolidated cases tried to the bench. The parties stipulated that all evidence and testimony presented at the suppression hearing would be incorporated into the trial proceeding. Following the

2At trial, the state, without objection by appellant and with the trial court's authorization, amended the date of Count 5 of the indictment in case No. 13CR-1564 to June 22, 2010. Nos. 13AP-654 and 13AP-655 4

bench trial, the court issued decisions finding appellant guilty in case No. 12CR-2800 of Counts 6, 7, and 8 (pandering sexually oriented matter involving a minor in violation of R.C. 2907.322(A)(5)), and guilty in case No. 12CR-1654 of Count 1 (pandering sexually oriented matter involving a minor in violation of R.C. 2907.322(A)(1)) and Counts 5, 6, and 7 (pandering sexually oriented matter involving a minor in violation of R.C. 2907.322(A)(5). The court acquitted appellant of the other crimes charged in the indictments. {¶ 9} Following a July 2013 sentencing hearing, the trial court sentenced appellant to a seven-day jail term, a five-year term of community control, and ordered that he register as a Tier II sex offender. Thereafter, the trial court issued a judgment entry memorializing its decisions and sentencing. {¶ 10} In a timely appeal, appellant asserts the following three assignments of error: I. THE TRIAL COURT ERRED IN OVERRULING APPELLANT'S MOTION TO SUPPRESS ALL EVIDENCE ARISING OUT OF OR RESULTING FROM THE INVESTIGATIVE SUBPOENA SENT TO AT&T BY LAW ENFORCEMENT FOR THE PURPOSE OF DETERMINIG APPELLANT'S IDENTITY.

II.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

State v. Pace
2025 Ohio 2874 (Ohio Court of Appeals, 2025)
State v. Perry
2025 Ohio 2054 (Ohio Court of Appeals, 2025)
State v. Hood
2025 Ohio 422 (Ohio Court of Appeals, 2025)
State v. Diaw
2024 Ohio 2237 (Ohio Court of Appeals, 2024)
State v. Harrison
2024 Ohio 884 (Ohio Court of Appeals, 2024)
State v. Nation
2023 Ohio 106 (Ohio Court of Appeals, 2023)
State v. Fenter
2022 Ohio 3279 (Ohio Court of Appeals, 2022)
State v. Kimes
2021 Ohio 650 (Ohio Court of Appeals, 2021)
State v. Burroughs
2020 Ohio 4417 (Ohio Court of Appeals, 2020)
State v. Mattocks
2020 Ohio 3858 (Ohio Court of Appeals, 2020)
State v. Reilly
2020 Ohio 850 (Ohio Court of Appeals, 2020)
State v. Teeple
2018 Ohio 1767 (Ohio Court of Appeals, 2018)
State v. Reece
2017 Ohio 8789 (Ohio Court of Appeals, 2017)
State v. Barnes
2017 Ohio 7284 (Ohio Court of Appeals, 2017)
State v. Seaburn
2017 Ohio 7115 (Ohio Court of Appeals, 2017)
State v. Wilson
2017 Ohio 5484 (Ohio Court of Appeals, 2017)
State v. Thomas
2017 Ohio 4356 (Ohio Court of Appeals, 2017)
Tavtigian v. Foster
2017 Ohio 4311 (Ohio Court of Appeals, 2017)
State v. Duvernay
2017 Ohio 4219 (Ohio Court of Appeals, 2017)
State v. Shannon
2016 Ohio 8220 (Ohio Court of Appeals, 2016)

Cite This Page — Counsel Stack

Bluebook (online)
2014 Ohio 3105, Counsel Stack Legal Research, https://law.counselstack.com/opinion/state-v-fielding-ohioctapp-2014.