State v. O'Neal

2024 S.D. 40
CourtSouth Dakota Supreme Court
DecidedJuly 10, 2024
Docket30023
StatusPublished
Cited by1 cases

This text of 2024 S.D. 40 (State v. O'Neal) is published on Counsel Stack Legal Research, covering South Dakota Supreme Court primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
State v. O'Neal, 2024 S.D. 40 (S.D. 2024).

Opinion

#30023-a-PJD 2024 S.D. 40

IN THE SUPREME COURT OF THE STATE OF SOUTH DAKOTA

****

STATE OF SOUTH DAKOTA, Plaintiff and Appellee,

v.

MICHAEL ADAM O’NEAL, Defendant and Appellant.

APPEAL FROM THE CIRCUIT COURT OF THE SECOND JUDICIAL CIRCUIT MINNEHAHA COUNTY, SOUTH DAKOTA

THE HONORABLE CAMELA THEELER Judge

KATHERYN DUNN LORANDA KENYON of Minnehaha County Public Defender’s Office Sioux Falls, South Dakota Attorneys for defendant and appellant.

MARTY J. JACKLEY Attorney General

ERIN E. HANDKE Assistant Attorney General Pierre, South Dakota Attorneys for plaintiff and appellee.

ARGUED OCTOBER 4, 2023 OPINION FILED 07/10/24 #30023

DEVANEY, Justice

[¶1.] Michael O’Neal was charged with fifteen counts of possession of child

pornography as a result of an investigation that included a warrantless seizure of

his cell phone followed by a later search of the phone pursuant to a warrant. O’Neal

moved to suppress the evidence obtained from his phone. The circuit court

determined the seizure of the phone was unconstitutional but ultimately denied the

motion to suppress the evidence obtained from the search of the phone. The circuit

court also denied O’Neal’s motion to dismiss the charges on grounds of

preindictment delay and his motion to preclude the introduction of images on his

phone corresponding to hash values that had not been identified by the State

pursuant to his request for a bill of particulars. Following a jury trial, O’Neal was

convicted on all fifteen counts. He appeals, challenging these and other rulings by

the court. We affirm.

Factual and Procedural Background

[¶2.] On December 7, 2018, Christiana Guggenberger contacted the Sioux

Falls Police Department and reported that she found an image of a topless 10- or

11-year-old girl on O’Neal’s phone. Guggenberger, O’Neal’s then-fiancé, found the

image while O’Neal was sleeping. She provided law enforcement with O’Neal’s

phone number, the passcode to the phone, and a detailed description of the phone.

She also told them that the phone would be in O’Neal’s possession at his place of

work. Anthony Buss, a now-former detective with the Sioux Falls Police

Department responsible for investigating internet crimes against children, was

-1- #30023

made aware of this information. He asked Officer Ryan Hansen to make contact

with O’Neal and retrieve this phone.

[¶3.] Officer Hansen went to O’Neal’s workplace, a Wendy’s restaurant, and

explained to O’Neal that the police department had received information regarding

concerning photos on his cell phone. Officer Hansen described the phone he was

looking for as a gold iPhone in a black and white case with a cracked screen and

told O’Neal that he would be seizing this phone. O’Neal informed Officer Hansen

that the phone was in the back employee area and stated that there was nothing on

the phone. Officer Hansen followed O’Neal to the back of the restaurant where

O’Neal retrieved the phone and handed it to Officer Hansen. Upon request, he also

gave Officer Hansen its passcode. Officer Hansen then placed the phone in airplane

mode, turned it off, and transported it to the Department’s evidence bureau. He did

not search the contents of the phone.

[¶4.] On December 11, 2018, Detective Buss obtained a warrant to search

the phone. He then unlocked the phone with the passcode and found images he

believed to be child pornography. Following this search, Guggenberger contacted

Detective Buss and informed him that she had several items at her residence that

she wanted to provide to the police. Detective Buss went to her apartment on

January 2, 2019, and retrieved hard drives, SD cards, and a pillowcase containing

printed pictures from her garage. Detective Buss then requested and obtained a

warrant to search the contents of these items.

[¶5.] On one of the hard drives retrieved from Guggenberger’s apartment,

Detective Buss found additional images depicting what he believed to be child

-2- #30023

pornography. The hard drive included separate folders named “CG” for Christiana

Guggenberger and “M stuffs” for Michael O’Neal. According to Guggenberger, she

gave the hard drive to O’Neal in the summer of 2016 and had not used it since. The

“CG” folder mainly consisted of vacation and cat photos. “M stuffs” had another

folder inside it named “re,” which contained another “re” folder. Within the second

“re” folder Detective Buss found alleged child pornography.

[¶6.] O’Neal was indicted on February 13, 2020, on fifteen counts of

possessing, manufacturing, or distributing child pornography in violation of SDCL

22-24A-3. Aside from the alleged dates of when the conduct occurred, each count

contained identical language. 1 O’Neal filed a motion for a bill of particulars asking

the State to provide “a more particularized statement of what images and the

location of said images” are alleged for each count. In response, the State provided

O’Neal a list of hash values identifying the images associated with each count of the

indictment. 2

1. The language in each count alleged that “the Defendant . . . did commit the public offense of Possessing, Manufacturing, or Distributing Child Pornography (SDCL 22-24A-3(3)) in that the Defendant did knowingly possess, distribute, or otherwise disseminate any visual depiction of a minor engaging in a prohibited sexual act, or in the simulation of such an act[.]” Counts 1-7 were alleged to have occurred on or about December 7, 2018, and pertained to images found on O’Neal’s cell phone, and counts 8-15 were alleged to have occurred on or about January 2, 2019, and pertained to images found on the hard drive.

2. As explained by O’Neal’s forensic computer expert, Daniel Meinke, a hash value is an identifying number computed by using various algorithms which is “the digital equivalent of human DNA[.]” Each image or data file has a hash value that is unique. This allows one who is examining a very large amount of data to locate the specific files at issue.

-3- #30023

[¶7.] O’Neal filed several pretrial motions. In two separate motions, he

moved to suppress any evidence obtained as a result of the December 7 seizure of

his phone and the later search of his phone executed pursuant to the December 11

search warrant. He argued that the seizure violated his Fourth Amendment rights

and that the warrant was issued without probable cause. 3

[¶8.] The circuit court held a suppression hearing on these issues and after

considering the evidence and arguments presented by the parties, the court took the

matter under advisement. 4 The court later issued a memorandum decision denying

the motions to suppress. In its written opinion, the court rejected the State’s

argument that O’Neal had voluntarily consented to the seizure of his phone, or in

the alternative, that exigent circumstances justified a warrantless seizure. The

court determined the December 7 seizure of the phone was unconstitutional but

concluded that the affidavit submitted in support of the search warrant provided

sufficient probable cause to sustain the warrant. The court then determined the

evidence obtained via the December 11 search warrant was sufficiently attenuated

from the unlawful seizure of O’Neal’s phone and, therefore, declined O’Neal’s

Free access — add to your briefcase to read the full text and ask questions with AI

Related

State v. Antuna
2024 S.D. 78 (South Dakota Supreme Court, 2024)

Cite This Page — Counsel Stack

Bluebook (online)
2024 S.D. 40, Counsel Stack Legal Research, https://law.counselstack.com/opinion/state-v-oneal-sd-2024.