State v. Wilkie

2017 Ohio 1487
CourtOhio Court of Appeals
DecidedApril 24, 2017
Docket2-17-01
StatusPublished
Cited by2 cases

This text of 2017 Ohio 1487 (State v. Wilkie) is published on Counsel Stack Legal Research, covering Ohio Court of Appeals primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
State v. Wilkie, 2017 Ohio 1487 (Ohio Ct. App. 2017).

Opinion

[Cite as State v. Wilkie, 2017-Ohio-1487.]

IN THE COURT OF APPEALS OF OHIO THIRD APPELLATE DISTRICT AUGLAIZE COUNTY

STATE OF OHIO,

PLAINTIFF-APPELLEE, CASE NO. 2-17-01

v.

ERIC WILKIE, OPINION

DEFENDANT-APPELLANT

Appeal from Auglaize County Common Pleas Court Trial Court No. 2015-CR-133

Judgment Affirmed

Date of Decision: April 24, 2017

APPEARANCES:

Nicole Rutter-Hirth for Appellant

R. Andrew Augsburger for Appellee Case No. 2-17-01

SHAW, J.

{¶1} Defendant-appellant, Eric Wilkie (“Wilkie”), brings this appeal from

the December 20, 2016, judgment of the Auglaize County Common Pleas Court

sentencing Wilkie to an aggregate ten-year prison term after Wilkie pled no contest

to, and was found guilty of, two counts of Pandering Obscenity Involving a Minor

in violation of R.C. 2907.321(A)(2), both felonies of the second degree, three counts

of Pandering Obscenity Involving a Minor in violation of R.C. 2907.321(A)(5), all

felonies of the fourth degree, and sixteen counts of Pandering Sexually Oriented

Material Involving a Minor in violation of R.C. 2907.322(A)(1), all felonies of the

second degree. On appeal, Wilkie argues that the trial court erred by denying his

motion to compel the government’s software that was used to find Wilkie sharing

child pornography and he argues that the trial court erred by denying his amended

suppression motion, particularly without an additional hearing.

Relevant Facts and Procedural History

{¶2} On November 18, 2015, Wilkie was indicted in trial court case number

2015-CR-0133 for two counts of Pandering Obscenity Involving a Minor in

violation of R.C. 2907.321(A)(2), both felonies of the second degree (Counts 1 and

3), and three counts of Pandering Obscenity Involving a Minor in violation of R.C.

2907.321(A)(5), all felonies of the fourth degree (Counts 2, 4, 5). A second

indictment was filed against Wilkie on February 25, 2016, alleging sixteen counts

-2- Case No. 2-17-01

of Pandering Sexually Oriented Material Involving a Minor in violation of R.C.

2907.322(A)(1), all felonies of the second degree. The second indictment was

originally assigned case number 2016-CR-0031; however, the two indictments

against Wilkie were consolidated without objection and all filings were thereafter

made in the 2015-CR-0133 file. Wilkie pled not guilty to the charges against him.

{¶3} The charges against Wilkie stemmed from allegations that Wilkie was

publicly sharing child pornography through an online peer-to-peer (“P2P”) file

sharing program called Shareaza.1 On multiple dates Detective Jeffrey Blackmore

of the Van Wert Police Department was able to download suspected child

pornography from an IP address linked to Wilkie and Detective Blackmore

1 A thorough discussion of P2P file sharing is contained in States v. Thomas, D. Vt, Nos. 5:12-cr-37, 5:12- cr-44, 5:12-cr-97, 2013 WL 6000484, which was cited by the trial court in its entry denying Wilkie’s suppression motion. It provides a general overview of P2P file sharing, which reads, in pertinent part:

Peer-to-peer file sharing is a popular means of obtaining and sharing files free of charge directly from other computer users who are connected to the Internet and who are also using peer-to-peer file sharing software. Peer-to-peer file sharing software is publicly available for download free of charge from the Internet and operates on a particular network which dictates to some extent how the file sharing will occur. * * *

The file sharing software does not permit a user to access files that are not available for sharing. * * *

File sharing occurs when one computer, identified by an Internet Protocol (“IP”) address, initiates a search for a responsive file by indicating the term or terms that it seeks to find in the file’s name. This is called a “query” and consists of key words such as “child,” “pornography,” or “child pornography.” Law enforcement has identified a number of search terms commonly associated with child pornography. Other computers that are using the same file sharing software and connected to the Internet at the time will respond to the query with a “query hit message.” A query hit message identifies the file or files available for sharing which have a word in the file name that matches the search word in the query. The query hit message will also contain additional information such as the IP addresses of the computers offering to share responsive files. * * *

-3- Case No. 2-17-01

confirmed that the files he downloaded from Wilkie’s IP address did, in fact, contain

child pornography. Detective Blackmore passed this information onto Detective

Douglas Burke of the Auglaize County Sheriff’s Office. Detective Burke used this

information to obtain a search warrant to search Wilkie’s residence, where more

child pornography was discovered on an external hard drive, leading to further

charges against Wilkie. During the search of Wilkie’s residence, Wilkie spoke with

Detective Blackmore and Wilkie admitted to possessing child pornography.

{¶4} On April 29, 2016, Wilkie filed an initial suppression motion, seeking

to suppress the results of the search of his home on November 5, 2015, and the

statements that he made on the day of the search.

{¶5} On June 30, 2016, a suppression hearing was held. At the hearing,

Detective Jeffrey Blackmore of the Van Wert Police Department testified that he

received training on how to use P2P file sharing programs and how to investigate

those file sharing programs for individuals sharing child pornography. Detective

Blackmore testified that utilizing a law enforcement-specific version of Shareaza

called Shareaza Law Enforcement (“ShareazaLE”), he identified an IP address in

St. Marys that had “child notable files shown in their file sharing database.”2 (June

30, 2016, Tr. at 16). Detective Blackmore testified that he initiated a “browse of

2 Detective Blackmore explained that the “law enforcement version of the software” utilizes a database of known child pornography to search “the file sharing networks for any child sharing pornography” then it will identify the IP address where it is coming from. (June 30, 2016, Tr. at 14). He also testified that the law enforcement version will not allow file sharing; rather it only accepts downloads. (Id. at 31).

-4- Case No. 2-17-01

that person’s file[s]” and that he then attempted to download the suspected child

pornography files.

{¶6} Detective Blackmore testified that he downloaded five files of

suspected child pornography between September 23rd and 24th of 2015 from the

same IP address in St. Marys. Detective Blackmore testified that the five

downloaded files did, in fact, contain child pornography. Detective Blackmore

testified that he obtained a subpoena for Time Warner Cable to learn who was the

subscriber attached to the IP address, and the address came back to 369 Northway

Drive in St. Marys, Ohio, under a “nickname” shown as “Eric.” The subscriber was

Wilkie and the address was Wilkie’s.

{¶7} Detective Blackmore testified that on October 18, 2015, he downloaded

thirteen more suspected child pornography files from Wilkie’s IP address.

Detective Blackmore testified that the additional files he downloaded also contained

child pornography.

{¶8} Detective Blackmore testified that he took his information to the

Auglaize County Police Department and was placed in contact with Detective

Free access — add to your briefcase to read the full text and ask questions with AI

Related

State v. Foster
2025 Ohio 2942 (Ohio Court of Appeals, 2025)
State v. Nichols
2023 Ohio 4364 (Ohio Court of Appeals, 2023)

Cite This Page — Counsel Stack

Bluebook (online)
2017 Ohio 1487, Counsel Stack Legal Research, https://law.counselstack.com/opinion/state-v-wilkie-ohioctapp-2017.