OPINION
Appellant, Barry Kent Barrett, pled guilty to one count of online solicitation of a minor and was sentenced to eighteen years confinement and a fine of .fS^OO.
1
He also pled guilty to twelve counts of possession of child pornography and was sentenced to ten years confinement as to each offense.
2
Finally, he pled guilty to four counts of promotion of child pornography and was sentenced to ten years confinement as to each offense.
3
All seventeen sentences were ordered to ran
Probable Cause
A search warrant cannot issue unless it is based on probable cause as determined from the four corners of an affidavit. U.S. Const. amend IV; Tex. Const. art. I, § 9; Tex.Code Crim. Proc. Ann. art. 18.01(b) (“A sworn affidavit ... establishing probable cause shall be filed in every instance in which a search warrant is requested.”) "When reviewing a magistrate’s decision to issue a warrant, we apply a highly deferential standard in keeping with the constitutional preference for a warrant.
Rodriguez v. State,
Under the Fourth Amendment and the Texas Constitution, an affidavit supporting a search warrant is sufficient if, from the totality of circumstances reflected in the affidavit and the reasonable inferences it supports, the magistrate was provided with a substantial basis for concluding that probable cause existed.
Swearingen v. State,
A reviewing court should not invalidate a warrant by interpreting the affidavit in a hypertechnical manner.
See Rodriguez,
Here, the affidavit provided in support of the search warrant in question alleges that Amarillo Police Department Sergeant Dustin Ponder received information via FBI Special Agent Ryan Allen that, on April 30, 2009, Agent Allen, logged onto a Yahoo! Instant Messenger chat program posing as a twelve year old female under the screen name “annababeel2.” While in the program, Agent Allen entered into a chat session with a person identified as “Brad Jones.” During that chat session, “Brad Jones” sent Agent Allen ten images of suspected child pornography. “Brad Jones” showed to have a Yahoo! User I.D. of “texasdudetwo.” On May 4, 2009, the FBI issued a subpoena to Yahoo! Inc. to obtain information regarding the identity of “texasdudetwo.” Yahoo! Inc. identified the internet protocol address of “tex-asdudetwo” as being 74.197.94.29. 4 Yahoo! Inc. further identified Suddenlink Communications as the internet provider that owned that particular IP address. On May 12, 2009, the FBI subpoenaed Sud-denlink Communications for information pertaining to the subscriber associated with that IP address. Suddenlink Communications identified the subscriber as Barry Barrett, 5021 John Drive, Amarillo, Texas 79110-231S. 5 On June 1, 2009, Sergeant Ponder received from the FBI copies of the subpoenas and returns, together with two CDs and ten printed photographs. Sergeant Ponder reviewed four of the photographs which he described in the affidavit as minor girls posing nude. Based on this information, Sergeant Ponder averred that he believed that “suspected partfies],” including Appellant, were, in charge of a “suspected place,” 5021 John Dr., Amarillo, Texas, and that he believed that evidence of a specific crime, “possession and/or promotion of child pornography,” would be found at that location. He further indicated that, based on his training and experience in the investigation of sexual offenses against children, he believed that evidence of that offense might be found at that address because it was common for individuals engaging in such activity to store such images on computer media. He also believed, based on his training and experience, that persons who collected images of child pornography do not dispose of them on a regular basis but store them for long periods of time.
While the possibility does exist that someone using a computer device with that particular IP address could have accessed the internet through a portal other than the access provided by Suddenlink Com
Appellee relies heavily on
Taylor v. State,
Considering the totality of the circumstances, the issuing magistrate could have reasonably inferred from the facts set forth in the affidavit the following: (1) suspected persons, including Appellant, resided at the residence located at 5021 John Drive, Amarillo, Texas; (2) Suddenlink Communications provided internet access to that address; (3) a computing device connecting to the internet through that access was assigned IP address number 74.197.94.29; (4) IP address number 74.197.94.29 was associated with “Brad Jones” whose Yahoo! User ID was “tex-asdudetwo”; and (5) someone using that IP address possessed and distributed images depicting child pornography. Accordingly, we conclude the affidavit in support of the search warrant in question contained sufficient allegations to establish probable cause that evidence of child pornography would be found at 5021 John Drive, Amarillo, Texas.
SbizuRE of Unlisted Items
Appellant next asserts that officers illegally seized female underwear while executing the search warrant because the warrant did not specifically describe those items. The State contends the seizure of the underwear was justified by the plain view doctrine. Appellant contends the plain view doctrine is inapplicable because the search warrant did not specifically list female underwear as an item to be seized and the mere possession of female underwear is not unlawful.
It is well established that under certain circumstances the police may seize, without a warrant, evidence of a crime that
Here, although not attached to the search warrant as evidence of probable cause, officers executing the search warrant were aware of chat logs, received from the FBI, containing a transcript of chat sessions between “Brad Jones” and “annababeel2.” During online chat sessions with Agent Allen, “Brad Jones” referred to himself as “pantiefetishguy,” expressed interest in the type of underwear worn and owned by “annababeel2,” requested pictures of her underwear, and indicated that he masturbated with girls’ underwear while inviting “annababeel2” to participate in that activity with him. During the execution of the search warrant, officers seized thirty-three pairs of female underwear from Appellant’s bedroom. Officers found eighteen pairs of female underwear, both women’s and children’s, lying around Appellant’s computer and in a cabinet underneath his computer, two pairs in his bedroom closet and thirteen pairs in a shaving kit bag.
Having found the search warrant was valid, we also find the officers were lawfully where the underwear could be “plainly viewed.” Furthermore, given the chat logs already known to the officers, the “incriminating character” of the underwear was “immediately apparent,” and they had the right to seize that evidence.
Keehn,
Stale Information
We agree with the State that the information contained in Sergeant Ponder’s affidavit was not stale. To support the issuance of a warrant, the facts relied upon in the probable cause affidavit must not have become “stale” by the time the warrant is issued;
Kennedy v. State,
Although the passage of time is one factor that should be considered when determining if the information in an affidavit is stale, the amount of time passed is less significant if the affidavit contains facts showing “activity of a protracted and continuous nature, i.e., a course of conduct.”
Kennedy,
The affidavit tendered to the magistrate in support of the warrant in question states that the investigation leading to this prosecution commenced on April 30, 2009, and that it relied upon information received pursuant to subpoenas issued May 4 and May 12, 2009. The affidavit further states that, based upon the affiant’s training and experience in the field of investigating sexual offenses against children, persons who collect pornographic images, such as those transmitted to Agent Allen, do not dispose of them on a regular basis, but instead tend to store them for long periods of time. The warrant in question was issued at 2:55 p.m. on June 16, 2009, and was formally executed at 8:45 a.m. on June 17, 2009. Thus, the warrant in question was obtained and executed within forty-eight days of the date the suspect first transmitted (and therefore possessed) images depicting child pornography.
Considering the affidavit as a whole and the reasonable inferences it supports, we conclude the issuing magistrate had a substantial basis to find that a fair probability existed that images depicting child pornography would continue to be on or recoverable from a computer device that would be readily accessible to one of the suspected parties at the residential address stated in the search warrant. See id. Accordingly, we conclude the information contained in Sergeant Ponder’s affidavit was not stale.
Conclusion
Having addressed Appellant’s arguments seriatim, we find the trial court did not err in denying Appellant’s motion to suppress. Appellant’s issue is overruled and the trial court’s judgments are affirmed.
Notes
. Cause No. 20,766-A. See Tex. Penal Code Ann. § 33.021(b)(2) (West 2011).
. Cause Nos. 20,767-A (two counts); 21,200-A (five counts); 21,201-A (five counts). See Tex. Penal Code Ann. § 43.26(a) (West 2011).
. No. 21,615-A. See Tex. Penal Code Ann. § 43.26(e) (West 2011).
. An internet protocol address, commonly referred to as an "IP address,” is a numerical label, consisting of four numbers (ranging from I to 255) separated by periods, uniquely assigned to every device (e.g., computer, printer, cell phone) participating in a computer network that uses the internet protocol for communication.
United States v. Vázquez-Rivera,
. Web page and internet providers such as Yahoo! Inc. and Suddenlink Communications have a vested interest in protecting their users from viewing materials that violate local, state, national, and international law.
State v. Cotter,
.
See also Armstrong v. State,
No. 10-08-00114-CR,
. As for those items of evidence which were not easily seen upon entering Appellant’s bedroom, e.g., the underwear located in the closet, cabinet drawers and shaving kit, officers were lawfully permitted to search the "suspected place” for any device which might store pornographic images. Because electronic computer memory devices can be easily concealed in a myriad of places, including closets, cabinets and shaving kits, the officers were lawfully searching places where the items were in plain view.
