OPINION
The trial court found appellant, Robert Lee Gant, guilty of possession of child pornography and assessed punishment at four years’ confinement and a $5,000 fine. In two issues, appellant argues the evidence was legally and factually insufficient to show he knowingly possessed the images on his computer. We affirm.
Factual and Procedural Background
Appellant came to the attention of the Canton Police Department when he placed a nude photograph of himself into the lab coat pocket of a pharmacy employee. Appellant wrote his email address and phone number on the back of the photograph and asked the employee to contact him. The employee reported the incident to the Canton Police Department. Michael King, a Canton Police detective, notified Tim MeLemee, an investigator with the Van Zandt County District Attorney’s Office with expeiience in computer crimes.
When MeLemee received the photograph, he created an email address with an alias for the sole purpose of contacting appellant. MeLemee contacted appellant using this address through a website he found listed with appellant’s email address. Appellant maintained a profile on the website, which was called Silver Daddies. MeLemee reviewed the profile and contacted appellant pretending to be a seventeen-year-old male. MeLemee and appellant corresponded over several weeks. Some of appellant’s electronic correspondence contained pornographic photographs. Based on McLemee’s communication with appellant, a search warrant was obtained for appellant’s home and computer. As a result of the search, authorities seized a laptop computer, several compact discs, two disposable cameras, one digital camera, one video camera, a black binder with compact discs, videotapes, a silver case containing videotapes, and several eight-millimeter tapes.
McLemee used the forensic software to “bookmark” the photographs so that he could return to them. The software gave McLemee the “life history” of each of the active images on the computer. The software also indicated the location of each photograph. The State introduced eight photographs into evidence, each of which had the file path: “Documents and Settings obert Local Settings Temp Temporary Internet Files Content.IE5.” McLe-mee testified that each of the files had been downloaded from an internet website by the user, “obert.” The only user listed on the computer was “obert,” which is appellant’s first name minus his first initial.
On cross-examination, appellant’s attorney showed McLemee another user name listed on appellant’s computer. McLemee explained that he did not see the other user name when he reviewed the hard drive. The only user authorized when McLemee examined the hard drive was “obert.” Further, the user name “obert” was the one associated with the photographs. Even if another user had been authorized, the images were not associated with him or her.
Dr. J.W. Dailey testified that in his expert medical opinion, six of the photographs that were recovered depicted children whose ages he estimated at under 17 years old. Four of the photographs depicted boys between the ages of 14 and 17, and two of the photographs depicted boys over the age of 17. Several of the photographs appeared to contain boys under the age of 17, but the photos were of such poor quality that Dr. Dailey could not accurately estimate the boys’ ages.
Appellant waived his right to trial by jury and the trial court found him guilty of possession of child pornography.
Discussion
In two issues, appellant contends the evidence was legally and factually insufficient to support his conviction. Specifically, he claims that because the photographs were stored in temporary internet files and were accessed more than 30 days before execution of the search warrant, there was no evidence specifically tying appellant to the photographs on that day.
When reviewing the legal sufficiency of the evidence, we examine all of the evidence in the light most favorable to the verdict to determine whether any rational trier of fact could have found the essential elements of the offense beyond a reasonable doubt.
Jackson v. Virginia,
When reviewing the factual sufficiency of the evidence, we view all the evidence in a neutral light and set aside the verdict “only if it is so contrary to the overwhelming weight of the evidence as to be clearly wrong and unjust.”
Cain v. State,
958
A person commits the offense of possession of child pornography if he “knowingly or intentionally possesses visual material that visually depicts a child younger than 18 years of age at the time the image of the child was made who is engaging in sexual conduct and the person knows that the material depicts the child [engaging in sexual conduct.]” Tex Penal Code Ann. § 43.26(a) (Vernon 2003). ‘Wisual material” means, any “physical medium that allows an image to be displayed on a computer or other video screen and any image transmitted to a computer or other video screen by telephone line, cable, satellite transmission, or other method.” Tex. Penal Code Ann. § 43.26(b)(3)(B). A person possesses something when he exercises actual care, custody, control, or management over it. Tex Penal Code Ann. § 1.07(a)(39).
A person acts intentionally, or with intent, with respect to the nature of his conduct or to a result of his conduct when it is his conscious objective or desire to engage in the conduct or cause the result. Tex. Penal Code Ann. § 6.03(a). A person acts knowingly, or with knowledge, with respect to the nature of his conduct or to circumstances surrounding his conduct when he is aware of the nature of his conduct or that the circumstances exist or when he is aware that his conduct is reasonably certain to cause the result. Tex Penal Code Ann. § 6.03(b).
Proof of a culpable mental state almost invariably depends upon circumstantial evidence.
Lee v. State,
Appellant does not challenge the evidence that the photographs depicted individuals under the age of 18 engaging in sexual conduct. Appellant contends that the evidence is insufficient to show he knowingly possessed the images because they were stored as temporary internet files 30 days before his computer was seized. Appellant raises the issue of whether images stored as temporary internet files can be knowingly possessed by the user of the computer.
One Texas court of appeals has addressed this issue in an unpublished opinion. The Fort Worth Court of Appeals found that images stored as temporary internet files were sufficient to support a finding of knowing possession.
See Perry v. State,
2-06-378-CR,
Among the federal courts and several state courts with similar statutes, there is a division of authority on whether an individual can knowingly possess images on his computer that are stored automatically as temporary internet files. In
United States v. Kudduski,
In contrast, other courts have determined that unless the defendant affirmatively downloads the image, he cannot be said to be “in possession” of child pornography.
See United States v. Stulock,
The crucial issue from these cases is whether the images were intentionally sought out or whether they appeared on the computer’s hard drive by default. The only Texas case to address this issue has followed the line of authority holding that images stored as temporary internet files could amount to possession by the user of the computer.
See Perry,
Appellant attempted to contradict McLemee’s testimony by showing him that another user was authorized to use the computer. On cross-examination, appellant’s attorney asked McLemee about another authorized user shown on the computer screen. McLemee testified that on the day the computer was seized, the only authorized user on the hard drive was “obert.” Although another user appeared on the computer screen on the day of trial, the hard drive did not reflect that user at the time of seizure. Further, even if another user had been authorized, the pornographic images were associated with the user, “obert.”
In challenging the sufficiency of the evidence to support his conviction, appellant relies on our sister court’s decision in
Krause v. State,
In this case, appellant engaged in sexually explicit email with McLemee, including sending naked pictures of himself over the internet. McLemee discovered child pornography stored in the same area on appellant’s computer as the naked pictures of himself, and testified that the hard drive contained 111,000 images, several of which were pornographic. While there was no evidence that the images had been copied or moved, there was evidence that they had been downloaded from the internet, that the images were stored in the same area as other pornography including pictures of appellant naked, and that appellant had sent naked images of himself in emails to McLemee. The evidence supports the implied finding that the images did not appear on appellant’s hard drive by default, but that he intentionally sought and downloaded the images from the internet.
See, e.g. United States v. Murray,
After reviewing the evidence in the light most favorable to the verdict, we conclude that any rational trier of fact could have found that appellant knowingly possessed the images.
See Jackson,
We overrule appellant’s issues and affirm the trial court’s judgment.
Notes
. “A cache (pronounced ‘cash’) is a storage mechanism designed to speed up the loading of internet displays. When a computer user views a webpage, the web browser stores a copy of the page on the computer's hard drive in a folder or directory. That folder is known as the cache, and the individual files within the cache are known as temporary internet files.” Ty E. Howard, Don’t Cache Out Your Case: Prosecuting Child Pornography Possession Laws Based on Images Located in Tempo-raty Internet Files, 19 Berkeley Tech. L.J. 1227, 1229-30(2004),
. We do not employ our sister court’s analysis or follow the decision in Periy.
