Following a jury trial, David Midkiff (“appellant”) was convicted of one count of possession of child pornography and eighteen counts of possession of child pornography, second or subsequent offense, in violation of Code § 18.2-374.1:1. On appeal, he contends the trial court erred in denying his motion to suppress evidence seized from his home. He argues that the search warrant was invalid and that the trial court erred in applying the Leon 1 good-faith exception to find the search pursuant to that warrant was valid. He also contends the trial court erred by admitting into evidence photographic images copied from his computer’s hard drive, arguing that doing so violated the best evidence rule. For the following reasons, we affirm the judgment of the trial court.
I. BACKGROUND
“In reviewing the denial of a motion to suppress based on the alleged violation of an individual’s Fourth Amendment rights, we consider the facts in the light most favorable to the Commonwealth. The burden is on the defendant to show that the trial court committed reversible error.”
Ward v. Commonwealth,
On August 3, 2006, pursuant to a search warrant issued earlier that day, Sergeant Rodney Thompson of the Bedford County Sheriffs Office and Investigator Boyd Arnold of the Pittsylvania County Sheriffs Office searched appellant’s house for child pornography. Appellant was not home at the time the search warrant was executed. 2 However, the officers located a telephone number on his phone’s “caller ID” inside his house and called him. They told appellant where they were and their purpose for being there. Appellant advised the officers that he had “purchas[ed] memberships to child pornography websites” and that child pornography was stored in “his computer.” He told them where that computer was located in his house. The officers then seized the computer and sent it to the Department of Forensic Science in Richmond to determine whether child pornography was stored on the computer’s hard drive. There, Kristen Scott, a digital evidence forensic scientist, located files containing suspected child pornography on the computer’s hard drive. She copied those files to a data DVD. Those files were later copied to a CD from the data DVD.
In his motion to suppress the evidence seized from his home, appellant argued that the affidavit presented by the
officers to
At trial, the trial court admitted into evidence twelve photographic images and a CD containing four digital image files and three digital movie files, which had been reproduced from a CD which had been made from the DVD copy of the data found on the hard drive of appellant’s computer. Appellant objected to the admissibility of that evidence, arguing that admitting those images violated the best evidence rule. He asserted that the best evidence rule required that the seized computer and its hard drive be brought into court and that any image files to be used as evidence be reproduced in court directly from that hard drive.
II. ANALYSIS
A. The Motion to Suppress
Appellant contends: (1) “the Trial Court Err[ed] in Refusing to Suppress the Evidence Seized at [his] Home on the Basis That the Information in the Affidavit for [the] Search Warrant was Deficient in That it Failed to State a Temporal Nexus or a Nexus With [his] Residence,” and (2) “the Trial Court Err[ed] in It’s [sic] Application of the Good Faith Exception to the Search Warrant Requirement to Salvage the Search of [his] Home.”
“The Fourth Amendment of the United States Constitution requires that a search warrant be based upon probable cause.”
Sowers v. Commonwealth,
Here, the affidavit for the search warrant, sworn before the magistrate by Sergeant Thompson on August 3, 2006, provided:
[Sergeant] Rodney Thompson received a case report and evidence CD from Suffolk County, N.Y. Police Department in reference to Operation Hardcore. In Feb. 2005, an undercover investigation into the Child Pornographic Website was begun. On 04/20/05, the Websites containing Child Pornography were seized and logs were recovered which recorded customer logon and Website activities. On 08/25/05, a forensic evaluation was performed by Det. Rory Forrestal with the Suffolk Co. Police Department of access logs (httpd-access.log and httpd-ss-request.log) pertaining to IP address 12.96.220.190. Forensic review showed this IP Address was downloading Child Pornography material from a computer having this IP address assigned. IP address is registered to Peoples Mutual Telephone Co. and an Administrative Subpoena was issued on 06/21/2005. The results advised that the IP address was registered to DAVID MIDKIFF of P.O. Box 85, Gretna, VA and physical address 123 Franklin Blvd., Gretna, VA 24557 and telephone number 434-656-9100. User Name: davldm. Autotrack records indicate DAVID WILLIS MIDKIFF (DOB: 06/10/1953) resides at 123 N. Franklin Street, Gretna, VA 24557. Address is located within Pittsylvania County. Investigators know from training and experience that individuals who possess, manufacture, or distribute child pornography are collectors and tend to keep their collection and not destroy it. Bedford County Sheriffs Office and Operation Blue Ridge Thunder are the Internet Crimes Against Children Task Force for the Commonwealth of Virginia and State of West Virginia. They are responsible for investigating crimes involving the Internet where the Sexual Exploitation of Children has occurred.
The affidavit described the place to be searched and listed the things to be searched
After considering the arguments of counsel, the trial court denied appellant’s motion to suppress, noting that the affidavit appeared to be stale, rendering the search warrant defective, but that the officers conducting the search did so in good-faith reliance on the validity of the judicially issued search warrant. For the following reasons, we conclude the trial court did not err in denying appellant’s motion to suppress.
In
United States v. Leon,
“(1) [Wjhen the [magistrate] “was misled by information in an affidavit that the affiant knew was false or would have known was false except for his reckless disregard of the truth’; (2) when ‘the issuing magistrate wholly abandoned his judicial role in the manner condemned in Lo-Ji Sales, Inc. v. New York,442 U.S. 319 ,99 S.Ct. 2319 ,60 L.Ed.2d 920 (1979)’; (3) when ‘an affidavit [is] so lacking in indicia of probable cause as to render official belief in its existence entirely unreasonable’; or (4) when ‘a warrant [is] so facially deficient ... that the executing officers cannot reasonably presume it to be valid.’ ”
Ward,
“ ‘[Suppression of evidence obtained pursuant to a warrant should be ordered only on a case-by-case basis and only in those unusual cases in which exclusion will further the purposes of the exclusionary rule[,]’ ... ‘to deter police mis
conduct.’ ”
Polston v. Commonwealth,
1. Judicial Role
Appellant first argues that the magistrate wholly abandoned his judicial role by examining the officer’s affidavit and issuing the search warrant in a period of only two minutes after the affidavit was presented to him. We disagree.
The United States Supreme Court has held that the good-faith exception to the exclusionary rule will not apply where the issuing magistrate does not “purport to ‘perform his “neutral and detached” function and ... serve[s] merely as a rubber stamp for the police.’ ”
Leon,
2. Temporal and Geographical Nexus
Appellant also argues that the “warrant was so lacking indicia of probable cause as to render official belief in its existence unreasonable.” He asserts that the officers lacked
“The third limitation to the
Leon
good-faith exception conditions reliance on the magistrate’s probable-cause determination by police officers to those circumstances where that reliance is objectively reasonable.”
Ward,
a.
The affidavit at issue here states that sometime prior to April 20, 2005 appellant is alleged to have downloaded child pornography to his computer. The affidavit also noted that “Peoples Mutual Telephone [Company]” records showed that the IP address to which the child pornography was downloaded was registered to appellant at the address to be searched. In determining whether police officers relied in good faith on a judicially issued warrant, we may “take into account information known to police officers that was not included in the search warrant affidavit.”
Adams,
275 Va. at
273,
In his affidavit for the search warrant, Sergeant Thompson stated that, based on his training and experience as a member of the Internet Crimes Against Children Task Force, he knew that “individuals who possess, manufacture, or distribute child pornography are collectors and tend to keep their collection and not destroy it.” Based on Sergeant Thompson’s training and experience in investigating child pornography, we conclude the trial court did not err in finding that the officer was not unreasonable in believing there was probable cause that the images of child pornography, downloaded sixteen months prior, could still be in appellant’s possession at the physical address to which the IP address was registered.
See Anzualda,
Appellant also argues that it was unreasonable for the officers to believe that the images of suspected child pornography would be found at his residence, asserting “there was absolutely no connection” between the IP address in the affidavit and his residence.
“For the
[Leon]
good faith [exception] to apply, the affidavit must provide some nexus between the evidence sought and the place to be searched.”
Sowers,
From the record on appeal, we conclude the trial court did not err in finding that the officers conducting the search pursuant to the judicially issued warrant “acted in good faith, and the deterrent function of the exclusionary rule would not be served by excluding the evidence seized.”
Ward,
B. The Best Evidence Rule
1.
Appellant also contends the trial court erred in admitting into evidence the sixteen images and three digital movie files of suspected child pornography purportedly recovered from his computer. He argues that evidence was not the best evidence of data stored on his computer as it was “at least third generation removed from [his] computer hard drive.” He asserts on appeal, as he did in objecting to that evidence being admitted at trial, that the hard drive of his computer, allegedly containing the offending images, is “what needs to be produced under the best evidence rule.” 5
We note that “[t]he admissibility of evidence is within the broad discretion of the trial court, and a ruling will not be disturbed on appeal in the absence of an abuse of discretion.”
Blain v. Commonwealth,
In Virginia, the best evidence rule has been limited to writings.
Meade v. Commonwealth,
2.
Appellant’s objection to the admissibility of the evidence of the digital images, in effect, is couched in terms of “reliability,” that is, whether the photographic images produced at trial were reliable depictions of what was stored on his computer’s hard drive seized from his home.
This Court has recognized, as have other courts, that “[t]he potentially limitless application of computer technology to evidentiary questions will continually require legal adaptation.”
Penny v. Commonwealth,
Here, appellant admitted to officers that he had “purchas[ed] memberships to child pornography websites” and that child pornography was stored in “his computer.” He “stipulate^] the chain of custody to [that] computer” from the time it was seized from his residence to the time it was analyzed by Kristen Scott, a forensic scientist with the digital evidence section of the Department of Forensic Science. Appellant also “stipulate[d]” to Scott’s expertise in digital forensic science. Scott testified that when she received appellant’s computer, she made “an image” of one of its hard drives. She testified that a “hard drive is the basic storage system of a computer” and that an “image of a hard drive is a bit for bit copy.... When you make a bit for bit image of a hard drive you get the exact same thing each time.” Relying on her training in examining computers, specifically in basic data recovery and acquisition, Scott used a data program and searched the data DVD copy she made of appellant’s hard drive for “JPEG 6 as well as other types of image files.”
Scott testified that she recovered digital image and movie files of suspected child pornography from the DVD copy of the hard drive of appellant’s computer. She then gave that data DVD to Investigator Arnold. From that data DVD, Investigator Arnold copied sixteen digital image files and three digital movie files onto a CD for use at trial. Scott testified that the files Investigator Arnold copied from the data DVD she gave him were considered originals, “[b]ecause in computers and bit for bit digital copying, there is no such thing as generation. Each copy you create from the original is considered forensically to be an original.”
After reviewing each of the photographic images offered into evidence at trial, Scott testified that she “recovered these images from [appellant’s] computer.” When asked whether the photographic images at trial “fairly and accurately represent what [she]
We have previously noted that a “computer decodes electronic records, converts them into a format understood by users and either prints them or displays them on a terminal. A person who can verify that [they] are authentic can present the evidence by testifying about what he saw displayed or by presenting a printed copy of the display.”
8
Lee v. Commonwealth,
Importantly, after considering the testimony at trial, the trial court found that four of the sixteen photographic images, offered as a collage, were inadmissible because they had been “combined” and did not appear as they did on appellant’s computer. 9 It found the remaining twelve photographic images rehable reproductions of the digital image files on appellant’s computer hard drive and admitted them into evidence.
We conclude that the trial court did not err in finding that the images it admitted at trial were fair and accurate representations of the digital image files of child pornography on appellant’s computer hard drive. Appellant admitted to the investigating officers that he purchased memberships in child pornography websites and that images of child pornography were on his computer. Accordingly, we conclude that the trial court did not abuse its discretion in admitting into evidence the images and digital movies reproduced from the digital files recovered from appellant’s computer.
III. CONCLUSION
For the foregoing reasons, we affirm appellant’s convictions of possession of child pornography in violation of Code § 18.2-374.1:1.
Affirmed.
Notes
.
United States v. Leon,
. The record on appeal does not indicate how the officers obtained entry into his home.
. Courts have also found that "[¡Information a year old is not necessarily stale as a matter of law, especially where child pornography is concerned.”
United States v. Newsom,
. An IP address is a string of four integer numbers between 0 and 255 separated by periods that identifies the location of a specific computer connected to the Internet. While many Internet connections are permanent and, thus, are assigned fixed IP addresses, the IP address assigned to a personal computer accessing the Internet through a portal site is drawn from a pool of open addresses and identifies that computer only during the time that computer is connected to the Internet.
Am. Online, Inc. v. Nam Tai Elecs., Inc.,
. Appellant does not argue that the photographic images admitted into evidence were not child pornography, nor does he argue that those images inaccurately reflect the digital image files contained on the DVD copy, and subsequent reproductions, Scott made of the hard drive of his computer. On appeal, he states that the contested evidence is "disgusting images of children in sexually explicit poses.”
. She testified that a JPEG is a digital photograph file.
. At trial, appellant "stipulated] that [both Scott’s and Investigator Arnold's] testimony would be, ... [the three digital movie clips] appear to be the same clips,” by file name, "2.avi,” "Lolitas R@YGOLD.avi,” and "RAYGOLD(l)_predoctor,” recovered from a digital copy of the hard drive of appellant's computer.
.
See also United States v. Meienberg,
. It admitted those four images in their original individual digital image file format, as well as the three digital movie files, on a CD.
