Lead Opinion
Following a trial by jury, Matthew Anthony New was convicted on 35 counts of sexual exploitation of children, two counts of child molestation, and one count of enticing a child for indecent purposes. On appeal from these convictions, New contends that (1) the evidence
Viewed in the light most favorable to the jury’s guilty verdict,
According to B. N., he was 14 years old during the period in question and there came an evening when his 13-year-old girlfriend, T. P., visited the apartment B. N. shared with his father. During that evening, New encouraged B. N. and T. P. to engage in what he called “strip wrestling,” explaining that the participants wrestle each other to the point of complete undress. New observed the event and photographed the minors as their clothes were removed down to their underwear, with T. P.’s bra being removed at one point.
And after the “strip wrestling” game concluded, New pulled B. N. aside and encouraged him to engage in sexual intercourse with T. P. in B. N.’s bedroom. New also set up a hidden video camera in B. N.’s bedroom under the suggestion that it would protect his son against any allegation of rape. Nevertheless, before engaging in sexual conduct with T. P, B. N. turned off the camera when New left the room.
Upon the report to law enforcement (which was made while B. N. was visiting his grandmother’s home), an investigation ensued as officers arrived to speak with New at his attached apartment. During the investigation, officers searched for any items that could hold digital media, seizing a computer from New’s residence. A forensic analysis of the computer revealed images depicting the “strip wrestling” incident as described by B. N. and T. P. Additionally, the same forensic search uncovered numerous images of child pornography. New was subsequently indicted for the offenses enumerated supra and convicted after a trial by jury. This appeal follows.
1. First, New contends that the evidence was insufficient to support a guilty verdict as to the 35 counts of sexual exploitation of children related to images of child pornography discovered on his computer.
Aperson commits the offense of sexual exploitation of children in the manner for which New was convicted when he or she knowingly possesses “any material which depicts a minor or a portion of a minor’s body engaged in any sexually explicit conduct.”
on and between the 1st day of October 2007, and the 1st day of March 2010, the exact date unknown to the grand jury, [he] did knowingly possess Image ID: [relevant Georgia Bureau of Investigation (GBI) identification number]. Hash: [relevant hash value7 number], material depicting [description of the relevant image’s content] ....
With regard to computer usage, the GBI specialist testified that only one Windows-operating-system user account (or profile) was consistently utilized on the computer’s hard drive, and that user account/profile was named “Matt.” The system also had one guest account/profile that had last been used on December 15, 2007, and another guest account/profile that had never been used.
While searching the computer, the GBI specialist discovered several user-installed software programs that could “clean” or “wipe” data from the computer’s hard drive and erase, inter alia, Internet search history. One particular program was configured to conduct three “wipes” of the hard drive, which included removing deleted files
In addition to deletion software, the computer also contained LimeWire, a peer-to-peer file-sharing program from which the GBI specialist obtained log files. These logs identified files that were contained in the shared folder for the username “Matt,” what files were downloaded, and recent downloads. In the GBI specialist’s expert opinion, the LimeWire log files indicated image and movie file names that were “likely to be associated with child pornography” downloaded to the user’s shared folder.
With regard to the child-pornography images discovered on New’s computer, the GBI specialist testified that, due to the images’ location on the hard drive and missing metadata,
On appeal, New cites to Barton v. State
the mere existence of pornographic images in the cache files of an individual’s computer is insufficient to constitute knowing possession of those materials absent proof that the individual either: (1) took some affirmative action to save or download those images to his computer; or (2) had knowledge that the computer automatically saved those files.16
Despite the complexity involved in determining exactly when a person is knowingly in “possession or control” of child pornography transmitted electronically, the bottom line is relatively straightforward: Was the evidence presented sufficient to sustain the conviction? In the case sub judice, unlike in Barton, the evidence was more than sufficient to sustain the conviction. In Barton, we concluded that evidence of the temporary Internet cache files alone was not sufficient to sustain the conviction under OCGA § 16-12-100 (b) (8) because there was insufficient evidence to prove knowing possession of the files themselves.
Indeed, it is well established in our case law that
[a] person who knowingly has direct physical control over a thing at a given time is in actual possession of it. A person who, though not in actual possession, knowingly has both the power and the intention at a given time to exercise dominion or control over a thing is then in constructive possession of it.21
And with regard to constructive possession, “[a]s long as there is slight evidence of access, power, and intention to exercise control or dominion over an instrumentality, the question of fact regarding constructive possession remains within the domain of the trier of fact.”
In the context of prior possession of child pornography, a computer user knowingly possesses the contraband when the user intentionally downloads child pornography to the computer but later deletes the file
Accordingly, for all the foregoing reasons, we conclude that there was sufficient evidence by which to sustain New’s convictions.
2. Next, New argues that the trial court erred by permitting inadmissible, irrelevant, and prejudicial evidence when the State elicited testimony from New’s ex-wife concerning his possession of adult pornography. This enumeration of error is wholly without merit.
The record reflects that a key focus of New’s defense was that others had access to the computer, including B. N. during the period he lived with his father. And during cross-examination of New’s ex-wife, New’s counsel questioned her extensively as to B. N.’s access to New’s computer during and after their marriage, any efforts by law enforcement to rule out B. N. as a suspect, and her knowledge of B. N. and B. N.’s friends’ interest in pornography, if any. Accordingly, during rebuttal, the State asked whether New’s ex-wife had ever located pornography on the home computer and, upon learning that she had, whether B. N. or his friends were responsible. New’s ex-wife responded that the only pornography she located was on the computer she shared with New and that she discovered it upon logging into his password-protected user profile.
New objected when the State continued to question the ex-wife about her discovery on the computer, the State apparently believing that the discovery included an image or video of child pornography that the ex-wife had burned to a disc and given to law enforcement. Thus, the State attempted to lay a foundation for the introduction of this disc. New’s objections were sustained when the ex-wife mentioned her discovery of a lockbox that contained discs of pornography and, after lengthy discussion outside the jury’s presence, the State decided to discontinue this entire line of questioning when it became
On appeal, New argues that the trial court erred by allowing the introduction of sexually explicit material unrelated to the crimes charged in violation of Georgia law,
As we have previously noted, it is unclear whether Simpson v. State
3. New’s third enumeration of error concerns the effectiveness of his trial counsel. New attacks his trial counsel’s performance for a number of reasons, contending that his attorney (1) failed to object to an alleged violation of the rule of sequestration, (2) failed to seek a directed verdict or jury charge based on Barton v. State
To begin with, we note that, in general, when a defendant claims that his trial counsel was ineffective, he has the burden of establishing that “(1) his attorney’s representation in specified instances fell below an objective standard of reasonableness and (2) there is a reasonable probability that, but for counsel’s unprofessional errors, the result of the proceeding would have been different.”
(a) First, New argues that his counsel rendered ineffective assistance by failing to object to the lead investigator’s presence in the courtroom after the rule of sequestration was invoked.
This argument lacks merit because New cannot show that, had counsel objected, the trial court would not have allowed the investigator to remain in the courtroom to assist the State’s presentation of
(b) Next, New argues that counsel was ineffective in failing to seek a directed verdict or jury charge based upon Barton v. State.
(c) New contends that his trial counsel rendered ineffective assistance by failing to present testimony regarding others’ access to his computer, testimony refuting B. N.’s assertion that password protection prevented unsupervised use of New’s computer, and testimony that the deletion software programs were placed on the computer by an outside vendor to fix viruses and/or malware. This assertion of error likewise lacks merit.
To begin with, New’s counsel did in fact present evidence concerning others’ access to and ability to log into the subject computer when New’s grandmother, wife, and brother all testified to observing New’s sons access the computer. As to the remaining evidence, New’s trial counsel testified at the motion-for-new-trial hearing that he was hindered in presenting the evidence after New and New’s mother were held in contempt for violating the rule of sequestration.
Further, insofar as New’s counsel made the decision not to call New’s mother as a witness, it is well established that “the decision as to which defense witnesses to call is a matter of trial strategy and tactics.”
As to the lack of testimony by New himself, although counsel may have advised New not to testify, “[t]he decision whether or not to testify is a tactical one made by the defendant himself after consultation with counsel” and “[t]he choice of whether to testify is ultimately a defendant’s.”
(d) New next argues that counsel was ineffective by failing to elicit evidence of a scar on his foot. At trial, the State introduced a photograph from the “strip wrestling” incident that contained a portion of the photographer’s left leg. New takes issue with his trial
Counsel testified at the motion-for-new-trial hearing that after New informed him of the scar during trial, he could not put New on the stand to rebut the evidence and show his foot to the jury, again, because of the contempt issue discussed supra, which counsel believed “would be far more damaging versus a toe that you don’t know who it’s attached to in the photo.” Additionally, counsel did not believe the scar issue was worth pursuing through other witnesses because, “without Matt showing the scar, [he did not] know [how] effective that would have been.” Furthermore, although New claims that his trial counsel could have elicited evidence of the scar by questioning New’s wife and brother, New presented no evidence of what their testimony would have been with regard to the scar.
(e) New argues that counsel rendered ineffective assistance by failing to request specific jury charges. In particular, New argues that his counsel was ineffective in failing to request that the jury be charged (1) to consider the weight and credibility of the lead investigator’s testimony in light of his presence in the courtroom in exception of the rule of sequestration or (2) to limit consideration of the respective offenses to the manner charged in the respective counts of the indictment. In a separate argument, he contends that his counsel was ineffective in that he caused the jury to be charged that they could find New guilty of child molestation and sexual exploitation of a child in manners not alleged in the indictment. These arguments are entirely without merit.
As to his argument with respect to the investigator’s presence in the courtroom, for the reasons set forth in Division 3 (a), supra, New cannot establish that his counsel rendered ineffective assistance in failing to seek jury instructions for same.
It is unquestionable that, in criminal prosecutions, “the court’s instructions must be tailored to fit the charge in the indictment and the evidence adduced at trial.”
4. New next contends that the trial court erred by failing to grant his motion to suppress the evidence recovered during law enforcement’s investigation because he contends that law enforcement exceeded the scope of his valid consent to search. This enumeration of error also lacks merit.
The record reflects that on the evening that B. N. called law enforcement to report the “strip wrestling” incident that occurred years prior, police officers arrived at New’s residence to begin their investigation. Among the items seized that evening was the computer on which the “strip wrestling” images and, ultimately, child pornography images discussed in Division 1, supra, were discovered. Prior to trial, New filed a motion to suppress and post-hearing brief in support of same. The trial court denied the motion to suppress, finding that New consented to law enforcement’s search, and issued a certificate of immediate review, but this Court denied New’s application for interlocutory appeal.
When reviewing a trial court’s decision on a motion to suppress, “we construe the evidence most favorably to uphold the findings and
At the suppression hearing, multiple police officers testified that New gave permission for the search of his residence, which was memorialized in a signed consent form. The consent-to-search form reads as follows:
I, Matthew New, have been informed by [officer 1] and [officer 2] who made proper identification as (an) authorized law enforcement officer(s) of the Fayetteville Police Department of my CONSTITUTIONAL RIGHTS not to have search made of the premises and property owned by me and/or under my care, custody and control, without a search warrant.
Knowing of my lawful right to refuse consent to such a search, I willingly give my permission to the above named officer(s) to conduct a complete search of [residence address] as well as [vehicle descriptions].
The above said officer(s) further have my permission to take from my premises and property, any letters, papers, materials, or any other property or things which they desire as evidence.
This written permission to search without a search warrant is given by me to the above officer(s) voluntarily and without any threats or promises of any kind at 1910 pm on this 2nd day of [February] year 2010.
Due to the nature of the allegations against New—that he digitally photographed two minors engaged in “strip wrestling”—the officers seized any item that could possibly contain electronic media. One officer specifically testified that New gave oral consent to law enforcement’s removal of the computer, along with other items. Another officer testified that New was told that the police wanted consent to search for the type of material relevant to the allegations
When the State alleges that a search was conducted pursuant to consent, the State has the burden of proving the validity of the consensual search,
Here, New was informed of the allegations against him and of the type of evidence officers sought—i.e., digital photographs of the “strip wrestling” incident. He was also present during the officers’ entire search of his residence and orally consented to the search, claiming that he was aware of the allegations and intended to cooperate fully. Finally, New signed a form memorializing his consent to a search of his residence, and that form expressly gave officers the right to “take from [New’s] premises and property, any letters, papers, materials, or any other property or things which they desire as evidence.”
5. Finally, New argues that his sentence is void for failure to comply with OCGA § 17-10-6.2 (b). We agree with New’s contention and, accordingly, must vacate his sentence and remand to the trial court for resentencing.
To begin with, a sentence is void if the court “imposes punishment that the law does not allow.”
any person convicted of a sexual offense shall be sentenced to a split sentence which shall include the minimum term of imprisonment specified in the Code section applicable to the offense. No portion of the mandatory minimum sentence imposed shall be suspended, stayed, probated, deferred, or withheld by the sentencing court and such sentence shall include, in addition to the mandatory imprisonment, an additional probated sentence of at least one year.82
The mandatory minimum sentences for child molestation, enticing a child for indecent purposes, and sexual exploitation of children are
On appeal, New argues that his sentence is void because OCGA § 17-10-6.2 (b) requires a split sentence for each of his convictions for child molestation, sexual exploitation of a minor, and enticing a child for indecent purposes, with at least one year of probation included in each individual sentence. New was sentenced by the trial court as follows:
Count 13: Sexual Exploitation of Children
• 20 years to serve.
Count 16: Sexual Exploitation of Children
• 20 years to serve consecutive to Count 13.
Count 18: Sexual Exploitation of Children
• 20 years to serve consecutive to Counts 13 & 16.
Count 24: Sexual Exploitation of Children
• 20 years to serve consecutive to Counts 13, 16, & 18.
Count 26: Sexual Exploitation of Children
• 20 years to serve consecutive to Counts 13, 16, 18, & 24.
Count 59: Sexual Exploitation of Children
• 20 years to serve consecutive to Counts 13, 16, 18, 24, & 26.
Count 38: Child Molestation
• 20 years to serve consecutive to Counts 13, 16, 18, 24, 26 & 59.
Count 58: Sexual Exploitation of Children
• 20 years (10 years to serve, 10 years’ probation) concurrent to Counts 38, 16, 18, 24, 26, & 59.
Count 68: Sexual Exploitation of Children
• 20 years (10 years to serve, 10 years’ probation) concurrent to Counts 13, 16, 18, 24, 26, 58, & 59.
Count 69: Sexual Exploitation of Children
• 20 years (10 years to serve, 10 years’ probation) concurrent to Counts 13, 16, 18, 24, 26, 58, 59, & 68.
Counts 1, 2, 11, 20, 21, 28, 30, 31, 34, 42, 43, 45, 49, 50, 51, 52, 53, 54, 55, 57, 63, 64, 66, 71, 72: Sexual Exploitation of Children
• 10 years to serve, concurrent to all other counts.
Count 37: Enticing a Child for Indecent Purposes
• 10 years to serve, concurrent to all other counts.
Count 41: Child Molestation
• 10 years to serve, concurrent to all other counts.
Accordingly, New was sentenced to serve 140 years with a remaining 10 years served on probation. Although his sentences fall
In addressing New’s argument that his sentence is void by the trial court’s failure to impose a split sentence on each count, we first note that “[c]riminal statutes must be strictly construed against the State.”
Judgment affirmed, sentence vacated, and case remanded for resentencing.
Notes
See, e.g., Goolsby v. State,
Id. (punctuation omitted).
Id. at 330-31 (punctuation omitted).
Miller v. State, 273 Ga. 831, 832 (
Although New does not challenge the sufficiency of the evidence as to his convictions for child molestation and enticing a child for indecent purposes, we note that the evidence was, nevertheless, sufficient to sustain guilty verdicts for same. See OCGA § 16-6-4 (a) (1) (“Aperson commits the offense of child molestation when such person... [d]oes any immoral or indecent act to or in the presence of or with any child under the age of 16 years with the intent to arouse or satisfy the sexual desires of either the child or the person____”); OCGA § 16-6-5 (a) (“Aperson commits the offense of enticing a child for indecent purposes when he or she solicits, entices, or takes any child under the age of 16 years to any place whatsoever for the purpose of child molestation or indecent acts.”). See generally Jackson v. Virginia,
OCGA § 16-12-100 (b) (8).
Hash values are explained infra at footnote 13 and its accompanying text.
See generally Microsoft Knowledge Base Article - 309531, How to Gain Access to the System Volume Information Folder, Microsoft, http://support.microsoft.com/ltb/309531 (last updated May 22,2013) (concerning access for the Windows XP operating system) (“The System Volume Information folder is a hidden system folder that the System Restore tool uses to store its information and restore points. There is a System Volume Information folder on every partition on your computer.”); Microsoft TechNet Article, How Volume Shadow Copy Service Works, Microsoft, http://technet.microsoft.com/en-us/library/cc785914%28WS.10%29.aspx (last updated Mar. 28, 2003) (explaining that the creation of a shadow copy results in “two data images—the original volume and the shadow copy volume” with the “functional difference between the two [being] that the original volume maintains full read/write capabilities, whereas the shadow copy volume is read-only[,] . . . ensuring] that the shadow copy volume remains a point-in-time copy until its status is changed by the administrator for a specific purpose”); Neil Randall, Controlling Shadow Copies in Vista (and Windows 7), PCMag.com (Mar. 6, 2009), http://www.pcmag.eom/article2/0,2817,2342534,00.asp (“Shadow Copies is the informal term for Volume Shadow Copy Service (VSS), also known as ‘Previous Versions.’All three names point to the same feature: the automatic saving of copies of files. The purpose of the service is to allow you to restore these backups of files that you have lost for any reason____”).
The GBI computer forensics specialist additionally testified to finding images from the “strip wrestling” incident in a thumb cache folder, explaining that the Windows operating system generates this file of thumbnail images after a user views the contents of a folder via the thumbnail-icon option.
According to the testimony of New’s own computer expert, the operating system was installed in November 2007.
Unallocated disk space is also called “free disk space” and is “[t]he area of the disk where [a] deleted file resides.” Bill Nelson et al., Guide to Computer Forensics and Investigations 208 (4th ed. 2010).
Metadata is “[d]ata describing a file or its properties, such as creation date, author, or last access date.” Linda Volonino & Reynaldo Anzaldua, Computer Forensics for Dummies 340 (2008).
See generally Nelson, supra note 11, at 127 (“Because hash values are unique, if two files have the same hash value, they are identical, even if they have different filenames.”); Ralph C. Losey, Hash: The New Bates Stamp, 12 J. Tech. L. & Pol’y 1, 2 (I) (June 2007) (“The hash algorithm analyzes a computer file and calculates a unique identifying number for it, called a hash value. No two electronic records have the same hash value. For that reason, it is called the ‘digital fingerprint’ of electronic documents.”).
Id. at 49-50. The cache (pronounced “cash”) of temporary Internet files is used by web browsers “to store webpage content on the computer hard disk for quick viewing” and allows the browser to “download only the content that has changed since [the user] last viewed a webpage, instead of downloading all the content every time that the page is displayed.” Microsoft Knowledge Base Article - 260897, How to Delete the Contents of the Temporary Internet Files Folder, Microsoft, http://support.microsoft.com/kb/260897 (last updated Sept. 6, 2013). This specific type of cache should not he confused with a system cache, which allows high-speed access to recently used data within the computer. See generally Jean Andrews, Guide to Hardware: Managing, Maintaining & Troubleshooting 693, 702 (4th ed. 2007) (defining “disk cache” as “[a] method whereby recently retrieved data and adjacent data are read into memory in advance, anticipating the next CPU request,” and defining “memory cache” as “[a] small amount of faster BAM that stores recently retrieved data, in anticipation of what the CPU will request next, thus speeding up access”). System cache is the type of cache that was discussed by the GBI specialist in the case sub judice when she explained her discovery of “strip wrestling” pictures in a cache of thumbnail images. See supra note 9.
Barton,
Id. at 52 (1) (noting that State did not “present any circumstantial evidence that would have allowed the jury to infer Barton’s knowledge of these files”); id. (“In short, the State presented no evidence that Barton was aware of the existence of the files at issue, and in doing so, they failed to prove that Barton knowingly possessed these images.”).
See id. (holding that State failed to meet its burden of proof on the issue of the defendant’s knowledge when State’s computer forensic’s expert testified that the defendant “took no affirmative action”).
See Haynes v. State,
See Sorg v. State,
Meridy v. State,
Hunt v. State,
See State v. Schuller,
See Wise v. State,
United States v. Kain,
See Ty E. Howard, Don’t Cache Out Your Case: Prosecuting Child Pornography Laws Based on Images Located in Temporary Internet Files, 19 Berk. Tech. L. J. 1227,1255 (V) (A) (2) (Fall 2004) (explaining that when applying the “Evidence Of” approach, “cached images are evidence of previously possessed items—they represent a recording of the contraband . .. the computer is now analogous to a video camera that records all of the activity of the computer user”).
Cf. Chancey v. State,
See Kain,
See Tecklenburg v. App. Div. Super. Ct.,
See Ward v. State, 994 So2d 293, 301-02 (Ala. Crim. App. 2007) (affirming conviction when evidence established that defendant constructively possessed child pornography by viewing images online); see also Mercer,
See People v. Josephitis,
See State v. Hurst,
Tennille v. State,
A review of the transcript and the discussion conducted outside the jury’s presence reveals that the State itself misunderstood the origin of the evidence it sought to link to the crimes charged, and the confused questioning of New’s ex-wife reflects same. Although the State initially believed that the suspected child pornography was contained on the disc the ex-wife herself burned from New’s computer, the ex-wife explained that the suspected child pornography was actually located on a disc that she discovered in the lockbox.
See Simpson v. State,
See Unif. Sup. Ct. R. 31.1 (“Notice of the [State’s] intention to present evidence of similar transactions or occurrences ... shall be given and filed at least ten (10) days before trial unless the time is shortened or lengthened by the judge.”) (amended Nov. 28, 2013).
Cf. Frazier v. State,
Phillips v. State,
See Alvarado v. State,
Cf. Cannon v. State,
Muldrow v. State,
Id.
See Hargett v. State,
See discussion in Division (3) (c), infra.
See Hargett,
See, e.g., Owens v. State,
The record reflects that in the middle of T. P.’s testimony, two law students—who were observing the trial—notified the State that they witnessed an individual in the gallery have a
Brown v. State,
Id. (punctuation omitted).
Cf. Howard v. State,
Goodwin v. State,
Id. at 230 (2) (b).
Cf. Hernandez v. State,
See id.
Emphasis supplied.
Emphasis supplied.
Emphasis supplied.
Boatright v. State,
Id. (punctuation omitted).
Id. at 272-73 (1) (e) (punctuation omitted).
Id. at 273 (1) (e) (punctuation omitted).
Id.
Id.
Id.
Id. (holding under similar circumstances that defendant did not receive ineffective assistance of counsel).
Conversely, New contends that a subsequently obtained search warrant was defective on its face and as executed; however, we need not address this contention because we find that law enforcement’s forensic examination of New’s computer was authorized by his consent to search. And any subjective belief by law enforcement that a search warrant was necessary is irrelevant. Cf. Whren v. United States,
Dryer v. State,
Id. (punctuation omitted).
Id.
Walker v. State,
Id.
Id.
Emphasis supplied.
See Betancourt v. State,
See id. at 206 (2) (b) (holding that trial court properly denied motion to suppress when, after consent was given, “at no time did either appellant object to the scope of the search or withdraw his consent as the search proceeded”).
Cf. Semelis v. State,
Rooney v. State,
OCGA § 17-10-6.2 (a) (5), (6), (10).
OCGA § 17-10-6.2 (b).
See OCGA § 16-6-4 (b) (1) (child molestation); OCGA § 16-6-5 (b) (enticing a child for indecent purposes); OCGA § 16-12-100 (g) (1) (sexual exploitation of children).
Davis v. State,
OCGA § 17-10-6.2 (b) (emphasis supplied).
See OCGA § 17-10-6.2 (c) (permitting trial court to deviate from the mandatory minimum sentence requirement of subsection (b) under certain circumstances).
OCGA § 17-10-6.2 (b); see also Bowen v. State,
See OCGA § 16-6-4 (b) (1) (“[A] person convicted of a first offense of child molestation shall be punished by imprisonment for not less than five nor more than 20 years and shall be subject to the sentencing and punishment provisions of [OCGA §) 17-10-6.2. . . .”); OCGA § 16-6-5 (b) (“[A] person convicted of the offense of enticing a child for indecent purposes shall be punished by imprisonment for not less than ten nor more than 30 years. Any person convicted under this Code section of the offense of enticing a child for indecent purposes shall, in addition, be subject to the sentencing and punishment provisions of [OCGA §] 17-10-6.2.”).
For purposes of additional correction on remand, we note what appear to he scrivener’s errors in the way of omissions and/or discrepancies between the trial court’s written sentencing order and the final disposition, particularly with regard to Counts 58, 68, and 69, which omit reference to Counts 13 and 38.
Concurrence Opinion
concurring fully and specially.
While I fully concur in the majority’s opinion as to all divisions, I write separately to emphasize a practical problem in the statutory scheme for the sentencing of sexual offenses, which requires that a defendant receive at least one year of probation for each such offense in addition to the mandatory minimum prison sentence. OCGA § 17-10-6.2 (b). In imposing this requirement, the legislature likely wanted to ensure that offenders not be released back into society after serving their time without continued supervision. Such an approach seems reasonable, particularly with research suggesting that sexual offenders have a high propensity to reoffend. The thinking here is, thus, that continued supervision by a probation officer could deter further sexual offenses or at least minimize that risk.
At the same time, the situation presented in this case is that a defendant is charged and convicted of multiple counts constituting sexual offenses. Since each count is subject to both a mandatory minimum prison sentence that cannot be suspended, stayed, probated, deferred or withheld by the sentencing court, and also must contain at least one additional year of probation, it presents challenges to the trial court in trying to make the sentence workable. If the trial court wants to maximize the time that a defendant spends in prison, it might decide to run some or all of the counts consecutively. However, that can be problematic since, as to each count, there must be at least one year of probation at the end of the mandatory minimum prison time. A consecutively run sentence would result in the defendant serving the prison part of one count, being released to probation for one year, and then reentering prison after the probation ended to serve the prison sentence on the next count.
The other option available to the trial court would be to run all counts concurrently. A concurrent sentence would prevent a defendant’s release from prison to probation until all of his prison time on
The legislature, if it so chooses, could amend this Code section to make this statutory scheme more workable. For example, it might provide that a defendant convicted of multiple sexual offenses must be sentenced to not less than one year of probation or not less than one year of probation for each count, but allow that all of the probation to be attached to the last count on which the defendant is sentenced. Such a modification would prevent the splitting of sentences where probation is sandwiched between prison terms, and it would also avoid a trial court resorting to concurrent sentences, unless the facts of the case so warrant, just to avoid the same problem.
