OPINION
¶ 1 This case raises the novel issue whether downloading images from a remote source through the Internet constitutes “duplicating,” as opposed to “receiving,” these images for purposes of Arizona’s sexual exploitation of children statutes. After a jury trial, Paul Windsor was convicted of five counts of sexual exploitation of a minor in violation of A.R.S. § 13-3553(A)(1). He was sentenced to mitigated, consecutive sentences totaling fifty years’ imprisonment. On appeal, Windsor contends the evidence was insufficient to support his convictions. For the following reasons, we disagree and affirm the convictions and sentences.
Factual and Procedural History
¶ 2 We view the facts in the light most favorable to sustaining the jury’s verdicts.
State v. Huffman,
¶ 3 When the second computer continued to send the virus-alert messages, staff members once again remotely accessed its screen and observed that the user was opening the images in a graphics program. A staff member called university police officers, who arrived and found Windsor sitting at the computer with pornographic photographs of children on the screen. 1 Subsequent forensic analysis revealed Windsor had downloaded the images from a remote Internet site and saved them in a shared file on the computer’s hard drive. He was later indicted, arrested, and convicted as outlined above.
Discussion
¶ 4 The sole issue on appeal is whether Windsor’s conviction was supported by sufficient evidence.
2
We will not reverse a conviction unless the state has failed to present substantial evidence of guilt. Substantial evidence is “more than a mere scintilla” and is proof that reasonable persons could accept as convincing beyond a reasonable doubt.
State v. Nunez,
¶ 5 The statute Windsor was convicted of violating, § 13-3553(A)(1), prohibits “Recording, filming, photographing, developing or duplicating any visual depiction in which a minor is engaged in exploitive exhibition or other sexual conduct.” Windsor does not dispute that the images he accessed were child pornography, but rather contends that his downloading these images did not amount to “[r]ecording, filming, photographing, developing, or duplicating” them. In our recent opinion,
State v. Paredes-Solano,
¶ 6 Accordingly, the convictions cannot be sustained unless the state presented sufficient evidence Windsor engaged in one of the activities proscribed in § 13-3553(A)(1). Because it is undisputed Windsor did not record, film, photograph, or develop any image, the validity of his conviction turns on whether downloading pictures from a remote Internet site constitutes “duplicati[on]” for the purposes of this statute. WTien called upon to interpret a statute, we consider its plain language, giving meaning to each word and phrase “ ‘so that no part is rendered void, superfluous, contradictory or insignificant.’ ”
State v. Larson,
¶7 At trial, the state’s computer expert testified that downloading involves using the Internet to copy a file from a remote computer, a description consistent with the way courts have construed the term.
See, e.g., Metro-Goldwyn-Mayer Studios Inc. v.
¶ 8 As Windsor points out, the word “duplicate” is not defined in the criminal code. The general dictionary definition of that word, however, is “to make an exact copy of.”
Webster’s Ninth New Collegiate Dictionary
389 (1991); accord The American Heritage Dictionary 430 (2d college ed.1982) (“[t]o make an identical copy of’);
see State v. Bews,
¶ 9 Windsor disputes this construction of the statute. Citing
Paredes-Solano,
he argues that because “duplicating” is used in § 13-3553(A)(1), it must refer to the “creation or production of a new image,” and the act of downloading is more analogous to the receipt or distribution of an existing image described in § 13-3553(A)(2) than to the creation of a new one.
4
But he does not explain how creating an electronic copy of an image is so significantly different from making any other type of duplicate that it should be treated differently under the law. Moreover, our generalized statement of the statute’s purposes in
Paredes-Solano
does not alter the plain language of the statute and cannot serve to narrow its application.
See State v. Peek,
¶ 10 Windsor also cites Oregon and Washington statutes similar to § 13-3553(A) and out-of-state cases in which courts upheld the convictions of defendants who had reproduced pornographic images. It appears his intent is to show that other states do not regard the act of downloading an image as “duplication]” for the purposes of their respective statutes. But none of the decisions he cites stand for this proposition or even include discussion of this issue.
State v. Dimock,
¶ 11 We also reject Windsor’s contention that interpreting the word “duplication]” in § 13-3553(A)(1) to include downloading would render superfluous the terms “receiving,” “electronically transmitting,” and “possessing,” that appear in § 13-3553(A)(2). Although he does not specifically explain how these words would become meaningless if downloading constitutes duplication, we infer that Windsor’s primary concern is the term “electronically transmitting.”
5
But there are
¶ 12 We find additional support in
State v. Jensen,
¶ 13 Similarly, we determined that, by visiting websites containing child pornography, the defendant in Jensen had taken “ ‘something given, offered, or transmitted’ ” or had “ ‘converged] incoming electro-magnetic waves into visible or audible signals,’ ” an act similar to, but separate from, intentionally downloading files onto his computer hard drive. Id. ¶ 13, quoting Webster’s II New Riverside University Dictionary 981 (1994). Implicit in this discussion is the idea that “electronic transmission” is the broadcast of images over the Internet, which one receives by viewing, and that these acts of transmitting and receiving are separate from actively and intentionally making a copy by downloading and saving the images in a specific location on a computer. 7
¶ 14 At Windsor’s trial, an FBI computer forensics expert testified that downloading a file from the Internet involves copying the file to a user’s computer hard drive. And Windsor did not contest that he was responsible for downloading the recovered image files. 8 Accordingly, because the state presented evidence that, by downloading these images, Windsor intentionally had copied them onto the computer, his conviction for duplicating an exploitative visual representation of a child in violation of § 13-3553(A)(1) was supported by substantial evidence.
Disposition
¶ 15 Windsor’s convictions and sentences are affirmed.
Notes
. There was trial testimony and an exhibit showing that the screen displayed numerous photographs in a "collage” format.
. Windsor does not dispute that he failed at trial to move for a judgment of acquittal on this basis pursuant to Rule 20, Ariz. R.Crim. P., and therefore is entitled to a review only for fundamental error.
See State v. Stroud,
. Windsor appears to all but concede that, had the state charged him under § 13-3553(A)(2), sufficient evidence would exist to support his conviction.
. In his opening brief, Windsor likens downloading images to purchasing a magazine containing pornography, arguing that a purchaser could only be guilty of violating § 13 — 3553(A)(1) by taking the additional step of scanning, photocopying, or faxing the image, "thus creating something entirely new." But downloading images is more analogous to purchasing materials at a store that requires a person to make his or her own photocopy of the materials to leave with them.
. One obviously could receive or possess illicit materials without having downloaded them, such as a photograph or a video recording, and with out having either accessed them on the Internet or duplicated them.
. "Streaming" involves transmitting electronic data in a continuous fashion to disseminate visual or audio content, or both, among receiving devices.
See Cable Plus Co., L.P. v. Ariz. Dep't of Rev.,
. In
Jensen
we did not reach the issue of whether inadvertently cached images constituted knowing possession of child pornography.
. At trial, Windsor denied knowing what the files contained but did not dispute that he had downloaded them.
