OPINION
I. Introduction
Appellant Ruben Wenger appeals his conviction on three counts of promotion of child pornography and four counts of possession of child pornography as alleged in the same indictment. Appellant argues that the evidence is legally and factually insufficient to support his conviction on the promotion counts and that the trial court abused its discretion in overruling his *194 hearsay objection and in admitting extraneous offense evidence of possession of child pornography.
II. Factual and procedural background
Sergeant Ried, an agent with the Attorney General’s Cyber Crimes unit, testified that on November 28, 2005, he used file-sharing software called Shareaza to access the Internet through a covert access point in his office in Austin. Shareaza is a peer-to-peer 1 file sharing software that allows a user to search for music, movies, and image files and download them from other Shareaza users’ computers. A Shareaza user can type exactly what he or she is looking for via search terms, and a results list will appear with download links for the user to choose from. The software also allows a user to select another user’s Internet protocol (“IP”) address 2 . and browse all files available from that user's collection. Downloads from Shareaza are automatically placed in a “Shared” folder created by the software on the user’s computer. By default, Shareaza automatically shares the items downloaded with other Shareaza users.
For his investigation, Sergeant Ried used a special search term popular in the child pornography community and discovered several results. Over Appellant’s hearsay objection, the trial court allowed Sergeant Ried to testify that he downloaded child pornography files from the IP address assigned to Appellant by his Internet service provider. He stated that IP addresses are like telephone numbers, assigned to only one person. Based on the child pornography 3 Sergeant Ried downloaded from Appellant’s IP address, he obtained a grand jury subpoena and a search warrant. Police executed the warrant on Appellant’s residence on February 8, 2006. Sergeant Ried retrieved a computer from the residence and took a statement from Appellant’s wife.
During trial, the State |olayed an audio recording of a February 8, 2006 interview between Sergeant Ried, Sergeant Smith, and Appellant while they were at the Fort Worth police substation after the warrant was executed. Sergeant Ried testified that, before taking the statement, he read Appellant his Miranda 4 rights and did not make any promises or threats regarding Appellant’s making the statement. In the recording, Sergeant- Ried read the Miranda rights, told Appellant that he was not under arrest, and informed Appellant that he could ask to go home at any time. Appellant voluntarily waived his Miranda rights and spoke with the officers.
After waiving his Miranda rights, Appellant confirmed that he was the jorimary user of both the computer and the installed Shareaza software. He claimed that a neighborhood child used the computer occasionally, along with his son. He stated that he formerly used the file-sharing soft *195 ware Kazaa but switched to Shareaza. He installed Shareaza and registered his name, hometown, state, and zip code on the software’s user information section. He registered his user name as “C.W.” because his nickname was Chip Wenger. Appellant stated initially that he had only movies and “straight” pornographic images on his computer. He denied having child pornography and stated that he did not know how it came to be on his computer unless it was “clicked on accidentally.” He stated that he “[tried] to view everything that gets downloaded.” Appellant admitted that he had searched for files containing the words “young” and “Lolita,” but denied having used other search terms associated with child pornography.
After Sergeant Ried confronted Appellant by informing him that he had personally downloaded child pornography from Appellant’s IP address, Appellant admitted that the ages of the children in the videos on his computer were “very early teens” and that the youngest child was “probably eight.” Appellant described the video of the youngest child and said that the video was in his “Shared” folder. He explained that he was curious about the visual material. Appellant denied finding the material sexually arousing, but compared his viewing of the pornographic images and videos to the “Taliban beheading [video],” stating that “you’d watch it even though you find it disgusting, but you are drawn to it.” He admitted he knew it was illegal.
When asked if he knew how many times he had “allowed people to upload those videos of child pornography from [his] computer,” Appellant replied that he “had no idea.” When asked if he was “aware that [it was possible for] people [to] upload ... [his] files,” Appellant stated, “I’m assuming that it is, ... but I think it says that it is — that’s part of Shareaza is that [ ] ... that’s your way to use it is that people pull files from members.” Appellant then claimed that he “did not know how to not share and share and separate those items out.” He ultimately admitted that there were “probably 300” videos of child pornography on his computer. Appellant described some files as located in folders that had titles such as “extreme,” “amateur,” “group,” “toy,” and “young.” He explained that after he obtained the files from Shareaza, he would create “subfold-ers” and move the files. 5
The State offered into evidence the files that Sergeant Ried downloaded from Appellant’s IP address during his November investigation. 6 Sergeant Ried stated that the files included both videos and photo images of children under eighteen, including the children’s genitalia and children engaging in sexual activity. He testified that one can preview partially downloaded files on Shareaza.
While Sergeant Ried testified about the steps of his investigative process on November 28, 2005, the State offered into evidence an exhibit of Shareaza screen captures 7 that showed a folder on a corn- *196 puter at Appellant’s IP address with a list of labeled subfolders and 900 files that included file names graphically describing both adult and child pornography. After a rule 403 objection and lengthy voir dire, the tidal court overruled the objection and admitted the screen captures into evidence. The trial court gave Appellant a running objection to that evidence.
Detective Lawrence testified that he worked in the Computer Crime Detail of the Major Crimes section of the Fort Worth Police Department, where he investigated computer crimes and conducted computer forensics. He conducted a forensic examination on Appellant’s computer after it was seized. He located the images alleged in the indictment on Appellant’s computer and testified that, in his opinion, those images constituted child pornography.
Detective Lawrence explained that Appellant had stored his pornography under the “My Documents” folder of a second hard drive, D:. He stated that the terms used in the file names, such as “age 6-3 (reelkiddymov child abuse underage preteen r@ygold bond age rape molestj.mpg,” were common to his child pornography investigations. He testified that one file was last accessed on February 7, 2006. He also testified about the organization of the files on the second hard drive and stated that they were “pretty well organized.” He stated that, in his opinion, Appellant’s possession of the child pornography was not inadvertent, based on the organizational structure of the files and the number of files on the computer.
Detective Lawrence confirmed that he found on Appellant’s computer all three of the files Sergeant Ried had downloaded via Shareaza on November 28, 2005. Detective Lawrence added that there were other child pornography pictures found in several subfolders other than the “young” subfolder. He also testified that unlike the default Shareaza installation, where downloaded files are automatically shared, Appellant’s computer had separate folders for downloaded and shared files and that files had to be moved from the “Download” folder to the “Shared” folder to share the files in question. He demonstrated how a person could make changes to his or her sharing settings by simply selecting “Shar-eaza Settings.”
Appellant was charged by indictment with promotion of child pornography by disseminating visual material on counts one through three of the indictment and possession of child pornography on counts four through seven. The jury returned a verdict of guilty on all counts and assessed a punishment of fifteen years for each promotion count and ten years for each possession count, with some of the sentences consecutive and others concurrent.
III. Legal and factual sufficiency of the evidence for intentional promotion by dissemination
Appellant argues that there was insufficient evidence to prove he actually and intentionally disseminated child pornography or that he had specific knowledge that the material was child pornography prior to dissemination because there was no proof that he saw the three files alleged to have been shared or that he intended to share the same.
a. Legal sufficiency: standard of review
In reviewing the legal sufficiency of the evidence to support a conviction, we view all the evidence in the light most favorable to the prosecution in order to determine whether any rational trier of fact could have found the essential elements of the crime beyond a reasonable doubt.
Jackson v. Virginia,
This standard gives full play to the responsibility of the trier of fact to resolve conflicts in the testimony, to weigh the evidence, and to draw reasonable inferences from basic facts to ultimate facts.
Jackson,
b. Factual sufficiency: standard of review
When reviewing the factual sufficiency of the evidence to support a conviction, we view all the evidence in a neutral light, favoring neither party.
Neal v. State,
In determining whether the evidence is factually insufficient to support a conviction that is nevertheless supported by legally sufficient evidence, it is not enough that this court “harbor a subjective level of reasonable doubt to overturn [the] conviction.”
Id.
We cannot conclude that a conviction is clearly wrong or manifestly unjust simply because we would have decided differently than the jury or because we disagree with the jury’s resolution of a conflict in the evidence.
Id.
We may not simply substitute our judgment for the factfinder’s.
Johnson v. State,
c. Applicable law
The offense of promotion of child pornography is described under penal code section 43.26(e), which provides that “a person commits an offense if: (1) the person knowingly or intentionally promotes or possesses with intent to promote material described by Subsection (a)(1); and (2) the person knows that the material depicts the child as described by Subsection (a)(1).” Tex. Penal Code § 43.26(e) (Vernon 2003). Section (a)(1) of the statute describes the offense of possession of child pornography: “[a] person commits an offense if: (1) the person knowingly or intentionally possesses visual material that visually depicts a child younger than 18 years of age at the time the image of the child was made who is engaging in sexual conduct.” Id. § 43.26(a).
The term “promote,” as defined under section 43.25(a) of the penal code, means “to procure, manufacture, issue, sell, give, provide, lend, mail, deliver, transfer, transmit, publish, distribute, circulate, disseminate, present, exhibit, or advertise or to offer or agree to do any of the above.” Id. § 43.25(a)(5) (Vernon 2007). A person acts intentionally, or with intent, with respect to the nature of his conduct or to a result of his conduct when it is his conscious objective or desire to engage in the conduct or cause the result. Id. § 6.03(a) (Vernon 2003). A person acts knowingly, or with knowledge, with respect to the nature of his conduct or to circumstances surrounding his conduct when he is aware of the nature of his conduct or that the circumstances exist or when he is aware that his conduct is reasonably certain to cause the result. See id. § 6.03(b).
Circumstantial evidence can be used to prove intent and knowledge.
See Guevara v. State,
d. Analysis
Appellant challenges the sufficiency of the evidence on three grounds. Appellant argues that the evidence is insufficient to prove (1) that he actually disseminated the child pornography; (2) if he disseminated the child pornography, that the dissemination was intentional or knowing; and (3) that he knew the files in question contained child pornography before Sergeant Ried downloaded them from his computer. We will address each ground separately in our analysis.
1. Actual dissemination
In the first part of his sufficiency challenge, Appellant argues that the evidence is insufficient to prove that he actually “disseminated” child pornography. Implicit in his argument is the question of whether sharing digital files through peer-to-peer software like Shareaza constitutes “dissemination.”
Several courts have held that making child pornography available for others to access and download through peer-to-peer file-sharing software qualifies as “distribution” or “delivery” to others.
See United States v. Sewell,
Tn
United States v. Shaffer,
the 10th Circuit Court of Appeals analogized the making available of child pornography through peer-to-peer file sharing software to a self-serve gas station.
See Shaffer,
Shaffer and the other cases cited above analyzed the term “distribution,” but in the context of peer-to-peer file sharing, there is no significant difference between “distribution” and “dissemination.” “Distribute” means, among other things, to spread out; to scatter; to give or deliver, especially to members of a group. Webster's Ninth New Collegiate Dictionary 368 (1987). “Dissemination” means to spread; to disperse throughout. Id. at 366. Because the terms “distribute” and “dissemination” have similar meanings, the cases holding that peer-to-peer file sharing is “distribution” persuasively answer the question of whether the same activity constitutes “dissemination.” Mindful that penal code section 43.25(a) defines “promote” to mean both “distribute” and “disseminate,” we hold that making digital files available to others through peer-to-peer file sharing software like Shareaza is “dissemination” within the meaning of section 43.25(a).
The jury heard ample evidence regarding Appellant’s dissemination of the child pornography files to Sergeant Ried on November 28, 2005. Sergeant Ried and Detective Lawrence both testified about how their investigations resulted in finding child pornography files stored in subfold-ers within Appellant’s “Shared” folder on his computer. Sergeant Ried explained his process of searching for child pornography on Shareaza and described how he retrieved the indicted files from Appellant’s computer by downloading them to his computer in Austin. Detective Lawrence confirmed that, in February 2006, his forensic investigation revealed that Appellant’s seized computer contained the same files and user-created subfolders discovered by Sergeant Ried’s November investigation. Thus, the evidence was legally and factually sufficient to prove that Appellant actually disseminated child pornography. See
Sewell,
2. Intentional or knowing dissemination
Next, Appellant argues that there was insufficient evidence to prove he intentionally or knowingly disseminated the files in question. Appellant highlights the *200 testimony that under Shareaza’s default settings, the program will share a user’s downloaded files automatically. Although Detective Lawrence testified that Appellant had changed the default settings sometime before the State seized his computer so that Appellant had to manually move downloaded files from the “downloads” folder to the “Shared” folder before Shareaza would share them with other users, he was unable to testify that Appellant had so modified the default settings before Detective Ried downloaded the indicted files from Appellant’s computer three months earlier. And State’s Exhibit 11 — the screen captures Detective Ried made when he downloaded the files — indicates that Appellant’s shared files were in the default “downloads” folder, not a separate “Shared” folder. Thus, argues Appellant, there is no evidence that he intentionally or knowingly disseminated child pornography because Shareaza automatically shared his downloaded files with other users, including Detective Ried.
But other evidence tends to show that Appellant intentionally or knowingly shared his downloaded files. Most significantly, in his recorded interview, Appellant admitted that he knew Shareaza shared his files: he said that he assumed users downloaded files from him and that the purpose of Shareaza was to allow users (like Detective Ried) to “pull files from' members” (like Appellant). Although Appellant claimed in the interview that he did not know “how to not share and share and separate those items out,” Detective Lawrence’s testimony shows that Appellant did at some point — before the State seized his computer and before the interview— change the default Shareaza settings so that the program did not automatically share Appellant’s downloaded files. This shows that — contrary to his claim in the recorded interview — Appellant did know how to “not share and share” files. Detective Lawrence also explained why a Shar-eaza user like Appellant might want to share files, namely, because Shareaza rewards a user for allowing others to download files from his computers: “[T]he more files you share, the faster you can download other files.”
A jury could reasonably infer from this evidence that Appellant knew Shareaza was sharing his downloaded files and knew how to prevent Shareaza from sharing his downloaded files. Thus, the evidence is legally and factually sufficient to show that Appellant intentionally or knowingly disseminated the indicted files despite his argument that Shareaza shared the files automatically and without his knowledge or intent.
3. Knowledge of the actual content of files
Finally, Appellant argues that the evidence is insufficient to show that he knew the files in question contained child pornography when Sergeant Ried downloaded them.
There is no direct evidence that Appellant viewed the files in question before Sergeant Ried downloaded them from Appellant’s computer; both Sergeant Ried and Detective Lawrence admitted that they had no such proof. But Appellant said in his recorded interview that he “tried” to view everything he downloaded. Sergeant Ried testified that Shareaza allows a user to “preview” files even before the download is complete. Appellant admitted that he searched for and downloaded child pornography by inputting search terms like “young” and “Lolita” (he denied that “Lolita” yielded any “matches,” but one of the indicted images has the term “Lolita” in its file name). He manually organized his child-pornography collection in folders with names like “young.” It *201 appears from State’s Exhibit 11 that the “young” folder existed on Appellant’s computer when Sergeant Ried downloaded the indicted files, and Detective Lawrence testified that he found those same files in the “young” folder on Appellant’s computer.
Most telling are the explicitly descriptive names of the indicted files themselves, which included the terms “age6-3,” “kiddy”, “child abuse,” “underage,” “rape,” “molest”, “p-e-d-o,” “Lolita,” “PTHC” (Pre-Teen Hard Core), “8 9 10 11 12 yo,” “6 year old,” and “baby incest.” Detective Lawrence testified that he knew what the files depicted from the file names alone before he viewed them. There was testimony that descriptive file names can be inaccurate or misleading, but in his recorded interview, Appellant volunteered that sometimes, the names are accurate: “[I]t says, ‘young teens,’ and you pull it up, and it’s a 35-year-old woman ... but some of the stuff does come up that ... is real.” The record shows that the descriptive file names of the indicted files were indeed accurate. Finally, the record shows that Appellant deliberately selected the descriptively-named files for downloading; as Detective Ried explained, Shareaza does not randomly download files.
From Appellant’s admission that he “tried” to view everything he downloaded, from the fact that he organized the indicted files in a folder labeled “young,” and from the descriptive names of the files, a jury could reasonably infer that Appellant knew the indicted files depicted child pornography when he disseminated them to Sergeant Ried, despite the lack of direct evidence that Appellant actually viewed the files’ contents before that date.
e. Conclusion
Viewing the evidence in a light most favorable to the prosecution, a rational jury could have determined beyond a reasonable doubt (1) that Appellant actually disseminated the images, (2) that he acted intentionally and knowingly, and (3) that he knew that the computer images in question depicted children under 18 years of age engaging in sexual conduct. We hold that the evidence is legally sufficient to support the jury’s verdict.
See Jackson,
Viewing the evidence in a neutral light, we cannot say that the evidence is so weak that the jury’s determination that Appellant intentionally or knowingly disseminated child pornography is clearly wrong or manifestly unjust. We also cannot say that conflicting evidence greatly outweighs evidence supporting conviction so that the jury’s determination is manifestly unjust.
See Lancon,
IV. Admission of hearsay testimony
In his second point, Appellant argues that the testimony identifying his IP address and Internet service provider constituted hearsay and should not have been admitted because it was an out-of-court computer-stored statement offered for the truth of the matter asserted. Appellant objected to Sergeant Ried’s initial statements regarding the IP address but did not obtain a running objection. Further, toward the end of Sergeant Ried’s testimony and when Detective Lawrence testified, Appellant did not object when the State elicited additional IP address testimony. Sergeant Ried confirmed without objection the existence of the IP address when describing Exhibit 11 and testified that the address was assigned to Appellant. Detective Lawrence recited the numbers in the IP address without any objection and stated that it came from Appellant’s com *202 puter and matched the submitted IP address from the Attorney General’s office.
To preserve a complaint for our review, a party must have presented to the trial court a timely request, objection, or motion that states the specific grounds for the desired ruling if they are not apparent from the context of the request, objection, or motion. Tex.R.App. P. 33.1(a)(1);
Mosley v. State,
Because Appellant did not obtain a running objection for his hearsay objection during Ried’s testimony or specifically object to the IP address testimony elicited from Detective Lawrence, he did not preserve error for our review.
Fuentes,
Y. Evidence of Extraneous Offenses
In his third point, Appellant argues that the trial court’s admission of the exhibit showing a list of subfolders and 900 file names from his “Shared” folder of Shareaza in addition to the files with which he was charged was improper because it included both adult as well as child pornography, thus constituting improper extraneous offense evidence that was unduly prejudicial under Texas Rules of Evidence 403 and 404(b). The State argues that because Appellant admitted his guilt at punishment, he is estopped from raising this point unless he can show that admission of this evidence implicated a fundamental right. 8 Because we hold the evidence was admissible and not unduly prejudicial, we need not address this contention.
We review a trial court’s evidentiary ruling for abuse of discretion.
Weatherred v. State,
Texas Rule of Evidence 404(b) prohibits admission of evidence of extraneous offenses to prove that, on the occasion in question, the defendant acted in conformity with the character shown by other bad acts. Tex.R. Evid. 404(b);
see Santellan v. State,
An extraneous offense has noncharacter-conformity relevance when it has any tendency to make the existence of a fact that is of consequence to the determination of the action more or less probable than it would be without the evidence.
See
Tex.R. Evid. 401;
Powell v. State,
Appellant’s defensive theory that he sought to develop on cross-examination of the officers was that, if any child pornography was downloaded onto his computer, it must have been accidental, and that it may have been shared with others before he viewed the content and without his knowledge. On cross-examination of Sergeant Ried, Appellant created an impression that he had only one file available for downloading and that that file could have been downloaded by others and “shared” before he became aware of it. The State’s exhibit showing an extensive list of subfolders and file names tended to show that Appellant was experienced in searching for both child and adult pornography, that he had numerous files of both kinds available for sharing, and that he organized his pornography collection by type of image, including creating a special subfolder entitled “young.” His creation — or retention — of the highly descriptive as well as offensive and lurid file names, along with their organization, not only made them easily searchable by other users but was also relevant to show that he was aware of the illegal nature of his conduct and that the presence of the indicted images on his computer was not accidental. The evidence was relevant to the issues of motive, intent, plan, knowledge, and lack of mistake or accident. We agree with the State that the exhibit had relevance apart from evidence of character-conformity. See Tex.R. Evid. 404(b).
Evidence relevant under Rule 404(b) may nevertheless be excluded if its probative value is substantially outweighed by the danger of unfair prejudice, confusion of the issues, or misleading the jury or by undue delay or needless presentation of
*204
cumulative evidence. Tex.R. Evid. 403. “Probative value” refers to the inherent probative force of an item of evidence— that is, how strongly it serves to make more or less probable the existence of a fact of consequence to the litigation — coupled with the proponent’s need for that evidence.
Gigliobianco v. State,
The relevant criteria in performing a rule 403 balancing test include (1) the inherent pi'obative force of the proffered item of evidence along with (2) the proponent’s need for that evidence, balanced against (3) any tendency of the evidence to suggest conviction on an improper basis, (4) any tendency of the evidence to confuse or distract the jury from the main issues, (5) any tendency of the evidence to be given undue weight by a jury that is not equipped to evaluate the probative force of the evidence, and (6) the likelihood that presentation of the evidence will consume an inordinate amount of time or merely repeat evidence already admitted.
Gigliobianco,
We presume that the probative value substantially outweighs the danger of unfaii' prejudice.
Montgomery,
As discussed above, the first two factors weigh in favor of admitting the extraneous offense evidence. The evidence was probative to rebut Appellant’s defensive theory that he did not intentionally or knowingly possess or promote the indicted images; many of the images listed in the State’s exhibit 11, like the indicted images, contain labels including terms such as “teen,” “child,” and “kiddy” and make it more likely that he was fully aware of the specific nature of the material that he downloaded. The evidence was needed by the State to show that Appellant organized, stored, and shared the downloaded images as described by their titles and that his doing so was not the result of mistake or accident.
The third, fourth, and fifth criteria of the balancing test do not weigh heavily in favor of exclusion. In contrast to the items with which Appellant was charged with possessing and promoting, the exhibit of which he complains consists only of a list of written titles; the corresponding images were never shown to the jury. Hence, the exhibit did not have a definite tendency to suggest a decision on an improper basis, to unduly confuse or distract the jury from the main issues regarding the indicted images, or to invite the jury to give undue weight to that evidence. Moreover, presentation of the evidence did not consume an inordinate amount of time nor merely repeat evidence already admitted.
Appellant complains of the offensive and repulsive nature of the titles shown and points to testimony that some of the titles may have been misleading or incorrect, but he acknowledges that many, if *205 not most, were “real.” Moreover, there was evidence that he selected the descriptively-titled files for downloading. Thus, we agree with the State that the exhibit listing the titles was the best and least prejudicial method of rebutting Appellant’s defensive theory that he may have downloaded images of child pornography accidentally or shared them without knowledge of their content.
Additionally, we note that the jury charge contains a proper reasonable doubt instruction. The jury was instructed not to consider evidence of Appellant’s commission of any crimes, wrongs, or acts other than the offenses alleged in the indictment unless it found such commission beyond a reasonable doubt. We hold that the trial court did not abuse its discretion in admitting the State’s exhibit because the probative value of that evidence was not substantially outweighed by the danger of undue prejudice. We overrule Appellant’s third point.
VI. Conclusion
Having overruled Appellant’s three points, we affirm the trial court’s judgment.
Notes
. Sergeant Ried defined “peer-to-peer” in this context as a "computer to computer connection," and as Detective Lawrence later explained, there is "no central location”; rather, a file is "shared amongst all the computers hooked up to the network at that time.”
. An IP address is a unique 32-bit-long code number that each computer acquires automatically through its Internet access provider for connecting to the Internet. http://www. businessdictionary.com/definition/IP-address. html (last visited June 17, 2009).
. Sergeant Ried downloaded three files from Appellant's IP address: one file containing actual sexual intercourse, one file containing actual lewd exhibition of female genitals, and one file containing actual sexual conduct.
.
Miranda v. Arizona,
. Officers did not arrest Appellant at the time of the statement; they arrested him four months later in June 2006.
. Exhibit 7 was a digital video with the file name ''age6-3 (reelkiddymov child abuse underage pre-teen kiddy r@ygold bond age rape molest).mpg.” Exhibit 8 was also a video, and its file name was "2_p-e-d-o lolita R@ygold PTHC incest 89 10 11 12 yo collection 053(50).jpg.'' Exhibit 9 was a photograph, and its file name was "6 year old girLfinger in pussy_preleen child underage pedo P-E-D-0 baby incest reelkiddy-mov(l)(l)(l)(l).jpg."
.Also called a “screen shot,” a screen capture is a reproduction of the current display on a computer screen, saved as a graphics file. See Dictionary.com, http://dictionary. reference.com/browse/screenshot (last visited June 17, 2009).
.
See Leday,
