WETZEL v. THE STATE
S15A0650
SUPREME COURT OF GEORGIA
NOVEMBER 2, 2015
328 Ga. App. 411 | 779 SE2d 263
NAHMIAS, Justice
An officer, in other words, may conduct certain unrelated checks during an otherwise lawful traffic stop. But... he may not do so in a way that prolongs the stop, absent the reasonable suspicion ordinarily demanded to justify detaining an individual. . . .
Beyond determining whether to issue a traffic ticket, an officer‘s mission includes “ordinary inquiries incident to [the traffic] stop.” [Caballes, supra, 543 U. S. at 408.] Typically such inquiries involve checking the driver‘s license, determining whether there are outstanding warrants against the driver, and inspecting the automobile‘s registration and proof of insurance.
(Citations omitted; emphasis supplied.) Rodriguez, supra, 135 SCt at 1615 (II). Nothing in Rodriguez supports prolonging a traffic stop to inquire into irrelevant passenger information.14
Because I believe the officer unlawfully extended the traffic stop in this case, I would uphold the decision of the Court of Appeals affirming the trial court‘s granting the motions to suppress. Accordingly, I respectfully dissent to the majority opinion.
I am authorized to state that Justice Hunstein and Justice Melton join in this dissent.
DECIDED NOVEMBER 2, 2015.
James L. Wright III, District Attorney, Blair D. Mahaffey, Assistant District Attorney, for appellant.
Veal & Lamar, Holly W. Veal; William C. Puckett, Jr., for appellees.
NAHMIAS, Justice.
Appellant Jeremy Wetzel was a high school paraprofessional who engaged in highly inappropriate, sexually oriented electronic
The computer pornography conviction was based on the State‘s argument at trial that the jury gets to decide whether, in its opinion, Wetzel‘s conduct should be deemed “an unlawful sexual offense against a child,” as that phrase is used in
1. Viewed in the light most favorable to the verdicts, the evidence at trial showed the following. Wetzel was a paraprofessional for special education students at North Oconee High School. He also helped with a club whose student members worked with special education students at the school. S. B. J. first met Wetzel through the club, which she joined in the fall of her sophomore year at North Oconee. S. B. J. was 15 years old; Wetzel was 24. They became Facebook friends and started chatting online.
On the evening of November 15, 2011, shortly after their Facebook communications began, S. B. J. used the cell phone number Wetzel posted on Facebook to begin exchanging text messages with him. When S. B. J.‘s cell phone stopped sending and receiving texts at 10:00 p.m. that night because of a restriction her parents had set on her phone, she switched to communicating with Wetzel via a text messaging app on her sister‘s iPod Touch, which can connect to the Internet and download apps but cannot make phone calls. Wetzel and S. B. J. exchanged text messages until 1:50 a.m. S. B. J. then texted Wetzel again after waking up on November 16, and resumed texting him when she got home from school that day. S. B. J. characterized the
At some point that night, Wetzel asked S. B. J. by text about what size penises she had seen. He then attempted to text her a picture of his penis, but her iPod texting app could not receive pictures. So Wetzel switched to e-mail and around 11:00 p.m., he used his cell phone to send two photographs from his Hotmail address to S. B. J.‘s Gmail address. One picture showed Wetzel‘s nude torso with an erect penis and the other was a close-up of just his erect penis. S. B. J. testified that a couple of days later, Wetzel sent her more pictures1 and asked her via text message, “What do I get in return?” S. B. J. testified that she then took two pictures of herself topless (one wearing sweat pants and one wearing only underwear) and sent them electronically to Wetzel. Their communications continued for a few more days, ending when Wetzel indicated that he wanted to resume a relationship with his former girlfriend.
On December 6, 2011, S. B. J. showed the November 16 pictures of Wetzel to two of her friends. The next day, those friends reported the pictures to a teacher. Wetzel and S. B. J. were interviewed by school administrators, and S. B. J. showed the principal the November 16 e-mails with the pictures, which were still in her trash folder. Wetzel was then terminated and told to leave the school. The police were notified, and he was arrested later that day. Two days later, the police obtained a search warrant for Wetzel‘s house and identified his bathroom as the background of the pictures. His cell phone and laptop computer were taken into custody, but no evidence of his communications with S. B. J. was found on them. His cell phone records obtained from his provider, however, showed numerous texts to and from S. B. J.‘s cell phone number and the number linked to the iPod‘s texting app. The two naked photographs of Wetzel from November 16 were recovered from S. B. J.‘s Gmail account. The text messages sent to and from the iPod could not be downloaded from the app, but a few texts that had been sent between Wetzel and S. B. J. in the early morning hours of December 1 were recovered by taking pictures of the iPod screen showing the texts. At trial, S. B. J. testified that she and Wetzel never had any inappropriate physical contact.
Wetzel was indicted for computer pornography, tracking the language of
2. We first consider Wetzel‘s challenges to his conviction for violating
did intentionally utilize an electronic device, to wit: a cellular phone, to seduce, solicit, and entice [S. B. J.], a child under 16 years of age, to engage in the sending and receiving of nude photographs, conduct that is, by its nature, an unlawful sexual offense against a child; in violation of
OCGA § 16-12-100.2 (d) [.]
This charge tracks the language of the 2011 version of the statute, which made it unlawful for any person
to utilize a computer on-line service or Internet service, including but not limited to a local bulletin board service, Internet chat room, e-mail, on-line messaging service, or other electronic device, to seduce, solicit, lure, or entice, or attempt to seduce, solicit, lure, or entice a child or another person believed by such person to be a child to commit any illegal act described in Code Section 16-6-2, relating to the offense of sodomy or aggravated sodomy; Code Section 16-6-4, relating to the offense of child molestation or aggravated child molestation; Code Section 16-6-5, relating to the offense of enticing a child for indecent purposes; or Code Section 16-6-8, relating to the offense of public indecency or to
engage in any conduct that by its nature is an unlawful sexual offense against a child.
(a) Most of Wetzel‘s challenges to his conviction under
The State‘s initial interpretation of the final clause in
Indeed, the construction of
“[O]ur liberties and rights [are] determined . . . not by a tribunal which makes its own law, but by a tribunal that obeys the law as made. . . . Unless there be a violation of law preannounced, . . . there is no crime and can be no punishment.”
Sparf v. United States, 156 U. S. 51, 87-88 (15 SCt 273, 39 LE 343) (1895) (citation omitted). See
After this Court directed the parties to be prepared to address this issue at oral argument, Wetzel apparently reacquainted himself with basic principles of our language, and the State apparently reacquainted itself with basic principles of our law. Both parties filed supplemental briefs repudiating their prior flawed interpretations of the final clause in
(b) Although Wetzel incorrectly interpreted
The trial court accepted, or at least acquiesced in, the State‘s obdurate refusal to identify any offense outside
A person commits the offense of computer pornography when he intentionally utilizes an electronic device to seduce, solicit, or entice a child or an individual believed by such person to be a child to engage in any conduct that by its nature is an unlawful sexual offense against a child. In this context, “child” means any person under the age of 16 years, and the State must prove beyond a reasonable doubt that the alleged victim was a child or was an individual believed by the accused to be a child. Additionally, the term “electronic device” may include, but is not limited to, a cellular phone.
Although this instruction tracked the relevant statutory language, it did not give the jury any inkling of the underlying offense on which Count 1 was allegedly based or refer to the elements of any such offense. Nor did the indictment, the material allegations of which the trial court elsewhere directed the jury to consider, identify the “unlawful sexual offense” referenced in Count 1. Thus, the
The absence of guidance to the jury on this point of law was exacerbated when, during its closing argument, the State affirmatively misled the jury regarding its consideration of Count 1, saying:
[W]hether or not the sending and receiving of nude photographs between a 24-year-old parapro at the high school and a 15-year-old sophomore, whether or not that is conduct that by its nature is an unlawful sexual offense against a child, well, ladies and gentlemen, that‘s for y‘all to decide. Y‘all are the voice of this community. I would submit to you that this community — or in any community, the sending and receiving of nude photographs between a 24-year-old and a 15-year-old is an unlawful sexual offense against a child.
For the reasons discussed above, this was a wholly inappropriate argument, which sought to bestow upon the jury the power to create and then retroactively enforce an “unlawful sexual offense” based solely on its feelings, or its beliefs regarding how the community would feel, about Wetzel‘s conduct. The court did nothing to correct this inaccurate statement of the relevant law. Compare Williams v. State, 297 Ga. 460, 461-463 (773 SE2d 213) (2015) (finding that a prosecutor‘s misstatement of the law on justification during his closing argument was harmless when the trial court advised the jury that the instructions on the law would come from the court and then fully and correctly instructed the jury on the legal issue, without objection by the defendant).
We conclude that the minimal instruction given by the trial court on the “unlawful sexual offense” element of
(a) Child molestation can certainly be a predicate offense for a violation of
The statute is not read naturally to allow the “unlawful sexual offense” in the final clause to be one of the four types of offenses specified earlier in the statute. The listed offenses are all undoubtedly “unlawful sexual offense[s],” so reading the statute as the State suggests would mean that there was no need to list them separately, and “this Court avoids interpreting statutes in a manner that renders any portion of them surplusage or meaningless.” Hill v. Owens, 292 Ga. 380, 383 (738 SE2d 56) (2013). See also Scott v. State, 295 Ga. 39, 40 (757 SE2d 106) (2014) (“[A] statute is to be construed to give sensible and intelligent effect to all its provisions and to refrain from any interpretation which renders any part of the statute meaningless.” (citation and punctuation omitted)).
Moreover, the enumeration of specific offenses and the final catch-all clause are separated by an “or” and introduced with similar but not
The State did not charge Wetzel with violating
(b) The offense that Wetzel was charged with (and convicted of) in Count 3 of the indictment — electronically furnishing obscene material to a minor in violation of
A violation of
Wetzel‘s violation of
(c) Despite our express invitation to do so, the State has not identified any other “unlawful sexual offense” within the meaning of
4. We turn now to Wetzel‘s challenges to his conviction on Count 3 of the indictment for violating
(a) Wetzel argues first that the evidence presented at trial was insufficient to support this conviction because there was no evidence that he electronically furnished his nude pictures to S. B. J. through the operation of a “computer bulletin board.” He similarly argues that the jury instruction on this count was defective because the jury was not told that it could find him guilty only if he operated a computer bulletin board. Because Wetzel‘s interpretation of how obscene materials may be “electronically furnishe[d]” to a minor is incorrect, these arguments lack merit.12
At the time of Wetzel‘s alleged violation in 2011, “electronically furnishes” was defined, in relevant part, as “[t]o make available by allowing access to information stored in a computer, including making material available by operating a computer bulletin board.”
As used in statutes, the word “including” and the specific terms that follow it may serve to expand, to limit, or to confirm by illustration the meaning of a more general term that precedes it. See Berryhill v. Ga. Community Support & Solutions, Inc., 281 Ga. 439, 441 (638 SE2d 278) (2006) (” ‘[T]he word ‘includes’ is susceptible of meaning, inter alia, either ‘encompasses’ or ‘is equivalent to.’ ” (citation omitted)). Accord Montello Salt Co. v. State of Utah, 221 U. S. 452, 464-465 (31 SCt 706, 55 LE 810) (1911) (“[Including] may have the sense of addition, as we have seen, and of ‘also;’ but, we have also seen, ‘may merely specify particularly that which belongs to the genus.’ ” (citation omitted)); Black‘s Law Dictionary (6th ed. 1990) (” ‘Including’ within statute is interpreted as a word of enlargement or of illustrative application as well as a word of limitation.“).14 Determining the sense in which the legislature used “including” in a particular statute depends on the exact language, context, and subject matter of the statute. See Berryhill, 281 Ga. at 440-442. When viewed in this way, it becomes clear that “including” is used in
We first examine the immediate context in which “including” appears in this statute. Unlike in Berryhill, where “includes” was followed by two very detailed specific phrases, see 281 Ga. at 441, “including” in
But if “make available by allowing access to information stored on a computer” was meant to be read expansively, then why was it necessary to specifically enumerate “operating a computer bulletin board?” To answer this question, it helps to consider the status of computer-based communications when
In 1993, the World Wide Web, on which today‘s familiar and massive computer-based communication hubs like Gmail, Facebook, and Reddit rely, was just beginning; it debuted in 1991. See Steve Jones, Encyclopedia of New Media 43 (2003). However, other methods of communicating electronically stored information through computers had been developed earlier and were being used over smaller networks. Instant messaging, for example, was invented in 1971 as a chat function on a government computer network. See id. at 236. And unix-to-unix copy, or UUCP, which was created in 1978, could be used to allow remote transfer of files or to send mail between machines connected with each other via phone lines. See Bernard Aboba, The Online User‘s Encyclopedia: Bulletin Boards and Beyond 90 (1993).
“Bulletin board” systems were another then-popular method of computer-based communication. They provided “the ability to send and receive local e-mail, the uploading and downloading of files, and opportunities for online game playing with rudimentary graphics.” Jones, supra, at 45-46. One article written in 1986, during the rise of computer bulletin boards, described them this way:
Technically, a combination of software and hardware resides on some host computer system, and users access it through terminals or microcomputers by dialing in over dedicated or general purpose telecommunication lines. The bulletin board “posts” announcements, messages and entire discussions written by, and intended for, the users of the system. Different from electronic mail or teleconferencing, which are designed for a finite list of users or notes, computer bulletin
boards are broadcast systems. Each message placed on them is intended for a wide audience; systems often seek out and encourage new users to sign on.
Sheizaf Rafaeli, The Electronic Bulletin Board: A Computer-Driven Mass Medium, 2 Computers and the Social Sciences 123, 123 (1986). Computer bulletin boards also provided the option of anonymity, allowing or even requiring users to communicate under pseudonyms. See id. at 124. During the early 1990s, the “golden years” of computer bulletin boards, there were more than 60,000 bulletin board systems in the United States, each with its own focus and community of users. See Jones, supra, at 47.
Given the growing popularity, potentially wide audience, and anonymity offered by bulletin boards as of 1993, it made sense for the General Assembly to want to ensure that those systems would be understood as coming within the scope of
The final indicator of the statute‘s meaning comes from the fact that the General Assembly chose to retain (with technologically updated language) the “operating a computer bulletin board” phrase when
For these reasons,
(b) Wetzel next contends that his conviction on Count 3 must be reversed because the State failed to prove that he knew or should have known that S. B. J. was under age 18.
Judgment affirmed in part and reversed in part. All the Justices concur.
Colin H. Moriarty; Michael L. Wetzel, for appellant.
Kenneth W. Mauldin, District Attorney, Kristopher M. Bolden, Assistant District Attorney; Samuel S. Olens, Attorney General, Patricia B. Attaway Burton, Deputy Attorney General, Paula K. Smith, Senior Assistant Attorney General, for appellee.
