OPINION
delivered the opinion of the Court
In this petition for discretionary review, the State contends the court of appeals erred in finding the evidence insufficient to support convictions against appellant, Jeffrey Shane Wise, for ten counts of possession of child pornography.
See Wise v. State,
majority opinion held that the State failed to prove that appellant knowingly or intentionally possessed the images because the images could possibly have gotten on the hard drive innocently without appellant having ever seen or accessed them.
See Wise,
I. Applicable Law for Sufficiency of Evidence of Possession of Child Pornography
In determining whether the evidence is sufficient, a reviewing court views all the evidence in the light most favorable to the prosecution to determine whether any rational trier of fact could have found the essential elements of the offense beyond a reasonable doubt.
See Jackson,
The evidence-sufficiency standard of review is the same for both direct and circumstantial evidence.
Hooper,
A person commits possession of child pornography if he “knowingly or intentionally possesses visual material that visually depicts a child younger than 18 years of age at the time the image of the child was made who is engaging in sexual conduct” and he “knows that the material depicts the child” in this manner. Tex. Penal Code § 43.26(a). A person acts “intentionally” or with intent “with respect to the nature of his conduct or to a result of his conduct when it is his conscious objective or desire to engage in the conduct or cause the result.” Id. § 6.03(a). A person acts knowingly or with knowledge of the nature of his conduct or circumstances “when he is awarе of the nature of his conduct or that the circumstances exist.” Id. § 6.03(b). The Texas Penal Code defines “possession” of contraband as “actual care, custody, control, or management.” Id. § 1.07(a)(39).
This Court has never addressed whether a person can knowingly or intentionally possess child pornography that exists only in the free space of that individual’s computer hard drive. This subject has rarely been discussed in intermediate courts in Texas, which havе only briefly mentioned the subject.
See Lancaster v. State,
*904 Although courts in Texas have rarely addressed criminal intent in computer pornography, courts throughout the nation have discussed the peculiarities of determining knowing or intentional possession of computer pornography. Courts generally take two approaches to framing sufficiency analysis in cases involving child-pornography images discovered in a computer’s cache or free space. 3 See Ty E. Howard, Don’t Cache Out Your Case: Prosecuting Child Pornography Possession Laws Based on Images Located in Temporary Internet Files, 19 Berkeley Tech. L.J. 1227, 1253-54 (2004). Under the first approach, termed a present-possession approach, a court will analyze the sufficiency of the evidence to determine whether a defendant had the knowledge and ability to access the files in their present format. Id. at 1254-55. In the context of deleted files, if an ordinary computer could not access files that have been deleted by a user or an automatic computer program, then the defendant could not presently have care, custody, control, or management of the images. See Deanna M. Rice, Note: Child Pornography, the Internet, and the Challenge of Updating Statutory Terms, 122 Harv. L.Rev. 2206, 2215-16 (2009). 4 Although images in a computer’s cache without other supрorting evidence have been determined to be insufficient in some cases, courts following this first approach note that the evidence would be sufficient when there is other evidence establishing that the images were presently knowingly or intentionally possessed. 5
*905
Under a second general approach, used by courts nationally, evidence of pornography found in a computer cache could be sufficient to support a conviction because the presence of the images in the cache is evidence that, at some earlier point, a defendant knowingly or intentionally possessed the images by viewing them online.
See
Howard,
supra,
at 1255. Under this framework, a defendant need not be aware that the image continued to exist on the computer, and the present accessibility of the image is not pertinent.
See id.
at 1259 (stating that, under “evidence of’ approаch, “the deletion of a temporary internet file has no bearing on the legal analysis of knowing possession”). Instead, the pertinent inquiry is whether a defendant had knowingly or intentionally possessed a pornographic image at a prior point in time.
See id.
Part of the difficulty using the second approach is that files lose some of their information upon deletion, such as when the image was created or how it came to be.
See Moreland,
Although these two general approaches are instructive in explaining the difficulties of establishing criminal intent in the possession of computer pornography, we conclude that each case must be analyzed on its own facts. For computer-pornography cases, like all criminal cases, a court must assess whether the inferences necessary to establish guilt are reasonable based upon the cumulative force of all the evidence considered in the light most favorable to the verdict.
See Hooper,
II. Analysis
As accurately observed by the Second Court of Appeals’s majority opinion, the evidence in the record shows that appellant, who did not have technical skills in computer programming, was presently unable to access the deleted files that were in the free space of the computer. As the computer expert explained at trial, the deletion of the file made them inaccessible to anyone but a highly skilled computer specialist. Because appellant was not presently able to access the images, the jury would have had to determine that, before the images were deleted, appellant knowingly or intentionally had care, custody, control, or management of the images. See Tex. Penal Code §§ 1.07(a)(39) & 43.26(a).
The State correctly observes that the court of appeals erroneously focused on two alternative hypotheses that the imаges could have been placed on the computer without appellant’s knowledge either through (1) a virus or (2) a previous owner of the computer. First, the court of appeals credited appellant’s suggestion that viruses on his computer could have placed the images there, but the jury could reasonably have disregarded that evidence.
See Wise,
[State]: Okay. Hypothetically, let’s say a bad guy wants to store child porn on your computer to view later on, okay? And if he puts it in your free space, he would have no way of retrieving those images of child porn to view because they’re not linked to a specific number, code or other identifying number or code; is that correct?
[Witness]: Well, there would be no file location to—
[State]: That’s correct?
[Witness]: — to show where the pointer was to where that file was.
[State]: Okay. So if I’m a bad guy and I put porn on your computer, the last place I would put it would be on your free space, becausе I couldn’t retrieve it to view it?
[Witness]: I don’t see how you could.
[State]: Okay. Because it could go anywhere on your computer, you don’t know?
[Witness]: Yes.
[State]: Because it’s in free space — I mean, anywhere in free space?
[Witness]: Right.
Because the placement of a pornographic image on the free space of a computer would be inconsistent with the purpose for placing a virus on a computer, the jury could have reasonably disregarded thаt explanation for the presence of the images.
See Wirth,
Second, the court of appeals erred by crediting appellant’s suggestion that the images could have been placed on the computer by a prior owner of the computer and finding that to be an alternative hypothesis inconsistent with guilt.
See Wise,
By focusing on the alternative hypotheses premised on the possibility of viruses or a prior owner placing the images on the free space of the computer, the court of appeals used a sufficiency standard that has been abrogated by our Court.
See Geesa,
The majority opinion also erred by implicitly examining the evidence in the light favorable to appellant, focusing on the fact that he could not access the images in the free space of the computer and the absence of computer evidence to establish exactly when the images were placed on, accessed, or deleted from the computer.
*907
See Wise,
The jury could have reasonably determined from the extensive evidence, which showed that appellant had a proclivity for child pornography and a prurient interest in children, that he knowingly and intentionally possessed the images that were in the free space of his computer before thе images were deleted. The evidence showed that he had an improper sexual relationship with a 16-year-old girl who was formerly his employee at a fast-food restaurant and that she gave him pornographic images of herself, which he kept on a digital memory card. Furthermore, the former employee was not the only child appellant had sexually assaulted. His stepdaughter testified that in 1999, when she was under 10 years old, apрellant performed sexual acts on her.
In addition to these sexual assaults, evidence showed that appellant had used his computer to pursue his sexual interest in children. Aside from the image of the former employee, appellant’s computer contained adult pornography and “child erotica.”
6
These child erotica images were found in a folder labeled “childmodel-sites.com” within the “My Documents” folder. Appellant acknowledged that he visited pornographic websites and had seen pictures of “all different” ages of girls, although he denied that any were underage. But appellant’s disclaimer of visiting pornographic websites of children is discredited by temporary internet files suggesting visits to websites with child pornography. The State’s expert testified to finding on appellant’s computer a folder called “youngpornandteensex@youngzilla. com” and another file relating to a “hickey preteen model.” These files were either viewed or created in 2007 or 2008 after he purportedly purchased the computer from the flea market. The jury could have reasonably inferred from appellant’s possession of temporary internet files referring to “young porn” and “teen sex” that appellant knowingly and intentionally had possession of the other child pornography in the frеe space of his computer.
See Carter,
Although the court of appeals focused on the absence of any evidence to show when or by whom the images in the free sрace of the computer were created or moved there, the record does contain evidence of appellant’s recent interest in photos depicting the sexualization of children as well as a history of sexually assaulting children. A jury could have reasonably rejected appellant’s claims that the images were due to a virus or former computer owner and instead determined that appellant had a history of and present sexual attraction to children and that he intended to possess
*908
the pornographic images of
the children that were in the free space of his computer. We hold that, viewing the totality of the evidence and inferences in a light most favorable to the verdict, the jury could have reasonably inferred that appellant knowingly had care, custody, control, or management of the ten pornographic images of unknown children found оn the free space of his computer.
See Hooper,
III. Conclusion
We reverse the judgment of the court of appeals and render a judgment affirming the trial court.
Notes
. When a file is deleted by a user, it is not completely wiped from the computer’s hard drive.
See United States v. Moreland,
. The ten counts of possession of child pornography were tried together along with other offenses. In addition to these convictions, appellant was convicted of four counts of sexual assault for his sexual acts with a former employee, one count of possession of child pornography for possessing a photo of the former еmployee on a digital camera, and one count of indecency with a child for sexual acts with his stepdaughter. See Tex. Penal Code §§ 22.011(a)(2) (sexual assault of a child), 43.26 (possession or promotion of child pornography), & 22.11(a) (indecency with a child).
. The majority of these cases involve a situation in which images are stored in a browser's cache. "A cache (pronounced 'cash') is a storage mechanism designed to speed up the loading of Internеt displays. When a computer user views a webpage, the web browser stores a copy of the page on the computer’s hard drive in a folder or directory. That folder is known as the cache, and the individual files within the cache are known as temporary Internet files. When the user later returns to a previously visited webpage, the browser retrieves the cached file to display the webpage instead of retrieving the file from thе Internet.'' Ty E. Howard,
Don't Cache Out Your Case: Prosecuting Child Pornography Possession Laws Based on Images Located in Temporary Internet Files,
19 Berkeley Tech. L.J. 1227, 1229-30 (2004). The images at issue here were not found in the cache but rather were deleted images. Deleted images are more difficult to access than images in a computer cache.
See Moreland,
.
See Moreland,
.See, e.g., Tucker,
. State's Expert Amy Trippel defined child erotica as "a picture of a child either partially clothed or nude” that is not illegal.
