After being convicted of 65 counts of “possession of
materials portraying a sexual performance by a minor” in violation of Kentucky
law, Samuel Crabtree appealed. State v. Crabtree, ___ S.W.3d ___, 2012
WL 3538316 (Kentucky Court of Appeals 2012).
This is how the prosecution arose:
In late October 2009, Crabtree was a
student at Eastern Kentucky University (EKU). He experienced problems with his
computer -- primarily, that it was running too slowly. Believing his computer was infected with malware, he took it to Resnet, a vendor that
provides computer services for EKU's students.
While working on Crabtree's computer,
one of the Resnet technicians discovered some suspicious filenames. Resnet
contacted the campus police. EKU police then confiscated the computer and
transported it to the Kentucky State Police laboratory in Frankfort.
When
Crabtree contacted Resnet to retrieve his computer, he was advised to contact
EKU police. He went to the station unannounced and spoke to Detective Collins,
who told Crabtree that his computer had been confiscated.
Crabtree readily admitted he had used
the internet to look up shock videos and had viewed some videos and still
images that were child pornography. Crabtree told Collins the material sickened
him; and so he had tried to delete them. Crabtree wrote down his account of
what happened for Collins.
State v. Crabtree, supra.
Crabtree was indicted on 67 counts of possessing matter
portraying a sexual performance by a minor, convicted of 65 counts of that
offense and one count of criminal attempt to possess matter portraying a sexual
performance by a minor. State v.
Crabtree, supra. He was sentenced to
5 years in prison for each possession count and 1 year for the attempt
account—all to be served concurrently. State
v. Crabtree, supra.
The Kentucky State Police’s Electronics Branch conducted a
forensic analysis of Crabtree's
computer. Even though it had already been partially cleaned by Resnet, the
technician discovered five videos containing child pornography in a system file
labeled `Saved.’ She also identified sixty-two images in some hidden files that
she flagged as child pornography.
State v. Crabtree, supra.
Crabtree’s first argument on appeal was that the evidence
did not “support a charge that he knowingly possessed the illegal
materials.” State v. Crabtree, supra. The Court of Appeals began it analysis of
that argument by outlining standards articulated by the U.S. Court of Appeals for the 9th Circuit. In U.S. v. Kuchinski, 469 F.3d 853 (9th
Circuit 2006), the court held that knowingly receives and possesses child
pornography images “when he seeks them out over the internet and then downloads
them to his computer.” And in U.S. v. Romm, 455 F.3d 990 (9th
Cir. 2006), the 9th Circuit held that in “the electronic context, a
person can receive and possess child pornography without downloading it, if he .
. . seeks it out and exercises dominion and control over it.”
The Kentucky Court of Appeals noted that the prosecution’s
evidence was
threefold, consisting of: the videos,
the still images, and Crabtree's confession. The videos were discovered in
the Saved and Incomplete folders in an application
called Limewire, a now-defunct `peer-to-peer’
sharing network. Such a network allows users to share files with other users --
be they music, photographs, documents, or videos. Special software was required
in order to access that network.
Users
obtained files on Limewire by typing in search criteria. Limewire returned a
list of files related to the search words. A user would click on the file he
wished to download. Limewire would respond with a dialog box asking if the user
was sure he wanted to download the file.
The download would not commence until
the user confirmed the instruction by again clicking on the `yes’ button. Thus,
the application gave the user two opportunities to consider
whether he actually wanted a file to be downloaded to his computer.
When a user downloaded a file
through Limewire, the download would be automatically stored in the Saved folder.
If a file failed to download even a miniscule piece of information, the
application would place it in the Incomplete folder.
However, many files could still be viewed even if
Limewire labeled them as Incomplete. Crabtree argues that the crime lab was unable
to conclusively say he had watched the videos. Neither, however, could the lab
determine that the videos had not been watched.
The still images were found in the thumbcache of Crabtree's computer. Thumbcache is
a type of file that is automatically generated with certain versions of the
Windows operating system. The catalogued images include photographs that were
viewed as well as the opening frame of videos that had been watched, generating
a `thumbnail’ marker of the original file.
Thumbnails are reduced versions of
larger images; they are stored in files and used for identifying and organizing
photo and video files.
Thumbcache files are hidden; most casual computer
users are not aware of their existence, and special software is required to
view the contents. Because thumbcache creates a brand-new, separate file of an
image that is viewed, the thumbnail remains stored in the thumbcache even if
the original file is deleted. It is essentially a collection of fingerprints of
images that have been on the computer.
State v. Crabtree, supra (emphasis in the original). The opinion notes that
Crabtree's laptop had the Windows Vista operating
system. In earlier versions of Windows, the thumbcache was known as thumbs.db;
the new filename is thumbcache.dll.
State v. Crabtree, supra.
The court also explained that the KSP’s Electronics Branch
flagged 67 images from the thumbcache
of Crabtree's computer. Some were recognized as opening frames of videos which
are well-known to collectors of child pornography and to law enforcement
specialists. The KSP expert testified that it was impossible to determine which
ones had been watched or viewed. However, in order to be located in the
thumbcache, the images had to have appeared on the screen:
thus, to have had possession.
State v. Crabtree, supra (emphasis in the original).
The Court of Appeals therefore found that the “evidence was
`beyond mere suspicion that Crabtree had possessed the images found.” State v. Crabtree, supra.
As noted above, the prosecution also relied on Crabtree’s
confession. State v. Crabtree, supra.
Crabtree signed the following statement:
`A while ago, out of boredom and
curiosity I looked at some mature content using limewire [sic ]. .
. . I looked to find disturbing images or videos that would shock me. Some of
these could be classified as child pornography. I tried to delete these things
from my laptop. . . .
I realize that looking at this type of
stuff was wrong and I feel sick because I did look at things that I should not
have looked at. However I did not realize that anyone would find out.
State v. Crabtree, supra.
The Court of Appeals found that this statement “corroborated
what was found in the Limewire folders and in the thumbcache.” State
v. Crabtree, supra. It also noted
that the thumbcache images corroborated
Crabtree's assertion that he deleted
illegal images of child pornography. Furthermore, in his discussion with
Collins, Crabtree described a video he had watched in detail. Traces of this
video were not found on the computer. The expert testified that it was possible
that an innocuous image in the thumbcache could have been the opening frame of
that video, causing it to not be flagged in the forensic analysis.
State v. Crabtree, supra.
Based on all this, the court found that Crabtree’s
confession -- along with the Limewire
content and the thumbcache images -- demonstrated that it was reasonable for a
jury to believe that Crabtree had sought out and had either downloaded or
viewed the illegal images. He had control of them and he possessed them.
State v. Crabtree, supra.
Crabtree also “urge[d]” the Court of Appeals to }consider
that his merely viewing child pornography images before deleting them should
not be deemed to constitute actual possession.”
State v. Crabtree, supra. The court concluded, however, that after
reviewing the facts . . . we are not
persuaded that this is a valid argument in light of the 9th Circuit's
definition of possession in Romm, supra: that
the act of seeking out child pornography and exercising control over it constitutes
criminal possession -- regardless of whether it is downloaded.
Crabtree admitted to seeking out the
material and to having it on his computer. Some of the videos remained, and
numerous videos and images left their traces in the thumbcache. His attempt to
clean up the computer by deleting the files does not purge him of the crime
committed.
Rather, it clearly illustrates an
attempt at a cover-up after the fact. Furthermore, as Romm holds,
Crabtree had the images in his control: he could have saved, printed, or shared
them before he deleted them.
While Crabtree alludes to the possibility that the
files mysteriously appeared on his computer by some accident, he did not
present any evidence at trial to support this theory. On the contrary, in order
for the videos in the Limewire folders to have been downloaded, Crabtree had
to click twice -- once on each file name, and then again to confirm the download.
The filenames were explicit.
They are too vulgar to be repeated in an opinion of
this Court, but it is beyond dispute that the filenames clearly stated sexual
content and included the ages of the children depicted in them.
State v. Crabtree, supra.
For this and other reasons, the Court of Appeals affirmed Crabtree’s
conviction and sentence. State v. Crabtree, supra.
The court also included a rather cryptic passage in its opinion, one I,
at least, wish it had expanded to provide more details on the issue it was
concerned about:
We note that this case demonstrates a
need for technical training among legal professionals. There were several
instances during the trial when it appeared that counsel for each party
attempted to elicit testimony from the experts but failed because of confusion
of technical terms.
In this particular case, the evidence of guilt
was overwhelming, but we anticipate that this communication gap could be
damaging in cases with weaker evidence.
State v. Crabtree, supra.
2 comments:
What the court meant by that passage you referred to is that both of the attorneys were n00bs and clueless ones at that. (In part, a n00b is "An insult describing a person who is not only lacking in knowledge of something, but also blatantly refuses to learn about it and even berates those who would benefit him with experience."
This is the EXACT reason why old people have no business writing laws about anything having to do with computers or crimes involving computers or the interwebs. Or even being DAs or defense counsel in said matters.
This guy is sooo stupid I hope they NEVER let him out of jail. This line here captures just how stupid this guy is: "I feel sick because I did look at things that I should not have looked at."
Having laws that tell you what you are allowed to look at and not allowed to look at is the stupidest thing ever in the history of the world. Why can I look a murder videos and videos of women being raped (not play acting rape, but the REAL deal - and u can tell the difference!), but why can I watch stuff like that and it is all legal?
His confession crucified him. This man is a fine example of why one should never speak to the police. I doubt the images alone would have been used to convict him as the governments forensic expert could not testify for certitude where the CP on the laptop was viewed.
Post a Comment