State v. Beck, 828 S.E.2d 821, 242 W. Va. 2 (2019)

June 6, 2019 · Supreme Court of Appeals of West Virginia · No. 18-0936
828 S.E.2d 821, 242 W. Va. 2

STATE of West Virginia, Plaintiff below, Petitioner
v.
Daniel BECK, Defendant below, Respondent

No. 18-0936

Supreme Court of Appeals of West Virginia.

Submitted: May 14, 2019
Filed: June 6, 2019

Rhonda L. Wade, Esq., Eric M. Gordon, Esq. Andrea C. Poling, Esq., Marshall County Prosecuting Attorney's Office, Moundsville, West Virginia, Patrick Morrissey, Esq., Attorney General, Lindsay S. See, Esq., Solicitor General, Charleston, West Virginia, Counsel for the Petitioner

Kevin L. Neiswonger, Esq., Neiswonger & White, Moundsville, West Virginia, Counsel for Respondent

WALKER, Chief Justice:

*823In this case we consider a certified question concerning West Virginia Code § 61-8C-3 (2014) and child pornography found in the cache files of a defendant's laptop computer. Respondent Daniel Beck (Beck) is charged with one count of violating § 61-8C-3. By order entered October 19, 2018, the circuit court certified the following question to this Court:

Is possession of a laptop computer containing cache files that relate to material visually portraying a minor and/or minors engaged in sexually explicit conduct, without evidence of when or where said cache files were created and/or accessed enough to establish the defendant knowingly and intentionally possessed the material contained on said cache files in violation within the meaning [sic] of West Virginia [C]ode §[ ]61-8C-3(a)?[1 ]

The circuit court answered this question, "No."

As the State acknowledges, the thrust of that question is "whether the evidence in this case is sufficient to sustain a conviction for possession of material depicting minors engaged in sexually explicit conduct" under § 61-8C-3(a). We decline to respond to that question, though, because our answer would be an impermissible advisory opinion that depends on disputed questions of material fact-namely the state of mind of the defendant.2

Nevertheless, there is a legal issue in the question certified by the circuit court that can be addressed at this point in the proceedings against Beck. We have held that it is appropriate to reformulate a certified question when it

is not framed so that this Court is able to fully address the law which is involved in the question, then this Court retains the power to reformulate questions certified to it under both the Uniform Certification of Questions of Law Act found in W. Va.Code, 51-1A-1, et seq. and W. Va.Code, 58-5-2 [1967], the statute relating to certified questions from a circuit court of this State to this Court. Syllabus Point 3, Kincaid v. Mangum, 189 W.Va. 404, 432 S.E.2d 74 (1993).[3 ]

Under the authority granted to this Court by West Virginia Code § 58-5-2 (2012), we reformulate the circuit court's certified question as follows:

May a jury consider images of a minor engaged in sexually explicit conduct, contained in the temporary Internet cache files on a defendant's computer, as evidence of a violation of West Virginia Code § 61-8C-3(a). Answer: Yes.

I. Case Background and Procedural Posture

On November 14, 2017, a grand jury returned a one-count indictment that charged Beck with violating West Virginia Code § 61-8C-3(a) and - 3(b) (2014). The indictment alleged that on or about February 23, 2017, Beck knowingly possessed fifteen images or files on his computer and that those images *824visually portrayed minor children engaged in sexually explicit conduct.4

On May 18, 2018, the parties filed a joint motion to certify a question to this Court addressing the issue of cache files. Prior to certifying the question, the circuit court held a hearing to hear testimony about cache files from a State witness, Matthew Adams (Adams). Adams is an investigator for the Ohio County Prosecuting Attorney's Office, and, for purposes of the hearing, Beck stipulated that Adams is expert in cyber-investigation and recovery and acquisition of computer data. Adams testified about the characteristics of cache files and their contents. He explained that a computer user does not intentionally download information, including images, from the Internet to cache files. Instead, a computer's web browser automatically downloads information to the computer's cache files when the user views a website that displays images. The browser does this to enable a computer user to access that website more quickly in the future. In other words, the information contained in the cache files enables the user to return to a website without having to download the entire site again.

Adams explained that while a user has the ability to delete cache files from his computer, the user does not intentionally create the files, in contrast to images that he downloads and intentionally saves to his computer:

Circuit court: So a download of a file is different than a cache of a picture?
Adams: Yes, sir. The way we're speaking about it today, yes, sir.
Circuit court: But a cache would indicate that that website or that particular picture was viewed or this computer connected with some computer that had that image and it shows that in this example his computer accessed that file?
Adams: Yes, sir. That's correct.
Circuit court: If he manually or with purpose saved it to the computer, you can tell that?
Adams: Yes, sir.
Circuit court: As a download file?
Adams: Yes, sir.
Circuit court: But if it's a cache, that's something that the computer does by default?
Adams: That's correct.

Adams also explained that he can use software called Forensic Tool Kit to extract images from cache files even when a computer is not connected to the Internet. But Forensic Took Kit is not available to the general public. And without it, Adams testified, a lay person cannot access an image directly from a cache file and would have to seek out that image on the Internet in order to see it again.

Following the hearing, the circuit court granted the parties' motion to certify a question to this Court. That question is as follows:

Is possession of a laptop computer containing cache files that relate to material visually portraying a minor and/or minors engaged in sexually explicit conduct, without evidence of when or where said cache files were created and/or accessed enough to establish the defendant knowingly and intentionally possessed the material contained on said cache files in violation within the meaning [sic] of West Virginia [C]ode §[ ]61-8C-3(a)?

The circuit court answered the question "No," then stayed the matter pending this Court's answer to the certified question.5

II. Standard of Review

"The appellate standard of review of questions of law answered and certified by a circuit court is de novo [,]"6 meaning that "we give plenary consideration to the legal issues *825that must be resolved to answer the question" certified by the circuit court.7

III. Discussion

Beck is charged with violating subsection (a) of West Virginia Code § 61-8C-3. In pertinent part, that statute provides:

(a) Any person who, knowingly and willfully, sends or causes to be sent or distributes, exhibits, possesses, electronically accesses with intent to view or displays or transports any material visually portraying a minor engaged in any sexually explicit conduct is guilty of a felony.

We found a prior version of § 61-8C-3(a) to be unambiguous.8 We find the current version of the statute is similarly clear so we accept the statute's plain meaning.9

Numerous state and federal cases have analyzed the implications of child pornography stored in temporary Internet cache files. These authorities instruct that child pornography contained in cache files may be used in at least two ways in a prosecution under § 61-8C-3(a), as contraband or as circumstantial evidence.

A. Method 1: Cached Images of Child Pornography as Contraband

First, child pornography stored in the cache files on a defendant's computer may be the "material visually portraying a minor engaged in any sexually explicit conduct"-that is, the actual offense contraband. Under this approach, the images of child pornography stored in the cache files on the defendant's computer are themselves the material banned by the statute.10 As one commentator has explained,

Under this approach, the computer is analogous to a file cabinet and the cache is a file drawer. The user has reached out to the Internet through use of a web browser and selected an image, after which the computer automatically "files" a copy of that image in its file drawer. Viewed this way, the possession of the image begins when the image is cached and ends when the file is deleted and overwritten by other data.[11 ]

But, the presence of cached images of child pornography on a defendant's computer-standing alone-cannot prove that the defendant actually possessed that contraband. As the State's expert Adams testified, when a computer user visits a website, the computer's browser automatically saves the images displayed on that page to the computer's cache files. Thus, those images exist in the cache files although the user may not know that they are there.12 Exactly for that reason, we cannot conclude that the mere presence of child pornography in cache files on a particular computer proves that the individual who controls that computer knowingly and willfully possesses child pornography in violation of § 61-8C-3(a).13

*826Under the contraband approach the State may still proceed on a theory that the defendant constructively, rather than actually, possessed the cached images.14 Our analysis of constructive possession in State v. Cummings is instructive.15 There, Cummings argued that the State had not proven at trial that he constructively possessed matches and pseudoephedrine (items commonly used to make methamphetamine) seized from a vehicle when the State's only evidence of possession was Cummings's status as the vehicle's driver.16 We rejected the State's theory that Cummings's presence in the stopped vehicle was enough to prove constructive possession at trial17 and, instead, adopted the rule that "the State must prove beyond a reasonable doubt that the defendant had knowledge of the presence of the [contraband] and that [it] was subject to the defendant's dominion and control."18 Applying that rule, we held that the State failed to prove that Cummings constructively possessed the methamphetamine ingredients because it had not offered any evidence that Cummings knew of or controlled those items.19

The circumstances in Cummings and those raised by the reformulated certified question are parallel.20 In both scenarios, the question of constructive possession turns on the defendant's knowledge of the contraband and dominion and control over it. Given those similarities, we believe that the logic of Cummings also applies in this context. For that reason, we conclude that images of minors engaged in sexually explicit conduct found in temporary Internet cache files on a defendant's computer are contraband in a prosecution for a violation of West Virginia Code § 61-8C-3(a) (2014) on a theory of constructive possession, where the State's evidence proves beyond a reasonable doubt that the defendant knew of the cached images and exercised dominion and control over them.21

B. Method 2: Cached Images of Child Pornography as Circumstantial Evidence

The second way cache files may be used in a prosecution under § 61-8C-3(a) is as circumstantial evidence. When the State cannot prove that a defendant constructively possessed child pornography found in his computer's cache files, a jury may still consider the cached images as circumstantial evidence of a prior violation of the statute.

Under this "evidence of" method, the cache files are no longer analogous to a file cabinet in which a defendant stores the contraband images of child pornography. Instead, the computer itself is analogous to a "video camera *827that records all of the activity of the computer user."22 Viewed in this manner, images found in the cache file are similar to the video, itself, and can be a record of a computer user's previous activity. Thus, the cache files are circumstantial evidence of a violation of § 61-8C-3(a) at an earlier point in time, but they do "not represent the literal contraband" under this approach.23 The Court of Appeals of Georgia succinctly explained this distinction in New v. State :

In the case sub judice, even if the State did not (and could not) present evidence that New was aware of the shadow copy images' existence and, thus, could not prove present possession of those files, there was more than sufficient circumstantial evidence for the jury to conclude that New knowingly possessed child pornography on his computer at a prior point.[24 ]

In short, under the "evidence of" method, the presence of child pornography in the cache files on a defendant's computer is circumstantial evidence of a violation of § 61-8C-3(a).

IV. Conclusion

Based on the analysis presented above, we hold that images of minors engaged in sexually explicit conduct found in temporary Internet cache files on a defendant's computer are contraband in a prosecution for a violation of West Virginia Code § 61-8C-3(a) (2014) on a theory of constructive possession, where the State's evidence proves beyond a reasonable doubt that the defendant knew of the cached images and exercised dominion and control over them. If the State cannot prove beyond a reasonable doubt that the defendant knew of the cached images and exercised dominion and control over them, the cached images are still circumstantial evidence that the State may use to prove that the defendant violated West Virginia Code § 61-8C-3(a). Therefore, we answer the reformulated certified question in the affirmative.

Having answered the reformulated certified question, we remand this case to the Circuit Court of Marshall County for further proceedings consistent with this Opinion.

Certified Question Answered.

JUSTICE WORKMAN concurs and reserves the right to file a separate opinion.

WORKMAN, J., concurring:

While I concur in the majority's substantive response to the reformulated certified question in this case, I write separately because I believe the new syllabus point, as constructed, is unwieldy and improperly injects the concept of "circumstantial evidence" into the analysis. As is well-established, in West Virginia:

There should be only one standard of proof in criminal cases and that is proof beyond a reasonable doubt. Once a proper instruction is given advising the jury as to the State's heavy burden under the guilt beyond a reasonable doubt standard, an additional instruction on circumstantial evidence is no longer required even if the State relies wholly on circumstantial evidence.

State v. Guthrie , 194 W. Va. 657, 663, 461 S.E.2d 163, 169 (1995). Therefore, the distinction created in the syllabus point that cache files may serve as circumstantial evidence is entirely unnecessary and confusing inasmuch as this Court has made clear that "there is no qualitative difference between direct and circumstantial evidence." Id ., at 669, 461 S.E.2d at 175. It is not the place of this Court, in the vacuum of a certified question, to label a piece of evidence as "direct" or "circumstantial," nor dictate for unforeseen circumstances and cases the exclusive manner *828in which a piece of evidence must be used.

The reason for the majority's adamant inclusion of the term "circumstantial" is undoubtedly because of its reliance on New v. State , 327 Ga.App. 87, 755 S.E.2d 568 (2014) to craft its syllabus point. However, in Georgia, the distinction between direct and circumstantial evidence is critical because Georgia, by statute, treats convictions based solely on circumstantial evidence differently: "To warrant a conviction on circumstantial evidence, the proved facts shall not only be consistent with the hypothesis of guilt, but shall exclude every other reasonable hypothesis save that of the guilt of the accused." Ga. Code Ann. § 24-14-6 (2013).

West Virginia has expressly rejected this distinction:

In adopting Jackson [v. Virginia, 443 U.S. 307, 99 S.Ct. 2781, 61 L.Ed.2d 560 (1979) ], we necessarily overturn our long established rule that when the State relies upon circumstantial evidence, in whole or in part, for a court to sustain the verdict all other reasonable hypotheses need be excluded by the prosecution save that of guilt.

Guthrie , 194 W. Va. at 668, 461 S.E.2d at 174.1 This is why a common jury charge or instruction in West Virginia advises the jury that: "The law makes no distinction between the weight or value to be given to either direct or circumstantial evidence. Nor is a greater degree of certainty required of circumstantial evidence than of direct evidence. You should weigh all the evidence in the case." See CRIMINAL LAW INSTRUCTIONS MANUAL FOR THE STATE OF WEST VIRGINIA , § 5.04 7th edition, 2018.

This Court's syllabus points should be crafted in a manner consistent with our precedent and should not cast uncertainty on long-established principles. Signed opinions containing original syllabus points have the highest precedential value because the Court uses "uses original syllabus points to announce new points of law or to change established patterns of practice by the Court"; therefore, legal accuracy is crucial. State v. McKinley , 234 W. Va. 143, 153, 764 S.E.2d 303, 313 (2014). The majority's inclusion of this evidentiary distinction is particularly troubling in that it may suggest that the Court is modifying our existing law as cited herein. That was not the intention of the Court, but the syllabus point as stated leaves that in doubt.2

Accordingly, I believe the new syllabus point, properly phrased, should read:

In a prosecution for a violation of West Virginia Code § 61-8C-3(a) (2014), images of minors engaged in sexually explicit conduct found in temporary Internet cache files on a defendant's computer are evidence of constructive "possession," where the defendant knew of the cached images and exercised dominion and control over them. The cache files may otherwise constitute *829evidence that the defendant violated West Virginia Code § 61-8C-3(a) by sending or causing to be sent or distributed, exhibiting, or electronically accessing with intent to view or display or transporting such material.

With consideration of the foregoing, I concur.