State v. Adamo

Decision Date12 October 2017
Docket NumberNO. A-1-CA-34597,A-1-CA-34597
Citation409 P.3d 1002
Parties STATE of New Mexico, Plaintiff-Appellee, v. Brian ADAMO, Defendant-Appellant.
CourtCourt of Appeals of New Mexico

Hector H. Balderas, Attorney General, Maris Veidemanis, Assistant Attorney General, Santa Fe, NM, for Appellee.

Bennett J. Baur, Chief Public Defender, Mary Barket, Assistant Appellate Defender, Santa Fe, NM, for Appellant.

VIGIL, Judge.

{1} The motion for rehearing is denied. The formal opinion filed in this case on August 31, 2017, is hereby withdrawn, and this opinion is substituted in its place.

{2} A jury found Defendant Brian Adamo guilty of one count of sexual exploitation of children (possession) in violation of NMSA 1978, Sections 30-6A-3(A) (2007, amended 2016), under the Sexual Exploitation of Children Act (the Act), NMSA 1978, §§ 30-6A-1 to -4 (1984, as amended through 2016). This is commonly known as possession of child pornography. Defendant appeals, and concluding there was no reversible error in Defendant's trial, we affirm.

BACKGROUND

{3} Following a preliminary hearing in the magistrate court in Carlsbad, New Mexico, the district attorney filed a criminal information in the district court charging Defendant with eighteen counts of sexual exploitation of children (possession) in violation of Section 30-6A-3(A). Pursuant to State v. Olsson , 2014-NMSC-012, 324 P.3d 1230, an amended criminal complaint was then filed charging Defendant with a single count of sexual exploitation of children (possession). At trial, the evidence established the following facts.

{4} Every internet subscriber has a unique Internet Protocol (IP) address that is assigned by the subscriber's internet provider and corresponds with the subscriber's residential address. Carlsbad Police Department Detective Blaine Rennie, who investigates crimes against children, testified that in March 2012, using software that detects IP addresses that have downloaded images of suspected child pornography and computers that are sharing such files, he detected "an exorbitant amount of downloads" of images that were identified as child pornography. The software monitors "SHA1 numbers," unique number-letter combinations that are assigned to images when they are uploaded to the internet. Specifically, the software detects SHA1 numbers that are associated with child pornography and computers that are sharing such files, known as "peer-to-peer sharing." The downloads belonged to an IP address where similar downloads had been detected in March 2011. There were more than nine hundred downloads of suspected child pornograpy in a year at this IP address, and the majority were determined to be images of child pornography.

{5} Detective Rennie contacted Agent Owen Pena of the New Mexico Attorney General's Office and asked him to try to obtain images from a single source at that IP address. This is possible because images that one is willing to share with others are downloaded and stored in the shared folder of the owner's computer using peer-to-peer software. Agent Pena explained that a person using peer-to-peer software must download an image to the owner's computer, then direct that the image be placed in the shared folder of the computer; otherwise, the image cannot be accessed by another party. The image may be seen before it is downloaded and then saved in the shared folder.

{6} On April 6, 2012, Agent Pena succeeded in downloading five images of child pornography from the shared folder of a computer at the IP address. Four of these images were admitted into evidence, and all of them had the same "pre-teen hard core" (PTHC) search term. Agent Pena said that images such as those he retrieved would be found in a file-sharing network, using known search terms for child pornography such as "PTHC." Normal search engines such as Google or Yahoo filter and "block" search terms for hard core child pornography images. With assistance from Agent Lisa Keyes of the Department of Homeland Security, Detective Rennie learned that the name and address of the account holder was Defendant's mother at a residential address in Carlsbad.

{7} On June 19, 2012, a search warrant was executed at the home associated with the IP address. Defendant, his mother, and his father were at home. Defendant's bedroom appeared as if he did not often leave the room, and it was described as messy, in "disarray," with pizza boxes, tissues, food items, clothes strewn about, and sexual paraphernalia consisting of penile extenders, penile pumps, sex toys, and pills. Defendant also had an operating computer in his bedroom with two hard drives, one of which was an external hard drive. The computer was on at the time, depicting a story with child characters and "sexual overtones."

{8} There were many computers in the home because Defendant's father operated a computer repair business, and all the computers were seized. While some were non-functional and could not be analyzed, Agent Victor Sanchez of the New Mexico Department of Homeland Security searched all of the undamaged computers and devices for pornography and child pornography. The only pornography he found was on the external hard drive from Defendant's room. Agent Sanchez testified that the external hard drive contained massive amounts of non-child pornography, including bestiality and cartoon pornography, which was highly organized and categorized by type, actors, and the like. Agent Sanchez did not find a category for child pornography, nor did he find evidence that there ever had been one.

{9} Agent Sanchez did not find any active or accessible child pornography when he searched the external drive. However, using a process called "data carving," he did find child pornography in the deleted files. Agent Sanchez described "data carving" in layman's terms. He said to think of a computer as a library with books. The computer's master file table (MFT) is analogous to the card catalog in a library and it tells the computer where the books are in the library. When the computer wants to find something, it does not go through all its rows looking for the book, but it goes to the MFT (the card catalog) that points to where the book is supposed to be, and gets it. When a file is "deleted," people have a misconception that the file is gone, but it isn't. The computer only goes into the card catalog and rips up the index card that told the computer where the file could be found. The book is still in the library, but the function of the card catalog telling the computer where the book is located is gone. Data carving tells the computer to go through every aisle in the library and look for images that were deleted, and the images are then recovered. Using this process, Agent Sanchez was able to retrieve approximately fifty-two images containing child pornography, and twelve were admitted into evidence. These were different from the four images admitted into evidence that were obtained by Agent Pena. The same analysis was performed on the computer belonging to Defendant's parents, and no images of child pornography were found.

{10} Defendant did not testify, and he did not present any evidence. Additional facts, necessary to address Defendant's arguments, are set forth in our analysis of Defendant's arguments.

II. DISCUSSION

{11} Defendant argues on appeal that the judgment and sentence must be reversed because: (1) there was insufficient evidence to support the verdict; (2) there was fundamental error in the jury instructions; (3) the district court abused its discretion in admitting sexual items found in Defendant's bedroom; (4) the evidence about Defendant refusing to speak to the police was improperly admitted; (5) ineffective assistance of counsel; and (6) other errors. We address each argument in turn.

1. Sufficiency of the Evidence

{12} Defendant contends that the evidence was not sufficient for a rational jury to conclude beyond a reasonable doubt that Defendant intentionally possessed child pornography, as required by Section 30-6A-3(A). We disagree.

{13} "Evidence is sufficient to sustain a conviction when there exists substantial evidence of a direct or circumstantial nature to support a verdict of guilt beyond a reasonable doubt with respect to every element essential to a conviction." State v. Smith , 2016-NMSC-007, ¶ 19, 367 P.3d 420 (internal quotation marks and citation omitted). "Substantial evidence is relevant evidence that a reasonable mind might accept as adequate to support a conclusion." State v. Largo , 2012-NMSC-015, ¶ 30, 278 P.3d 532 (internal quotation marks and citation omitted). "In reviewing whether there was sufficient evidence to support a conviction, [appellate courts] resolve all disputed facts in favor of the [s]tate, indulge all reasonable inferences in support of the verdict, and disregard all evidence and inferences to the contrary." Id. (internal quotation marks and citation omitted); see State v. Myers , 2009-NMSC-016, ¶¶ 7, 13, 146 N.M. 128, 207 P.3d 1105 (setting forth the standard for reviewing evidence for sufficiency in a bench trial). We have already set forth what the pertinent evidence was at trial.

{14} The evidence supports the jury's finding that sometime in the past Defendant knowingly possessed child pornography. The evidence showed that there were more than nine hundred downloads of suspected child pornography in a year to the IP address used by Defendant's computer, and most were determined to be images of child pornography. In March 2012, exorbitant amounts of child pornography were being downloaded to that same IP address. Images of child pornography can only be obtained from a file sharing network where search terms such as "PTHC" are used. The following month, on April 6, 2012, Agent Pena used peer-to-peer software to retrieve five images of child pornography from the shared folder of a single computer at the same IP address. A person using peer-to-peer software downloads the image...

To continue reading

Request your trial
12 cases
  • State v. Garcia
    • United States
    • Court of Appeals of New Mexico
    • October 14, 2021
    ...trial, we hold that the lack of an instruction defining that phrase was not fundamental error. See State v. Adamo , 2018-NMCA-013, ¶ 27, 409 P.3d 1002 (holding that, where "there was no reversible error" "in the instructions[,]" "there was no fundamental error").II. The Evidence Suffices to......
  • State v. Rael
    • United States
    • Court of Appeals of New Mexico
    • April 7, 2020
    ...identified Section 30-6A-3(A) —"knows or has reason to know"—"is constitutionally sufficient." State v. Adamo , 2018-NMCA-013, ¶¶ 31, 34, 409 P.3d 1002. We see no reason to reach a different conclusion as to Section 30-6A-3(B), which contains a scienter requirement identical to that in Sect......
  • State v. Knight
    • United States
    • Court of Appeals of New Mexico
    • June 28, 2019
    ...when he would find them. However, Defendant concedes that this Court rejected similar arguments in State v. Adamo , 2018-NMCA-013, ¶ 19, 409 P.3d 1002 (stating the fact-finder was free to accept or reject the defendant’s contentions regarding intentionality including that the downloads were......
  • State v. Calhoun
    • United States
    • Court of Appeals of New Mexico
    • November 22, 2019
    ...for the instruction was not laid and the defendant did not argue that he had no duty to retreat); State v. Adamo, 2018-NMCA-013, ¶ 27, 409 P.3d 1002 ("Since there was no reversible error, it follows that there was no fundamental error in the instructions.").B. Defendant Was Not Entitled to ......
  • Request a trial to view additional results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT