Opinion issued December 6, 2018




                                  In The

                          Court of Appeals
                                  For The

                       First District of Texas
                         ————————————
                          NO. 01-17-00920-CR
                          NO. 01-17-00921-CR
                          NO. 01-17-00922-CR
                        ———————————
                JAMES DOYLE COLLINS, JR., Appellant
                                    V.
                    THE STATE OF TEXAS, Appellee


                 On Appeal from the 300th District Court
                         Brazoria County, Texas
          Trial Court Case Nos. 76666-CR, 76667-CR, 76668-CR


                      MEMORANDUM OPINION
      A jury found appellant, James Doyle Collins, Jr., guilty of three separate

offenses of possession of child pornography1 and assessed his punishment at

confinement for five years and a fine of $10,000, confinement for five years and a

fine of $10,000, and confinement for ten years and a fine of $10,000, to run

concurrently. It then recommended that his ten-year prison sentence be suspended

and he be placed on community supervision. The trial court, in accordance with the

jury’s recommendation, suspended appellant’s ten-year prison sentence and placed

him on community supervision for a period of ten years. In two issues, appellant

contends that the evidence is legally insufficient to support his convictions and the

trial court erred in denying his motion to suppress his statement.

      We affirm.

                                    Background

      Pearland Police Department (“PPD”) Detective C. Arnold, a certified

cyber-crimes investigator with the Houston Metro Internet Crimes Against Children

Task Force (“ICACTF”), testified that he, through the use of computers in his office,

monitors certain file-sharing networks that “exist on the internet” in order to




1
      See TEX. PENAL CODE ANN. § 43.26(a) (Vernon 2016); appellate cause no.
      01-17-00920-CR; trial court cause no. 76666-CR (Offense I); appellate cause no.
      01-17-00921-CR; trial court cause no. 76667-CR (Offense II); appellate cause no.
      01-17-00922-CR; trial court cause no. 76668-CR (Offense III).

                                          2
investigate the “distribution and receipt of child pornography.”2 Arnold receives “a

notification when someone [using a file-sharing network] uploads or downloads a

[known] child pornograph[y]” image or video, and upon receiving a notification, he

views the image or video to determine whether it constitutes child pornography.3

Arnold then obtains the location of the person using the file-sharing network based

on the IP address assigned to that person.


2
             Peer-to-peer file sharing is a popular means of obtaining and sharing
             files free of charge directly from other computer users who are
             connected to the [i]nternet and who are also using peer-to-peer
             file[-]sharing software. . . . Once peer-to-peer file[-]sharing software
             has been downloaded and installed [on a computer] by the user, the
             user may interface directly with other computers using the same
             filing[-]sharing software and browse and obtain files that have been
             made available for sharing. . . . File sharing occurs when one
             computer, identified by an Internet Protocol (“IP”) address, initiates a
             search for a responsive file by indicating the term or terms that it seeks
             to find in the file’s name. This is called a ‘query’ and consists of key
             words       such      as     ‘child,’    ‘pornography,’     or      ‘child
             pornography.’ . . . Other computers that are using the same
             file[-]sharing software and connected to the [i]nternet at the time will
             respond to the query with a ‘query hit message.’ A query hit message
             identifies the file or files available for sharing which have a word in
             the file name that matches the search word in the query. . . . After a
             query hit message is received, the computer user requesting the file
             must affirmatively select it for download, generally by double
             clicking on the file’s name.
      U.S. v. Thomas, Nos. 5:12-cr-37, 5:12-cr-44, 5:12-cr-97, 2013 WL 6000484, at *2–
      3 (D. Vt. Nov. 8, 2013) (order).
      Detective Arnold explained that twenty-six file-sharing networks exist, including
      “ARES, Limewire, [and] BearWare.”
3
      The “alert” that Detective Arnold receives essentially tells him that in the
      “geographic area that [he is] monitoring,” a particular IP address has “downloaded
      or uploaded [a certain child-pornography] video[] and picture[].”

                                             3
      In regard to appellant, Detective Arnold testified that on March 6, 2015, his

computer “made a direct connection and download [of a known child-pornography

video] from an IP address in Pearland, [Texas].” When Arnold viewed the video,

he determined that it constituted child pornography. At the time, Arnold did not

know the identity of appellant, but based on the IP address associated with the

downloaded-child-pornography video, he obtained appellant’s physical address.

Arnold drove to appellant’s residence in Pearland, Brazoria County, Texas, and

determined that he had a secure internet connection.4 Arnold then obtained a search

warrant for appellant’s residence.5

      On May 12, 2015, Detective Arnold, along with Homeland Security Special

Agents D. Lewis and L. Erickson, PPD Detectives D. Vlasek and J. Cox, and two

uniformed PPD patrol officers, served a search warrant on appellant at his residence.

Upon arriving at appellant’s home, Arnold, along with the other law enforcement

officers, “clear[ed] the house” and identified the individuals that were present.




4
      Detective Arnold explained that with an “open internet connection . . . someone can
      [park] in front of your house” and “us[e] your [W]ifi signal [to] access the internet.”
      However, with a secure internet connection, “no one can . . . use your internet
      connection without [knowing] your password.” This is important because if another
      person can “log into your wireless [internet] signal,” then “it would show your IP
      address and what they[, and not you, were] doing” on their computer.
5
      The trial court admitted into evidence Detective Arnold’s affidavit and the search
      warrant.

                                             4
Arnold and Lewis then interviewed appellant, while Vlasek and Cox “examine[d]

and process[ed] all of the electronic[] [devices]” found in appellant’s home.6

      Detective Arnold noted that when he and Agent Lewis spoke to appellant, he

was not in custody, was free to leave, and was not placed in handcuffs or in any type

of restraints. Despite the fact that appellant was not in custody, Arnold informed

him of his legal rights, and appellant waived them, agreeing to speak. Arnold did

not coerce appellant, threaten him, or make any promises to him. And he recorded

the interview with appellant.7

      During his interview, which lasted approximately forty-five minutes,

appellant stated that he was the only person living in his home and he had

downloaded and used, on his electronic devices, certain file-sharing networks,8




6
      Detective Arnold explained that Detectives Vlasek and Cox used a “forensic
      recovery program” to “look[] for obvious signs of child pornography” on appellant’s
      electronic devices. The other law enforcement officers present at appellant’s home
      “split up doing searches in each of the rooms [in the house], looking for items that
      [might have] contain[ed]” child pornography.
7
      The trial court admitted into evidence State’s Exhibit 2, appellant’s audio-recorded
      interview with Detective Arnold and Agent Lewis.
8
      Detective Arnold explained that a file-sharing network “doesn’t do anything on its
      own.” A person “ha[s] to tell it what [to] look[] for,” “ha[s] to tell it to download
      files,” and “ha[s] to manually open files and view them.” And a file-sharing network
      does not appear on a person’s computer unless he specifically “download[s] it.”

                                            5
including “ARES,”9 “BearShare and Bear,”10 and “Limewire.”11 When Arnold

questioned appellant about certain terms that appellant may have used while

searching the file-sharing networks, including the search terms “Vicky”12 and

“PTHC,”13 appellant admitted that he had in fact viewed child pornography “out of



9
      See Ferguson v. State, Nos. 09-15-00342-CR to 09-15-00345-CR, 2016 WL
      4247956, at *1 (Tex. App.—Beaumont Aug. 10, 2016, pet. ref’d) (mem. op., not
      designated for publication) (defendant used “ARES file[-]sharing network” to
      download child pornography). Appellant admitted to using the “ARES” file-sharing
      network in 2015.
10
      See Wiand v. United States, Nos. 3:10-CV-1420-M, 3:07-CR-352-M, 2012 WL
      1033623, at *1 (N.D. Tex. Jan. 17, 2012) (defendant “admitted he acquired . . . child
      pornography using a file-sharing program called Bearshare”).
11
      See Lubojasky v. State, No. 03-10-00780-CR, 2012 WL 5192919, at *16 n.14 (Tex.
      App.—Austin Oct. 19, 2012, pet. ref’d) (mem. op., not designated for publication)
      (“LimeWire is peer-to-peer file[-]sharing software that . . . is often used to
      download images and videos of child pornography.”).
12
      Detective Arnold explained that “Vicky is a common series in child pornography
      that a lot of people that are seeking child pornography want to get. It [is] a video
      series . . . [of] a[] 4-year old child[,] whose name is Vicky[,] up to about the age of
      11. There are many, many videos over that time period that were made by her
      stepfather as he was sexually abusing her.” See Gasper v. State, Nos.
      01-16-00930-CR, 01-16-00931-CR, 01-16-00932-CR, 2017 WL 4249558, at *4
      n.17 (Tex. App.—Houston [1st Dist.] Sept. 26, 2017, no pet.) (mem. op., not
      designated for publication) (“‘Vicki’ is ‘a series of a child’ and a ‘common search
      term[]’ for child pornography[.]”); Hicks v. State, Nos. 07-12-00256-CR to
      07-12-00276-CR, 2013 WL 4711223, at *2 (Tex. App.—Amarillo Aug. 28, 2013,
      no pet.) (mem. op., not designated for publication) (noting “the ‘Vicky’ series . . . [is
      a] series [that is] readily recognized by those who investigate child[-]pornography
      cases”).
13
      Detective Arnold noted that “PTHC is an acronym [that] stands for Pre[-]Teen Hard
      Core. It’s another common search term that people will use on a file[-]sharing
      network when looking for child pornography.” See Gasper, 2017 WL 4249558, at
      *3 n.8 (“‘PTHC’ is a ‘common search term[]’ for child pornography and stands for
      ‘preteen hard core[.]’”).

                                              6
curiosity” and he had searched for “Vicky,” “PTHC,” and “Baby J”14 when looking

for pornography on file-sharing networks. (Internal quotations omitted.) When

appellant had searched for “Vicky” on a file-sharing network, “[a] whole bunch of

porn showed up.” (Internal quotations omitted.) And when Arnold asked appellant

if he had ever searched for a particular age while looking for pornography, appellant

stated that he had searched for “12.” (Internal quotations omitted). According to

Arnold, appellant had downloaded twenty-five child-pornography images and

videos over a four-month period from December 2014 until March 2015. Appellant

stated that he would download a child-pornography image or video “to see if the

children were real” and this would then “lead [him] to the next one.” (Internal

quotations omitted.) In other words, appellant admitted that he had downloaded,

viewed, and continued to search for child pornography.

      Appellant also stated in his interview that he had deleted the child

pornography that he had found. And he had looked for “adult porn” or pornography

involving “adult women.” (Internal quotations omitted.) Further, when he had



14
      Detective Arnold explained that “Baby J” is a “child porn[ography] series video
      [involving] a toddler or an infant child, probably 2 to 3 years of age.” (Internal
      quotations omitted.) Detective Cox testified that “Baby J is a common series of
      child pornography.” (Internal quotations omitted). See Assousa v. State, No.
      05-08-00007-CR, 2009 WL 1416759, at *2 (Tex. App.—Dallas May 21, 2009, pet.
      ref’d) (mem. op., not designated for publication) (“Baby J series” constituted
      “known child-porn series[,] involving an infant child.” (internal quotations
      omitted)).

                                           7
“tr[ied] to download movies,” appellant stated that “suddenly porn would [just]

come up.” (Internal quotations omitted.) Appellant also stated that he had not

realized that child pornography had actually been downloaded onto his computer.

However, appellant admitted to looking at child pornography from 2011–2014. And

at the end of his interview, he affirmed that he had “looked at child porn[ography],”

explaining that he was “done looking at it” because he was “no longer curious.”

(Internal quotations omitted.)

      Detective Arnold further testified that law enforcement officers found child

pornography on more than one electronic device in appellant’s home. In fact, they

found over 900 child-pornography images and videos on appellant’s electronic

devices and discovered that appellant had been viewing and downloading child

pornography over “a four-year period.” Arnold opined that the large volume of child

pornography found on appellant’s electronic devices indicated that he had not been

accidentally downloading child pornography. One electronic device contained 727

child-pornography images, a second device contained sixteen child-pornography

images, and a third device contained 168 child-pornography images.

      Detective Arnold explained that appellant had also been “distribut[ing] child

pornography,” noting that he had shared a child-pornography video with Arnold’s

computer. Specifically, on March 6, 2015, appellant had a child-pornography video

in his “unique share folder” on the “ARES” file-sharing network, Arnold’s computer


                                         8
“connected to [appellant’s] share folder[,]” and Arnold “got the video from

[appellant].” Arnold did concede that he did not know who specifically was using

appellant’s computer at the time that the child-pornography video was shared.

However, appellant had told Arnold that he lived by himself and “[h]e was the one

searching and . . . looking at the[] [child-pornography] videos.”

      Detective Cox, a computer forensic analyst with the ICACTF, testified that on

May 12, 2015, he, along with other law enforcement officers, served a search warrant

on appellant at his residence. Cox, as a computer forensic analyst, was responsible,

along with Detective Vlasek, for “preview[ing]” or “[t]riag[ing]” any electronic

devices found in appellant’s home, including “hard drives, laptops, flash drives,

[and] camera cards,” to determine whether they contained “any evidence of child

pornography.”     “[E]vidence of child pornography” could include file-sharing

networks, “child[-]pornography files themselves,” and “link files which would show

any . . . files that [had been recently] opened on” a particular electronic device.

      In regard to the electronic devices found in appellant’s home, Detective Cox

noted that, while “preview[ing]” or “[t]riag[ing],” he did not find any actual

child-pornography files on appellant’s devices, but he found “link files” with “titles

that were consistent with child[-]pornography files.”15 And Cox found file-sharing


15
      See U.S. v. Brown, No. 10-20233, 2012 WL 5948085, at *2 (E.D. Mich. Nov. 28,
      2012) (order) (in regard to offense of possession of child pornography, noting “the
      Government presented evidence that someone viewed child pornography on the
                                           9
networks on multiple electronic devices in appellant’s home. Although Cox did not

find actual child-pornography files while “[t]riag[ing]” appellant’s electronic

devices, he “found evidence that child porn[ography] had been on some of the

devices that [he was] look[ing] at.” Cox noted that law enforcement officers seized

several electronic devices from appellant’s home so that “full forensic[] [analysis

could be] done . . . at a later date by a forensic officer.”

      Detective Vlasek, a former computer forensic analyst with the ICACTF,

testified that on May 12, 2015, he, along with other law enforcement officers, served

a search warrant on appellant at his residence. Vlasek and Detective Cox were

responsible for “preview[ing]” or “triag[ing]” the contents of the electronic devices

found in appellant’s home. And while “preview[ing]” or “triag[ing]” the devices,

he found “link files” and “quite a few” of “peer-to-peer [file-sharing] programs.”

Vlasek explained that “link files” and “linked to” “[a]nything that [a] user [of an

electronic device] has viewed, opened, [or] executed,” and based on the titles of the

“link files” found on appellant’s electronic devices, Vlasek determined that they

related to child pornography. Vlasek opined that the file-sharing networks and “link

files” “indicat[ed] that child pornography exist[ed]” on appellant’s electronic



      desktop computer by way of a link file found on the . . . computer hard drive”);
      United States v. Koch, No. 3:08-cr-0105-JAJ, 2009 WL 10697501, at *2–5 (S.D.
      Iowa July 6, 2009) (order) (considering presence of “[l]ink files relating to child
      pornography” in determining defendant’s guilt).

                                            10
devices. And law enforcement officers seized electronic devices from appellant’s

home that day.

      Following the seizure of appellant’s electronic devices, Detective Vlasek

completed a forensic analysis and found downloaded child pornography on three

electronic devices: (1) a “gray desktop computer,” (2) a “Dell desktop” computer,

and (3) a “PNY flash drive.” In total, he found “[r]oughly 900” child-pornography

images and videos on appellant’s electronic devices.

      In regard to the “gray desktop computer,” Detective Vlasek testified that it

contained   168    downloaded      child-pornography      images     and    twenty-five

child-pornography videos.16 Vlasek viewed the child-pornography images and

videos and confirmed that they did indeed constitute child pornography. The

majority of the images and videos found on the “gray desktop computer” were “in

the thumbnail database,” which indicated that they had been viewed.

      Detective Vlasek further noted that he had discovered, on the “gray desktop

computer,” the “ARES” file-sharing network. And he determined that the majority

of the child-pornography images and videos found on the “gray desktop computer”



16
      The trial court admitted into evidence State’s Exhibit 4, a list of 366
      child-pornography images and videos found on the “gray desktop computer.”
      Detective Vlasek explained that some of the child-pornography images and videos
      appear several times on the list because they had been downloaded several times.
      State’s Exhibit 4 reveals that the child-pornography images and videos found on the
      “gray desktop computer” had been downloaded in 2008, 2010, and 2011.

                                          11
had been downloaded using that program. According to Vlasek, although the

child-pornography images and videos that he recovered from the “gray desktop

computer” had been deleted, the “ARES” file-sharing network had not.

      Detective Vlasek further explained that he was able to recover the titles of the

child-pornography images and videos that had been downloaded on the “gray

desktop computer,” which included the following: “Six-year-old Larissa Fucked

124s 1,” “Ten-year-old LS Magazine Issue LSM,”17 “PTHV, Lolifuck, 10-year-old

Handjob,” “W18 Lolitas, Folladas”18 “Eight-year-old Real Child Porn Pre[-]Teen

Pedo PTHD kiddy incest anal cum,” and “Kid Sex, . . . PTHC, King Pass, hussyfan,

Baby J, Jenny, Baby shiv 2.”19 (Internal quotations omitted.) Vlasek also recovered

the “search terms” that had been “inputted” into the “ARES” file-sharing network



17
      Detective Arnold testified that “LSM” was “an infamous photography studio in
      Europe that specialized in child pornography.” The studio “would take series of
      pictures of kids, usually between the ages of 4 years old up to about 15 [years old]
      in various states of undress.” Arnold opined that “if you’re actually . . . searching
      for the letters ‘LSM,’ you’re looking for this European company that filmed children
      involved in sexual conduct.” Detective Cox further explained that “LSM” is “a
      series of child pornography. See U.S. v. Laub, No. 12-40103-01-JAR, 2014 WL
      1400669, at *1 & n.2 (D. Kan. Apr. 10, 2014) (“[L]sm” constitutes “a common label
      or term present in files or documents containing images of child pornography”
      (internal quotations omitted)).
18
      See Gasper, 2017 WL 4249558, at *3 n.9 (“‘Lolita’ and ‘Loli’ are ‘common search
      terms’ for child pornography.”).
19
      See Solon v. United States, Nos. 2:11-CV-303-CAB, 07-CR-032-CAB, 2013 WL
      12321956, at *14 n.10 (D. Wyo. May 24, 2013) (order) (video title containing
      “Babyshivid,” among other terms, “le[ft] little doubt [that] the content relate[d] to
      child pornography”).

                                           12
on the “gray desktop computer,” which included the following: “Baby J,” “LSM,”

“Kiddie,”20 “Pedo,”21 “Kinderfuck,” “Kiddie Pedo,” “King Pass,”22 “Kiddie Porn,”

“Kids,” “[9]YO,”23 and “TPSF.”24 (Internal quotations omitted.) When asked

whether he found “those search terms . . . [on] computers seized out of [appellant’s]

home,” Vlasek responded, “Yes.”

      Further, during Detective Vlasek’s testimony, the trial court admitted into

evidence State’s Exhibits 6 and 7, certain child-pornography images and videos that

were found on the “gray desktop computer” seized from appellant’s home.25 Vlasek

noted that these images and videos were indicative of the other child-pornography

images that he found on the other electronic devices seized from appellant’s home.


20
      See Lubojasky, 2012 WL 5192919, at *16 n.14 (“[K]iddie” constitutes “[a] known
      child pornography search term[]” (internal quotations omitted)).
21
      See id. (“PEDO” constitutes “[a] known child pornography search term[]” (internal
      quotations omitted)); Brackens v. State, 312 S.W.3d 831, 834 (Tex. App.—Houston
      [1st Dist.] 2009, pet. ref’d) (“‘Pedo’ . . . short for pedophile or pedophilia.”).
22
      Detective Cox testified that “King Pass” is “a term that [he] find[s] on many
      child[-]pornography files,” and Detective Arnold explained that “King Pass” is a
      “term that . . . [is] attached in commonly looked-for child[-]pornography videos.”
      (Internal quotations omitted.)
23
      See Laub, 2014 WL 1400669, at *1 (filename containing “9 yo” referenced age of
      child and indicative of child pornography (internal quotations omitted)); Solon,
      2013 WL 12321956, at *14 n.10 (video title containing “10yo and 9yo lolitas,”
      among other terms, “le[ft] little doubt [that] the content relate[d] to child
      pornography” (internal quotations omitted)).
24
      The trial court admitted into evidence State’s Exhibit 5, a list of the search terms
      inputted into the “ARES” file-sharing network on the “gray desktop computer.”
25
      Detective Vlasek testified that State’s Exhibit 7 depicted “[a] little girl,” named
      “Vicky.”

                                           13
      In regard to the “Dell desktop” computer, Detective Vlasek testified that it

contained sixteen “complete[ly] download[ed]” child-pornography images and the

“ARES” file-sharing network, all of which had been deleted. Vlasek recovered the

titles of certain images that had been downloaded to the “Dell desktop,” which

included the following: “King Pass,” “Old Cousin Fucks Little Cousin, Rare, New

divx 2,” “PTHC, valya 10-year, 2 Sound,” “Babyshivid, Five-year old,” “Webcam,

14-year Boy,” and “Way Fuck, PTHC, 3-year mom, dad Fuck.”26                        (Internal

quotations omitted.)

      In regard to the “PNY flash drive,” Detective Vlasek explained that it

contained 727 downloaded child-pornography images, which had been deleted, and

three file-sharing networks, i.e., “ARES,” “Limewire,” and “Vuze.”27                 Vlasek

viewed the 727 child-pornography images to confirm that they indeed constituted

child pornography. The only items on the flash drive were child-pornography

images.




26
      The trial court also admitted into evidence State’s Exhibit 3, a list of nine titles of
      child-pornography images found on the “Dell computer.” State’s Exhibit 3 states
      that these images were downloaded on July 25, 2014.
27
      See United States v. Walley, Nos. 8:13-cr-304-T-23AEP, 8:15-cv-344-T-23AEP,
      2018 WL 1519047, at *1 (M.D. Fla. Mar. 28, 2010) (order) (defendant admitted to
      downloading “a couple hundred child[-]pornograph[y] images and a few
      videos . . . through Vuze, a peer-to-peer [file-sharing] network” (internal quotations
      omitted)).

                                            14
      Detective Vlasek conceded that he did not know who had specifically

downloaded the child-pornography images and videos that he found on the

electronic devices seized from appellant’s home. Nor could he testify as to who

specifically entered in the “search terms” into the file-sharing networks. Further,

every child-pornography image or video that he found on appellant’s electronic

devices had been “deleted” at some point.

      However, Detective Vlasek also explained that there were no other persons in

appellant’s home when the search warrant was served, he was not aware that anyone

else lived in the home with appellant, and appellant was “in possession of” the “gray

desktop computer,” the “Dell computer,” and the “PNY flash drive” when the search

warrant was served. Further, Vlasek noted that appellant would have seen the title

of any file before he “click[ed] the button to download it.” And he opined, based on

the filenames, that it would not be surprising that the files would contain child

pornography. When Vlasek was asked whether he could “tell . . . that [appellant

had] actually looked at any of th[e] child pornography,” Vlasek responded “Yes,

actually, I can.”28

      In his audio-recorded interview with Detective Arnold and Agent Lewis,

admitted into evidence as State’s Exhibit 2, appellant stated that he was the only


28
      However, Detective Vlasek noted that he was unable to tell whether the
      child-pornography image or video had been viewed for “one minute, ten seconds,
      one second, or an hour.”

                                         15
person living in his home29 and he owned several computers. Specifically, appellant

noted that he had a “Dell desktop” computer in the game room/den of his house and

a “homemade” desktop computer in his bedroom. He further admitted that he had

used certain file-sharing networks, including “Limewire,” “ARES,” and

“BearShare.” And he had primarily used the “ARES” file-sharing network on the

“Dell desktop” computer. Appellant conceded that he had “come across” child

pornography, while using the “ARES” file-sharing network, noting that “sometimes,

a whole bunch of stuff [would] just pop[] up” when he would generally search for

“porn.” Appellant admitted that he would actually see the titles of the files prior to

downloading them from the file-sharing network, and he would have to “click” on a

particular image or video in order to download it. Appellant stated that when he saw

a child-pornography file on the “ARES” file-sharing network, he would delete it.30

      Further, during the interview, when Detective Arnold told appellant that he

had a child-pornography video in his share folder on the “ARES” file-sharing

network, appellant stated that it would have been “caught up in some other stuff”

that he had downloaded. And although appellant stated that he would “delete” any

child-pornography that appeared on the “ARES” file-sharing network, he also stated


29
      Appellant noted that his two sons had previously lived with him, but they were now
      married and living elsewhere. One son lives in Florida.
30
      Appellant stated that he used the “ARES” file-sharing network between December
      2014 and March 2015.

                                          16
that he would delete it after he had “seen . . . what it was.” Further, appellant

admitted to “looking” for child pornography because he was curious about it. And

he confirmed that he had searched for “porn,” “PTHC,” “Vicky,” and the age of

“12.” According to appellant, when he had searched for “Vicky,” “a whole bunch

of” pornography involving “younger girls” appeared. And he searched for the age

of “12” to see if there was pornography involving “underage girls.”

      Appellant also stated that “a lot” of the files that he saw said “young women,”

which he thought meant women who were nineteen or twenty years old. But, he also

recalled seeing child-pornography images or videos involving ten-year-old and

twelve-year-old children, and he wondered if they were real. This curiosity led

appellant to look at more child-pornography images and videos because he was

“wonder[ing].” When Arnold asked appellant if he had a “curiosity” for child

pornography in 2011, 2012, 2013, and 2014, appellant responded, “I guess so, just

every once in a while.” According to appellant, he would look at child pornography

and then stop. Appellant stated that he had used several different computers at

different times, and he did not know whether law enforcement officers would find

evidence of child pornography before 2011.           According to appellant, he had

“satisfied” his curiosity related to child pornography.31


31
      At the end of the interview, Detective Arnold told appellant that he could go back
      inside of his house, sit downstairs, “relax,” and “hang out” while law enforcement
      officers finished looking at his electronic devices. Arnold also told appellant that
                                           17
                               Sufficiency of Evidence

      In his second issue, appellant argues that the evidence is legally insufficient

to support his convictions because the State did not prove that he intentionally and

knowingly possessed child pornography.

      We review the legal sufficiency of the evidence by considering all of the

evidence in the light most favorable to the jury’s verdict to determine whether any

“rational trier of fact could have found the essential elements of the crime beyond a

reasonable doubt.” Jackson v. Virginia, 443 U.S. 307, 318–19, 99 S. Ct. 2781, 2788–

89 (1979); Williams v. State, 235 S.W.3d 742, 750 (Tex. Crim. App. 2007). Our role

is that of a due process safeguard, ensuring only the rationality of the trier of fact’s

finding of the essential elements of the offense beyond a reasonable doubt. See

Moreno v. State, 755 S.W.2d 866, 867 (Tex. Crim. App. 1988). We give deference

to the responsibility of the fact finder to fairly resolve conflicts in testimony, weigh

evidence, and draw reasonable inferences from the facts. Williams, 235 S.W.3d at

750. However, our duty requires us to “ensure that the evidence presented actually

supports a conclusion that the defendant committed” the criminal offense of which

he is accused. Id.


      officers would likely take some of his electronic devices “back [to] the station” so
      that appellant did not have to “spend the entire day” with officers in his home.
      Appellant was permitted to watch television while the officers were in his home.
      He was not arrested on May 12, 2015, and the officers left his home at the conclusion
      of their search.

                                           18
      We note that in reviewing the legal sufficiency of the evidence, a court must

consider both direct and circumstantial evidence, as well as any reasonable

inferences that may be drawn from the evidence. See Clayton v. State, 235 S.W.3d

772, 778 (Tex. Crim. App. 2007); see also Wise v. State, 364 S.W.3d 900, 903 (Tex.

Crim. App. 2012) (evidence-sufficiency standard of review same for both direct and

circumstantial evidence). Circumstantial evidence is just as probative as direct

evidence in establishing the guilt of an actor, and circumstantial evidence alone can

be sufficient to establish guilt. Clayton, 235 S.W.3d at 778; Hooper v. State, 214

S.W.3d 9, 13 (Tex. Crim. App. 2007). For evidence to be sufficient, the State need

not disprove all reasonable alternative hypotheses that are inconsistent with a

defendant’s guilt. See Wise, 364 S.W.3d at 903; Cantu v. State, 395 S.W.3d 202,

207–08 (Tex. App.—Houston [1st Dist.] 2012, pet. ref’d). Rather, a court considers

only whether the inferences necessary to establish guilt are reasonable based upon

the cumulative force of all the evidence when considered in the light most favorable

to the jury’s verdict. Wise, 364 S.W.3d at 903; Hooper, 214 S.W.3d at 13.

      Appellant argues that the State did not prove that he intentionally and

knowingly possessed child pornography because the “ARES peer-to-peer

[file-sharing] network” that he used “automatically download[ed] files to a shared

folder that other users of ARES could access” and “most users are not even aware

that the files are being shared from their computers”; he did not “possess[] . . . any


                                         19
specialized software to recover deleted files”; “it is . . . possible for a person who

believes that he is viewing only adult pornography to inadvertently download child

pornography” or to be “redirected to a child pornography site without his

knowledge”; “there is no evidence . . . that . . . he was indeed the person who

accessed the [i]nternet files, knew that the[] files were being automatically

downloaded and saved to his hard drive”; the search of his home did not reveal any

“sexually explicit materials . . . depicting children”; and there is no evidence that he

“had [ever] corresponded or met with another person to share information and

identities of their victims,” “maintained or ran his own photographic production and

reproduction equipment,” rented or used a “safe deposit box[] or other storage

facility[y],” “collected, read, copied or maintained . . . lists of persons [with] similar

sexual interests,” “kept the names of any children he may have been involved with,”

“maintained diaries of any sexual encounters with children,” “cut pictures of any

children out of any . . . publications . . . [to] use as a means of fantasy relationships,”

“collected . . . writings on the subject of sexual activities with any children” or “on

the subject of sexual activity,” “used sexual aids . . . in the seduction of any victims,”

“used any drugs or alcohol as a means of inducement to get any child to a particular

location,” “maintained artifacts . . . which depicted any children . . . in nude poses

or sexual acts,” “kept mementoes,” “maintained any World Wide Web site,” or

“used many screen names.” Further, appellant asserts that “[t]he fact that every


                                            20
single file depicting child pornography [that was found on appellant’s electronic

devices] had been deleted . . . evidences a lack of intent.”

      A person commits the offense of possession of child pornography if he

knowingly or intentionally possesses visual material that visually depicts a child,

younger than eighteen years of age at the time the image of the child was made, who

is engaging in sexual conduct, and the person knows that the material depicts the

child in this manner. TEX. PENAL CODE ANN. § 43.26(a) (Vernon 2016); Wise, 364

S.W.3d at 903; Krause v. State, 243 S.W.3d 95, 110 (Tex. App.—Houston [1st Dist.]

2007, pet. ref’d). A person acts “intentionally” or with intent “with respect to the

nature of his conduct or to a result of his conduct when it is his conscious objective

or desire to engage in the conduct or cause the result.” TEX. PENAL CODE ANN.

§ 6.03(a) (Vernon 2011). A person acts “knowingly” or with knowledge of the

nature of his conduct or circumstances “when he is aware of the nature of his conduct

or that the circumstances exist.” Id. § 6.03(b).

      “Possession” means “actual care, custody, control, or management.” Id.

§ 1.07(a)(39) (Vernon Supp. 2018) (internal quotations omitted). A defendant

commits a possession offense only if he voluntarily possesses the contraband. Id.

§ 6.01(a) (Vernon 2011). Possession is voluntary “if the possessor knowingly

obtains or receives the [contraband] possessed or is aware of his control of the

[contraband] for a sufficient time to permit him to terminate his control.” Id.


                                          21
§ 6.01(b); see also Williams v. State, 313 S.W.3d 393, 397 (Tex. App.—Houston

[1st Dist.] 2009, pet. ref’d). Proof of a culpable mental state almost invariably

depends on circumstantial evidence, and a trier of fact can infer knowledge from all

the circumstances, including the acts, conduct, and remarks of the accused. See

Hernandez v. State, 819 S.W.2d 806, 810 (Tex. Crim. App. 1991); Dillon v. State,

574 S.W.2d 92, 94–95 (Tex. Crim. App. 1978).

      If contraband is not found on a person or is not in a location that is under the

exclusive control of a single person, mere presence at the location where the

contraband is found is insufficient by itself to establish actual care, custody, or

control of the contraband. See Evans v. State, 202 S.W.3d 158, 162 (Tex. Crim.

App. 2006). “However, presence or proximity, when combined with other evidence,

either direct or circumstantial . . . , may well be sufficient to establish [possession]

beyond a reasonable doubt.” Id. Accordingly, a fact finder may infer that a

defendant intentionally or knowingly possessed contraband not in his exclusive

possession if there are sufficient independent facts and circumstances justifying such

an inference. Tate v. State, 500 S.W.3d 410, 413–14 (Tex. Crim. App. 2016). In

other words, evidence that links the defendant to the contraband suffices for proof

that he possessed it knowingly. Brown v. State, 911 S.W.2d 744, 747 (Tex. Crim.

App. 1995); Wilson v. State, 419 S.W.3d 582, 587–88 (Tex. App.—San Antonio

2013, no pet.). It is not the number of links that is important, but rather the logical


                                          22
force the links have in establishing the elements of the offense. Evans, 202 S.W.3d

at 162.

      In Wise, the Texas Court of Criminal Appeals noted the “peculiarities of

determining knowing or intentional possession of computer pornography” and

concluded that “each case must be analyzed on its own facts.” 364 S.W.3d at 904–

05. Thus, the court held that in computer-pornography cases, “like all criminal cases,

a court must assess whether the inferences necessary to establish guilt are reasonable

based upon the cumulative force of all the evidence considered in the light most

favorable to the verdict.” Id. at 905.

      Sufficient evidence to support a jury’s determination that a defendant had

knowledge of child pornography on his electronic devices may include evidence:

(1) the child pornography was found in different computer files, showing that the

images or videos had been copied or moved; (2) the child pornography was found

on an external hard drive or a removable storage device, which would indicate that

the images or videos were deliberately saved on the external device; (3) the

child-pornography stored on the computer and the external hard drive were stored in

similarly named folders; (4) the names of the folders containing child pornography

necessarily were assigned by the person saving the files; or (5) numerous images or

videos of child pornography were recovered from the defendant’s electronic devices.

See Ballard v. State, 537 S.W.3d 517, 523 (Tex. App.—Houston [1st Dist.] 2017,


                                         23
no pet.); Krause, 243 S.W.3d at 111–12; see also Savage v. State, Nos.

05-06-00174-CR, 05-06-00175-CR, 2008 WL 726229, at *5 (Tex. App.—Dallas

Mar. 19, 2008, pet. ref’d) (not designated for publication).

      Detective Arnold testified on March 6, 2015, his computer, which

“monitor[ed] file[-]sharing networks for the transmission of child pornography,”

“made a direct connection and download[ed]” a child-pornography video “from an

IP address in Pearland, [Texas].” Based on the IP address, Arnold determined that

the downloaded child-pornography video had originated from appellant’s residence,

which had a secure internet connection.

      On May 12, 2015, Detective Arnold and other members of the ICACTF

searched appellant’s home for evidence of child pornography.          There, law

enforcement officers found child pornography on more than one electronic device.

In fact, they found over 900 child-pornography images and videos on appellant’s

electronic devices. And forensic analysis of the devices showed that appellant had

been viewing and downloading child pornography over “a four-year period.”

According to Arnold, one electronic device found in appellant’s home contained 727

child-pornography images, a second electronic device contained sixteen

child-pornography images, and a third electronic device contained 168

child-pornography images. See Ballard, 537 S.W.3d at 523–24 (evidence sufficient

where electronic devices seized from defendant’s residence contained “several


                                          24
hundred [child-pornography] videos”); Savage, 2008 WL 726229, at *7 (evidence

sufficient where “numerous images of child pornography were recovered from

[defendant’s] computer”); Krause, 243 S.W.3d at 111–12 (evidence sufficient where

defendant owned “CD’s, computers, and hard drives that stored images of children

engaged in sexual conduct”).      Arnold opined that the large volume of child

pornography on appellant’s electronic devices indicated that he had not accidentally

downloaded child pornography.       See Gasper v. State, Nos. 01-16-00930-CR,

01-16-00931-CR, 01-16-00932-CR, 2017 WL 4249558, at *7 (Tex. App.—Houston

[1st Dist.] Sept. 26, 2017 no pet.) (mem. op., not designated for publication)

(evidence sufficient where law enforcement officer opined defendant had not

accidentally downloaded child pornography).

      Detective Arnold explained that appellant had also been “distribut[ing] child

pornography,” noting that he had actually shared a child-pornography video with

Arnold’s computer.       Specifically, on March 6, 2015, appellant had a

child-pornography video in his “unique share folder” on the “ARES” file-sharing

network, Arnold’s computer “connected to [appellant’s] share folder[,]” and Arnold

“got the video from [appellant].” Although Arnold did not know who specifically

was using appellant’s computer at the time that the child-pornography video was

shared with Arnold’s computer, appellant had told Arnold that he lived by himself

and “[h]e was the one searching and . . . looking at the[] [child-pornography]


                                        25
videos.” See Gasper, 2017 WL 4249558, at *7 (evidence sufficient where electronic

devices found in home owned by defendant and he owned and used devices);

Ballard, 537 S.W.3d at 523–24 (evidence sufficient where defendant “primary user”

of computer).

      Further, during his interview Detective Arnold and Agent Lewis, appellant

stated that he had downloaded and used certain file-sharing networks, including

“ARES,”32 “BearShare and Bear,”33 and “Limewire,”34 on the electronic devices in

his home.35 See Gasper, 2017 WL 4249558, at *7 (evidence sufficient where

defendant admitted to using peer-to-peer file-sharing network “that c[ould] be used

to obtain child pornography”); Lubojasky v. State, No. 03-10-00780-CR, 2012 WL

5192919, at *16 n.14 (Tex. App.—Austin Oct. 19, 2012, pet. ref’d) (mem. op., not

designated for publication) (peer-to-peer file-sharing network “often used to

download images and videos of child pornography”). And when Arnold questioned

appellant about certain terms that he may have searched for on a file-sharing




32
      See Ferguson, 2016 WL 4247956, at *1. Appellant admitted to using “ARES” in
      2015.
33
      See Wiand, 2012 WL 1033623, at *1.
34
      See Lubojasky 2012 WL 5192919, at *16 n.14.
35
      Detective Arnold explained that a file-sharing network “doesn’t do anything on its
      own.” A person “ha[s] to tell it what [to] look[] for,” “ha[s] to tell it to download
      files,” and “ha[s] to manually open files and view them.” And a file-sharing network
      does not appear on a person’s computer unless he specifically “download[s] it.”

                                           26
network, including “Vicky”36 and “PTHC,”37 appellant admitted that he had in fact

viewed child pornography “out of curiosity” and he had searched for “Vicky,”

“PTHC,” and “Baby J.”38 See Gasper, 2017 WL 4249558, at *11 (evidence

sufficient where defendant “admitted to seeing certain child-pornography terms

while searching for pornography, and he knew the meaning of the[] terms”); see also

Wenger v. State, 292 S.W.3d 191, 200–01 (Tex. App.—Fort Worth 2009, no pet.)

(evidence sufficient to support defendant intentionally or knowingly disseminated

child pornography where he admitted to searching by inputting search terms like

“young” and “Lolita” (internal quotations omitted)).            According to appellant,

searching for “Vicky” on a file-sharing network prompted “[a] whole bunch of porn

[to] show[] up.” (Internal quotations omitted.) And when Arnold asked appellant




36
      Detective Arnold explained that “Vicky is a common series in child pornography
      that a lot of people that are seeking child pornography want to get. It [is] a video
      series . . . [of] a[] 4-year old child[,] whose name is Vicky[,] up to about the age of
      11. There are many, many videos over that time period that were made by her
      stepfather as he was sexually abusing her.” See Gasper, 2017 WL 4249558, at *4
      n.17; Hicks, 2013 WL 4711223, at *2.
37
      Detective Arnold noted that “PTHC is an acronym [that] stands for Pre[-]Teen Hard
      Core. It’s another common search term that people will use on a file[-]sharing
      network when looking for child pornography.” See Gasper, 2017 WL 4249558, at
      *3 n.8.
38
      Detective Arnold explained that “Baby J” is a “child porn[ography] series video
      [involving] a toddler or an infant child, probably 2 to 3 years of age.” (Internal
      quotations omitted.) Detective Cox testified that “Baby J is a common series of
      child pornography.” (Internal quotations omitted). See Assousa, 2009 WL
      1416759, at *2.

                                            27
whether he had ever searched for a particular age when looking for pornography,

appellant stated that he had searched for “12.” (Internal quotations omitted).

      Further, appellant told Detective Arnold that he would download a

child-pornography image or video “to see if the children were real” and this would

then “lead [him] to the next one.” (Internal quotations omitted.) In other words,

appellant admitted that he had downloaded, viewed, and continued to search for

child pornography.     Appellant further admitted that he had looked at child

pornography from 2011–2014. And at the end of his interview, appellant affirmed

that he had “looked at child porn[ography],” explaining that he was “done looking

at it” because he was “no longer curious.” (Internal quotations omitted.) See

Gasper, 2017 WL 4249558, at *11 (evidence sufficient where defendant admitted

to “‘open[ing]’ files containing child pornography and ‘look[ing] at’ them”

(alterations in original)); Wilson, 419 S.W.3d at 590 (evidence sufficient where

defendant, in his interview, stated he “inadvertently viewed [child-pornography]

images and would quickly ‘back out,’” “just clicked on [certain] images to ‘verify’

that they were of underage children,” “viewed images he knew were of underage

children because he was ‘curious,’” and “looked at [child-pornography] images out

of sympathy for the children”); Bethards v. State, No. 10-09-00016-CR, 2011 WL

2937875, at *6 (Tex. App.—Waco July 20, 2011, no pet.) (mem. op., not designated

for publication) (evidence sufficient where defendant admitted to “intentionally


                                         28
search[ing] for child pornography . . . because he was curious and was looking for

information on whether the websites were legal”).

      Detective Vlasek, a former computer forensic analyst with the ICACTF,

testified that on May 12, 2015, he, while “preview[ing]” or “triag[ing]” the contents

of the electronic devices found in appellant’s home, found “link files” and “quite a

few” of “peer-to-peer [file-sharing] programs.” See Gasper, 2017 WL 4249558, at

*8–9 (evidence sufficient where forensic analysis of electronic devices revealed

peer-to-peer file-sharing network and child-pornography images and videos);

Lubojasky, 2012 WL 5192919, at *16 n.14 (peer-to-peer file-sharing network “often

used to download images and videos of child pornography”). Vlasek explained that

“link files” are “linked to” “[a]nything that the user [of the electronic device] has

viewed, opened, [or] executed,” and based on the titles of the “link files,” Vlasek

was able to determine that they related to child pornography. 39 Vlasek opined that

the file-sharing networks and “link files” found on appellant’s electronic devices

“indicat[ed] that child pornography exist[ed].”

      Detective Vlasek completed a full forensic analysis of the electronic devices

seized from appellant’s home, and he found downloaded child pornography on three

devices: (1) a “gray desktop computer,” (2) a “Dell desktop” computer, and (3) a

“PNY flash drive.” In total, he found “[r]oughly 900” child-pornography images

39
      See Brown, 2012 WL 5948085, at *2; Koch, 2009 WL 10697501, at *2–5.

                                         29
and videos on appellant’s electronic devices. See Gasper, 2017 WL 4249558, at *8–

10 (evidence sufficient to establish defendant intentionally or knowingly possessed

child pornography where full forensic analysis revealed large amount of child

pornography on electronic devices seized from defendant’s home); Ballard, 537

S.W.3d at 523–24 (evidence sufficient where electronic devices seized from

defendant’s residence contained “several hundred [child-pornography] videos”);

Krause, 243 S.W.3d at 111–12 (evidence sufficient where defendant owned “CD’s,

computers, and hard drives that stored images of children engaged in sexual

conduct”); see also Bogany v. State, Nos. 14-10-00138-CR to 14-10-00146-CR,

2011 WL 704359, at *4–6 (Tex. App.—Houston [14th Dist.] Mar. 1, 2011, pet.

ref’d) (mem. op., not designated for publication) (size of child-pornography

collection on defendant’s computer “large enough to be obvious to the owner of the

computer”).

      In regard to the “gray desktop computer,” Detective Vlasek testified that it

contained     168   downloaded      child-pornography       images     and     twenty-five

child-pornography videos.40 See Ballard, 537 S.W.3d at 523–24 (“[T]he fact that



40
      State’s Exhibit 4, admitted into evidence, constituted a list of 366 child-pornography
      images and videos found on the “gray desktop computer.” Detective Vlasek
      explained that some of the images and videos appear several times on the list
      because they had been downloaded several times. State’s Exhibit 4 reveals that the
      child-pornography images and videos found on the “gray desktop computer” had
      been downloaded in 2008, 2010, and 2011.

                                            30
hundreds of files of child pornography were recovered from [defendant’s] computer

is . . . circumstantial evidence that he knowingly possessed child pornography.”);

Savage, 2008 WL 726229, at *7 (evidence sufficient where “numerous images of

child pornography were recovered from [defendant’s] computer”); see also Bogany,

2011 WL 704359, at *4–6 (size of child-pornography collection on defendant’s

computer “large enough to be obvious to the owner of the computer”). Vlasek

viewed the child-pornography images and videos found on the “gray desktop

computer” and confirmed that they did indeed constituted child pornography. And

he explained that the majority of the images and videos found on the “gray desktop

computer” were “in the thumbnail database,” indicating that the image or video had

been viewed.

      Detective Vlasek further noted that he had discovered, on the “gray desktop

computer,” the “ARES” file-sharing network. And he determined that the majority

of the child-pornography images and videos found on the “gray desktop computer”

had been downloaded using that program.               See Zaratti v. State, No.

01-04-01019-CR, 2006 WL 2506899, at *6 (Tex. App.—Houston [1st Dist.] Aug.

31, 2006, pet. ref’d) (mem. op., not designated for publication) (evidence sufficient

where computer expert located several child-pornography files in peer-to-peer

file-sharing database). According to Vlasek, the child-pornography images and

videos that he recovered from the “gray desktop computer” had been deleted, but the


                                         31
“ARES” file-sharing network had not. See Gasper, 2017 WL 4249558, at *7, *9–

11 (evidence sufficient although defendant had deleted or attempted to delete

child-pornography files); Assousa v. State, No. 05-08-00007-CR, 2009 WL

1416759, at *4 (Tex. App.—Dallas May 21, 2009, pet. ref’d) (not designated for

publication) (“Logically, one cannot destroy what one does not possess and control.

Indeed, the ability to destroy is definitive evidence of control.” (internal quotations

omitted)); Fridell v. State, Nos. 09-04-200 CR, 09-04-201 CR, 2004 WL 2955227,

at *3 (Tex. App.—Beaumont Dec. 22, 2004, pet. ref’d) (mem. op., not designated

for publication) (“[A]ttempts to erase [child-pornography] material from the

computer . . . show[s] that [defendant’s] possession of child pornography was

knowing or intentional.”).

      Detective Vlasek further explained that he was able to recover the titles of the

child-pornography images and videos that had been downloaded on the “gray

desktop computer,” which included the following: “Six-year-old Larissa Fucked

124s 1,” “Ten-year-old LS Magazine Issue LSM,”41 “PTHV, Lolifuck, 10-year-old




41
      Detective Arnold testified that “LSM” was “an infamous photography studio in
      Europe that specialized in child pornography.” The studio “would take series of
      pictures of kids, usually between the ages of 4 years old up to about 15 [years old]
      in various states of undress.” Arnold opined that “if you’re actually . . . searching
      for the letters ‘LSM,’ you’re looking for this European company that filmed children
      involved in sexual conduct.” Detective Cox further explained that “LSM” is “a
      series of child pornography. See Laub, 2014 WL 1400669, at *1 & n.2.

                                           32
Handjob,” “W18 Lolitas, Folladas,”42 “Eight-year-old Real Child Porn Pre[-]Teen

Pedo PTHD kiddy incest anal cum,” and “Kid Sex, . . . PTHC, King Pass, hussyfan,

Baby J, Jenny, Baby shiv 2.”43 (Internal quotations omitted.) See Ballard, 537

S.W.3d at 523–24 (“explicit titles” of child-pornography files found on defendant’s

computer suggested knowing possession of child pornography); Wenger, 292

S.W.3d at 201 (noting “explicitly descriptive names of the . . . files themselves” in

determining sufficiency of evidence). Vlasek also recovered the “search terms” that

had been “inputted” into the “ARES” file-sharing network on the “gray desktop

computer,” which included the following: “Baby J,” “LSM,” “Kiddie,”44 “Pedo,”45

“Kinderfuck,” “Kiddie Pedo,” “King Pass,”46 “Kiddie Porn,” “Kids,” “[9]YO,”47 and

“TPSF.”48 (Internal quotations omitted.) When asked whether he found “those

search terms . . . [on] computers seized out of [appellant’s] home,” Vlasek




42
      See Gasper, 2017 WL 4249558, at *3 n.9.
43
      See Solon, 2013 WL 12321956, at *14 n.10.
44
      See Lubojasky, 2012 WL 5192919, at *16 n.14.
45
      See id.; Brackens, 312 S.W.3d at 834.
46
      Detective Cox testified that “King Pass” is “a term that [he] find[s] on many
      child[-]pornography files,” and Detective Arnold explained that “King Pass” is a
      “term that . . . [is] attached in commonly looked-for child[-]pornography videos.”
      (Internal quotations omitted.)
47
      See Laub, 2014 WL 1400669, at *1; Solon, 2013 WL 12321956, at *14 n.10.
48
      State’s Exhibit 5, admitted into evidence, constituted a list of the search terms
      inputted into the “ARES” file-sharing network on the “gray desktop computer.”

                                          33
responded, “Yes.” And he noted that appellant would have seen the title of any file

before he would have “click[ed] the button to download it.”

      Further, during Detective Vlasek’s testimony, the trial court admitted into

evidence State’s Exhibits 6 and 7, certain child-pornography images and videos that

were found on the “gray desktop computer” seized from appellant’s home.49 Vlasek

noted that these images and videos were indicative of the other child-pornography

images that he found on the other electronic devices seized from appellant’s home.

      In regard to the “Dell desktop” computer, Detective Vlasek testified that it

contained sixteen “complete[ly] download[ed]” child-pornography images and the

“ARES” file-sharing network. See Gasper, 2017 WL 4249558, at *8–9; Lubojasky,

2012 WL 5192919, at *16 n.14; Savage, 2008 WL 726229, at *7; Krause, 243

S.W.3d at 111–12.

      However, the sixteen child-pornography images and the file-sharing network

recovered from the “Dell desktop” had been deleted. See Gasper, 2017 WL

4249558, at *7, *9–11; Assousa, 2009 WL 1416759, at *4; see also Fridell, 2004

WL 2955227, at *3. Vlasek explained that he was able to recover titles of certain

images that had been downloaded to the “Dell desktop,” which included the

following: “King Pass,” “Old Cousin Fucks Little Cousin, Rare, New divx 2,”



49
      According to Detective Vlasek, State’s Exhibit 7 depicted “[a] little girl” named
      “Vicky.”

                                          34
“PTHC, valya 10-year, 2 Sound,” “Babyshivid, Five-year old,” “Webcam, 14-year

Boy,” and “Way Fuck, PTHC, 3-year mom, dad Fuck.”50 (Internal quotations

omitted.) See Ballard, 537 S.W.3d at 523–24 (“explicit titles” of child-pornography

files found on defendant’s computer suggested knowing possession of child

pornography); Wenger, 292 S.W.3d at 201 (noting “explicitly descriptive names of

the . . . files themselves” in determining sufficiency of evidence).

      In regard to the “PNY flash drive,” Detective Vlasek testified that it contained

727 downloaded child-pornography images, which had been deleted, and three

file-sharing networks, i.e., “ARES,” “Limewire,” and “Vuze.”51 See Gasper, 2017

WL 4249558, at *7, *9–11; Assousa, 2009 WL 1416759, at *4; Fridell, 2004 WL

2955227, at *3; see also Lubojasky, 2012 WL 5192919, at *16 n.14. Vlasek viewed

the 727 child-pornography images to confirm that they indeed constituted child

pornography. See Gasper, 2017 WL 4249558, at *8–9; Savage, 2008 WL 726229,

at *7; see also Bogany, 2011 WL 704359, at *4–6 (size of child-pornography

collection on defendant’s computer “large enough to be obvious to the owner of the

computer”). The only items on the flash drive were child-pornography images. See



50
      State’s Exhibit 3, admitted into evidence, constituted a list of nine titles of
      child-pornography images found on the “Dell computer.” State’s Exhibit 3 states
      that these images were downloaded on July 25, 2014. Detective Vlasek noted that
      appellant would have seen the title of a file before “click[ing] the button to download
      it.”
51
      See Walley, 2018 WL 1519047, at *1.

                                            35
Ballard, 537 S.W.3d at 524 (“[E]vidence supports an inference that [defendant]

possessed child pornography knowingly because it . . . [was] saved deliberately to

the[] external devices.”); Savage, 2008 WL 726229, at *6 (child-pornography

images found on “loose hard drive” and “zip disks,” indicating “deliberately saved

on the external devices”); Krause, 243 S.W.3d at 111–12 (child pornography found

on external hard drive, indicating images “deliberately saved to the[] external

device[]”).

      Although Detective Vlasek conceded that he did not know who had

specifically downloaded the child-pornography images and videos that he found on

the electronic devices seized from appellant’s home or who had entered in the

“search terms” into the file-sharing networks, he explained that there were no other

persons in appellant’s home when the search warrant was served, he was not aware

that anyone else lived in the home with appellant, and appellant was “in possession

of” the “gray desktop computer,” the “Dell computer,” and the “PNY flash drive”

when the search warrant was served.

      In his audio-recorded interview with Detective Arnold and Agent Lewis,

appellant stated that he was the only person living in his home and he had a “Dell

desktop” computer in the game room/den of his house and a “homemade” desktop

computer in his bedroom.      He admitted that he had used certain file-sharing

networks, including “Limewire,” “ARES”, and “BearShare.” And he had primarily


                                        36
used the “ARES” file-sharing network on the “Dell desktop” computer. See Gasper,

2017 WL 4249558, at *7 (evidence sufficient where defendant admitted to using a

peer-to-peer file-sharing network “that c[ould] be used to obtain child

pornography”); Lubojasky, 2012 WL 5192919, at *16 n.14. Appellant stated that he

had “come across” child pornography, while using the “ARES” file-sharing network,

noting that “sometimes, a whole bunch of stuff [would] just pop[] up” when he

would generally search for “porn.”52 See Gasper, 2017 WL 4249558, at *11

(evidence sufficient where defendant stated “it was ‘possible’ that by downloading

pornography in ‘mega pack[s]’ or ‘movie pack[s],’ he had ‘picked up child

pornography’” (alterations in original)); Wilson, 419 S.W.3d at 590 (evidence

sufficient where defendant, in his interview, stated he “inadvertently viewed

[child-pornography] images”); Zaratti, 2006 WL 2506899, at *5–6 (evidence

sufficient even though defendant argued because “his computer contained

considerably more files of legal adult pornography than unlawful child pornography,

it was possible that he could have downloaded the child pornography

unintentionally”). Appellant admitted that he would actually see the titles of the files

prior to downloading them from the file-sharing network, and he would have to

“click” on a particular image or video in order to download it. Appellant stated that



52
      Appellant conceded that he had used the “ARES” file-sharing network between
      December 2014 and March 2015.

                                          37
when he saw a child-pornography file on the “ARES” file-sharing network, he would

delete it. See Gasper, 2017 WL 4249558, at *7, *9–11; Assousa, 2009 WL 1416759,

at *4; Fridell, 2004 WL 2955227, at *3.

      Further, during appellant’s interview, Detective Arnold told him that he had a

child-pornography video in his share folder on the “ARES” file-sharing network,

and appellant stated that it would have been “caught up in some other stuff” that he

had downloaded. See Gasper, 2017 WL 4249558, at *11; Wilson, 419 S.W.3d at

590; Zaratti, 2006 WL 2506899, at *5–6. Although appellant stated that he would

“delete” the child-pornography that appeared on the “ARES” file-sharing network,

he also stated that he would delete it after he had “seen . . . what it was.” Further,

appellant admitted to “looking” for child pornography because he was curious about

it. See Gasper, 2017 WL 4249558, at *11 (evidence sufficient where defendant

admitting to “‘open[ing]’ files containing child pornography and ‘look[ing] at’

them” (alterations in original)); Wilson, 419 S.W.3d at 590 (evidence sufficient

where defendant, in his interview, stated he “inadvertently viewed [child

pornography] images and would quickly ‘back out,’” “just clicked on [certain]

images to ‘verify’ that they were of underage children,” “viewed images he knew

were of underage children because he was ‘curious,’” and “looked at [child

pornography] images out of sympathy for the children”); Bethards, 2011 WL

2937875, at *6 (evidence sufficient where defendant admitted to “intentionally


                                          38
search[ing] for child pornography . . . because he was curious and was looking for

information on whether the websites were legal”). And he confirmed that he had

searched for “porn,” “PTHC,” “Vicky,” and the age of “12.” According to appellant,

when he searched for “Vicky,” “a whole bunch of” pornography involving “younger

girls” appeared. And he searched for the age of “12” to see if there was pornography

involving “underage girls.” See Gasper, 2017 WL 4249558, at *11 (evidence

sufficient where defendant “admitted to seeing certain child-pornography terms

while searching for pornography, and he knew the meaning of the[] terms”); see also

Wenger, 292 S.W.3d at 200–01 (evidence sufficient to support defendant

intentionally or knowingly disseminated child pornography where he admitted to

searching by inputting search terms like “young” and “Lolita” (internal quotations

omitted)). Appellant also stated that “a lot” of the files that he saw said “young

women,” which he thought meant women who were nineteen or twenty years old.

But, he recalled seeing child-pornography images or videos involving ten-year-old

and twelve-year-old children, and he wondered if they were real. This curiosity led

appellant to look at more child-pornography images and videos because he was

“wonder[ing].”

      Further, when Detective Arnold asked appellant if he had a “curiosity” for

child pornography in 2011, 2012, 2013, and 2014, appellant responded, “I guess so,

just every once in a while.” Appellant explained that he would look at child


                                        39
pornography and then stop, and he had used several different computers at different

times. According to appellant, he had “satisfied” his curiosity related to child

pornography.

      To the extent that appellant asserts that a person other than himself could have

been responsible for downloading the child-pornography images and videos found

on the electronic devices seized from his home, we note that the State need not

disprove all reasonable alternative hypotheses that are inconsistent with appellant’s

guilt. See Gasper, 2017 WL 4249558, at *11; Wise, 364 S.W.3d at 903; Ballard,

537 S.W.3d at 522, 524. Further, to the extent that appellant, at times, in his

interview with Detective Arnold and Agent Erickson, may have denied downloading

child pornography, it was for the jury to determine his credibility and the weight to

be given such evidence. See Adames v. State, 353 S.W.3d 854, 860 (Tex. Crim.

App. 2011); Brooks v. State, 323 S.W.3d 893, 899 (Tex. Crim. App. 2010). And

appellant’s assertion that “[t]he fact that every single file depicting child

pornography [that was found on appellant’s electronic devices] had been

deleted . . . evidences a lack of intent,” is simply incorrect. See Gasper, 2017 WL

4249558, at *7, *9–11; Assousa, 2009 WL 1416759, at *4; Fridell, 2004 WL

2955227, at *3.

      Viewing all of the evidence and inferences in the light most favorable to the

jury’s verdict, we conclude that the evidence is sufficient for a rational fact finder to


                                           40
have found beyond a reasonable doubt that appellant knowingly or intentionally had

care, custody, control, or management of the child pornography found on the

electronic devices seized from his house. Accordingly, we hold that the evidence is

legally sufficient to support appellant’s convictions.

      We overrule appellant’s second issue.

                             Suppression of Statement

      In his first issue, appellant argues that the trial court erred in denying his

motion to suppress State’s Exhibit 2, his audio-recorded interview with Detective

Arnold and Agent Lewis, because “a reasonable and prudent person would [have]

believe[d]” that he was “under arrest” at the time of his interview and his

“[s]tatements [w]ere the [r]esult of [i]nterrogation.”

       We review a trial court’s denial of a motion to suppress evidence under a

bifurcated standard of review. Turrubiate v. State, 399 S.W.3d 147, 150 (Tex. Crim.

App. 2013). We review the trial court’s factual findings for an abuse of discretion

and the trial court’s application of the law to the facts de novo. Id. The trial court

is the sole and exclusive trier of fact and judge of the witnesses’ credibility and may

choose to believe or disbelieve all or any part of the witnesses’ testimony. Maxwell

v. State, 73 S.W.3d 278, 281 (Tex. Crim. App. 2002); State v. Ross, 32 S.W.3d 853,

855 (Tex. Crim. App. 2000). If, as in this case, the trial court makes express findings

of fact, we review the evidence in the light most favorable to the trial court’s ruling


                                          41
and determine whether the evidence supports the fact findings. See Valtierra v.

State, 310 S.W.3d 442, 447 (Tex. Crim. App. 2010). A trial court’s findings on a

motion to suppress may be written or oral. See State v. Cullen, 195 S.W.3d 696, 699

(Tex. Crim. App. 2006); State v. Groves, 837 S.W.2d 103, 105 n.5 (Tex. Crim. App.

1992). We give almost total deference to the trial court’s determination of historical

facts, particularly when the trial court’s fact findings are based on an evaluation of

credibility and demeanor. Valtierra, 310 S.W.3d at 447.

      We review the trial court’s legal ruling de novo unless its explicit findings that

are supported by the record are also dispositive of the legal ruling. State v. Kelly,

204 S.W.3d 808, 818 (Tex. Crim. App. 2006). We will sustain the trial court’s ruling

if it is reasonably supported by the record and is correct on any theory of law

applicable to the case. Valtierra, 310 S.W.3d at 447–48. In determining whether

the trial court’s ruling on a motion to suppress is supported by the record, we

generally consider only the evidence adduced at the hearing on the motion unless

the suppression issues have been consensually relitigated by the parties during the

trial on the merits. Rachal v. State, 917 S.W.2d 799, 809 (Tex. Crim. App. 1996).

      Prior to trial, appellant moved to suppress “[a]ny statements . . . allegedly

made by [him]” or “[a]ny video and/or audio recordings made of [him]” “[a]t the

time of any conversations between [him] and law enforcement officers,” i.e.,

appellant’s audio-recorded interview with Detective Arnold and Agent Lewis.


                                          42
         Following a suppression hearing, the trial court denied appellant’s motion,

and, orally, on the record, issued the following findings of fact and conclusions of

law53:

         Under Article 38.22 of the Texas Code of Criminal Procedure, I’ll find
         under Subsection 5 that the statement that has been provided was not a
         statement that was given or stems from custodial interrogation.

         I will find that [appellant] at that time who was not arrested was not
         physically deprived of his freedom of action in any significant way; that
         he was not told he could not leave; and that although there were a
         number of officers there who were there as was presented by Detective
         Arnold for purposes of evaluating those items that would need to be
         seized and/or searched and the other officers that were there for officer
         safety, that presence did not create a situation that would lead a
         reasonable person to believe that his freedom of movement had been
         significantly restricted. In fact, there was no indication that he was
         restricted from leaving at all.

         Further, I will find that if there is any indication, and there’s not, that
         there was a custodial interrogation, I will further find that the [legal]
         warnings were complied with as provided for in 38.22; that there was
         an electronic recording that was not visual but was audio only; that prior
         to any statements being provided that [appellant] was provided with his
         [legal] warnings as set out in 38.22, and as he just testified that he freely
         and voluntarily knowingly waived his rights and began to visit with
         Detective Arnold.

53
         See TEX. CODE CRIM. PROC. ANN. art. 38.22, § 6 (Vernon Supp. 2018) (“If [a]
         statement has been found to have been voluntarily made and held admissible as a
         matter of law and fact by the court in a hearing in the absence of the jury, the court
         must enter an order stating its conclusion as to whether or not the statement was
         voluntarily made, along with the specific finding of facts upon which the conclusion
         was based, which order shall be filed among the papers of the cause.”); Urias v.
         State, 155 S.W.3d 141, 142 (Tex. Crim. App. 2005). A trial court may dictate its
         findings and conclusions into a reporter’s record that is included in the appellate
         record. See Mbugua v. State, 312 S.W.3d 657, 668 (Tex. App.—Houston [1st Dist.]
         2009, pet. ref’d).

                                               43
      The recording is capable of making an accurate recording. The operator
      was competent and the recording hasn’t been altered in any respect. All
      of the voices on the recording are identified and that prior to 20 days of
      the date of these proceedings that audio was provided to counsel for
      review and listening.

      And as such, even if there had been custodial interrogation, it would
      be -- it would not be suppressed and would be permitted to be admitted.
      But as I indicated, I’m finding under Subsection 5 that this does not
      stem from custodial interrogation and, therefore, is admissible.

      Appellant first argues that he was “under arrest” at the time of his interview

with Detective Arnold and Agent Lewis because “[a] large number of law

enforcement officers entered [his] residence early in the morning and exercised

physical control over [him]”; the officers “sought out [a]ppellant and escorted him

outside [of] his home and into a police vehicle waiting in the street”; “he was

accompanied by at least two detectives who interrogated him for nearly an hour”; he

was “aware [that] he was the focal point of the investigation”; he testified that “he

believed [that] he was in custody”; he was “denied access to food, drink, and a

restroom break while in the police vehicle”; and “[a] reasonably prudent person

would certainly believe [that he] w[as] about to be transported to jail” and “would

not feel [that he] would be able to invoke [his] constitutional right to counsel, to

remain silent, or [to] terminate the interrogation.”

      The United States Constitution prohibits the use of statements made by a

criminal defendant against himself if they are obtained through custodial


                                          44
interrogation without the necessary procedural safeguards to secure the Fifth

Amendment right against self-incrimination. Miranda v. Arizona, 384 U.S. 436,

444, 86 S. Ct. 1602, 1612 (1966); Jones v. State, 119 S.W.3d 766, 772 (Tex. Crim.

App. 2003). Similarly, the Texas Code of Criminal Procedure precludes the State’s

use of the statements of a criminal defendant against himself obtained through a

custodial interrogation without compliance with procedural safeguards. TEX. CODE

CRIM. PROC. ANN. art. 38.22 (Vernon Supp. 2018).             Notably, however, an

individual’s Fifth Amendment rights do not come into play if the person is not in

custody and any investigation is not yet custodial, and neither Miranda nor article

38.22 warnings are required before questioning. Herrera v. State, 241 S.W.3d 520,

526 (Tex. Crim. App. 2007); Melton v. State, 790 S.W.2d 322, 326 (Tex. Crim. App.

1990); White v. State, 395 S.W.3d 828, 834 (Tex. App.—Fort Worth 2013, no pet.).

      “Custody” for purposes of article 38.22 is consistent with the meaning of

“custody” for purposes of Miranda. Gardner v. State, 433 S.W.3d 93, 98 (Tex.

App.—Houston [1st Dist.] 2014, pet. ref’d). The appropriate inquiry as to whether

a person is in “custody,” for purposes of their right to receive legal warnings, is

“whether there is a ‘formal arrest or restraint on freedom of movement’ of the degree

associated with a formal arrest.” California v. Beheler, 463 U.S. 1121, 1125, 103 S.

Ct. 3517, 3520 (1983) (quoting Oregon v. Mathiason, 429 U.S. 492, 495, 97 S. Ct.

711, 714 (1977)); see also Gardner v. State, 306 S.W.3d 274, 293–94 (Tex. Crim.


                                         45
App. 2009).      A “custodial interrogation” is “questioning initiated by law

enforcement officers after a person has been taken into custody or otherwise

deprived of his freedom . . . in any significant way.” See Herrera, 241 S.W.3d at

525. The determination of custody is made on a case-by-case basis considering all

the surrounding circumstances. Dowthitt v. State, 931 S.W.2d 244, 255 (Tex. Crim.

App. 1996). A person is in custody only if, under the circumstances, an objectively

reasonable person would believe that his freedom of movement was restrained to the

degree associated with a formal arrest. Id. at 254.

      Generally, a person’s detention may constitute custody for purposes of

Miranda and article 38.22: (1) when an individual is physically deprived of his

freedom of action in any significant way; (2) when a law enforcement officer tells

the person that he is not free to leave; (3) when a law enforcement officer creates a

situation that would lead a reasonable person to believe that his freedom of

movement has been significantly restricted; and (4) there is probable cause to arrest

the person and law enforcement officers do not tell the person that he is free to leave.

Id. at 255. In the first three situations, the restriction upon freedom of movement

must amount to the degree associated with an arrest rather than an investigative

detention. Id. Under the fourth situation, the existence of probable cause must be

manifested to the person. Id. Such a concession, however, does not automatically

establish a custodial interrogation; rather, it is a factor to consider, together with


                                          46
other circumstances, to determine whether a reasonable person would believe that

he is under restraint to a degree associated with an arrest. Id.

      Additional circumstances to consider in determining whether an interrogation

is custodial include whether the criminal defendant arrived at the interrogation place

voluntarily, the length of the interrogation, any request by the defendant to see

relatives or friends, and the degree of control exercised over him. Gardner v. State,

433 S.W.3d at 98; Ervin v. State, 333 S.W.3d 187, 205 (Tex. App.—Houston [1st

Dist.] 2010, pet. ref’d). We may also examine such things as “the location of the

questioning, statements made during the interview, the presence or absence of

physical restraints during the questioning, and the release of the [defendant] at the

end of the questioning.” Howes v. Fields, 565 U.S. 499, 509, 132 S. Ct. 1181, 1189

(2012) (internal citations omitted); see also Copeland v. State, No. 06-17-00193-CR,

2018 WL 1801324, at *5 (Tex. App.—Texarkana Apr. 17, 2018, no pet.) (mem. op.,

not designated for publication).

      Simply because an interrogation begins as “noncustodial” does not preclude

custody from arising later if the conduct of law enforcement officers causes “a

consensual inquiry to escalate into [a] custodial interrogation.” Dowthitt, 931

S.W.2d at 255. A defendant bears the burden at trial of proving that his statements

were the product of a custodial interrogation. Herrera, 241 S.W.3d at 526.




                                          47
      At the suppression hearing, Detective Arnold testified that on May 12, 2015,

he and Agent Lewis interviewed appellant in a silver Dodge Durango sport utility

vehicle (“SUV”) that was parked outside of appellant’s residence. In addition to

Arnold and Lewis, Detectives Vlasek and Cox, Agent Erickson, and two uniformed

PPD law enforcement officers were present at appellant’s home that day to aid in the

serving of a search warrant on appellant. These additional individuals did not

participate in appellant’s interview. Instead, they secured the scene and searched for

electronic devices or “anything tending to show that child pornography was present”

in appellant’s home.

       Before interviewing appellant, Detective Arnold identified himself, as did

Agent Lewis, and Arnold told appellant that he was not under arrest. Although

appellant was not “in custody,” Arnold “read him his [legal] rights,” including

informing him that he had a “right to remain silent” and “anything [that] he said

c[ould] and w[ould] be used against him in a [c]ourt of law.” Arnold did not tell

appellant that he was recording their conversation. At the time of the interview,

Arnold did not know whether appellant had child pornography on any electronic

devices in his home; he only knew that “child pornography [had] c[o]me from an IP

address that returned to [appellant’s] physical [home] address.” In other words, at

the time of appellant’s interview, Arnold was “not a hundred precedent sure that




                                         48
[appellant] even possessed child pornography.” During the course of the interview,

appellant admitted to possessing child pornography.

      Following appellant’s interview, Detective Arnold and Agent Lewis walked

appellant back inside his home. They, along with Detectives Vlasek and Cox, Agent

Erickson, and the two uniformed PPD law enforcement officers, then remained at

appellant’s home “[s]till searching, identifying . . . electronic evidence,” and

“triaging th[at] evidence,” in order to “eliminate” those electronic devices in

appellant’s home that did not contain child pornography. As the officers searched

his home, appellant, following his interview, sat in “a common area” of the home

with a uniformed PPD officer. According to Arnold, however, that officer was “not

sitting on top of [appellant]”54 and he was free to leave the home. In fact, the law

enforcement officer sat with appellant for safety purposes only, specifically to

prevent appellant from “run[ning] around the house,” “access[ing] . . . weapons,” or

“interfer[ing] with the piles of electronic evidence that [were] being processed by

the forensic analysts.” After officers completed their search of appellant’s home and

seized certain electronic devices, they left appellant at his home. Appellant was not




54
      The other uniformed PPD officer stood at the front door of appellant’s home “to
      prevent people coming back into the house once they [had] le[ft].”

                                         49
arrested that day, and at no point, during the entirety of the time that law enforcement

officers were at his home, was appellant ever placed in handcuffs.55

      Appellant testified that on May 12, 2015, law enforcement officers arrived at

his residence “early in the morning” to search his home pursuant to a search warrant.

Appellant spoke with Detective Arnold that day, although he did not know, at the

time, that Arnold was recording his interview.            Appellant’s interview lasted

thirty-five to forty minutes, he was “read . . . [his] rights” prior to the interview, and

he chose to speak to Arnold. Appellant was not threatened or coerced into speaking

with Arnold, but he felt intimated. During the interview, appellant informed law

enforcement officers that there were firearms in his home.

      After his interview, appellant did not feel that he could leave his home because

a law enforcement officer sat next to him by the pool table in his house and he was

told “to sit there . . . and not to move.” However, only one officer stayed with

appellant, while the other officers searched the home. None of the law enforcement

officers told appellant that he could leave, but appellant received water when




55
      Appellant’s audio-recorded interview further reveals that at the end of the interview,
      Detective Arnold told appellant that he could go back inside of his house, sit
      downstairs, “relax,” and “hang out” while law enforcement officers finished looking
      at his electronic devices. Arnold also told appellant that officers would likely take
      some of his electronic devices “back [to] the station” so that he did not have to
      “spend the entire day” with officers in his home. Law enforcement officers
      permitted appellant to watch television, did not arrest him on May 12, 2015, and left
      his home at the conclusion of their search.
                                            50
requested. And although he never asked to use the restroom, he knew that he could

do so. Appellant believed that he was under arrest. However, he was not placed in

handcuffs, and he was not told that he “under arrest” that day. (Internal quotations

omitted.)

      The question we must determine in regard to custody is whether, under the

circumstances, an objectively reasonable person would believe that his freedom of

movement was restrained to the degree associated with a formal arrest. Dowthitt,

931 S.W.2d at 254; Wilson v. State, 442 S.W.3d 779, 784 (Tex. App.—Fort Worth

2014, pet. ref’d). Initially, we note that appellant’s subjective belief that he was

“under arrest” is irrelevant. See Bartlett v. State, 249 S.W.3d 658, 669 (Tex. App.—

Austin 2008, pet. ref’d); Hernandez v. State, No. 01-13-00245-CR, 2014 WL

3607849, at *9 (Tex. App.—Houston [1st Dist.] July 22, 2014, no pet.) (mem. op.,

not designated for publication). Further, here, after law enforcement officers arrived

at him home to execute a search warrant, appellant voluntarily agreed to speak with

Detective Arnold and Agent Lewis.

      The interview, which lasted approximately thirty-four minutes, took place in

a silver Dodge Durango SUV that was parked outside of appellant’s residence with

only Detective Arnold and Agent Lewis present. Cf. Ervin, 333 S.W.3d at 208

(“[T]he four hour period of time at the police station does not constitute a length of

time that would cause a reasonable person to believe she was in custody . . . .”); see


                                         51
also Copeland, 2018 WL 1801324, at *6 (facts tending to show interrogation

noncustodial included short length of interview). Appellant was never placed in

handcuffs or restrained in any way before, after, or during his interview, and Arnold

told appellant that he was not being arrested. See Taylor v. State, 509 S.W.3d 468,

481 (Tex. App.—Austin 2015, pet. ref’d) (defendant not in custody where he

voluntarily agreed to interview and told not being arrested); Ervin, 333 S.W.3d at

211 (defendant not in custody where she voluntarily gave statements to law

enforcement officers and remained unhandcuffed throughout statements); Gardner,

433 S.W.3d at 99 (defendant not in custody when he willingly accompanied law

enforcement officers to patrol car and never handcuffed). The entire interview was

conducted in a non-confrontational manner, and appellant was not pressured or

coerced into speaking with Arnold and Lewis. See Copeland, 2018 WL 1801324, at

*6 (facts tending to show interrogation noncustodial included “only one law

enforcement officer present during the questioning,” interview conducted in

“non-confrontational tone,” and officer “did not pressure or coerce confession” from

defendant).

      Although appellant was not offered water or access to the restroom during the

interview, he also did not request either. See id. (facts tending to show interrogation

noncustodial included defendant making no requests to leave room for any reason);

State v. Perez, No. 14-16-00690-CR, 2017 WL 5505855, at *7 (Tex. App.—Houston


                                          52
14th Dist.] Nov. 16, 2017, no pet.) (mem. op., not designated for publication)

(considering defendant “did not ask for food or drink”); Gardner, 433 S.W.3d at 99

(defendant did not ask to use telephone and officers did not refuse to allow defendant

to use telephone). Upon reentering his home after his interview, appellant requested

water, which he received. And appellant admitted that he knew that he would be

permitted to use the restroom if he had needed to do so. See Colvin v. State, 467

S.W.3d 647, 658–59 (Tex. App.—Texarkana 2015, pet. ref’d) (defendant not denied

food, water, or other facilities tended to show interrogation noncustodial); Johnson

v. State, 299 S.W.3d 491, 495 (Tex. App.—Tyler 2009, no pet.) (defendant’s

“requests for water and breaks were heeded”).

      Further, prior to his interview, Detective Arnold was “not a hundred percent

sure that [appellant] even possessed child pornography.” See Nickerson v. State, 478

S.W.3d 744, 754–55 (Tex. App.—Houston [1st Dist.] 2015, no pet.) (defendant not

in custody where he voluntarily agreed to give statement, treated fairly, and officers

not certain he committed offense prior to interview). And although appellant

admitted to possessing child pornography during the course of his interview, this is

not dispositive of the custody determination. See Trejos v. State, 243 S.W.3d 30,

46–47 (Tex. App.—Houston [1st Dist.] 2007, pet. ref’d) (defendant not in custody

although he “admitted . . . his role in [complainant’s] death,” officer considered him

to be suspect, and his statements made during interview provided sufficient probable


                                         53
cause to arrest him); Garcia v. State, 106 S.W.3d 854, 858–59 (Tex. App.—Houston

[1st Dist.] 2003, pet. ref’d) (defendant not in custody, despite statements giving

officers probable cause to arrest him).

      Following appellant’s interview, he was walked back inside his home. See

Taylor, 509 S.W.3d at 481 (defendant not in custody where not arrested and left at

conclusion of interview); Ervin, 333 S.W.3d at 211 (defendant not in custody where

she returned home after making statement). And Detective Arnold told appellant

that he could sit downstairs, “relax,” and “hang out” while officers finished

examining his electronic devices. Because, at the time, law enforcement officers

were still searching the home and collecting evidence, appellant sat in “a common

area” of the home with a uniformed PPD officer for safety purposes and to avoid any

interference with the officers’ search. See Gardner, 433 S.W.3d at 99 (defendant

not in custody although “officers escorted [him] to avoid any interference with the

officers executing the search warrant”); cf. Turner v. State, 252 S.W.3d 571, 580

(Tex. App.—Houston [14th Dist.] 2008, pet. ref’d) (placing defendant in handcuffs

for officer safety purposes did not mean in custody). Appellant had, after all,

informed law enforcement officers that he had firearms in his home.

      According to Detective Arnold, appellant, at all times, was free to leave.

Arnold informed appellant that law enforcement officers would likely seize some

the electronic devices found in the home so that appellant did not have to “spend the


                                          54
entire day” with officers. Officers permitted appellant to watch television while they

searched the home, did not arrest appellant on May 12, 2015, and left appellant at

his home at the conclusion of their search.         See Gardner, 433 S.W.3d at 99

(“[O]fficers left [defendant’s] home after executing the warrant and did not arrest

[defendant] until several weeks later . . . . This fact weighs heavily in favor of

finding that [defendant] was not in custody [at the time of his interview].”).

      Having examined the totality of the circumstances, we conclude that there is

nothing in the record to suggest a restraint of appellant’s freedom of movement of

the degree associated with a formal arrest. Accordingly, we hold that the trial court

did not err in denying appellant’s motion to suppress his statement.

      We overrule appellant’s first issue.

                                     Conclusion

      We affirm the judgments of the trial court.




                                                Terry Jennings
                                                Justice

Panel consists of Justices Jennings, Higley, and Massengale.

Massengale, J., concurring solely in the judgment.

Do not publish. TEX. R. APP. P. 47.2(b).



                                           55
