                 REPORTED

  IN THE COURT OF SPECIAL APPEALS

              OF MARYLAND

                   No. 962

            September Term, 2016

______________________________________


               JOHN R. FONE

                      v.

          STATE OF MARYLAND

______________________________________

      Eyler, Deborah S.,
      Arthur,
      Wilner, Alan M.
           (Senior Judge, Specially Assigned),
                    JJ.
______________________________________

      Opinion by Eyler, Deborah S., J.
______________________________________

      Filed: June 6, 2017
       A jury in the Circuit Court for Montgomery County convicted John R. Fone, the

appellant, of ten counts of distribution of child pornography. The court sentenced him to

five years for each count, with the sentences to run concurrently, and suspended the

sentences in favor of a five-year term of supervised probation.

       The appellant presents four questions for review, which we have condensed and

rephrased as three:

       I. Did the circuit court err by denying his motion to suppress from
       evidence pornographic images of children seized in a search of his laptop
       computer in his townhouse?

       II. Did the trial court err or abuse its discretion by permitting the State’s
       expert witness to opine about certain activity on the appellant’s laptop
       computer immediately before and after pornographic images of children
       were shared?

       III. Was the evidence legally sufficient to support the appellant’s
       convictions?

For the following reasons, we shall affirm the judgments of the circuit court.

                            FACTS AND PROCEEDINGS

       The Child Exploitation Unit (“CEU”) operates within the Special Victims

Investigations Division (“SVID”) of the Montgomery County Police Department

(“MCPD”). On January 2, 2015, the CEU received information from the National Center

for Missing and Exploited Children (“NCMEC”) that an image of child pornography had

been attached to an email on a gmail account with the address CaptainJRF@gmail.com,

accessed from an Internet Protocol (“IP”) address in Germantown. The NCMEC had

received that information from Google, which operates gmail.
      MCPD Detective Louvenna Pallas, who was working in the CEU, investigated the

information and on March 18, 2015, applied for and obtained a search warrant for the

appellant’s townhouse in Germantown. That same day, she and MCPD Detective Robert

Onorio went to the townhouse to execute that search warrant. They knocked on the door

and the appellant answered. They asked if they could come inside and speak to him, and

he consented.

      The detectives sat down with the appellant at his dining room table and talked to

him for over an hour. With the appellant’s consent, Detective Pallas audio recorded their

conversation. The appellant told them he was married with two adult children, neither of

whom lived at home. His wife had been diagnosed with Alzheimer’s disease six years

earlier, and he was her primary caregiver.       She was upstairs sleeping during the

interview.

      Detectives Pallas and Onorio asked the appellant if he had a gmail account; he

replied that he did. He identified his email address as “CaptainJRF6969@gmail.com.”

They asked if he had any other email accounts, such as an account with an address of

CaptainJRF@gmail.com. He replied that he “might have had that.”1

      The detectives inquired about the appellant’s internet usage. He acknowledged

having pornography on his computer but denied having any “inappropriate images of

children.” He primarily used a Gateway laptop computer (“laptop”), which he kept in the


      1
          The appellant later confirmed that he had used that email address. He also
identified two other email accounts he used: NudistJohn6969@yahoo.com and
CaptJRF6969@verizon.net.


                                           -2-
basement of the townhouse. He said he spent a couple of hours each day in online

chatrooms and also spent time on Yahoo! Messenger, which is an instant messaging

program. He had an account with Flickr, an online photo storage site, under the name

“NudistJohn6969.”

       Detective Onorio asked the appellant whether they could search his laptop and he

agreed. Detective Onorio accompanied the appellant to the basement of the townhouse to

retrieve the laptop.   While the interview continued, Detective Onorio inspected the

contents of the laptop. He received permission from the appellant to run a computer

program to scan the laptop for child pornography. That program did not work, however,

so Detective Onorio carried out a manual search of the laptop. The appellant told the

detectives he engaged in “fantasy chats” on the laptop about sexual activity with children.

He denied ever having exchanged any child pornography images or videos. He said that

on one occasion the previous year a “guy” had sent him two images that he had looked at

for “about 10 seconds” and then deleted. One image depicted an infant and the other

image depicted “a child in pain.”

       The appellant said he “d[id] it all” in caring for his wife. His sister had taken care

of his wife “once,” when he was out of town, but that time he had “left [his wife] at [his]

sister’s house.” His son lived in Seattle. A “good friend” who lived in Phoenix also had

taken care of his wife for him.

       Detective Onorio located images of what the CEU calls “child erotica” on the

laptop. “Child erotica” are images of children in “sexually exploitative positions and

dress” that do not meet the definition of child pornography. He asked the appellant if it


                                            -3-
was “fair to say [he had] a sexual attraction to children in a fan[tasy] component?” The

appellant replied, “Not to children, well yeah.” Detective Onorio inquired about the

appellant’s “age of attraction,” noting that his internet searches suggested he was

attracted to children from infancy through their teenage years. The appellant replied,

“Yeah.” He claimed there was no chance that he had child pornography on his laptop,

however.

        As he continued his manual search of the laptop, Detective Onorio located an

image he believed to be child pornography. At that point, he stopped the interview and

advised the appellant that the detectives had a search warrant for his house.         The

detectives seized the laptop and an external hard drive for it that was in the basement

where the laptop had been. They also seized a computer tower for a desktop computer

that was in the master bedroom. The appellant was not placed under arrest at that time.

        Detective Onorio made copies of the hard drives from the devices seized at the

appellant’s townhouse and provided the copies to the MCPD Electronic Crimes Unit

(“ECU”). Detective William Heverly, with the ECU, analyzed the digital copies. From

the appellant’s laptop, he located ten images of child pornography and numerous internet

searches, websites visited, and chat sessions that were associated with child pornography.

The ten images had been sent by the appellant to an unknown third party on August 24,

2014.

        On September 24, 2015, the appellant was arrested and charged with ten counts of

possession of child pornography and ten counts of distribution of child pornography. He

later filed a pre-trial motion to suppress the evidence seized from his townhouse.


                                            -4-
       On April 8, 2016, the court held a suppression hearing. Among other things, the

appellant argued that the search warrant was issued based upon information that was stale

and therefore did not give rise to probable cause. The court denied the suppression

motion, rejecting the staleness argument and ruling, in the alternative, that even if

probable cause was lacking the detectives relied upon the warrant in good faith. The

appellant filed a motion for reconsideration, which was denied.

       Before trial, the State entered a nolle prosequi on the possession counts.

       A four day jury trial commenced on May 2, 2016. The State called Detective

Pallas, Detective Onorio, and Detective Heverly, who was accepted as an expert in digital

forensic analysis. The audio recording of the appellant’s March 18, 2015 interview with

the police was played for the jury, with minor redactions.

       Detective Heverly testified that there were two user accounts associated with the

appellant’s laptop: one under the name “John” and one under the appellant’s wife’s name.

The appellant’s wife’s account was password protected and had been accessed just 7

times, with the last access in January 2013. The “John” account was not password

protected and had been accessed 2,937 times. The ten images of child pornography that

formed the basis for the charges had been accessed from the “John” account on the laptop

and sent to an unknown third party via Yahoo! Messenger on August 24, 2014, between

3:41 p.m. and 3:47 p.m.

       Detective Heverly determined that fifteen minutes before that six-minute Yahoo!

Messenger session, a user of the “John” account had accessed the Flickr account the

appellant    identified    as    his   during     the    police    interview        and   the


                                            -5-
CaptainJRF6969@gmail.com gmail account, which the appellant also had identified as

his. Five minutes after the end of the Yahoo! Messenger session, a user of the “John”

account had accessed that same gmail account. A user of the “John” account also had

accessed a particular chatroom before and after the Yahoo! Messenger session. Detective

Heverly further testified that the external hard drive seized from the appellant’s

townhouse had been plugged into the laptop before and after the Yahoo! Messenger

session and images from it had been accessed.

       In his case, the appellant presented his own digital forensic analysis expert, Patrick

Siewart, who testified that it was possible that a user other than the appellant had

uploaded and sent the ten child pornography images. He further testified that laptops are

portable, and therefore the images in question could have been sent when the appellant’s

laptop was outside of Montgomery County or outside of Maryland. He suggested that the

MCPD should have subpoenaed the IP address logs for the appellant’s internet service

provider (“ISP”) for August 24, 2014, to determine whether the laptop was connected to

the internet at the appellant’s townhouse on that date.

       The appellant’s motion for judgment of acquittal at the close of all the evidence

was denied.

       After conviction and sentencing, the appellant noted a timely appeal. We shall

include additional facts in our discussion of the issues.

                                       DISCUSSION

                                              I.

                            Denial of the Motion to Suppress


                                             -6-
       In his pre-trial motion to suppress the evidence the police seized from his

townhouse, the appellant argued that the warrant was lacking in probable cause for

several reasons, including, as pertinent here, that the affidavit in support of the warrant

application “fail[ed] to state the date of the events relied upon to show probable cause . . .

[making it impossible] to determine the remoteness in time between the facts observed

and the issuance of the warrant, rendering the probable cause stale.” In other words, the

appellant maintained that because the warrant application did not disclose when the

image of child pornography was attached to the CaptainJRF@gmail.com account, that

event was not shown to be close enough in time to the date of the warrant application not

to be stale.2

       At the suppression hearing, the warrant application was introduced into evidence

by joint stipulation. No testimony or other evidence was introduced.

       The warrant application was sworn out by Detective Pallas on March 18, 2015,

and the warrant was issued and executed that same day. In the affidavit, Detective Pallas

detailed her experience, identified the location to be searched, listed the items to be

seized, and averred:

              On 01-02-15, the [NCMEC] cyber tipline received a complaint from
       Google that an image containing child pornography was attached to the
       Google email address, captainjrf@gmail.com which may or may not have
       been sent. (Cybertip #3384307)
              The following is a description of the attached image:
                     1. Jpeg image titled: 39601_15

       2
         It appears that the image of child pornography that Google reported to the
NCMEC on January 2, 2015, is not one of the ten images of child pornography the
appellant later was charged with possessing and distributing on August 24, 2014.


                                             -7-
                      This image depicts an adult female performing fellatio on a
                      male toddler’s penis.
               Your affiant through her training, knowledge, and experience
       identified the above described image as being child pornography.
               Google provided an IP address, date, and time of the suspected
       uploaded image. A preservation letter was also sent to Google, Inc. to
       preserve the account information pending warrant service.

Detective Pallas further attested that, using the IP address, she determined that the

computer associated with the image was located in Germantown and used a Verizon

internet account. She obtained Verizon subscriber information for that account, which

was registered to the appellant at an address in Germantown.            A Department of

Assessments and Taxation search revealed that the address was a townhouse owned by

the appellant and his wife.     A criminal history background check showed that the

appellant had been arrested and charged with public masturbation in Jacksonville,

Florida, in 1986.

       Detective Pallas further averred in the warrant application that, based on her

training and experience, “[s]ubjects who view or collect child pornography value their

collections and often go to great lengths to organize and protect their collections

including concealing the images on computer media.”            Moreover, “when subjects

possessing child pornography conceal or delete it to avoid detection . . . it is possible to

recover files and data from computer media in hidden areas or after it has been deleted.”

       Before the suppression court, the appellant argued that the information contained

within the four corners of the warrant was stale, and therefore the warrant was not




                                            -8-
supported by probable cause.3      The State responded that staleness was not an issue

because, unlike drug evidence that is likely to “dissipate” because the drugs will be

“used,” child pornography stored on a digital device is a “collector’s item.”

Alternatively, the State argued that even if the information in the warrant was stale, the

evidence seized should not be excluded because Detectives Pallas and Onorio had relied

upon the warrant in good faith.

      In rejecting the staleness argument, the suppression court, quoting United States v.

Seiver, 692 F.3d 774, 777 (7th Cir. 2012), stated that it was persuaded that staleness “‘is

highly relevant to the legality of a search for a perishable or consumable object like

cocaine but rarely relevant when it is a computer file.’” The court emphasized that

computer files, even if deleted, can be recovered. The court also found that Detective

Pallas’s averments in the warrant affidavit, based upon her 14 years of experience as an

SVID detective, about “the habits and propensities of those who view or collect child

pornography,” further supported the view that it is likely that a computer image of child

pornography will be saved (or will be recoverable even if deleted).

      The court reasoned that given all of the above, the “issue of when did this

possession occur . . . doesn’t matter much because it is still on the computer until

destroyed and that there are ways to get these images back or to recover these images


      3
        This was not the appellant’s primary argument. His primary argument, which he
does not raise on appeal, was that the warrant was not supported by probable cause
because the tip from Google was inadmissible hearsay, was uncorroborated, and was
unreliable. Defense counsel did not touch on the staleness argument until he was given
an opportunity for rebuttal.


                                            -9-
even if they have been deleted twice by a person who has access to the computer.”

Moreover, the court pointed out, federal law requires ISPs, including Google, to report

suspected child pornography to the NCMEC “as soon as reasonably possible.” See 18

U.S.C. § 2258A(a)(1). Thus, it reasonably could “assume that the existence of the picture

[was] fairly recent in time,” relative to the date of the tip (January 2, 2015).

       Alternatively, the court ruled that even if the warrant was lacking in probable

cause because it was based on stale information, Detectives Pallas and Onorio acted in

good faith in executing it, under United States v. Leon, 468 U.S. 897 (1984). The court

opined that there was “nothing so glaring about this search warrant that would suggest to

a well-trained officer that he [or she] could not rely on that warrant particularly since it

[was] linked to [the appellant]’s address and computer very well.”             Moreover, the

“description of the contraband [was] clear and d[idn’t] leave anything subject to

interpretation” and the source of the tip was Google, which did “have some degree of

reliability.”

       The appellant filed a motion for reconsideration addressing only the issue of

staleness, which the State opposed.4 On the first day of trial, the court heard argument on

that motion and denied it.

       Before this Court, the appellant contends the suppression court erred by “ruling

that the evidence contained within the search warrant affidavit was not stale.” He relies

upon numerous federal cases on staleness of probable cause that hold that information

       4
         The appellant’s motion does not appear in the record, but the State’s opposition
to it does.


                                             -10-
leading police to believe that child pornography is present on a computer can become

stale over time; that each case must be considered on its unique facts; and that a period of

more than a year is often too remote. The appellant argues that because the warrant

affidavit established only that one image of suspected child pornography was attached to

an email on an unknown date before January 2, 2015, and there were no facts showing

that Detective Pallas took any additional investigative steps to determine when that image

was uploaded, the court could not assess whether the length of time was too remote. He

maintains, moreover, that Detectives Pallas and Onorio could not “claim objective good

faith when they relied upon a search warrant that was so lacking in probable cause.”

       The State responds that the warrant application in this case was not the type of

conclusory, bare-bones application that falls outside the broad protections of Leon, and

the suppression court correctly ruled that the detectives relied upon the warrant in good

faith. The State maintains that because the good faith ruling was correct, this Court need

not address the staleness issue; and if we do, the issuing judge had a substantial basis to

believe that probable cause supporting the warrant was not stale, and therefore child

pornography would be found at the appellant’s townhouse.

       We shall address staleness and good faith.

                                            -a-

       Our standard of review when considering a facial challenge to a search warrant is

well-established:

       We determine first whether the issuing judge had a substantial basis to
       conclude that the warrant was supported by probable cause. State v.
       Amerman, 84 Md. App. 461, 463–64, 581 A.2d 19, 20 (1990). We do so not


                                           -11-
       by applying a de novo standard of review, but rather a deferential one. The
       task of the issuing judge is to reach a practical and common-sense decision,
       given all of the circumstances set forth in the affidavit, as to whether there
       exists a fair probability that contraband or evidence of a crime will be found
       in a particular search. Illinois v. Gates, 462 U.S. 213, 238–39, 103 S.Ct.
       2317, 2332, 76 L.Ed.2d 527, 548 (1983). The duty of a reviewing court is
       to ensure that the issuing judge had a “substantial basis for . . . conclud[ing]
       that probable cause existed.” Id. (Quotation and citations omitted);
       Birchead v. State, 317 Md. 691, 701, 566 A.2d 488, 492–93 (1989); Potts v.
       State, 300 Md. 567, 572, 479 A.2d 1335, 1338 (1984) (Quotation and
       citation omitted). The U.S. Supreme Court explained in Gates that the
       purpose of this standard of review is to encourage the police to submit to
       the warrant process. Gates, 462 U.S. at 237 n.10, 103 S.Ct. at 2331 n.10, 76
       L.Ed.2d at 547 n.10.

Greenstreet v. State, 392 Md. 652, 667–68 (2006).

       “One of the factors in the ‘probable cause puzzle’ concerns the staleness of the

information contained in an affidavit supporting a search warrant application.” Behrel v.

State, 151 Md. App. 64, 88 (2003) (quoting West v. State, 137 Md. App. 314, 327–28

(2001)). “There is no ‘bright-line’ rule for determining the ‘staleness’ of probable cause;

rather, it depends upon the circumstances of each case, as related in the affidavit for the

warrant.” Connelly v. State, 322 Md. 719, 733 (1991). In making that assessment, the

court considers whether “the ‘event[s] or circumstance[s] constituting probable cause,

occurred at . . . [a] time . . . so remote from the date of the affidavit as to render it

improbable that the alleged violation of law authorizing the search was extant at the

time[.]’” Patterson v. State, 401 Md. 76, 92 (2007) (quoting Peterson v. State, 281 Md.

304, 314 (1977)). That assessment turns on the particular facts of the case:

       The ultimate criterion in determining the degree of evaporation of probable
       cause, however, is not case law but reason. The likelihood that the evidence
       sought is still in place is a function not simply of watch and calendar but of
       variables that do not punch a clock: the character of the crime (chance


                                            -12-
      encounter in the night or regenerating conspiracy?), of the criminal
      (nomadic or entrenched?), of the thing to be seized (perishable and easily
      transferable or of enduring utility to its holder?), of the place to be
      searched (mere criminal forum of convenience or secure operational base?),
      etc. The observation of a half smoked marijuana cigarette in an ashtray at a
      cocktail party may well be stale the day after the cleaning lady has been in;
      the observation of the burial of a corpse in a cellar may well not be stale
      three decades later. The hare and the tortoise do not disappear at the same
      rate of speed.

Andresen v. State, 24 Md. App. 128, 172 (1975) (emphasis added).

      Several federal courts addressing staleness of probable cause in the context of

child pornography stored on digital devices have reasoned that because digital images

have a “potentially infinite lifespan,” United States v. Elbe, 774 F.3d 885, 891 (6th Cir.

2014), cert. denied, 135 S.Ct. 1573 (2015), “‘the passage of time alone’ cannot

demonstrate staleness.” United States v. Burkhart, 602 F.3d 1202, 1206 (10th Cir. 2010)

(quoting United States v. Mathis, 357 F.3d 1200, 1207 (10th Cir. 2004)). In Seiver, 692

F. 3d at 775–76, for example, the Seventh Circuit held that a seven-month delay from the

date that child pornography images were downloaded from the internet to the defendant’s

computer to the date a search warrant for the defendant’s computer was applied for did

not render the information stale. The court opined:

      “Staleness” is highly relevant to the legality of a search for a perishable or
      consumable object, like cocaine, but rarely relevant when it is a computer
      file. Computers and computer equipment are “not the type of evidence that
      rapidly dissipates or degrades.” United States v. Vosburgh, 602 F.3d 512,
      529 (3d Cir. 2010). Because of overwriting, it is possible that the deleted
      file will no longer be recoverable from the computer’s hard drive. And it is
      also possible that the computer will have been sold or physically destroyed.
      And the longer the interval between the uploading of the material sought as
      evidence and the search of the computer, the greater these possibilities. But
      rarely will they be so probable as to destroy probable cause to believe that a
      search of the computer will turn up the evidence sought; for probable cause


                                          -13-
       is far short of certainty—it “requires only a probability or substantial
       chance of criminal activity, not an actual showing of such activity,” Illinois
       v. Gates, 462 U.S. 213, 244 n. 13, 103 S.Ct. 2317, 76 L.Ed.2d 527 (1983),
       and not a probability that exceeds 50 percent (“more likely than not”),
       either. Hanson v. Dane County, 608 F.3d 335, 338 (7th Cir. 2010).

Id. at 777 (emphasis in original).

       The Seiver court recognized that

       after a very long time, the likelihood that the defendant still has [a
       particular] computer, and if he does that the file hasn’t been overwritten, or
       if he’s sold it that the current owner can be identified, drops to a level at
       which probable cause to search the suspect’s home for the computer can no
       longer be established.

Id. (emphasis in original). Seven months was far too short a period of time for that to

occur, however. See also United States v. Carroll, 750 F.3d 700, 704-05 (7th Cir. 2014)

(five-year gap between date victim alleged she was molested by defendant, at which time

he showed her images of child pornography and took digital images of her genitals, and

date of warrant application was not so remote as to render probable cause to search the

defendant’s home and seize cameras and other digital devices stale); Burkhart, 602 F.3d

at 1206-07 (information pertaining to an email between child pornography distributor and

the defendant two years and four months before issuance of a search warrant not stale);

United States v. Morales-Aldahondo, 524 F.3d 115, 119 (1st Cir. 2008) (lapse of three

years between the defendant’s purchase of digital child pornography images and warrant

application did not render search warrant stale); but see United States v. Greathouse, 297

F.Supp. 2d 1264, 1272-73 (D. Ore. 2003) (information that child pornography was

distributed from a computer f: drive 13 months before a search warrant was applied for

was stale, so search warrant was not supported by probable cause).


                                           -14-
       In the case at bar, the March 18, 2015 warrant application showed that Google

made its disclosure to the NCMEC about ten weeks earlier, on January 2, 2015. NCMEC

then reported the information from Google to the MCPD, which engaged in the

investigation set forth in the affidavit. Google gave the information to NCMEC pursuant

to a federal statute mandating ISPs to notify the NCMEC of suspected child pornography

“as soon as reasonably possible.” We agree with the suppression court that, given that

statutory mandate, the judge to whom the warrant application was presented rationally

could infer that the image of suspected child pornography was attached to an email on a

day reasonably close in time to January 2, 2015, and certainly within a few years. In this

case, in which the lapse between the report from Google and the issuance of the search

warrant was only three months and the lapse between the emails of August 24 and the

warrant was only seven months, Detective Pallas’s averments about the habits of

possessors of child pornography and the ability of the police “to recover files and data

from computer media [even] after it has been deleted” gave rise to a substantial basis for

the issuing judge’s probable cause determination. See Behrel, 151 Md. App. at 90 (“In

analyzing the issue of staleness, ‘the expertise and experience of the officer are to be

taken into account in applying the Fourth Amendment probable cause test,’ even if ‘the

officer would not qualify as an expert witness on the subject.’” (quoting 2 LaFave, §

3.2(c), at 38–39, 38 n.70)).




                                          -15-
                                               -b-

         If we agreed with the appellant that the information in the warrant application was

stale, which we do not, we nevertheless would agree with the suppression court that the

good faith exception applied.

         Evidence seized without a warrant or based upon a warrant not supported by

probable cause may be subject to exclusion. See, e.g., Agurs v. State, 415 Md. 62, 76

(2010). Unlike a warrantless search, however, “searches pursuant to a warrant will rarely

require any deep inquiry into reasonableness, for a warrant issued by a magistrate

normally suffices to establish that a law enforcement officer has acted in good faith in

conducting the search.”       Leon, 468 U.S. at 922 (citations omitted). Thus, “[i]n the

absence of an allegation that the magistrate abandoned his detached and neutral role,

suppression is appropriate only if the officers were dishonest or reckless in preparing

their affidavit or could not have harbored an objectively reasonable belief in the

existence of probable cause.” Id. at 926 (emphasis added).

         The Leon Court outlined four scenarios in which the good faith exception will not

apply:

         (1) the magistrate was misled by information in an affidavit that the officer
         knew was false or would have known was false except for the officer's
         reckless regard for the truth;
         (2) the magistrate wholly abandoned his detached and neutral judicial role;
         (3) the warrant was based on an affidavit that was so lacking in probable
         cause as to render official belief in its existence entirely unreasonable; and
         (4) the warrant was so facially deficient, by failing to particularize the place
         to be searched or the things to be seized, that the executing officers cannot
         reasonabl[y] presume it to be valid.

Id. at 923. The appellant relies only upon the third scenario.


                                              -16-
       Where, as here, the facts are not in dispute, we review the suppression court’s

ruling on “the applicability of the Leon good faith exception to the exclusionary rule . . .

de novo[.]” Patterson, 401 Md. at 104–05. In assessing whether the warrant application

was “so lacking in probable cause as to render official belief in its existence entirely

unreasonable,” Leon, 468 U.S. at 923, we apply an objective test to determine whether

“officers, exercising professional judgment, could have reasonably believed that the

averments of their affidavit related a present and continuing violation of law, not remote

from the date of their affidavit, and that the evidence sought would be likely found at [the

place identified in the affidavit].”    Connelly, 322 Md. at 735.       As this Court has

explained, that reasonable belief test will not be satisfied when the warrant application

contains “nothing beyond mere conclusions.” State v. Jenkins, 178 Md. App. 156, 203

(2008).

       In the case at bar, the warrant application was not conclusory or bare bones. It

gave the date and the substance of the Google tip to the NCMEC; the nature of the

pornographic image uploaded; the investigation into the IP address associated with the

upload; the means to establish that the appellant lived at that address; the types of devices

that might be used to store child pornography; expert information about the habits of

collectors of child pornography; and expert information about forensic techniques to

recover deleted computer files. Although the date the image was attached to the email

was not included, the date Google informed the NCMEC about the image, which was just

over three months before the warrant application, supported a reasonable belief that

someone at the appellant’s townhouse had engaged in a violation of the law (possession


                                            -17-
of child pornography) within months of the warrant application and, in light of the other

averments, that evidence of that possession could be found on a device located at that

address, even if it had since been deleted.

                                              II.

                               State’s Expert’s Testimony

       As circumstantial proof of the appellant’s criminal agency, the State presented

evidence, through Detective Heverly, that 1) the appellant’s gmail account and his Flickr

account were accessed from his laptop within 15 minutes before the six minute Yahoo!

Messenger session in which the ten images of child pornography were distributed by

means of that laptop; 2) his gmail account also was accessed from that laptop within five

minutes after that session; 3) pornographic images of adult males were accessed by the

appellant’s laptop from his external hard drive soon before and after the critical Yahoo!

Messenger session; and 4) the “Silver Daddy” chatroom was accessed from the

appellant’s laptop soon before and after the Yahoo! Messenger session. The last two

categories of evidence were relevant because the appellant told the police in his interview

that he was bisexual, had had two long-term sexual relations with men over the past

several decades, and viewed adult gay pornography and participated in gay sexual

chatrooms such as “Silver Daddy.”

       The appellant contends the State violated Rule 4-263(d), governing mandatory

discovery disclosures by the State in a criminal case, by not disclosing the specific

information about the gmail and Flickr account access, and consequently the court erred




                                              -18-
by not excluding Detective Heverly’s testimony in that regard. (The appellant does not

raise any issue about the evidence on the external hard drive.)

       The State responds that this issue is not preserved for review and, in any event, the

court did not err or abuse its discretion by permitting Detective Heverly to testify about

the account activity on the laptop soon before and after the incriminating Yahoo!

Messenger session.

       On March 30, 2016, the State sent a letter to defense counsel stating that it

intended to call Detective Heverly as an expert witness in “digital forensic examination”;

that he would testify that his examination of the laptop revealed that the “contraband

charged in counts 1-10 was distributed via Yahoo! Messenger on August 24, 2014”; and

that he would “further testify that his examination revealed that both prior-to and after the

distribution of the contraband charged in counts 1-10, the user [of the laptop] accessed

images files and video files of pornography, specifically pornography depicting adult

men engaged in various sexual activities with each other.”

       Before trial, the State provided the defense a summary of the Internet Evidence

Finding report (“IEF”) that Detective Heverly prepared after he examined the copies of

the hard drives for the appellant’s laptop and other devices. The State could not provide

the full IEF report to the defense because it contained prohibited images that could not be

shared. The full IEF report included the information about the gmail and Flickr accounts

used immediately before and after the Yahoo! Messenger session. The State made open

file discovery available, so the defense had access to the full IEF report. And, as part of

open file discovery, the State made the copies of the hard drives that were searched by


                                            -19-
Detective Heverly and were the subject of his IEF report available for inspection by the

defense expert. Indeed, the defense expert inspected them, twice, performing his own

forensic examination and preparing his own IEF report.

      At the outset of the proceedings on May 5, 2016, which was the third day of trial

and the day Detective Heverly was expected to testify, the prosecutor advised the court

that he planned to use a demonstrative exhibit titled “Timeline analysis for August 24,

2014” (“Exhibit 11”) that showed laptop user access of the Flickr account and the gmail

account in the periods shortly before and after the Yahoo! Messenger session. The

prosecutor explained that Detective Heverly’s testimony about user access before and

after the Yahoo! Messenger session would be “circumstantial evidence of who was using

the laptop at the time of the distribution [of child pornography].”       The prosecutor

maintained that the information in Exhibit 11 had been disclosed to defense counsel in

the March 30, 2016 expert disclosure.

      Defense counsel responded that the prosecutor had not disclosed that the State

intended to present evidence that a user of the laptop accessed the Flickr account or the

gmail account, only that a user of the laptop had viewed pornography involving adult gay

men. The prosecutor disagreed, taking the position that the expert disclosure was

sufficient and, in any event, because the defense expert had been given full access to the

copy of the hard drive for the laptop, the defense could not claim unfair surprise about

any information on the laptop.

      The court denied the motion in limine, ruling that Detective Heverly could testify

about the user access as shown on Exhibit 11. Defense counsel “note[d] [his] objection


                                          -20-
to the expert testifying as to the usage of the computer shortly prior to and subsequent

thereto because that was not something that was provided [in discovery].” He did not

seek a continuing objection.

       Detective Heverly was called as the second witness that day. He was accepted as

an expert in digital forensic analysis by stipulation. After he testified generally about his

analysis of the laptop hard drive, the Yahoo! Messenger program, and the ten images of

child pornography sent via Yahoo! Messenger over six minutes on August 24, 2014, the

prosecutor approached the stand and showed him Exhibit 11 to refresh his recollection

about the start time (3:41 p.m.) and end time (3:47 p.m.) of that Yahoo! Messenger

session. Defense counsel did not object to any of this line of inquiry.

       Later in Detective Heverly’s direct examination, the prosecutor asked: “And how

do you go about trying to identify the person who is sitting at the computer? The user.”

Detective Heverly responded that he tries to “find data and artifacts that will kind of help

us determine who that person was.” He gave as an example a user who works on his

resume, then engages in “illegal activity,” and then goes back to working on his resume.

He explained, “So we[] look for activity before and after.” He was asked if he had

“attempt[ed] to ascertain anything that was going on on [the laptop] that the user was

accessing at the time, 3:41 [p.m.] to 3:47 [p.m.] on August 24th of 2014?” He responded

that he had “specifically searched for activity right around that date to see what was

going on.” He did not find any other user activity during the Yahoo! Messenger session,

but he did find user activity just before and after that session. He then testified about the

gmail and Flickr accounts access as reflected on Exhibit 11. These questions all were


                                            -21-
asked, and Detective Heverly’s answers all were given, without any objection or motion

to strike.

       When Detective Heverly was asked whether he was able to determine that a user

had accessed the external hard drive seized from the appellant’s basement around the

time of the Yahoo! Messenger session, defense counsel objected and a bench conference

was held. The prosecutor explained that Detective Heverly was going to testify that

images were accessed from an external hard drive plugged into the laptop immediately

before and again immediately after the 6 minute Yahoo! Messenger session. Defense

counsel argued that the March 30, 2016 expert disclosure letter did not reveal that the

State’s expert would testify that the external hard drive had been accessed at those times.

The court disagreed and overruled the objection.

       The prosecutor then resumed questioning Detective Heverly about the access of

the external hard drive. The questioning spans more than two pages of the transcript.

Defense counsel did not lodge any further objections.

       The prosecutor subsequently sought to introduce Exhibit 11 into evidence. The

court denied that request, ruling that it was a demonstrative exhibit that had not been

disclosed to defense counsel in a timely manner.

       We agree with the State that the issue the appellant raises on appeal—whether the

trial court erred by allowing Detective Heverly to testify about the laptop user accessing

his gmail and Flickr accounts close in time to the Yahoo! Messenger session in which the

child pornography images were distributed—is not preserved for review. “It is well-

established that a party opposing the admission of evidence ‘shall object’ at the time the


                                           -22-
evidence is offered or as soon thereafter as the grounds for objection become apparent.

Wimbish v. State 201 Md. App. 239, 260–61 (2011) (quoting Md. Rule 4-323(a))

(additional citations omitted).   If not, the objection is waived and the issue is not

preserved for review. Id. at 261. Also, “to preserve an objection, a party must either

‘object each time a question concerning the [matter is] posed or . . . request a continuing

objection to the entire line of questioning.’” Id. (quoting Brown v. State, 90 Md. App.

220, 225 (1992)). “Th[is] requirement of a contemporaneous objection at trial applies

even when the party contesting the evidence has made his or her objection known in a

motion in limine[.]” Id.

       Here, the appellant did not object to any of the long line of questions that elicited

the evidence he complains about on appeal. His only objection was to the admission of

Detective Heverly’s testimony about the images of pornography on the external hard

drive, which is not the evidence being challenged on appeal. Moreover, we disagree with

the appellant’s argument in his reply belief that there was sufficient temporal proximity

between the trial court’s denial of the motion in limine and the direct examination of

Detective Heverly that the failure to make a contemporaneous objection should be

excused. Detective Heverly’s testimony was preceded by the cross-examination and

redirect examination of Detective Onorio. See, e.g., Hickman v. State, 76 Md. App. 111,

117-18 (1988) (“temporal closeness” exception to the contemporaneous objection rule

applies only when the court rules (or reiterates a prior ruling) immediately prior to the

objectionable testimony being elicited or evidence being offered). Also, at the close of




                                           -23-
the motion in limine, the appellant could have requested a continuing objection but did

not.

       In any event, we would not find merit in this issue even if it were preserved for

review. Rule 4-263(d) governs mandatory discovery disclosures by the State.              At

subsection (d)(8), “Reports or Statements of Experts,” it requires the State to disclose, in

pertinent part, “[a]s to each expert consulted by the State’s Attorney . . . the expert’s

name and address, the subject matter of the consultation, the substance of the expert’s

findings and opinions, and a summary of the grounds for each opinion.” Also, the State

is required to provide the defense “the opportunity to inspect and copy all written reports

or statements made in connection with the action by the expert, including the results of

any physical or mental examination, scientific test, experiment, or comparison.” Id.

       The March 30, 2016 disclosure by the State was non-specific, but referred to video

images and files accessed by the laptop user before and after the Yahoo! Messenger

session in which the images of child pornography were distributed. The details were

contained in the full IEF report prepared by Detective Heverly.

       As noted, the State could not give that report to the defense as it contained

prohibited images, so the State gave the defense a summary and the opportunity for the

defense to have its own expert review the full IEF report in person. The dispute during

the motion in limine argument was over whether the State in fact did so. Defense counsel

asserted that the State did not; the prosecutor asserted that the State did. The court found

that the State had provided the report, and we cannot say that that finding was clearly

erroneous. Moreover, there was no dispute that the defense expert in fact examined the


                                           -24-
hard drive copy for the laptop more than once and that the State offered to have Detective

Heverly review it with him. On this record, the court did not err or abuse its discretion in

denying the motion in limine.

                                            III.

                                Sufficiency of the Evidence

       Finally, the appellant contends the evidence was legally insufficient to sustain his

convictions for distribution of child pornography for two reasons. First, the State failed

to establish that he was the person using the laptop when the 10 images were sent via the

Yahoo! Messenger program. Second, the State failed to prove territorial jurisdiction, i.e.,

that the criminal conduct occurred in Maryland.

       The State responds that it presented ample circumstantial evidence from which

jurors reasonably could infer that the appellant was the user of the laptop when the

images of child pornography were accessed and transmitted and that he was at his home

in Maryland at the time of the charged conduct. We agree with the State.

       As this Court has explained:

       “The standard for appellate review of evidentiary sufficiency is whether,
       after viewing the evidence in the light most favorable to the prosecution,
       any rational trier of fact could have found the essential elements of the
       crime beyond a reasonable doubt.” State v. Smith, 374 Md. 527, 533, 823
       A.2d 664 (2003) (citations omitted). “Weighing the credibility of witnesses
       and resolving any conflicts in the evidence are tasks proper for the fact
       finder.” State v. Stanley, 351 Md. 733, 750, 720 A.2d 323 (1998). In
       addition, we give “‘due regard to the [fact finder’s] finding of facts, its
       resolution of conflicting evidence, and, significantly, its opportunity to
       observe and assess the credibility of witnesses.’” Moye v. State, 369 Md. 2,
       12, 796 A.2d 821 (2002) (quoting McDonald v. State, 347 Md. 452, 474,
       701 A.2d 675 (1997) (quoting State v. Albrecht, 336 Md. 475, 478, 649
       A.2d 336 (1994))).


                                           -25-
Larocca v. State, 164 Md. App. 460, 471-72 (2005) (en banc).

       The appellant relies upon several federal cases holding that evidence was legally

insufficient to prove criminal agency vis-à-vis charges of possession of child

pornography when someone other than the defendant had access to the digital device and

was not excluded as the user. See United States v. Lowe, 795 F.3d 519, 523-24 (6th Cir.

2015) (evidence insufficient to prove criminal agency when the defendant, his wife, and

his “adoptive son” had access to the laptop and were not excluded as possible users);

United States v. Moreland, 665 F.3d 137, 151-52 (5th Cir. 2011) (evidence insufficient to

prove criminal agency when child pornography was found on a computer in the home

shared by the defendant, his wife, and his father, and there was evidence that the

defendant’s father frequently used the computer late at night while the defendant and his

wife slept).

       In the case at bar, in contrast, the evidence viewed in the light most favorable to

the State did not reveal any actual or even potential alternative users. The appellant lived

in a townhouse with his wife, who was suffering from Alzheimer’s disease.               The

appellant’s wife had been diagnosed around 2009, more than four years before the

Yahoo! Messenger session. The appellant admitted to the police that the laptop in his

basement belonged to him and that he spent several hours every day using it there. In his

police interview, the appellant did not claim that anyone else had used his laptop or even

that anyone else frequented his townhouse, either to visit or help care for his wife. He

openly informed the police about his bisexuality and that his current partner, of eight



                                           -26-
years, lived in Atlanta and never came to his house to visit. 5 He acknowledged having

several gmail accounts (and provided the addresses); having a Flickr account (and

provided his user name); visiting the Silver Daddy chatroom (and provided his user

name); and using Yahoo! Messenger.

       The appellant further admitted that he was sexually attracted to children; that he

engaged in fantasy chats about sexual activity with children; and that he frequently

viewed pornography, including images of adult men engaging in sex acts, on his laptop.

       The evidence pertinent to April 24, 2014, the date of the distribution, showed that

a user of the appellant’s laptop accessed a gmail account belonging to the appellant and a

Flickr account belonging to the appellant about 15 minutes before the 10 images were

sent via Yahoo! Messenger. Within two minutes of the end of that session, a user of the

appellant’s laptop again accessed those same two accounts. A user of the appellant’s

laptop also accessed an external hard drive kept in the appellant’s basement before and

after the Yahoo! Messenger session, accessing images depicting adult males engaged in

sexual acts. This plainly was evidence from which reasonable jurors could infer that the

appellant was the person using the laptop before, during, and after the Yahoo! Messenger

session.

       The evidence also was legally sufficient to prove that the criminal conduct took

place in Maryland. Detective Heverly testified that he had detected “artifacts” on the

laptop showing that it had been connected to the internet in the appellant’s townhouse ten

       5
        The appellant’s family members knew he was bisexual and knew his partner, but
he had promised his wife he would not bring his partner to their home.


                                          -27-
days before the subject images were distributed. As noted, the appellant told police that

he used his laptop in his basement and that he had had to “give up all”

his activities after his wife became ill, sometime around 2009. There also was evidence

that the laptop was connected to an external hard drive on August 24, 2014, both before

and after the Yahoo! Messenger session. This was evidence from which a reasonable

juror could infer that the laptop was located in the appellant’s home in Maryland, where

he stored his laptop and the external hard drive, at the time of the Yahoo! Messenger

session.

                                                 JUDGMENTS AFFIRMED. COSTS
                                                 TO BE PAID BY THE APPELLANT.




                                          -28-
