                                                                  FILED BY CLERK
                                                                    MAR 30 2010
                                                                      COURT OF APPEALS
                                                                        DIVISION TWO
                           IN THE COURT OF APPEALS
                               STATE OF ARIZONA
                                 DIVISION TWO

THE STATE OF ARIZONA,                       )
                                            )       2 CA-CR 2009-0090
                                Appellee,   )       DEPARTMENT A
                                            )
                   v.                       )       OPINION
                                            )
PAUL DAVID WINDSOR, JR.,                    )
                                            )
                               Appellant.   )
                                            )


           APPEAL FROM THE SUPERIOR COURT OF PIMA COUNTY

                               Cause No. CR-20073224

                         Honorable Hector E. Campoy, Judge

                                    AFFIRMED


Terry Goddard, Arizona Attorney General
 By Kent E. Cattani and Diane Leigh Hunt                                    Tucson
                                                             Attorneys for Appellee

Robert J. Hirsh, Pima County Public Defender
 By David J. Euchner                                                         Tucson
                                                             Attorneys for Appellant


E S P I N O S A, Presiding Judge.
¶1           This case raises the novel issue whether downloading images from a remote

source through the Internet constitutes “duplicating,” as opposed to “receiving,” these

images for purposes of Arizona‟s sexual exploitation of children statutes. After a jury

trial, Paul Windsor was convicted of five counts of sexual exploitation of a minor in

violation of A.R.S. § 13-3553(A)(1).     He was sentenced to mitigated, consecutive

sentences totaling fifty years‟ imprisonment. On appeal, Windsor contends the evidence

was insufficient to support his convictions. For the following reasons, we disagree and

affirm the convictions and sentences.

                           Factual and Procedural History

¶2           We view the facts in the light most favorable to sustaining the jury‟s

verdicts. State v. Huffman, 222 Ariz. 416, ¶ 2, 215 P.3d 390, 392 (App. 2009). One

morning in January 2006, staff at a public computer facility located in a University of

Arizona library received more than fifty, automatically generated, virus-alert messages

from one of the facility‟s computers over the course of several minutes. After a staff

member remotely rebooted that computer, another computer began sending similar virus-

notification messages. The staff member remotely viewed its screen and saw “sexually

suggestive” pictures of children. He then rebooted the computer, “hoping that the [user]

would leave.”

¶3           When the second computer continued to send the virus-alert messages, staff

members once again remotely accessed its screen and observed that the user was opening

the images in a graphics program. A staff member called university police officers, who

                                           2
arrived and found Windsor sitting at the computer with pornographic photographs of

children on the screen.1 Subsequent forensic analysis revealed Windsor had downloaded

the images from a remote Internet site and saved them in a shared file on the computer‟s

hard drive. He was later indicted, arrested, and convicted as outlined above.

                                         Discussion

¶4            The sole issue on appeal is whether Windsor‟s conviction was supported by

sufficient evidence.2 We will not reverse a conviction unless the state has failed to

present substantial evidence of guilt. Substantial evidence is “more than a mere scintilla”

and is proof that reasonable persons could accept as convincing beyond a reasonable

doubt. State v. Nunez, 167 Ariz. 272, 278, 806 P.2d 861, 867 (1991).

¶5            The statute Windsor was convicted of violating, § 13-3553(A)(1), prohibits

“[r]ecording, filming, photographing, developing or duplicating any visual depiction in

which a minor is engaged in exploitive exhibition or other sexual conduct.” Windsor

does not dispute that the images he accessed were child pornography, but rather contends

that his downloading these images did not amount to “[r]ecording, filming,



       1
      There was trial testimony and an exhibit showing that the screen displayed
numerous photographs in a “collage” format.
       2
        Windsor does not dispute that he failed at trial to move for a judgment of
acquittal on this basis pursuant to Rule 20, Ariz. R. Crim. P., and therefore is entitled to a
review only for fundamental error. See State v. Stroud, 209 Ariz. 410, n.2, 103 P.3d 912,
914 n.2 (2005). However, a conviction not supported by substantial evidence constitutes
fundamental error. Id.; see also State v. Fernandez, 216 Ariz. 545, ¶ 32, 169 P.3d 641,
650 (App. 2007) (court will not ignore fundamental error if it finds it), cert. denied, ___
U.S. ___, 129 S. Ct. 460 (2008).
                                              3
photographing, developing, or duplicating” them.        In our recent opinion, State v.

Paredes-Solano, 223 Ariz. 284, ¶¶ 9-12, 15, 222 P.3d 900, 904-06 (App. 2009), this court

recognized that §      13-3553(A)(1), under which Windsor            was charged, and

§ 13-3553(A)(2), which prohibits “[d]istributing, transporting, exhibiting, receiving,

selling, purchasing, electronically transmitting, possessing, or exchanging,” were

intended to punish different kinds of harm. Relying on Paredes-Solano, Windsor argues

the state was required to prove he committed the distinct crime outlined in the subsection

under which he was charged.3 We agree. See Paredes-Solano, 223 Ariz. 284, ¶¶ 16-22,

222 P.3d at 906-08 (reversing conviction where duplicitous indictment did not require

unanimous verdict distinguishing between § 13-3553(A)(1) and (A)(2)).

¶6           Accordingly, the convictions cannot be sustained unless the state presented

sufficient evidence Windsor engaged in one of the activities proscribed in

§ 13-3553(A)(1). Because it is undisputed Windsor did not record, film, photograph, or

develop any image, the validity of his conviction turns on whether downloading pictures

from a remote Internet site constitutes “duplicati[on]” for the purposes of this statute.

When called upon to interpret a statute, we consider its plain language, giving meaning to

each word and phrase “„so that no part is rendered void, superfluous, contradictory or

insignificant.‟” State v. Larson, 222 Ariz. 341, ¶ 14, 214 P.3d 429, 432 (App. 2009),




      3
       Windsor appears to all but concede that, had the state charged him under
§ 13-3553(A)(2), sufficient evidence would exist to support his conviction.
                                            4
quoting Pinal Vista Props., L.L.C. v. Turnbull, 208 Ariz. 188, ¶ 10, 91 P.3d 1031, 1033

(App. 2004).

¶7             At trial, the state‟s computer expert testified that downloading involves

using the Internet to copy a file from a remote computer, a description consistent with the

way courts have construed the term. See, e.g., Metro-Goldwyn-Mayer Studios Inc. v.

Grokster, Ltd., 545 U.S. 913, 919-23 (2005) (downloaded files copied from servers or

directly from peer-to-peer network); United States v. Sullivan, 451 F.3d 884, 891 (D.C.

Cir. 2006) (“every time one user downloads an image, he simultaneously produces a

duplicate version of that image”); Salter v. State, 906 N.E.2d 212, 219 (Ind. Ct. App.

2009) (downloading picture means “saving a copy of the image”); Moore v. State, 879

A.2d 1111, 1117 (Md. 2005) (download “means to transfer or copy a file”); People v.

Hill, 715 N.W.2d 301, 304 (Mich. Ct. App. 2006) (downloaded material copied from

websites).

¶8             As Windsor points out, the word “duplicate” is not defined in the criminal

code. The general dictionary definition of that word, however, is “to make an exact copy

of.” Webster’s Ninth New Collegiate Dictionary 389 (1991); accord The American

Heritage Dictionary 430 (2d college ed. 1982) (“[t]o make an identical copy of”); see

State v. Bews, 177 Ariz. 334, 336, 868 P.2d 347, 349 (App. 1993) (“widely respected

dictionary” useful when statutory term not defined in statute and “no indication it [was]

to be given an unusual meaning”). Based solely on the plain meanings of the terms

“download” and “duplicate,” it would appear that one who downloads an image from a

                                            5
remote computer or computer server has duplicated it for the purposes of

§ 13-3553(A)(1).

¶9            Windsor disputes this construction of the statute. Citing Paredes-Solano,

he argues that because “duplicating” is used in § 13-3553(A)(1), it must refer to the

“creation or production of a new image,” and the act of downloading is more analogous

to the receipt or distribution of an existing image described in § 13-3553(A)(2) than to

the creation of a new one.4 But he does not explain how creating an electronic copy of an

image is so significantly different from making any other type of duplicate that it should

be treated differently under the law. Moreover, our generalized statement of the statute‟s

purposes in Paredes-Solano does not alter the plain language of the statute and cannot

serve to narrow its application. See State v. Peek, 219 Ariz. 182, ¶¶ 16-17, 195 P.3d 641,

643-44 (2008) (rejecting argument based on case law requiring interpretation contrary to

statute‟s plain language).

¶10           Windsor also cites Oregon and Washington statutes similar to § 13-3553(A)

and out-of-state cases in which courts upheld the convictions of defendants who had

reproduced pornographic images. It appears his intent is to show that other states do not

regard the act of downloading an image as “duplicati[on]” for the purposes of their


       4
        In his opening brief, Windsor likens downloading images to purchasing a
magazine containing pornography, arguing that a purchaser could only be guilty of
violating § 13-3553(A)(1) by taking the additional step of scanning, photocopying, or
faxing the image, “thus creating something entirely new.” But downloading images is
more analogous to purchasing materials at a store that requires a person to make his or
her own photocopy of the materials to leave with them.
                                            6
respective statutes. But none of the decisions he cites stand for this proposition or even

include discussion of this issue. State v. Dimock, 27 P.3d 1048, 1048-49 (Or. Ct. App.

2001), involved a defendant who undisputedly used electronic mail (e-mail) to transmit

pornographic images. State v. Knutson, 823 P.2d 513, 515 (Wash. Ct. App. 1991), did

not involve computers at all, but rather photographs the defendant had enlarged and

reproduced. And the defendants in State v. Betnar, 166 P.3d 554, 556 (Or. Ct. App.

2007), and People v. Hill, 715 N.W.2d 301, 304-05 (Mich. Ct. App. 2006), had

duplicated images by placing them on compact discs. That other courts have sustained

convictions for acts that would also violate our statute is not germane to Windsor‟s claim

that downloading is not duplicating.

¶11          We also reject Windsor‟s contention that interpreting the word

“duplicati[on]” in § 13-3553(A)(1) to include downloading would render superfluous the

terms “receiving,” “electronically transmitting,” and “possessing,” that appear in

§ 13-3553(A)(2). Although he does not specifically explain how these words would

become meaningless if downloading constitutes duplication, we infer that Windsor‟s
                                                             5
primary concern is the term “electronically transmitting.”       But there are a number of

ways that electronic transmission could entail acts other than downloading, such as using




      5
       One obviously could receive or possess illicit materials without having
downloaded them, such as a photograph or a video recording, and without having either
accessed them on the Internet or duplicated them.
                                            7
e-mail to send an image or broadcasting streaming video over the Internet.6 Additionally,

we are unconcerned that a defendant who downloaded an image could be found both to

possess and to have duplicated it—a possibility faced equally by anyone who knowingly

copies proscribed images in any form. Cf. State v. Cheramie, 218 Ariz. 447, ¶¶ 10-11,

189 P.3d 374, 376 (2008) (unlawful possession lesser-included offense of transporting

drugs for sale because “we cannot conceive how a person can „transport‟ drugs without

having possess[ed them]”).

¶12           We find additional support in State v. Jensen, 217 Ariz. 345, 173 P.3d 1046

(App. 2008), for our conclusion that intentionally downloading an image constitutes

something distinct from receiving, possessing, or electronically transmitting it. The issue

in Jensen was whether sufficient evidence existed to prove the defendant knowingly had

received or possessed child pornography in violation of § 13-3553(A)(2) when his

computer‟s memory cache contained automatically saved images that had been accessed

via the Internet. Id. ¶¶ 2, 4, 6. In holding the downloaded images could be evidence of

receipt, this court discussed the concept of “receiving” information through the Internet,

distinguishing that receipt from intentionally downloading a file.       Id. ¶ 18 (images

automatically stored in computer cache constituted evidence operator voluntarily


       6
        “Streaming” involves transmitting electronic data in a continuous fashion to
disseminate visual or audio content, or both, among receiving devices. See Cable Plus
Co., L.P. v. Ariz. Dep’t of Rev., 197 Ariz. 507, ¶ 13, 4 P.3d 1050, 1052-53 (App. 2000)
(describing transmission of information by streaming electronic signals); see also UMG
Recordings, Inc. v. Veoh Networks, Inc., 620 F. Supp. 2d 1081, 1085 (C.D. Cal. 2008)
(distinguishing downloading from streaming).
                                            8
received them by “intentionally accessing websites” “to have them visually appear on the

screen”).

¶13              Similarly, we determined that, by visiting websites containing child

pornography, the defendant in Jensen had taken “„something given, offered, or

transmitted‟” or had “„convert[ed] incoming electro-magnetic waves into visible or

audible signals,‟” an act similar to, but separate from, intentionally downloading files

onto his computer hard drive. Id. ¶ 13, quoting Webster’s II New Riverside University

Dictionary 981 (1994).        Implicit in this discussion is the idea that “electronic

transmission” is the broadcast of images over the Internet, which one receives by

viewing, and that these acts of transmitting and receiving are separate from actively and

intentionally making a copy by downloading and saving the images in a specific location

on a computer.7

¶14              At Windsor‟s trial, an FBI computer forensics expert testified that

downloading a file from the Internet involves copying the file to a user‟s computer hard

drive.       And Windsor did not contest that he was responsible for downloading the

recovered image files.8      Accordingly, because the state presented evidence that, by



         7
        In Jensen we did not reach the issue of whether inadvertently cached images
constituted knowing possession of child pornography. 217 Ariz. 345, ¶ 18, 173 P.3d at
1052-53. Similarly, here we need not address whether automatically cached copies of
images could constitute a knowing duplication because the evidence clearly shows
Windsor placed the images in a shared folder of the computer.
         8
       At trial, Windsor denied knowing what the files contained but did not dispute that
he had downloaded them.
                                             9
downloading these images, Windsor intentionally had copied them onto the computer, his

conviction for duplicating an exploitative visual representation of a child in violation of

§ 13-3553(A)(1) was supported by substantial evidence.

                                       Disposition

¶15           Windsor‟s convictions and sentences are affirmed.




                                             /s/ Philip G. Espinosa
                                             PHILIP G. ESPINOSA, Presiding Judge

CONCURRING:



/s/ Joseph W. Howard
JOSEPH W. HOWARD, Chief Judge




/s/ Peter J. Eckerstrom
PETER J. ECKERSTROM, Presiding Judge




                                            10
