PEOPLE OF MI V LEONARD PAUL PATTERSON
Annotate this Case
Download PDF
STATE OF MICHIGAN
COURT OF APPEALS
PEOPLE OF THE STATE OF MICHIGAN,
UNPUBLISHED
April 1, 2008
Plaintiff-Appellee,
v
No. 273937
Calhoun Circuit Court
LC No. 06-001126-FH
LEONARD PAUL PATTERSON,
Defendant-Appellant.
Before: Saad, C.J., and Murphy and Donofrio, JJ.
PER CURIAM.
Defendant appeals as of right from his conviction for possession of child sexually abusive
material, MCL 750.145c(4). Because trial counsel was constitutionally ineffective, and because
there was a reasonable probability that, but for counsel’s unprofessional errors, the result would
have been different, we reverse and remand for a new trial.
This case initially stems from a police investigation of a complaint waged against
defendant that he had stalked an ex-girlfriend. Deputy Wes Cuatt was a part of a team that
executed a warrant to search defendant’s residence on August 31, 2006. Cuatt has expertise in
computers, which was needed during the search so that property would not be damaged and
evidence purportedly on a computer in the home would not be lost. Police located an old
computer that operated with a dial-up modem in a small room and two hard drives. The
computer was powered on even though no one was home and had no brand name or serial
number. Police seized the computer and Deputy Cuatt eventually subjected both hard drives to
certain forensic programs on December 21, 2006. One of the hard drives had a large amount of
adult pornography on it. The same hard drive had four pictures of young girls who were
obviously under the age of eighteen. The hard drives also contained photographs of defendant,
family members, and friends, as well as e-mail to and from defendant.
Defendant was charged and the matter went to jury trial. The trial was relatively short
and the prosecution only called two witnesses: Deputy Cuatt, and Dr. Steven R. Guertin, a
physician. Deputy Cuatt testified regarding the investigation and the four illegal images among
31,739 images found on defendant’s computer. Dr. Guertin’s testimony concerned the apparent
ages of the girls in the pictures, which he estimated to be between eight and twelve years old.
Specifically, in testimony about the illegal photographs, Deputy Cuatt said that two were
found in the computer’s temporary internet file. Both images would have to have been seen on
-1-
the monitor screen at some time. They might have come from any number of sources—the
internet, a floppy disc, e-mail, or a peripheral drive. The other two pictures at issue came from
an MPEG file icon on the monitor screen desktop. The same hard drive that had the four illegal
images also had 31,735 other images on it. On cross-examination, defense counsel asked Deputy
Cuatt about the MPEG icon and a file under that icon titled “teenpink.” He testified:
Q [by defense counsel]: Okay. So this is coming off the hard drive?
A [by Deputy Cuatt]: Right.
Q:
Okay. So this is coming off the hard drive?
A:
Right.
Q:
All right. All right. That’s where I wanted to get.
A:
I’m sorry.
Q:
Okay. No. That’s ok, trust me. Your knowledge is way as far advance
[sic] than mine and everything. Now, as far as with the People’s 2 and 3
that was taken off of the hard drive and everything, any indication how
long it has been—it had been there?
A:
That I’ve written down there, no. On the CD, for each one of the pictures
out of all of them that I have tagged, there’s a complete description, one
where it’s located, it’s size, it’ll have the creation date, it also has the last,
what’s called, access date. I don’t have it printed off on the hard copy.
That would be on that CD.
Q:
Okay. So there is a way of determining as far as when it was first placed
on the hard drive and the last time it was accessed, is that correct?
A:
Right. Creation date would not necessarily [sic] the creation of the
picture. I mean the creation of the picture on that hard drive.
On further cross-examination, Deputy Cuatt admitted not knowing who had put the
illegal photos on the computer’s hard drive. The room from which the computer was seized was
not locked. Deputy Cuatt did not know if the computer was password-protected and stated that,
if the computer was operated in a “standby” mode, someone could access it without a password.
Deputy Cuatt insisted that someone had to have purposefully downloaded two of the
photographs, but admitted there was no way to tell exactly how these unlawful images got onto
the computer because he did not investigate whether anyone else might have had access to it.
Deputy Cuatt also acknowledged that the two “thumbnail” photos might have come from “popups” and might not have been seen by any person operating the computer.
During trial, the trial court allowed jurors to submit questions for Deputy Cuatt. The trial
court posed the jury’s questions as follows:
-2-
THE COURT: All right. Officer, several of the jurors have questions.
I’ll try and go through them so as not to be repetitive because some of them are
duplicates. But, do you know whether the keyboard or the computer was checked
for fingerprints?
WITNESS: No.
THE COURT: All right. Do you know whether anybody lives with the
Defendant?
WITNESS: I do not know. I was not the one that interviewed him or
anything. I never talked with him, so I couldn’t answer that.
THE COURT: And so you don’t know how many people reside in the
home, if more than one?
WITNESS: I don’t know for sure, no.
Deputy Cuatt further testified that it might have been possible, but difficult and “highly
unlikely,” for someone to “hack” into defendant’s computer. In response to a question by the
court whether someone else could have put the illegal images on the computer without the
knowledge of the computer’s owner, Deputy Cuatt responded, “It could be possible.” But the
deputy noted that the MPEG icon would appear on the computer desktop and opined that, if he or
any reasonable person saw an icon on the desktop that he did not put there, he would check it out
to see what it contained and why it was there.
Following the testimony, both the prosecutor and defense gave closing arguments. In his
closing remarks to the jury, the prosecutor emphasized that the defense had made no offer of
proof about who, beside defendant, had access to the computer. In part, the prosecutor states as
follows:
You can consider things that are evidence in this case. And the only evidence has
come from two witnesses and four photographs. It’s come from Dr. Guertin, it’s
come from Deputy Cuatt. It came from the 4 photographs that were admitted as
exhibits in this case. There isn’t any other evidence in this case. That means that
all of the ventures that we have taken down kind of side roads and little back trails
with the defense saying, well, maybe it was somebody else, could have been
somebody else, might have been somebody else, possibly somebody else, maybe
the Defendant didn’t know, possibly the Defendant know [sic], could it be that the
Defendant didn’t know really means absolutely nothing because there isn’t any
evidence here, at all, to tell any of you that anybody other than the Defendant had
control of this computer, entered those images onto that computer. Because the
Judge is going to tell you, as he gives you the instructions and you have sworn to
follow those instructions, that this is not a guessing game, it’s not a game of
speculation. It’s not where somewhere you [sic] can sit around and kind of
theorize and say, yeah, but maybe someone else did this. Now, I know the
defense is going to tell you, you know, look, we don’t have to do anything. It’s
not our burden to do anything. This is the Prosecutor’s job. It’s the Prosecutor’s
-3-
burden to present you with the evidence. However, when the defense poses a
theory to you, the defense truly has an obligation to give you something to
support that theory. This is not just a, hey, look, there was [sic] gunmen on the
grassy know [sic: knoll] that shot Kennedy, okay. Gee, now, there we have it, it’s
now solved. This is not a “guess what, someone else might have done it”, we
don’t have to show you who did it, we don’t have to give you any evidence as to
who did it, we can just kind of throw out this blind theory and speculation and tell
you someone could have done it. Now, you’re supposed to believe what the
defense is saying and you’re supposed to then find that that’s reasonable doubt.
Well, it doesn’t work that way. Again, this is evidence. It’s based on evidence.
You can only consider evidence and if there is no evidence that someone else
entered or put these pictures on the hard drive of that computer, then no one else
did.
Well, where else do you get this information then? If it’s not the
Defendant saying, hey, guess what, this other person, or these other people, had
access to my computer, used my computer, did things on my computer, then
where does the information come from? You already know from the instructions
that the Defendant need not testify. Then where does the information come from?
How did the police investigate to kind of, again, rebut these kind of blind theories,
groundless theories, that the defense throws out about other people entering
information and pictures and images and things onto the Defendant’s computer, if
we don’t have that information to investigate? It’s easy to take and, again, throw
out kind of reckless speculation and say, ha, ha, the Prosecutor didn’t prove to
you that no one else did this. There. There’s your reasonable doubt. What the
defense doesn’t want to tell you is that without the proper information, there is no
way to answer that question.
In his summation to the jury, defense counsel emphasized that Deputy Cuatt admitted it
was possible that someone else put the photos on defendant’s computer and that the pictures
might have been on the computer without defendant’s knowledge. He also reminded the jurors
that Deputy Cuatt had been asked about the origin of the illegal photographs and asserted that it
could not be known whether defendant ever saw the illegal pictures.
After receiving instructions from the court, the jury deliberated about two hours before
returning a guilty verdict. The trial court sentenced defendant to three months in jail, four years
of probation, and ordered him to pay a fine and costs. Defendant was also required to register as
a convicted sex offender. Defendant sought to appeal his conviction and sentence.
Appellate counsel moved in the trial court for a Ginther1 hearing or new trial, alleging
that defendant’s trial counsel was ineffective and that there was insufficient evidence to prove
that defendant was guilty beyond a reasonable doubt. A hearing was held on June 7, 2007 where
defendant and his trial counsel were the only witnesses. Defendant testified that he had sent trial
1
People v Ginther, 390 Mich 436; 212 NW2d 922 (1973).
-4-
counsel a list of witnesses he wanted called at trial. According to defendant, several witnesses
would have testified that he did not live alone and that a number of people, who either lived with
him or assisted him because of his physical limitations, had access to the computer. Defendant
also testified that some of those people were no longer friends and they had a reason sabotage his
computer. Defendant complained that he was “baffled” by his trial counsel’s decision not to call
any of the witnesses or, at a minimum, question them before trial.
Trial counsel acknowledged defendant sent him two letters listing prospective witnesses
and the court admitted both letters into evidence. When defendant’s appellate counsel
questioned his trial counsel about the prosecutor’s case, the following exchange occurred:
Q [by defendant’s appellate counsel] And wasn’t part of it the fact that the
Prosecutor’s case—wasn’t part of the Prosecutor’s case the fact that
[defendant] was the only person that really had access to that computer in
his home, as he lived alone and that was his personal computer?
A [by trial counsel]
time.
At that time I believe [defendant] was living alone at that
Q Okay. And do you think that it would have been helpful to explain to the
jury that there were many other people that lived in that place, and that had
access to the computer and had actually used the computer?
A If I’m not mistaken, during the testimony it came out that he had a son who
visited frequently, that there were individuals who helped [defendant]
during the day. It came out during the testimony, if I’m correct, that the
computer was not in [defendant’s] room; it—the computer was not locked
up. Anyone there at—visiting or staying overnight would have had access
as far as to the computer.
Trial counsel said he was concerned about who else might have had access to the
computer, but defendant never told him directly about who did have access. When asked why he
decided not to call witnesses despite his concern about who else had access to the computer, trial
counsel replied that he told defendant that the witnesses would have to be subpoenaed and would
probably assert their 5th Amendment rights against self-incrimination. In response to questions
from the court, trial counsel admitted receiving both witness lists weeks before the trial but that
he did not contact anyone on the lists or investigate further. In his closing remarks at the Ginther
hearing, the prosecutor stated:
[Defendant’s trial counsel] did exactly what he should have done. He
acted effectively on behalf of his client. He did everything in this particular case
that he could have done, and I will state this as the attorney of record for the
prosecution; I think that there was certainly a degree of disbelief on everyone’s
part when the jury came back and said guilty.
The trial court entered an opinion and order denying relief. The court found that trial counsel
employed a proper trial strategy in not calling witnesses, even though he never contacted any of
the dozen or more witnesses offered by defendant.
-5-
On appeal, defendant argues that his trial attorney was constitutionally ineffective
because counsel conducted no pretrial investigation and sought no assistance of an expert versed
in computer science.2 Assertions of ineffective counsel are mixed issues of fact and law. Fact
issues are reviewed for clear error. People v LeBlanc, 465 Mich 575, 579; 640 NW2d 246
(2002). Constitutional claims based on provisions of the Sixth Amendment are reviewed de
novo. People v Grant, 470 Mich 477, 485; 684 NW2d 686 (2004).
The benchmark in evaluating a claim that trial counsel was ineffective is whether
counsel’s conduct so undermined the proper functioning of the adversarial process that the trial
cannot be relied on as having produced a just result. Strickland v Washington, 466 US 668, 686;
104 S Ct 2052; 80 L Ed 2d 674 (1984); People v Pickens, 446 Mich 298, 337-338; 521 NW2d
797 (1994). To prevail on a claim that trial counsel was constitutionally ineffective, the
defendant must meet two tests: First, the defendant must show that counsel’s performance was
deficient. This requires a showing that counsel made errors so serious that he was not
functioning as the “counsel” guaranteed by the Sixth Amendment. Second, the defendant must
show prejudice from the poor performance of counsel. This requires proof that counsel’s errors
were so serious as to deprive the defendant of a fair trial, i.e., a trial whose result is reliable.
Strickland, supra at 687.
While counsel’s conduct is presumed effective and reviewing courts are required to give
heavy deference to the strategic decisions of trial counsel, counsel’s clear duty to investigate
remains “reasonableness under prevailing professional norms.” Strickland, supra at 688-689. A
decision by counsel not to investigate prior to trial must be directly assessed for reasonableness
in all the circumstances. Rompilla v Beard, 545 US 374, 381; 125 S Ct 2456; 162 L Ed 2d 360
(2005); Wiggins v Smith, 539 US 510, 533; 123 S Ct 2527; 156 L Ed 2d 471 (2003); Strickland,
supra at 691.
In Rompilla, supra at 387, and Wiggins, supra at 527-528, the United States Supreme
Court emphasized that a lawyer has a duty to investigate thoroughly prior to making a strategic
choice. Moreover, each decision made the point that Strickland’s cryptic reference to
“prevailing professional norms” is now a constitutional imperative incorporating the American
Bar Association Standards for Criminal Justice. Rompilla, supra at 375, and Wiggins, supra at
524. The standard relating to the duty of counsel to investigate provides in pertinent part:
Defense counsel should conduct a prompt investigation of the
circumstances of the case and explore all avenues leading to facts relevant to the
merits of the case and the penalty in the event of conviction. The investigation
should include efforts to secure information in the possession of the prosecution
and law enforcement authorities. The duty to investigate exists regardless of the
accused’s admissions or statements to defense counsel of facts constituting guilt
2
No evidence was presented at the Ginther hearing to support appellate counsel’s claim that trial
counsel was ineffective for failing to present testimony from a computer expert. Without any
record evidence regarding what an expert might have offered, we cannot conclude that trial
counsel was ineffective on this ground. Thus, our analysis focuses only on counsel’s failure to
conduct a pretrial investigation of potential witnesses.
-6-
or the accused’s stated desire to plead guilty. [ABA Standards for Criminal
Justice, Defense Function, Part IV, Investigation and Preparation, 4-4.1(a).]
The relevant portion of the Commentary to Standard 4-4.1 provides:
Facts form the basis of effective representation. Effective representation
consists of much more than the advocate’s courtroom function per se. Indeed,
adequate investigation may avert the need for courtroom confrontation.
Considerable ingenuity may be required to locate persons who observed the
criminal act or have information concerning it. After they are located, their
cooperation must be secured. It may be necessary to approach a witness several
times to raise new questions stemming from facts learned from others.
*
*
*
The effectiveness of advocacy is not measured solely by what the lawyer does at
trial; without careful preparation, the lawyer cannot fulfill the advocate’s role.
Failure to make adequate pretrial preparation and investigation may also be
grounds for finding ineffective assistance of counsel.
Appellate review of trial counsel’s conduct of pretrial investigation must consider not
only the quantum of evidence already known to counsel, but also whether the known evidence
would lead a reasonable lawyer to investigate further. Rompilla, supra at 391; Wiggins, supra at
527. Strickland’s teaching is not that every cursory investigation justifies all subsequent tactical
choices. Indeed, Strickland itself makes the point that “strategic choices made after less than
complete investigation are reasonable precisely to the extent that reasonable professional
judgments support the limitations on investigation.” Strickland, supra at 690-691.
Our review of the testimony at the Ginther hearing reveals that trial counsel knew weeks
before the trial that many others had access to the computer containing the illegal pictures yet
failed to investigate or produce these individuals as defense witnesses. On these facts alone, we
conclude that counsel’s conduct fell far below an objective standard of reasonableness. See
Grant, supra at 486, 498 (the Court concluded that defense counsel’s failure to investigate
whether the minor victim’s injuries were the result of the alleged sexual assault or an earlier
bicycle accident was an abdication of counsel’s duty to investigate, independent of any trial
“strategy”).
We also conclude that defendant was prejudiced because there was a reasonable
probability that, but for counsel’s unprofessional errors, the result would have been different. A
reasonable probability is a probability sufficient to undermine our confidence in the outcome.
Strickland, supra at 694; Grant, supra at 496. Testimony that others were present in defendant’s
home and had access to the computer would have created a reasonable probability that the result
would have been different, especially considering that even the trial prosecutor was somewhat
surprised by the jury’s finding of guilt. The trial prosecutor’s comment at the conclusion of the
Ginther hearing is especially telling in light of Strickland’s admonishment that a part of the
effective assistance of counsel equation turns on the quantum and quality of proofs adduced at
trial:
-7-
In making this determination, a court hearing an ineffectiveness claim
must consider the totality of the evidence before the judge or jury. Some of the
factual findings will have been unaffected by the errors, and factual findings that
were affected will have been affected in different ways. Some errors will have
had a pervasive effect on the inferences to be drawn from the evidence, altering
the entire evidentiary picture, and some will have an isolated, trivial effect.
Moreover, a verdict or conclusion only weakly supported by the record is more
likely to have been affected by errors than one with overwhelming record support.
[Strickland, supra at 695-696.]
Considering the totality of the circumstances, the evidence supporting defendant’s
conviction was weak. Counsel’s failure to investigate telling circumstantial evidence that clearly
would have countered the prosecutor’s theory of the case undermines our confidence in the
outcome. We disagree with the trial court’s finding at the Ginther hearing that no evidence had
been presented about what the witnesses on the witness lists might have testified. The record
displays that defendant testified at length about the number of people who lived with him and
took care of him. The witness lists even indicated who was a “roommate.” Even a small amount
of investigation would have shown who lived with defendant and the time periods involved.
Given that the prosecutor’s case rested entirely on the premise that defendant was the only
person who could have put the illegal images on the computer, and where defendant’s trial
counsel thought defendant lived alone, counsel’s failure to investigate the witness list was
ineffective and extremely prejudicial. This is especially true considering the questions posed by
the jury about defendant’s living arrangements, and the prosecutor’s emphasis during closing
argument that defendant had failed to offer any evidence countering the prosecution’s proofs.
Counsel’s erroneous belief that he had to somehow prove others actually entered the
illegal pictures onto the computer hard drive and that, if they were called as witnesses, they
would invoke their constitutional protections against self-incrimination, directly contributed to
his decision not to question them at all. “Constitutionally effective counsel must develop trial
strategy in the true sense-not what bears a false label of “strategy”--based on what investigation
reveals witnesses will actually testify to, not based on what counsel guesses they might say in the
absence of a full investigation.” Ramonez v Berghuis, 490 F3d 482, 489 (CA 6, 2007); see also
Towns v Smith, 395 F3d 251, 258 (CA 6, 2005).
Defendant also claims that there was insufficient evidence to sustain a conviction for
possession of child sexually abusive material, MCL 750.145c(4). We review sufficiency claims
de novo, in a light most favorable to the prosecution, to determine whether any rational trier of
fact could have found that the essential elements of the crime charged were proved beyond a
reasonable doubt. People v Wolfe, 440 Mich 508, 515; 489 NW2d 748, amended 441 Mich 1201
(1992). It is for the trier of fact, and not this Court, to determine what inferences may fairly be
drawn from the evidence and to determine the weight to be accorded to those inferences. People
v Hardiman, 466 Mich 417, 428; 646 NW2d 158 (2002).
MCL 750.145c(4) requires that the prosecutor show that the defendant “knowingly
possessed” child sexually abusive material on his computer. The prosecutor must show more
than the presence of child sexually abusive material in a temporary internet file or in a computer
recycle bin to prove that the defendant “knowingly possessed” child pornography. People v
Girard, 269 Mich App 15, 20; 709 NW2d 229 (2005).
-8-
The proofs at defendant’s trial showed that two photos were in a marked folder, entitled
“teenpink.” These two photos were thus part of the photo library contained on the computer.
The testimony of Dr. Guertin, if accepted, proves the pictures to be of children. The existence of
the pictures in a folder on a hard drive owned by defendant and maintained in defendant’s home
together with other images is evidence of defendant’s possession. The circumstantial evidence
created by defense counsel’s failure to show other users of the computer--regardless of any
denial that those users placed and kept the photos--infers defendant’s placement and keeping of
the photos. In sum, after reviewing the evidence adduced in this trial without a defense, we
conclude that the evidence was sufficient to support defendant’s conviction when viewed in the
light most favorable to the prosecution.
Reversed and remanded for a new trial. We do not retain jurisdiction.
/s/ Henry William Saad
/s/ Pat M. Donofrio
-9-
Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.