Rubin Renfrow v. State of Mississippi
Annotate this Case
Download PDF
IN THE COURT OF APPEALS OF THE STATE OF MISSISSIPPI
NO. 2008-KA-00786-COA
RUBIN RENFROW
APPELLANT
v.
STATE OF MISSISSIPPI
DATE OF JUDGMENT:
TRIAL JUDGE:
COURT FROM WHICH APPEALED:
ATTORNEYS FOR APPELLANT:
ATTORNEY FOR APPELLEE:
DISTRICT ATTORNEY:
NATURE OF THE CASE:
TRIAL COURT DISPOSITION:
DISPOSITION:
MOTION FOR REHEARING FILED:
MANDATE ISSUED:
APPELLEE
05/02/2008
HON. ROBERT G. EVANS
SIMPSON COUNTY CIRCUIT COURT
W. TERRELL STUBBS
REEVES JONES
OFFICE OF THE ATTORNEY GENERAL
BY: DEIRDRE MCCRORY
EDDIE H. BOWEN
CRIMINAL - FELONY
CONVICTED OF POSSESSION OF CHILD
PORNOGRAPHY AND SENTENCED TO
FIFTEEN YEARS IN THE CUSTODY OF
THE MISSISSIPPI DEPARTMENT OF
CORRECTIONS
AFFIRMED - 11/10/2009
BEFORE LEE, P.J., GRIFFIS AND ROBERTS, JJ.
ROBERTS, J., FOR THE COURT:
¶1.
A jury sitting before the Simpson County Circuit Court found Rubin Renfrow guilty
of one count of possession of child pornography. The circuit court sentenced Renfrow to
fifteen years in the custody of the Mississippi Department of Corrections (MDOC).
Aggrieved, Renfrow appeals. Renfrow claims the circuit court erred when it: (1) denied his
motions to suppress the evidence that was obtained from his computer, (2) denied his motion
to suppress the evidence related to his interview at the Simpson County Sheriff’s
Department, (3) denied his motion to dismiss the indictment on the basis that Mississippi
Code Annotated section 97-5-33(5) (Supp. 2008) is impermissibly vague, (4) denied his
motion for a continuance intended to give his attorney more time to review a forensic
duplicate of his hard drive and his original hard drive, (5) denied his motion for a judgment
notwithstanding the verdict (JNOV), and (6) denied his motion for a new trial. Finding no
error, we affirm.
FACTS AND PROCEDURAL HISTORY
¶2.
The catalyst that led to Renfrow’s conviction occurred in March 2006, when a child
related to Renfrow spoke to an elementary school counselor. It is unclear what the child said
to the school counselor, but whatever the child said, the school counselor was concerned that
the child had been exposed to inappropriate matters of a sexual nature. The school counselor
relayed his concerns to the child’s father and Kim Fulgram with the Rankin County
Department of Human Services. Fulgram contacted Brian Ervin, a counselor with the Rankin
County Child Advocacy Center. On March 8, 2006, Ervin interviewed the child who spoke
to the school counselor. Ervin also interviewed the child’s sibling. The children, then ages
four and six years old, indicated that Renfrow showed them pictures that he had on his
computer.1 To paraphrase the children, Renfrow showed them pictures of naked adults and
children. The inference was that Renfrow had showed the children pictures of adult and
1
We omit the children’s names from this opinion to maintain their anonymity.
2
child pornography. The children also allegedly indicated that Renfrow had touched them
inappropriately.2
¶3.
Because the events described by the children were to have taken place in Simpson
County, Fulgram contacted the Simpson County Sheriff’s Department. On March 16, 2006,
the children’s father met with Investigator Bernard Gunter of the Simpson County Sheriff’s
Department. Investigator Gunter also watched the videotape of Erwin’s interviews of the
children. On March 21, 2006, Investigator Gunter applied for and obtained warrants to arrest
Renfrow and to search Renfrow’s home and seize his computer. That same day, Investigator
Gunter executed the warrants. Investigator Gunter went to Renfrow’s home in Simpson
County, arrested Renfrow, and seized Renfrow’s computer. Investigator Gunter delivered
Renfrow’s computer to the Mississippi Attorney General’s Cyber Crime Unit (the Cyber
Crime Center), where forensic investigators Sherita Sullivan and Keith Leavitt examined
Renfrow’s computer.
Their examinations will be discussed in greater detail below.
Succinctly stated, the investigation of Renfrow’s computer involved creating a forensic
duplicate of Renfrow’s hard drive and then examining the forensic duplicate.
¶4.
Meanwhile, Renfrow had been arrested and released from custody. However, on
March 16, 2007, Renfrow reported to the Simpson County Sheriff’s Department after
2
Those allegations will be discussed in slightly greater detail as necessary. However,
Renfrow was indicted for those allegations at the same time he was indicted for possession
of child pornography. The State nolle prossed the inappropriate touching count of the
indictment, and Renfrow has not been prosecuted for any alleged inappropriate touching of
the children. Because there is still a possibility that Renfrow may be prosecuted for those
allegations, we have avoided discussing them in any detail except as necessary. No portion
of this opinion should be construed as a finding related to those potential allegations.
3
Investigator Gunter had placed a card on the door of Renfrow’s home and requested that
Renfrow report to the Simpson County Sheriff’s Department. Investigator Gunter later
explained that he intended to serve Renfrow with a capias. However, when Renfrow
reported, he informed Investigator Gunter that he would waive his rights to remain silent and
to have an attorney present and would allow Investigator Gunter to interview him. Renfrow
executed a document waiving his rights and allowed Investigator Gunter to interview him
while Sheriff Kenneth Lewis was present. During that interview, Renfrow stated that he
knew he had pictures depicting child pornography on his computer. However, he also stated
that he obtained the pictures inadvertently. To summarize Renfrow’s version of events, he
received unsolicited e-mails that included the pictures depicting child pornography, he did
not know who sent him the pictures, and he tried to delete the pictures.
¶5.
Investigator Gunter attempted to create a videotaped recording of Renfrow’s
interview. However, after the interview had ended, Investigator Gunter discovered that he
had failed to activate a switch that would have created an audio recording of the interview.
In other words, Investigator Gunter only had a video recording of the interview. There was
no audio recording. Investigator Gunter then wrote a summary of Renfrow’s interview.
Sheriff Lewis signed Investigator Gunter’s summary and indicated that he shared Investigator
Gunter’s recollection of Renfrow’s interview.
¶6.
On October 1, 2007, the Simpson County Grand Jury returned an indictment against
Renfrow, charging him with one count of touching a child inappropriately in violation of
Mississippi Code Annotated section 97-5-23(1) (Rev. 2006). The grand jury also charged
Renfrow with one count of willful possession of child pornography. Renfrow waived
4
arraignment and pled not guilty.
¶7.
Renfrow filed numerous pretrial motions. For our purposes, only a few of those
motions are noteworthy. On February 13, 2008, Renfrow filed a motion to review the State’s
evidence. That same day, Renfrow filed a relatively generic motion to suppress practically
any evidence the State obtained from any source. On February 28, 2008, Renfrow filed a
motion for a continuance. Renfrow requested a continuance so he could review the discovery
tendered by the State. Renfrow also requested that he and his computer expert be allowed
access to the original hard drive that was removed from his computer. On March 5, 2008,
Renfrow filed an amended motion to suppress the State’s evidence. The majority of
Renfrow’s amended motion to suppress was identical to his original motion to suppress.
However, Renfrow added a claim that “[t]he State has wholly failed to protect and secure the
[evidence obtained from Renfrow’s computer], and it has been contaminated and subjected
to potential virus infection.”
¶8.
On March 7, 2008, the circuit court conducted a hearing on Renfrow’s first series of
pretrial motions. The events that transpired during the hearing on those motions will be
discussed in greater detail as necessary in the analysis of Renfrow’s issues. Suffice it to say
that the circuit court granted Renfrow’s motion for a continuance so Renfrow’s computer
expert could review a copy of Renfrow’s hard drive.
The circuit court rescheduled
Renfrow’s trial date and set Renfrow’s trial for March 27, 2008. However, the circuit court
also denied Renfrow’s motions to suppress the evidence.
¶9.
During the March 7, 2008, hearing, Renfrow moved to dismiss the indictment.
Renfrow argued that section 97-5-33(5) is impermissibly vague because it does not include
5
a mens rea component. The State pointed out that, while there is no mens rea component
listed in that statutory provision, the language in the indictment required the State to prove
that Renfrow willfully possessed child pornography. The circuit court denied Renfrow’s
motion to dismiss the indictment and noted that because the indictment contained the
allegation that Renfrow willfully possessed child pornography, the State would be obligated
to prove that portion of the allegation beyond a reasonable doubt. Finally, the circuit court
rescheduled Renfrow’s trial date.
¶10.
On March 14, 2008, the State filed a document titled “entry of nolle prosequi” and
moved that the circuit court dismiss the charge that Renfrow inappropriately touched the
children. The circuit court executed the consent portion of that document on the same day.
On March 19, 2008, Renfrow filed three new pretrial motions. Two of those motions are
pertinent to the issues on appeal. The first of those pertinent motions was Renfrow’s second
motion for a continuance. Renfrow’s March 19, 2008, motion for a continuance was based
on the fact that, although the State provided his expert with access to an exact copy of the
hard drive, the State had not given his expert access to the original hard drive. Additionally,
Renfrow filed a renewed motion to suppress the evidence. Renfrow claimed the circuit court
should suppress the evidence that Investigator Gunter obtained when he executed the search
warrant. The most significant evidence that Investigator Gunter seized was Renfrow’s
computer and all of the evidence that was obtained from his computer. Renfrow argued that
it was appropriate to suppress that evidence because the events that led to the acquisition of
the search warrant occurred nine or ten months before Investigator Gunter sought to obtain
the search warrant.
6
¶11.
On March 20, 2008, the circuit court conducted another series of hearings on
Renfrow’s motions. After some discussion, it was resolved that the State would allow
Renfrow’s expert to make her own copy of Renfrow’s original hard drive, subject to the
conditions that Renfrow’s expert make her copy at the Cyber Crime Center under the
supervision of employees of the Cyber Crime Center, who would ensure that Renfrow’s
expert maintained the evidentiary integrity of Renfrow’s original hard drive. However, the
circuit court did not grant Renfrow’s request for a continuance.
¶12.
As for Renfrow’s renewed motion to suppress the evidence obtained by the search
warrant, the circuit court found that, although the children indicated that the alleged
inappropriate touching occurred in April or May 2005, the children did not report the
allegation until late February or early March 2006. The circuit court also found that
Investigator Gunter acted on the allegations as soon as he found out about them.
Accordingly, the circuit court denied Renfrow’s renewed motion to suppress. There were
no further delays, and Renfrow went to trial as scheduled.
¶13.
The events that transpired at Renfrow’s trial will be discussed as necessary in the
analysis portion of this opinion. As previously mentioned, the jury found Renfrow guilty of
possession of child pornography. Following Renfrow’s unsuccessful post-trial motions for
a judgment notwithstanding the verdict (JNOV) or, alternatively, a new trial, the circuit court
sentenced Renfrow to fifteen years in the custody of the MDOC. Aggrieved, Renfrow
appeals. We have restructured the issues and Renfrow’s arguments to provide greater clarity,
as Renfrow’s claims require significantly more separate discussions than the six issues he
lists.
7
ANALYSIS
I.
¶14.
RENFROW’S MOTION TO DISMISS THE INDICTMENT
Count II of the indictment charged Renfrow with violating section 97-5-33(5) of
the Mississippi Code, which states that “[n]o person shall, by any means including computer,
possess any photograph, drawing, sketch, film, video tape or other visual depiction of an
actual child engaging in sexually explicit conduct.” Miss. Code Ann. § 97-5-33(5). Renfrow
moved to dismiss Count II of the indictment on the basis that section 97-5-33(5) is
unconstitutionally vague.
¶15.
The circuit court denied Renfrow’s motion and held as follows:
I agree subsection (5) of 97-5-33 does not contain the word “knowingly” or
“willfully” or anything like that. In a sense, the indictment which does contain the
word “willfully” and which has been equated numerous times, dozens, if not
hundreds, of times with knowingly in all kinds of different cases by our supreme
court. The indictment in effect puts more burden on the State than the statute
does. The State has nailed themselves down to proving that the defendant
willfully, i.e., knowingly, possessed this alleged child pornography. The statute
doesn’t say they have to do it, but the indictment does. So that’s what you’re
stuck with. So, for this case, that motion is denied.
¶16.
Renfrow claims the circuit court erred. Our supreme court has directed that, upon
review of a circuit court’s decision to deny a motion to dismiss the indictment based on a
claim that a statute is unconstitutionally vague, the appropriate test is to determine “whether
the statute defines the criminal offense with sufficient definiteness such that a person of
ordinary intelligence has fair notice of what conduct is prohibited.” Lewis v. State, 765 So.
2d 493, 499 (¶25) (Miss. 2000).
¶17.
Renfrow notes that section 97-5-33(1), (3), (6), and (7) contain a mens rea aspect,
but section 97-5-33(5) does not contain a mens rea aspect. According to Renfrow’s logic,
8
“to allow this section to stand as written, without requiring some mental element on the part
of a defendant, would be tantamount to not affording a person of ordinary intelligence, [sic]
fair notice of exactly what conduct is prohibited.” Renfrow also argues that section 97-533(5), as written, punishes people who have unintentionally or unknowingly had child
pornography placed on their computers through computer viruses or computer hackers.
¶18.
There can be no doubt that a criminal statute is not unconstitutionally vague solely
because it does not contain a mens rea element. “The Legislature may define a crime which
depends on no mental element and consists only of forbidden acts or omissions.” Roberson
v. State, 501 So. 2d 398, 401 (Miss. 1987) (quoting Wright v. State, 236 So. 2d 408, 413
(Miss. 1970)). “In that instance, the intent to do the forbidden act is the only intent necessary
to complete the offense.” Id.
¶19.
However, our decision need not turn on whether section 97-5-33(5) is
unconstitutionally vague simply because it does not contain a mens rea element. The State
charged Renfrow with willful possession of child pornography. That is, Count II of the
indictment against Renfrow contained language that included an allegation that Renfrow
willfully possessed child pornography. By including that language, the State imposed a mens
rea requirement, and it was obligated to prove that aspect of the charge beyond a reasonable
doubt. Consequently, under the circumstances, it is irrelevant that section 97-5-33(5) does
not include a mens rea element. We find no merit to this issue.
II.
¶20.
RENFROW’S ATTEMPTS TO SUPPRESS THE EVIDENCE
Renfrow filed multiple motions intended to suppress the evidence against him.
Based on several different rationales, Renfrow vigorously attempted to suppress the evidence
9
that was obtained from his computer. Renfrow also attempted to suppress Investigator
Gunter’s written recollection of Renfrow’s March 16, 2007, interview. For clarity’s sake,
we have restructured Renfrow’s issues and the various lines of reasoning for those issues.
As we review Renfrow’s litany of arguments under these issues, we are mindful of our
standard of review. “The standard of review regarding the admission or exclusion of
evidence is abuse of discretion.” Terrell v. State, 952 So. 2d 998, 1005 (¶31) (Miss. Ct. App.
2006). We will only find an abuse of discretion if “a defendant shows clear prejudice
resulting from an undue lack of constraint on the prosecution or undue constraint on the
defense.” Id. In other words, “[t]his Court shall not disturb a trial court’s decision unless it
is clearly wrong.” Id.
A.
¶21.
RENFROW’S COMPUTER
Renfrow repeatedly sought to suppress any and all evidence that the State obtained
from his computer. Renfrow’s reasoning was based on the following concepts: (1) there was
no probable cause to issue the search warrant because the events that led to Investigator
Gunter’s decision to obtain the search warrant occurred long before Investigator Gunter
sought to obtain the warrant; (2) his computer was contaminated by viruses while it was in
the State’s custody; (3) there was a discrepancy between the computer’s actual serial number
and the serial number as recorded by the Cyber Crime Center; and (4) the State failed to
establish a proper chain of custody. We discuss each of Renfrow’s arguments in turn.
1.
¶22.
Probable Cause for the Search Warrant
Renfrow claims there was no probable cause for the search warrant that allowed
Investigator Gunter to seize the computer. We must exercise caution while discussing this
10
claim, because the State dismissed count one of the two-count indictment by nolle prosequi,
and there is still a possibility that the State could re-indict Renfrow for those allegations. In
any event, Renfrow contends that the circuit court erred when it did not find that there was
no probable cause to issue the search warrant because, according to the two children central
to this case, the alleged inappropriate touching occurred nine or ten months before
Investigator Gunter sought to obtain the search warrant.
¶23.
The circuit court judge stated, “as I see the motion, the narrow issue is whether .
. . dismissing Court One affected the search warrant. I find it does not.” According to
Renfrow, “the information relied upon was given by two young children almost one year
after the alleged incident, and [it] cannot be deemed credible because they could not state a
specific date for the alleged incident.” Renfrow concludes that “the time lapse of almost one
year certainly rendered the search warrant stale.” We disagree.
¶24.
“When reviewing a finding of probable cause to issue a warrant[,] this Court does
not make a de novo determination of probable cause, but only determines if there was a
substantial basis for the magistrate’s determination of probable cause.” Foley v. State, 914
So. 2d 677, 685 (¶12) (Miss. 2005) (citation and internal quotations omitted). “The task of
the issuing magistrate is simply to make a practical, common-sense decision based on all the
circumstances set forth in the affidavit before him, including the ‘veracity’ and ‘basis of
knowledge’ of persons supplying hearsay information.” Id. at 685-86.
¶25.
Renfrow claims that, because the children at issue did not notify an adult of the
alleged inappropriate touching and the images on Renfrow’s computer for approximately ten
or eleven months, there was no probable cause for the search warrant. “[S]taleness of
11
information may be a defect in probable cause for search warrants.” Flake v. State, 948 So.
2d 493, 496 (¶9) (Miss. Ct. App. 2007). However, “[t]he determination of factual currency
in the affidavit for a search warrant would be but one factor in the totality of the
circumstances for establishing the existence of probable cause.” Id.
¶26.
Although it is true that the children involved in the underlying alleged incident
stated that Renfrow showed them pictures of naked adults and children on his computer and
suggested that Renfrow may have touched them inappropriately sometime in April or May
2005, that is not the end of the analysis. Authorities were unaware of the allegation until
March 2006. As mentioned, Erwin, a child advocacy counselor, interviewed the children
promptly after one of the children first gave a school counselor reason for concern.
Investigator Gunter promptly received a copy of the videotape of Erwin’s interviews. After
Investigator Gunter watched the interview, he promptly sought to obtain the search warrant.
The probable cause for the search warrant was not rendered stale simply because Investigator
Gunter first discovered the allegations nine or ten months after the alleged incident occurred.
This is especially true in the context of allegations by small children, who may be too
ashamed or frightened to inform others that something inappropriate may have occurred
because they were expressly ordered or threatened to remain silent. Based on the totality of
the circumstances, we find that there was a substantial basis for the issuance of the search
warrant. Additionally, it was reasonable for the judge who issued the search warrant to
conclude that images on a computer could still be recovered by forensic methods nine or ten
months after the children saw them. Sullivan’s examination report stated that she was able
to recover “all available files[,] including those previously deleted.” Accordingly, because
12
the images were stored on a computer, the probable cause for Investigator Gunter’s search
warrant was not rendered stale by the passage of time. We find no merit to this issue.
2.
¶27.
Integrity of the Original Hard Drive
Renfrow claims that the circuit court should have prohibited the State from
introducing any evidence that was obtained from his computer because the State failed to
protect the integrity of Renfrow’s original hard drive. Renfrow contends that there are three
reasons to conclude that the State failed to protect the integrity of the original hard drive: (1)
the possibility that Renfrow’s hard drive was exposed to virus contamination while in the
custody of the Cyber Crime Center; (2) the presence of two “bad sectors” on Renfrow’s
original hard drive; and (3) his allegation that the Cyber Crime Center did not have a
sufficient fail-safe system to protect the integrity of the original hard drive.
i.
¶28.
Virus Contamination
Renfrow claims that the circuit court should have suppressed the evidence that was
obtained from his computer because the original hard drive might have been exposed to virus
contamination while it was in the State’s custody. According to Renfrow, his original hard
drive was probably contaminated while it was in the Cyber Crime Center’s custody “because
so many people had access to the [evidence] vault and made copies from the original hard
drive.” First and foremost, Renfrow’s statement is a mischaracterization of the evidence.
According to the expert witnesses from the Cyber Crime Center, two or three people had
access to the Cyber Crime Center’s vault at any given time.
¶29.
Moreover, Renfrow’s argument under this heading is purely speculative. There
is absolutely no evidence in the record that either the original or one of the forensic duplicate
13
copies of Renfrow’s hard drive were ever exposed to computer virus contamination while
in the State’s custody. While there was some testimony that there were viruses, spyware,
adware, or “Trojan” programs on Renfrow’s original hard drive, there was no evidence that
those items first appeared on the original hard drive while it was in the State’s custody. The
only reasonable inference is that those items were on Renfrow’s original hard drive when
Investigator Gunter seized Renfrow’s entire computer. There was no testimony that those
items were not on Renfrow’s hard drive before Investigator Gunter seized Renfrow’s
computer. There was no evidence that anyone from the Cyber Crime Center exposed
Renfrow’s hard drive to possible contamination by logging on the Internet or any other
source of contamination. Additionally, the State’s expert witnesses testified that their use
of a “write-blocker” prevented any alterations to Renfrow’s original hard drive. Renfrow
never presented any evidence to the contrary. There is no merit to this purely speculative
claim.
ii.
¶30.
The Presence of “Bad Sectors” on the Original Hard Drive
Renfrow’s next argument under this heading involves the presence of two “bad
sectors” on the original hard drive. To support his claim that the Cyber Crime Center failed
to protect the integrity of his original hard drive, Renfrow references a portion of Leavitt’s
testimony in which Leavitt testified that there were two “bad sectors” on Renfrow’s original
hard drive. Renfrow states that Leavitt “testified that the damaged hard drives have
something to do with the way the hard drive operates.” Although Renfrow accurately states
that Leavitt found two “bad sectors” on Renfrow’s hard drive, Renfrow is inaccurate in the
remainder of his characterization of Leavitt’s testimony.
14
¶31.
Leavitt testified that he found two “bad sectors” on Renfrow’s hard drive. The
State asked Leavitt to elaborate on what the “bad sectors” meant. Leavitt testified:
A bad sector typically could mean some type of physical damage to the hard drive.
These are electronic parts. They have physical moving parts, and they become
damaged just like maybe your cassette tape that you listen to in the radio might - portions of it could get damaged where you couldn’t hear it. It’s the same way
with a hard drive. Those portions of the hard drive can become damaged and be
unusuable by the - - by the hardware.
Leavitt went on to testify that it is not uncommon to find bad sectors on a hard drive. Leavitt
explained that he examined the damaged sectors to determine whether there was any
information stored on them and found no information. Additionally, Leavitt testified that the
two damaged sectors would have held very little information. The State asked Leavitt to
elaborate regarding the information that could be stored on the two damaged sectors
compared to the information that could be stored on the entire hard drive. Leavitt explained
that the two sectors would represent “maybe a crumb” of an entire pie.
¶32.
On cross-examination, Renfrow’s attorney asked Leavitt whether the two “bad
sectors” would influence the way Renfrow’s computer operated. Leavitt testified that they
would not influence the way Renfrow’s computer operated, but they would influence the way
the hard drive operated in that the hard drive would skip over the two damaged sectors and
simply move on to the next undamaged sector of the hard drive. Renfrow’s attorney never
asked Leavitt to testify as to how the “bad sectors” might have become damaged.
Additionally, Renfrow’s computer expert, Nannette Pate, did not discuss the presence of the
“bad sectors” during her testimony. As a result, there was no evidence that the “bad sectors”
were damaged during the time Renfrow’s hard drive was in the custody of the Simpson
15
County Sheriff’s Department or the Cyber Crime Center. Instead, Sullivan’s and Leavitt’s
testimonies were that the Cyber Crime Center’s first priority was to maintain the integrity of
the original hard drive. There is no basis to conclude that the presence of the “bad sectors”
are indicative of the Cyber Crime Center’s failure to protect the integrity of Renfrow’s
original hard drive. Renfrow’s claim under this heading is entirely meritless.
iii.
¶33.
The Cyber Crime Center’s Fail-Safe Systems
Finally, Renfrow claims the circuit court should have suppressed the evidence that
was obtained from his computer because the Cyber Crime Center did not have adequate failsafe systems to protect the integrity of his original hard drive. Again, Renfrow completely
mischaracterizes the evidence.
¶34.
Investigator Gunter testified that Renfrow’s computer was off when he first
encountered it in Renfrow’s home.
Investigator Gunter simply unplugged Renfrow’s
computer when he seized it. He did not turn on Renfrow’s computer to prevent the
possibility of any alterations to Renfrow’s hard drive. He placed evidence tape over the plug
ports to the computer to prevent anyone from hooking the computer up and turning it on.
¶35.
Sullivan and Leavitt testified in great detail regarding the Cyber Crime Center’s
fail-safe systems. They described how each aspect of the Cyber Crime Center’s fail-safe
systems and the investigative process were designed specifically to protect the integrity of
an original hard drive. Sullivan removed the original hard drive and placed a write-blocking
device on it to prevent any alterations to the original hard drive. Sullivan made an exact copy
of the hard drive and examined the copy. The intended purpose behind examining the copy
was to protect the integrity of the original hard drive. Leavitt made a similar duplicate copy
16
for Renfrow’s expert to examine. Again, the specific purpose of making a copy was to
protect the integrity of the original evidence. Renfrow’s attorney wanted to boot up the
original hard drive so his expert could examine it. The State opposed Renfrow’s request and
explained that booting up the original hard drive would destroy the integrity of the original
evidence. Suffice it to say, every step of the State’s procedure to gather evidence from the
original hard drive was designed to protect the integrity of the evidence. This issue, like the
other two under this heading, is meritless.
3.
¶36.
Discrepancy in Serial Numbers
Renfrow draws our attention to a discrepancy in his serial number as it appears on
his computer and the serial number that the Cyber Crime Center placed on an evidence
receipt when Investigator Gunter delivered Renfrow’s computer to the Cyber Crime Center.
Renfrow makes mention of the discrepancy in his claim that the State failed to establish a
chain of custody. For brevity’s sake, we discuss that issue in a separate heading.
¶37.
Renfrow’s computer bore the serial number 0151002229. When Leavitt filled out
the evidence receipt, he listed the serial number as 015100229. After the hearing on
Renfrow’s first volley of motions, the circuit court found that the discrepancy in the serial
numbers was nothing more than a clerical error. Sullivan’s report bore the same serial
number that appeared on the computer. While Renfrow references the discrepancy in his
brief and implies that the discrepancy somehow reflects on the State’s chain of custody, he
provides no argument to suggest that the circuit court erred when it found that the
discrepancy in recording the computer’s serial number was anything more than a clerical
error involved with omitting one repetitive digit in the serial number. Consequently, we do
17
not find that the circuit court abused its discretion when it declined to suppress the evidence
obtained from the computer simply due to a clerical error.
4.
¶38.
Chain of Custody
Next, Renfrow claims that the circuit court should have suppressed evidence that
the State obtained from the copy of Renfrow’s original hard drive because the State failed
to demonstrate a proper chain of custody regarding his computer. Renfrow’s reasoning is
based on the same arguments he raises regarding the Cyber Crime Center’s fail-safe systems,
the presence of bad sectors on his original hard drive, and the number of people who had
access to the Cyber Crime Center’s vault. Renfrow does not claim that any specific portion
of the chain of custody was insufficient. Accordingly, for brevity’s sake, it is unnecessary
to discuss the entire chain of custody when the argument for suppression is based on such a
broad allegation.
¶39.
Yet again, Renfrow’s claim is based on a mischaracterization of the evidence.
There was no testimony that “so many” people had access to the Cyber Crime Center’s
evidence vault. Instead, Sullivan testified that, depending on the actual date, either two or
three people at any given time had a key to access the Cyber Crime Center’s evidence vault.
The State presented the Cyber Crime Center’s evidence log. That log detailed each time
either Renfrow’s original hard drive or a copy of the original hard drive were removed from
the Cyber Crime Center’s vault. The evidence log also detailed who removed the original
hard drive or a copy of the original hard drive. Because the State presented an adequate
chain of custody and Renfrow failed to point out any specific inadequacy in that chain of
custody, we find no merit to this allegation.
18
5.
¶40.
Duplicate Copy of the Hard Drive
In his final claim under this heading, Renfrow argues that the circuit court “erred
in allowing the introduction of the copy of the hard drive as opposed to the original.” There
is no merit to this claim. Sullivan and Leavitt both explained why it was necessary to create
a duplicate copy of the original hard drive and why it was necessary to test the duplicate. A
forensic examination of Renfrow’s original hard drive would have altered the original hard
drive and, by extension, would have completely destroyed any evidentiary value of the
original hard drive. To maintain the integrity of the original hard drive, it was necessary to
create a forensic duplicate of the original hard drive and then conduct all examinations on
the forensic duplicate. There is no merit to this claim.
B.
¶41.
RENFROW’S STATEMENT
Next, Renfrow argues that the circuit court erred when it did not suppress
Investigator Gunter’s statement regarding his recollection of his interview of Renfrow. In
an effort to serve Renfrow with a capias, Investigator Gunter left a note on Renfrow’s door
and requested that Renfrow report to the Simpson County Sheriff’s Department. Investigator
Gunter’s note only included a request that Renfrow go to the sheriff’s department.
Investigator Gunter’s note did not mention the capias.
¶42.
In any event, Renfrow went to the sheriff’s department as requested. However,
once there, Renfrow expressed his willingness to waive his rights and submit to an interview
by Investigator Gunter. Renfrow executed a document and waived his rights. Investigator
Gunter interviewed Renfrow while Sheriff Lewis sat-in on the interview. Investigator Gunter
intended to create a videotape of the interview.
19
¶43.
After the interview, Investigator Gunter discovered that he had only obtained a
video recording of Renfrow’s interview. Investigator Gunter did not have any audio
recording of the interview. Investigator Gunter then “immediately sat down and did a
statement of facts to what he and Mr. Renfrow [had] talked about.” Sheriff Lewis signed
Investigator Gunter’s recollection of the interview and indicated that he agreed with
Investigator Gunter’s recollection. According to Investigator Gunter, during the interview,
Renfrow stated that he knew he had child pornography on his computer. However, he also
stated that he obtained the child pornography inadvertently. According to Renfrow, people
on the Internet sent the images without his solicitation of them.
¶44.
Renfrow filed a motion to suppress Investigator Gunter’s statement regarding the
interview. The circuit court denied Renfrow’s motion. Renfrow claims the circuit court
erred. According to Renfrow, the circuit court should have suppressed Investigator Gunter’s
statement because: (1) it was not voluntary because Investigator Gunter enticed Renfrow to
come to the sheriff’s department; (2) Renfrow never signed the statement; and (3) it was not
Renfrow’s statement; instead, it was merely Investigator Gunter’s recollection of what was
said during Renfrow’s interview.
¶45.
As for Renfrow’s claim that Investigator Gunter enticed him to go to the sheriff’s
department, Investigator Gunter merely left a note at Renfrow’s house. In that note,
Investigator Gunter requested that Renfrow go to the sheriff’s department, but Investigator
Gunter did not ask Renfrow to waive his rights or agree to be interviewed. There is no
evidence that Investigator Gunter or anyone else promised Renfrow anything in exchange
for his agreeing to be interviewed. There is no evidence that Renfrow went to the sheriff’s
20
department or agreed to be interviewed based on any enticement by Investigator Gunter or
anyone else. We find no error in the circuit court’s decision to deny suppressing Investigator
Gunter’s recollection statement based on Renfrow’s allegation of enticement.
¶46.
Renfrow claims that the circuit court should have suppressed Investigator Gunter’s
recollection of Renfrow’s interview because it was not actually Renfrow’s statement and
Renfrow never signed Investigator Gunter’s recollection statement. However, admissibility
of an unsigned statement is an issue of the accuracy of a statement and not the voluntariness
of a statement. Craft v. State, 380 So. 2d 251, 254 (Miss. 1980). We find no merit to
Renfrow’s claim that the circuit court erred when it declined to suppress Investigator
Gunter’s recollection statement based on the fact that it was Investigator Gunter’s
recollection of the interview and Renfrow did not sign the statement. Those matters
pertained to the weight and credibility of the statement, and those matters are for the jury to
consider. “Matters concerning what weight and credibility to give to the evidence presented
are to be decided by the jury.” Walker v. State, 799 So. 2d 151, 153 (¶4) (Miss. Ct. App.
2001). It bears mentioning that Investigator Gunter’s recollection of Renfrow’s statements
corroborated Renfrow’s defense at trial. That is, Investigator Gunter noted that Renfrow said
he did not solicit the images depicting child pornography and that Renfrow did not
intentionally obtain the images. That was Renfrow’s theory of the case. Accordingly,
Renfrow was not prejudiced by the circuit court’s decision to deny Renfrow’s motion to
suppress Investigator Gunter’s recollection of Renfrow’s interview. This issue is without
merit.
III. RENFROW’S MOTIONS FOR CONTINUANCE
21
¶47.
On February 28, 2008, Renfrow filed a motion for a continuance. At that time,
Renfrow’s trial was scheduled for March 19, 2008. Renfrow requested a continuance so that
his attorney would have time to review discovery that the State had provided on February 8,
2008. Renfrow also filed a motion to view the evidence. In that motion, Renfrow requested
that the circuit court allow his computer expert to review Renfrow’s hard drive. On March
7, 2008, the circuit court conducted a hearing on Renfrow’s numerous pretrial motions.
During that hearing, Renfrow’s attorney complained that, although the State had provided
its reports regarding the presence of child pornography on Renfrow’s computer, Renfrow’s
computer expert had not had an opportunity to personally observe and review a copy of
Renfrow’s hard drive. The circuit court judge stated that he would “grant [Renfrow’s]
motion [to view the evidence] with respect to going and viewing the evidence.”
Accordingly, the circuit court judge instructed the State to provide Renfrow’s attorney with
dates that Renfrow’s expert could go to the Cyber Crime Center and review a copy of
Renfrow’s hard drive. Additionally, the circuit court judge rescheduled Renfrow’s trial date
to March 27, 2008.
¶48.
On March 19, 2008, Renfrow filed another motion for a continuance. In his
second motion for a continuance, Renfrow claimed that he had “still been denied . . . access
to all of the evidence of the State in this matter, more particularly, the original hard drive and
the original computer intact as it was obtained.” In other words, Renfrow requested that the
circuit court continue his trial until his computer expert could inspect Renfrow’s original hard
drive after re-installing the hard drive in Renfrow’s computer tower. On March 20, 2008,
the circuit court conducted a hearing on Renfrow’s second barrage of pretrial motions.
22
¶49.
During the hearing on Renfrow’s second motion for a continuance, the State
vigorously objected to Renfrow’s computer expert being allowed to re-install and inspect
Renfrow’s original hard drive. Leavitt testified during that hearing. Leavitt explained that
Renfrow’s expert would destroy the evidentiary value if she was allowed to install it in
Renfrow’s tower and boot it up.3 Leavitt elaborated and testified that, if one were to boot up
Renfrow’s original hard drive without attaching the write-blocking device, “over 1,000 files
would be changed immediately.” The “registry files” would be modified, and the original
data could never be recovered again. Leavitt explained that booting up the original hard
drive would also change all of the “time date stamps” throughout the computer and the “log
files would be changed, deleted, or recreated in some cases.” Finally, Leavitt testified that
if Renfrow’s expert were allowed to do as Renfrow requested, that act would “certainly
change the entire makeup of [Renfrow’s] hard drive.” On cross-examination, Leavitt
explained that neither he nor anyone else who performs forensic examinations for the Cyber
Crime Center ever examined an original hard drive or booted up a copy of a hard drive –
much less an original hard drive – without using the previously-mentioned write blocker.
The circuit court resolved the matter by instructing the Cyber Crime Center to allow
Renfrow’s expert to create her own forensic duplicate copy of Renfrow’s original hard drive.
However, when Renfrow’s expert appeared at the Cyber Crime Center, she was not equipped
to prepare her own duplicate. Consequently, Leavitt prepared another duplicate copy of
3
Using forensic computer tools and programs, it is possible to compare an original
hard drive to a forensic duplicate of a hard drive to test for consistency. However, those
tools and programs avoid having to boot up an original hard drive.
23
Renfrow’s original hard drive as Renfrow’s expert, Pate, observed. To summarize, Pate had
access to two forensic duplicates of Renfrow’s original hard drive.
¶50.
Renfrow claims that the circuit court erred when it denied his motion for
continuance. “Trial judges have wide latitude in deciding whether to grant continuances, and
that decision is left to the sound discretion of the trial judge.” Evans v. State, 899 So. 2d 890,
896 (¶23) (Miss. Ct. App. 2004) (quoting Adams v. State, 772 So. 2d 1010, 1014 (¶16) (Miss.
2000)). A trial court’s decision to deny a motion for a continuance is not reversible “unless
manifest injustice appears to have resulted from the denial.” Id.
¶51.
First and foremost, Renfrow does not indicate what his attorney or his expert might
have discovered if the circuit court would have granted his motion for a continuance.
Additionally, the undisputed testimony during the hearing on Renfrow’s second motion for
a continuance was that Renfrow’s expert would destroy the evidentiary value of the evidence
if the circuit court consented to Renfrow’s request. What is more, Renfrow seems to argue
that, if the circuit court would have granted his second motion for a continuance, his attorney
or his expert might have made some unspecified discovery that may or may not have
benefitted his defense. Renfrow had no specific purpose in mind. He simply wanted more
time to see if his expert could find something. The circuit court granted Renfrow’s first
motion for a continuance and gave Renfrow’s expert more than one opportunity to review
the same evidence that the State had. As the State notes, Renfrow’s attorney presented no
proof as to how he could have been better prepared to defend Renfrow if he would have had
additional time to prepare for trial. Under the circumstances, we find that the circuit court
did not abuse its discretion when it denied Renfrow’s second motion for a continuance.
24
Accordingly, we find no merit to this issue.
IV. SUFFICIENCY OF THE EVIDENCE
¶52.
Renfrow claims the evidence against him was insufficient to convict him of
possession of child pornography. In summary, he argues that: he did not know those files
were on his computer; he never sent the files to anyone; and he was a novice with using
computers.
¶53.
“A motion for a judgment notwithstanding the verdict is a challenge to the
sufficiency of the evidence.” Gilbert v. State, 934 So. 2d 330, 335 (¶9) (Miss. Ct. App.
2006). As our Mississippi Supreme Court has stated:
in considering whether the evidence is sufficient to sustain a conviction in the face
of a motion for directed verdict or for judgment notwithstanding the verdict, the
critical inquiry is whether the evidence shows beyond a reasonable doubt that
accused committed the act charged, and that he did so under such circumstances
that every element of the offense existed; and where the evidence fails to meet this
test it is insufficient to support a conviction. . . . [T]he relevant question is
whether, after viewing the evidence in the light most favorable to the prosecution,
any rational trier of fact could have found the essential elements of the crime
beyond a reasonable doubt. Should the facts and inferences considered in a
challenge to the sufficiency of the evidence point in favor of the defendant on any
element of the offense with sufficient force that reasonable men could not have
found beyond a reasonable doubt that the defendant was guilty, the proper remedy
is for the appellate court to reverse and render.
Bush v. State, 895 So. 2d 836, 843 (¶16) (Miss. 2005) (internal citations and quotations
omitted). However, this Court will determine that there was sufficient evidence to sustain
the jury’s verdict if the evidence was “of such quality and weight that, having in mind the
beyond a reasonable doubt burden of proof standard, reasonable fair-minded men in the
exercise of impartial judgment might reach different conclusions on every element of the
offense.” Id. (internal citations and quotations omitted).
25
¶54.
Renfrow was indicted for possession of child pornography in violation of
Mississippi Code Annotated section 97-5-33(5). As mentioned, although section 97-5-33(5)
does not contain a mens rea element, the language of the indictment included an allegation
that Renfrow willfully possessed the images depicting child pornography.
¶55.
It was undisputed that several images depicting child pornography were found on
Renfrow’s computer. Renfrow argued that he did not solicit the images at issue and that he
obtained them inadvertently. According to Renfrow, he had limited knowledge about
computers, and the images appeared on his computer after he clicked the word “attachment”
at the bottom of the computer screen while using a “chat program” called ICQ. However,
Renfrow also attempted to attribute the child pornography images to other sources. Pate,
Renfrow’s expert witness, testified that: (a) she found numerous viruses on the duplicate
clone of Renfrow’s hard drive; (b) she found a “porn net Trojan virus” on Renfrow’s
computer; (c) the “porn net Trojan virus” causes adult pornographic images pop up on a
computer screen; (d) she found a “backdoor Trojan virus” that allows someone to take
control of a computer without an owner’s knowledge; (e) a “backdoor Trojan virus” can hide
and disguise itself; and (f) Renfrow could have accepted the images without knowing exactly
what they were.
¶56.
However, there was no evidence that any of the computer viruses or other
programs that Pate described actually transferred any of the images of child pornography.
Pate’s testimony in that regard was merely that the viruses or “Trojan” programs
theoretically could have been the reason the images at issue were on Renfrow’s computer.
Pate’s testimony was in stark contrast to Sullivan’s testimony and Leavitt’s testimony. Both
26
Leavitt and Sullivan testified that viruses or “Trojan” programs were not responsible for
placing the pornographic images of children on Renfrow’s computer. Leavitt testified that,
because Renfrow used a dial-up internet connection that used “dynamic IP addressing,” it
was impossible for someone to remotely control Renfrow’s computer. Both Leavitt and
Sullivan testified that Renfrow created a file under the title “PEDO” and stored the images
at issue in that file. Leavitt testified that one of the images of child pornography was
attached to an e-mail that was stored in Renfrow’s “outbox.” Renfrow’s e-mail was
protected by a password.
¶57.
Additionally, the State’s experts discovered e-mails that were sent from Renfrow’s
e-mail address. The only inference presented at trial was that Renfrow wrote the stories
contained in each e-mail.4 One such e-mail included a story that Renfrow wrote in which a
fifteen-year-old boy reminisced in extremely graphic detail how he became attracted to his
pre-teen sister and eventually raped her. In a different e-mail, Renfrow wrote a story about
a father who proudly reminisces in extremely graphic detail about the time he encouraged
his twelve-year-old twin son and daughter to have sex with one another. In that story, the
father molested both children, and after encouraging his twelve-year-old twin children to
have sex with one another, the father committed statutory rape of his twelve-year-old
daughter. The father continued to do so for months, until his daughter became pregnant. In
the story within that e-mail, the father closed by describing how he held his granddaughter
4
The State’s experts found an e-mail from someone who was replying to an earlier
e-mail from Renfrow. In Renfrow’s earlier e-mail, Renfrow stated that he was writing
stories about “very young girls” and that one of his stories was about “a father and his 9year-old daughter.” Renfrow also asked the recipient whether he was offended by incest.
27
while hoping for more grandchildren so he could “educate” another generation of his family.
In yet another e-mail, Renfrow wrote a story about an adult male who fondly described
having sex with his pre-teen niece and daughter.
¶58.
Finally, Dr. Larry Gibson, a physician certified in family medicine, testified that
the images at issue depicted sexually explicit conduct involving girls as young as six or seven
years old. According to Dr. Gibson, the eldest child depicted in the various images was
approximately twelve years old.
¶59.
We can confidently conclude that reasonable and fair-minded jurors could have
found that the State proved each element of the offense as stated in the indictment beyond
a reasonable doubt. Accordingly, we find that the circuit court did not abuse its discretion
when it denied Renfrow’s motion for a JNOV. We find no merit to this issue.
V.
¶60.
WEIGHT OF THE EVIDENCE
Renfrow claims the circuit court erred when it denied his motion for a new trial.
According to Renfrow, the circuit court should have granted his motion for a new trial
because the jury’s verdict is contrary to the overwhelming weight of the evidence. We are
mindful that, as we review the circuit court’s decision to deny a motion for a new trial, this
Court “will only disturb a verdict when it is so contrary to the overwhelming weight of the
evidence that to allow it to stand would sanction an unconscionable injustice.” Bush, 895 So.
2d at 844 (¶18). The supreme court has further instructed that, when reviewing a trial court’s
decision to deny a motion for a new trial:
the court sits as a thirteenth juror. The motion, however, is addressed to the
discretion of the court, which should be exercised with caution, and the power to
grant a new trial should be invoked only in exceptional cases in which the
28
evidence preponderates heavily against the verdict. However, the evidence should
be weighed in the light most favorable to the verdict. A reversal on the grounds
that the verdict was against the overwhelming weight of the evidence, unlike a
reversal based on insufficient evidence, does not mean that acquittal was the only
proper verdict. Rather, as the “thirteenth juror,” the court simply disagrees with
the jury’s resolution of the conflicting testimony. This difference of opinion does
not signify acquittal any more than a disagreement among the jurors themselves.
Instead, the proper remedy is to grant a new trial.
Id. (footnote and internal citations and quotations omitted).
¶61.
To support this issue, Renfrow discusses the same matters that he discussed to
support his challenge of the sufficiency of the evidence. Based on evidence discussed in the
analysis under Renfrow’s challenge of the sufficiency evidence, when viewed in the light
most favorable to the verdict, we find that the jury’s verdict was not so contrary to the
overwhelming weight of the evidence that to allow it to stand would sanction an
unconscionable injustice. We find no merit to this issue.
¶62.
THE JUDGMENT OF THE SIMPSON COUNTY CIRCUIT COURT OF
CONVICTION OF POSSESSION OF CHILD PORNOGRAPHY AND SENTENCE
OF FIFTEEN YEARS IN THE CUSTODY OF THE MISSISSIPPI DEPARTMENT
OF CORRECTIONS IS AFFIRMED. ALL COSTS OF THIS APPEAL ARE
ASSESSED TO THE APPELLANT.
KING, C.J., LEE AND MYERS, P.JJ., IRVING, GRIFFIS, BARNES, ISHEE,
CARLTON AND MAXWELL, JJ., CONCUR.
29
Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.