David William Runyon v. The State of Texas Appeal from 435th District Court of Montgomery County (opinion)

Annotate this Case
Download PDF
In The Court of Appeals Ninth District of Texas at Beaumont __________________ NO. 09-22-00043-CR NO. 09-22-00044-CR __________________ DAVID WILLIAM RUNYON, Appellant V. THE STATE OF TEXAS, Appellee __________________________________________________________________ On Appeal from the 435th District Court Montgomery County, Texas Trial Cause Nos. 21-03-03965-CR and 21-03-03966-CR __________________________________________________________________ OPINION After the trial court denied David William Runyon’s motion to suppress, he pleaded guilty to two indictments charging him with possession of child pornography. 1 Based on these pleas, the trial court 1See Tex. Penal Code Ann. § 43.26(a). 1 found Runyon guilty, and in punishment, the trial court assessed concurrent, seven-year sentences. In the two cases, the record shows the State obtained Runyon’s indictments based on images it extracted from Runyon’s laptop, which police searched after obtaining a search warrant. To obtain the search warrant, police relied on information they were told about what was on the laptop by a woman living with Runyon, his then girlfriend, whom we will call Sally. 2 At issue in the appeal is whether, as Runyon argues, the evidence shows that Sally illegally accessed Runyon’s laptop before providing the information on it to the police. On appeal, Runyon argues the trial court abused its discretion in failing to suppress the images police seized from his laptop. Runyon argues that because Sally didn’t have his effective consent to access his laptop when she did, the images she found were obtained in violation of the Computer Security statute, which prohibits a persons from accessing a computer owned by another without the owner’s effective consent.3 2A pseudonym. 3Id. § 33.02 (Breach of Computer Security). 2 Runyon concludes that Sally’s search of his laptop, which he argues the evidence in the suppression hearing shows was obtained without his effective consent violated the Computer Security statute, which made the search conducted by police even though police obtained a warrant illegal too. After a careful review of the evidence, we conclude the evidence addressing the issue of whether Sally had Runyon’s effective consent to access the laptop is conflicting. The trial court’s finding that Runyon failed to carry his burden of persuasion on the effective consent issue is a fact issue, which is tied to the trial court’s express or implied determinations of historical facts. Because the trial court properly applied the law in concluding the search warrant was not based on evidence illegally obtained by another given its historical findings of fact, we conclude it did not err in denying Runyon’s motion to suppress. 4 For the reasons explained below, we will affirm. 4Tex. Code Crim. Proc. Ann. art. 38.23(a) (providing that “[n]o evidence obtained by an officer or other person in violation of the Constitution or laws of the State of Texas, or of the constitution or laws of the United States of America shall be admitted in evidence against the accused on the trial of any criminal case”). 3 The Hearing on the Motion to Suppress Three witnesses testified in the hearing the trial court conducted on Runyon’s motion to suppress: (1) Sally; (2) Runyon; and (3) Jarod Tunstall, a detective employed by the Montgomery County Constable’s Office, Precinct 3. Detective Tunstall signed the probable cause affidavit, which police used to support the search warrant that a magistrate signed to obtain Runyon’s laptop. The seizure of Runyon’s laptop and a search of its hard drive led to the discovery of the images that were the subject of Runyon’s motion to suppress. The testimony in the hearing shows that one day in July 2020, when Runyon was at work, Sally accessed Runyon’s laptop to find out what he was doing. Sally did so, she said, because she had a strange feeling in her gut. According to Sally, when she saw Runyon’s laptop that day, it was on, the screen was visible, it was unlocked, and “on an ESPN page.” The laptop was in one of the guest bedrooms in Runyon’s home. Runyon and Sally had been living together in the home for about a year before Sally saw the images on Runyon’s laptop that she reported to the police. According to Sally, when she accessed the laptop, she saw a file folder 4 labeled “girls.” In that folder, she saw a file, which was labeled with the name of her friend who had visited in their home. On opening it, Sally discovered that the folder had a file in it that was a recording of her friend getting undressed in the home’s guest bedroom. Then, she noticed other files in the folder that had images of her and Runyon having intercourse, which according to Sally had been taken without her knowledge or consent. After seeing these files, Sally looked at other folders on Runyon’s laptop, and when she looked in the laptop’s download folder, she found that Runyon had downloaded images of naked children. Sally reported the presence of the images on Runyon’s laptop to federal and state authorities. After police executed the search warrant on Runyon at his home, Sally testified Runyon told her: “[H]is biggest regret that day was leaving it unlocked. He recalled the day that he left it unlocked.” Following the hearing, the trial court issued findings of fact and conclusions of law. Among its findings, the trial court found: ... 5. Detective Jarod Tunstall’s testimony was credible. 5 ... 10. . . . [Sally’s] testimony was credible. ... 16. [Runyon] allowed [Sally] to use his silver Hewlett Packard laptop on multiple occasions prior to July 22, 2020. 5 17. [Runyon] was aware that [Sally] used Runyon’s silver Hewlett Packard laptop on multiple occasions prior to July 22, 2020. 18. [Sally] used numerous electronic devices belonging to [Runyon] at different times while living with him in their home. 19. There were never any express or implied statements concerning the use of electronic devices in the home that [Sally] shared with [Runyon]. 20. There were no written statements, verbal statements, or any other evidence that would have suggested to [Sally] that she did not have permission to access [Runyon’s] silver Hewlett Packard laptop. ... 22. [Runyon] never restricted [Sally’s] access to his Hewlett Packard laptop. 5Though some evidence shows Sally accessed the laptop on July 22, she said she accessed it on July 21st. We’ve used July 21st as the date of access since that date is consistent with Sally’s testimony. 6 23. [Runyon] never told [Sally] not to access his silver Hewlett Packard laptop. 24. [Runyon] shared access to numerous electronic devices in the home with [Sally]. 25. [Sally] did not knowingly access [Runyon’s] silver Hewlett Packard laptop without his effective consent. Relying on these findings, the trial court determined that Runyon failed to carry his burden to establish the search of his computer violated his rights and denied Runyon’s motion to suppress. Turning to the hearing on which the trial court’s findings are based, the evidence admitted in the hearing shows that Sally testified she met Runyon in May 2018. They began dating about four months later, eventually moving into a house that Runyon bought in May 2019. Even though they were not married, Sally and Runyon shared certain expenses incurred when they lived together in the home. Sally and Runyon lived in the home for around a year before breaking up. While together, Sally explained, there was no express or implied agreement that things were “off limits” in the home. According to Sally, they mostly “shared everything[.]” Explaining the extent to which she and Runyon shared their possessions, Sally pointed to an 7 expensive deck of cards, which she said were owned for the most part by Runyon. The cards were for a game known as “Magic: The Gathering,” which Sally said were worth around $30,000. Even though Sally and Runyon owned the electronic devices kept in the home separately, Sally discussed how she and Runyon shared them. Sally testified she had four such devices: a tablet computer, a laptop computer, and two cell phones. By Sally’s account, Runyon had a laptop, a cell phone that worked, and a cell phone that didn’t. Sally testified that she and Runyon also shared around thirteen electronic game platforms, manufactured by Sony and Nintendo, which they separately owned. When asked whether she needed Runyon’s permission to use “any of the electronic devices you guys had in the house[,]” Sally answered: “No.” And when asked whether “there were ever any statements expressed or implied concerning when you could use certain electronic devices or not in the home[,] Sally answered: “No.” Turning to Runyon’s laptop, Sally testified that the day she discovered the pornographic images, his computer “wasn’t password protected.” That said, she agreed that she and Runyon never specifically 8 discussed her use of his laptop or whether she could use his laptop at any time. To be sure, Sally conceded that generally, Runyon’s laptop was protected by a password, yet no one ever asked to explain why it wasn’t password protected in July 2020 when she found and then reported that it had pornographic images of children on it to the police. Sally also described how she had used Runyon’s laptop while living with him since she first moved in. According to Sally, she had used Runyon’s laptop to update her resume and to play “Arena,” an online game. When asked whether she was alone with the laptop when she did these types of things, Sally replied: “Like, he was maybe in the room, but, like, I was by myself.” Sally then clarified her testimony, explaining that when she played Arena on Runyon’s laptop, he was in the room. Sally added that on a few other occasions, she and Runyon had used his laptop to watch baseball games. When Runyon’s attorney asked Sally whether she believed she “could access [Runyon’s] computer at any time [after updating her resume and playing Arena on his laptop,] Sally answered: “I don’ t know.” Runyon’s attorney also asked Sally whether she had Runyon’s effective 9 consent to access his computer, as he asked her the following leading question: “That on July 22nd, you would agree that you knowingly accessed [Runyon’s] computer without [his] effective consent that afternoon?” Sally answered: “I think it was the [July] 21st. I don’t know.” In an effort to clarify his question, Runyon’s attorney then told Sally that effective consent included “consent by a person legally authorized to act through the owner.” Yet after explaining that to Sally, Sally stuck with her same answer to the question about effective consent and repeated her answer: “I don’t know.” Sally conceded that Runyon never gave her his express permission to use his laptop the day she accessed it and found it contained pornographic images of children. Sally also agreed that she waited until Runyon left home, consciously decided to enter the guest bedroom, and then was checking into what Runyon was doing by “snooping” around in his laptop based on her fear that he might be cheating. Even though Sally agreed Runyon was not home when she accessed his laptop, she said he never told her or did anything that suggested to her that she couldn’t access his laptop when he wasn’t present. For 10 instance, Sally said that when she used Runyon’s computer to update her resume, Runyon didn’t place any limitations on her use. Likewise, when she used his laptop to play an online game, Arena, she never asked Runyon for his express consent before using his laptop. According to Sally, she never had a conversation with Runyon where he told her she could only use his laptop for a limited purpose, and he never implied to her that she could only use his laptop while playing Arena online. During the hearing, Sally did admit she felt “guilty for snooping” after accessing Runyon’s laptop. But she testified her feelings depended on her sense of morals. She explained: A: I guess morally. I just never – I don’t know. Morally, I feel like it wasn’t the best move, but I never in the two years wanted – I don’t want – to be that kind of person. I wanted to not snoop, but – for the most part, I feel like it’s not the greatest, but – Q: Sure. A: – in my gut, I just didn’t feel like something was right, and I think that’s what I felt. While questioned about her feelings as they related to her accessing Runyon’s computer, Sally maintained that Runyon never did prohibit her from accessing his laptop. 11 Detective Jarod Tunstall, the investigating officer who responded to Sally’s report, testified in the hearing that his first contact with Sally was on the phone. She agreed to come in for an interview. Detective Tunstall interviewed Sally twice in August 2020, and the recordings of the interviews were admitted into evidence in the hearing. During the recorded interviews, Sally told the detective she accessed Runyon’s laptop after he left home because “something told me to snoop[.]” In the recording, Sally is heard explaining that she accessed the laptop because it was unlocked. She also told the detective she didn’t have Runyon’s password. Detective Tunstall explained that he relied on the information Sally gave him to obtain the search warrant police used to seize Runyon’s laptop and search it for evidence of a crime. When the detective was asked whether in preparing his investigation and report if he “had any concern about whether or not [Sally’s] access to [Runyon’s] laptop was unlawful[,]” the detective answered: “No, I did not.” Runyon was the third witness who testified in the hearing. Although he disputed some of Sally’s testimony, he didn’t dispute her 12 claim he left his laptop on and unlocked on the day she found the images that were the subject of his motion, nor her claim that there were occasions in which he had allowed her to use his laptop in the past. To be clear, Runyon’s position was that while she could use his laptop, she could only do so on those occasions when they were in the same room. Turning to Runyon’s account about their general use of passwords, Runyon testified that he and Sally didn’t share any passwords with each other except to the online game, Arena. Runyon disputed Sally’s testimony that he and Sally shared everything, for example he specifically disputed her claim that they shared access to the deck of cards for “Magic: The Gathering.” Instead, Runyon said, their custom was to ask permission if one of them needed to use the other person’s items. Still, Runyon agreed that he and Sally had “some form of shared access” to around twenty electronic devices. That said, Runyon didn’t clearly spell out the terms of the agreements he claims he had with Sally as to their shared use of the twenty electronic devices he agreed that they shared, except he did say that if he “ever used [two of Sally’s electronic gaming platforms, which Runyon identified,] I believe I asked her 13 permission[.] . . . [But] “I’m not sure if I would describe it as a requirement or not.” Turning to Runyon’s laptop, Runyon testified that generally, he kept his laptop protected by a password, which he didn’t share with Sally. But he thought that Sally might have had it, because his password was “onions,” and Sally had seen him unlock his laptop using his password before. For example, when Sally used his laptop to update her resume, she asked if she could use the laptop, he unlocked it, entered his password, opened the word-processing program for her, and handed the laptop to her. As to Sally’s testimony about using his laptop to play Arena, Runyon testified he couldn’t recall if she used his laptop for that purpose, but if she did, he “would have logged onto the [laptop], unlocked it, entered the password, brought up Arena and then handed [the laptop] to her to play on her account.” Runyon testified he would have expected Sally to have asked him for his permission before she used his laptop. Runyon explained that his laptop had a password, and it was his practice to “lock it and it would have needed a password to get into it.” Still, when questioned about 14 whether the laptop was locked when Sally discovered the images she later reported to the police, Runyon testified: “I don’t remember how I left it that day when I left for work.” According to Runyon, however, even if Sally could have accessed his laptop without entering his password because he left it on and open that day, it didn’t mean that he intended to give Sally his effective consent to access his laptop without his express permission. Runyon added, he never gave Sally “a blanket effective consent to go into” his laptop. While Runyon explained what he intended, he also agreed that at best what he intended was implied, not express. He agreed that he never told Sally, “Don’t ever go on my laptop.” And he agreed that when Sally either used his laptop or had asked him whether she could use it, he never told her she could not. After the trial court denied his motion to suppress, Runyon pleaded guilty to two counts of child pornography. Based on the pleas, the trial court sentenced Runyon to serve concurrent, seven-year sentences. 15 Standard of Review Texas law requires that evidence obtained by a person in violation of the Constitution be excluded even if the person has acted in good faith when investigating a crime. 6 The exclusionary rule created by the exclusionary statute, Article 38.23, encompasses private individuals even though the private individual was not when gathering the evidence acting as an agent of the state. 7 Under Article 38.23(a) the defendant bears the initial burden to show a “causal connection” between the alleged illegality and the evidence that is the subject of the motion to suppress. 8 The evidence Runyon sought to suppress relates to images found on his laptop by his girlfriend, images he claims she knowingly accessed without his permission, which he alleged made the search illegal under Texas law because the images were found as a result of a violation of the Texas Computer Security statute. 9 6Id. State v. Johnson, 939 S.W.2d 586, 587 (Tex. Crim. App. 1996). Wehrenberg v. State, 416 S.W.3d 458, 468 (Tex. Crim. App. 2013); Pham v. State, 175 S.W.3d 767, 772 (Tex. Crim. App. 2005). 9Tex. Penal Code Ann. § 33.02. 16 7See 8See We review a trial court’s ruling on a motion to suppress under a bifurcated standard of review. 10 In conducting our review, “[w]e afford almost total deference to the trial court’s findings of historical facts that are reasonably supported by the record and to its resolution of mixed questions that turn on credibility or demeanor[.]” 11 “We review de novo a trial court’s legal conclusions and its resolution of mixed questions that do not turn on credibility and demeanor.” 12 As the judge of the credibility of the witnesses in a hearing on a motion to suppress, the trial court is the sole judge of the credibility of the witnesses. 13 A defendant claiming evidence is inadmissible under Article 38.23 because the evidence was illegally obtained by an individual not acting on behalf of the government has the initial burden to establish the individual obtained the evidence in violation of the law. 14 “Only when this burden is met does the State bear a burden to prove compliance.” 15 Still, v. State, 610 S.W.3d 487, 494 (Tex. Crim. App. 2020); Turrubiate v. State, 339 S.W.3d 147, 150 (Tex. Crim. App. 2013). 11Id. 12Id. 13State v. Ross, 32 S.W.3d 853, 855 (2000). 14State v. Robinson, 334 S.W.3d 776, 779 (Tex. Crim. App. 2011). 15Id. 17 10Lopez “the burden of persuasion is properly and permanently placed upon the shoulders of the moving party.” 16 “When a criminal defendant claims the right to protection under an exclusionary rule of evidence, it is his task to prove his case.” 17 When, as here, the trial court makes findings of fact, we determine whether the evidence when viewed in the light most favorable to the trial court’s ruling supports the trial court’s findings. 18 We will reverse the trial court’s ruling on a motion to suppress “only if it is arbitrary, unreasonable, or ‘outside the zone of reasonable disagreement.’” 19 In our review, we afford the party that prevailed on the motion the strongest legitimate view of the evidence and give that party all inferences that may be reasonably drawn from the evidence. 20 We will uphold the trial 175 S.W.3d at 773. 17Id. (cleaned up). 18State v. Kelly, 204 S.W.3d 808, 818 (Tex. Crim. App. 2006); see also State v. Duran, 396 S.W.3d 563, 571 (Tex. Crim. App. 2013). 19State v. Story, 445 S.W.3d 729, 732 (Tex. Crim. App. 2014) (quoting State v. Dixon, 206 S.W.3d 587, 590 (Tex. Crim. App. 2006)). 20Duran, 396 S.W.3d at 571. 18 16Pham, court’s ruling if it is reasonably supported by the record and is correct on any theory of law that applies to the case. 21 Analysis On appeal, Runyon argues the record does not support the trial court’s finding that Sally did not knowingly access Runyon’s laptop without Runyon’s effective consent. According to Runyon, the trial court abused its discretion in making this finding because in Runyon’s view, the evidence shows his “laptop remained off limits unless he was physically present.” As Runyon sees it, the record shows the trial court should have inferred from the evidence in the hearing that because he was not at home when Sally accessed his laptop, by accessing it she did so without having his effective consent. Runyon concludes that because the evidence doesn’t support the trial court’s finding that Sally did not knowingly access his laptop without his effective consent, her search of his laptop was illegal because it violated the Computer Security statute, making the State’s seizure of his laptop and its search illegal too. 22 445 S.W.3d at 732; Turrubiate, 399 S.W.3d at 150. 22Tex. Penal Code Ann. § 33.02. 19 21Story, Under the Computer Security statute, “[a] person commits an offense if the person knowingly accesses a computer, computer network, or computer system without the effective consent of the owner.”23 To establish a violation of this statute, the evidence must show the person who accessed the computer did so when they knew they didn’t have the effective consent of the computer’s owner to access the device. 24 Whether or not someone acts knowingly is left to the factfinder based on the inferences that the factfinder must draw from the evidence admitted in the trial based on the conduct of the person being accused of engaging in the conduct prohibited under the law. 25 Since Sally is the person Runyon accused of violating the law in his motion to suppress, his motion and the evidence in the hearing focused on whether Sally, when accessing Runyon’s laptop, knew she didn’t have his permission to access it, and whether the evidence police obtained following Sally’s report was § 33.02(a). State, 586 S.W.3d 413, 421 (Tex. App.—Houston [14th Dist.] 2017, pet. ref’d). 25See Tex. Penal Code Ann. § 6.03(b) (defining what it means under the Penal Code when a statute requires proof that a person acted knowingly or with knowledge). 20 23Id. 24Thomas v. “evidence obtained” in violation of the Constitution or the Texas exclusionary statute. 26 On appeal, Runyon argues he never gave Sally his express or apparent consent to use his laptop “while he was not at his home.” But under the Computer Security statute, the owner’s express consent isn’t required. That’s because the Penal Code allows consent to be proven by showing an owner’s consent was either “express or apparent.” 27 During the hearing, Sally testified that she and Runyon never discussed that they wouldn’t access each other’s “cell phones and laptops[.]” As the factfinder in the suppression hearing, the trial court could, in the exercise of its sound discretion, credit Sally’s testimony that no express agreement existed about accessing each other’s cell phones or laptops. The trial court could also reasonably reject Runyon’s testimony to the contrary, suggesting that Sally should have understood from a conversation they had before she moved in with him that she didn’t have his express permission to use his laptop. In that conversation, according Tex. Code Crim. Proc. Ann. art. 38.23(a). 27Tex. Penal Code Ann. § 1.07(11). 21 26See to Runyon, they discussed another couple who they knew that were having a problem in their relationship based on a breach of trust. As a result, the other couple had agreed to share all passwords “between them because they could not trust each other[.]” Runyon testified that during that conversation, he and Sally agreed that “we did not want that for our relationship.” From that conversation, Runyon argues, Sally should have understood that Sally didn’t have his permission to access his laptop, even though the conversation occurred over a year before Sally moved into his home. Turning to the issue of apparent (or implied) consent, Runyon argues the trial court failed to address material, uncontested facts that show Sally didn’t have “consent to access [Runyon’s] laptop when he was not present[.]” He also contends the trial court’s findings fail to address uncontested facts, which he argues show that Sally knew she didn’t have Runyon’s consent to access his laptop. We disagree. The evidence about whether Sally knew of an implied agreement prohibiting her from accessing Runyon’s laptop is conflicting. Under the bifurcated standard that we must use to review suppression rulings, we are bound by the trial 22 court’s findings on issues related to credibility and “who did what, when, where, how, or why[.]” 28 Here, the trial court heard testimony that before Sally found the pornographic images on Runyon’s laptop, Runyon allowed Sally to use his laptop and to access many other electronic devices that he owned in the home. On the day Sally found the images on Runyon’s laptop, Runyon left the laptop on, unlocked, and he didn’t take his laptop with him to work. By Runyon’s telling, the fact that Sally admitted she felt guilty because she was “snooping” shows she knew she didn’t have Runyon’s permission to access his laptop. According to Runyon, the trial court’s finding that Sally did not knowingly access his laptop without his permission conflicts with this evidence and with Sally’s testimony that she knew his laptop was protected with a password, which he didn’t share with her. Runyon also argues that in its findings, the trial court failed to consider Sally’s testimony that when she accessed Runyon’s laptop, Sally admitted she knew it wasn’t right: “[I]n my gut, I just didn’t feel like something was right, I think that’s what I felt.” Runyon concludes that 28Baird v. State, 398 S.W.3d 220, 226 (Tex. 2013). 23 the evidence is all consistent and shows that Sally “accessed [Runyon’s] laptop without his permission and knew he had not consented to her use of the laptop when he was not present.” First, we will address why we disagree with Runyon that Sally’s testimony she was snooping when she accessed Runyon’s laptop isn’t inconsistent with the trial court’s findings that Sally did not knowingly access Runyon’s laptop without his effective consent. As commonly used, the word snoop means “to look or pry in a sneaking or meddlesome manner : search intrusively or pryingly.” 29 Runyon argues that because Sally testified that she was snooping when she accessed Runyon’s laptop, Sally knew she didn’t have his permission to use his laptop when he wasn’t there. Even though we concede the trial court could have inferred Sally’s snooping meant that she didn’t have Runyon’s permission to access his laptop, we must view her testimony from the totality of the circumstances and in the light that is most favorable to the trial court’s 29Snoop, (2002). Webster’s Third New International Dictionary 2157 24 ruling. 30 As to Sally’s admission that she was snooping, the question is was it reasonable for the trial court to conclude that Sally did not have a clear understanding that she didn’t have Runyon’s apparent permission to access his laptop unless he was in the room. We conclude that whether the trial court’s resolution of that question is a reasonable one turns on Runyon’s burden to prove that Sally clearly understood she could not access his laptop. 31 In Baird, the Court of Criminal Appeals explained that when the issue of apparent consent turns on a matter the computer’s owner didn’t “explicitly verbalize” under the Computer Security statute, the party asserting a statutory violation occurred must prove that the computer’s owner conveyed a “clear and manifest understanding” to the person who accessed the computer that the person who accessed the computer did not have the right to access the owner’s computer. 32 Thus, the trial court could have reasonably reconciled Sally’s testimony that she was “snooping” as evidence that she v. Garcia-Cantu, 253 S.W.3d 236, 241 (Tex. Crim. App. 2008); Guitterez v. State, 221 S.W.3d 680, 687 (Tex. Crim. App. 2007). 31Baird, 398 S.W.3d at 229. 32Id. at 230. 25 30State felt guilty about prying into Runyon’s computer because she thought he might be cheating on her, not as evidence that she did so while having a clear understanding that the only times she could access Runyon’s laptop was when he was there. Second, as to the remaining conflicts Runyon points to in the evidence, we conclude the trial court was also entitled as the factfinder in the hearing to resolve those in favor of the ruling it made denying Runyon’s motion to suppress. For instance, the trial court could have reasonably believed that Runyon left his laptop on and unlocked the day Sally accessed the laptop, as Sally claimed. On that view of the evidence, Sally would not have needed a password to access the laptop. Alternatively, the trial court could have concluded that Runyon simply didn’t meet his burden of persuasion to establish that he ever made it clear to Sally that based on the fact he had allowed her to use his laptop in the past, she didn’t have his permission to use his laptop unless he was there with her and in the same room. In the hearing, Sally testified no express or implied agreement existed with Runyon about “when [she] could use certain electronic devices or not in the home[.]” Given the 26 deference we must afford to the trial court’s historical findings, on this record the trial court could have reasonably chosen to believe Sally’s testimony. In sum, Runyon simply offers a different view of the inferences that he argues the trial court should have drawn from the evidence than the ones the trial court chose to draw after deciding which witnesses it believed. But as the reviewing court, we must defer to the trial court’s findings of historical facts since its findings are supported by the evidence. 33 Because the trial court could reasonably conclude Runyon didn’t meet his burden of persuasion to establish Sally knowingly violated the Computer Security statute, the trial court applied the law properly in finding the State did not obtain a search warrant based on evidence illegally by another in violation of Article 38.23(a). 34 Because the trial court did not abuse its discretion in denying Runyon’s motion to suppress, the issues he raises in his appeals in trial court cause numbers 21-03-03965-CR and 21-03-03966-CR are overruled. id. at 227. 34Tex. Code Crim. Proc. Ann. art. 38.23(a); Thomas, 586 S.W.3d at 422-23. 27 33See Conclusion Because we conclude Runyon’s issues lack merit, we affirm the trial court’s judgments in trial court cause numbers 21-03-03965-CR and 2103-03966-CR. AFFIRMED. _________________________ HOLLIS HORTON Justice Submitted on May 18, 2023 Opinion Delivered August 16, 2023 Publish Before Horton, Johnson and Wright, JJ. 28

Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.