Loading Now

CROSSOVER: Digital Possession Proof in Child Porn Case: Forensic Phone Evidence and Admissions as Circumstantial ‘Control & Knowledge’—A Template for SAPCR/Protective-Order Fact Building

New Texas Court of Appeals Opinion - Analyzed for Family Law Attorneys

Jose Guevara-Molina v. The State of Texas, 04-24-00512-CR, March 25, 2026.

On appeal from 218th Judicial District Court, Atascosa County, Texas

Synopsis

The Fourth Court of Appeals affirmed six child-pornography possession convictions, holding the evidence legally sufficient under Jackson v. Virginia where the images were recovered from multiple locations on the defendant’s phone (including a private folder), the phone was seized from his person, and his admissions and related messages supported circumstantial findings of “control and knowledge.” The court also held the appellant waived his evidentiary complaint by objecting on hearsay grounds at trial but arguing authentication on appeal.

Relevance to Family Law

For Texas family litigators, this opinion is a ready-made blueprint for proving “possession/knowledge/control” of digital contraband or sexually explicit child-related content using forensic phone evidence plus party admissions—exactly the evidentiary posture that drives temporary orders, SAPCR custody restrictions, supervised possession, protective orders, and even geographic limitations. It also reinforces a practical appellate lesson that translates directly to family bench trials: if you do not object on the correct theory (e.g., authentication vs. hearsay), your record is vulnerable to waiver, even when the evidence is case-dispositive.

Case Summary

Fact Summary

The case arose out of a long-term romantic relationship between Molina and Elidia Calvillo. A family member discovered disturbing communications on Elidia’s phone suggesting sexual “role play,” sometimes with Elidia purportedly speaking as though she were her youngest daughter. Law enforcement obtained a search warrant for Molina’s phone, seized it from his person, and performed a forensic extraction.

The extraction recovered multiple sexually explicit images of a child. Critically for the sufficiency analysis, the forensic examiner located the images in more than one place on the device: within the phone’s file structure, accessible through the photo gallery, and inside a Samsung “private folder” (a feature typically requiring user access/authentication). In an interview, Molina admitted the phone was his, recited the phone number, and said he’d had it about a year. When confronted, he identified the child in the images as Elidia’s ten-year-old daughter, identified her by name, and made statements the jury could treat as consciousness-of-guilt and knowledge (including acknowledging texts about the photos and describing possessing them as “shitty”). The State also offered message traffic between Molina and Elidia referencing the child and body parts depicted.

A jury convicted Molina on six counts; the trial court imposed sixty-eight years’ confinement on each count. On appeal, Molina attacked legal sufficiency on “knowing possession” and separately challenged admission of message screenshots, but on a different theory than he raised at trial.

Issues Decided

  • Whether the evidence was legally sufficient to prove the defendant knowingly possessed child pornography found on his cell phone.
  • Whether the defendant preserved an evidentiary complaint regarding the admission of text/message evidence (and, relatedly, whether the trial objection comported with the appellate theory).

Rules Applied

  • Sufficiency standard: Jackson v. Virginia, 443 U.S. 307 (1979); Brooks v. State, 323 S.W.3d 893 (Tex. Crim. App. 2010) (single legal-sufficiency standard).
  • Elements/possession concepts: TEX. PENAL CODE § 43.26 (possession of child pornography); “possession” proven by direct or circumstantial evidence showing care, custody, control, or management plus knowledge of character/content. Wise v. State, 364 S.W.3d 900 (Tex. Crim. App. 2012).
  • Circumstantial proof and inference stacking: Hooper v. State, 214 S.W.3d 9 (Tex. Crim. App. 2007).
  • Non-mandatory factors framing: Krause v. State, 243 S.W.3d 95 (Tex. App.—Houston [1st Dist.] 2007, pet. ref’d) (illustrative circumstances, not a controlling test).
  • Preservation/waiver: TEX. R. APP. P. 33.1; TEX. R. EVID. 103; Yazdchi v. State, 428 S.W.3d 831 (Tex. Crim. App. 2014); Bekendam v. State, 441 S.W.3d 295 (Tex. Crim. App. 2014); Gibson v. State, 541 S.W.3d 164 (Tex. Crim. App. 2017); Pena v. State, 285 S.W.3d 459 (Tex. Crim. App. 2009).

Application

On sufficiency, the court told a familiar digital-possession story that family lawyers should recognize because it mirrors how factfinders evaluate “who controlled the device and what did they know.” First, custody/control: the phone was seized from Molina’s person; he admitted it belonged to him, knew the number, and said he’d had it for about a year. That permitted the jury to infer dominion over the device and its contents.

Second, knowledge: the forensic extraction showed the images were not limited to a single “accidental” location. The images existed in multiple device locations, including a user-restricted private folder, allowing the jury to infer retention/storage rather than inadvertent appearance. Layered onto that, Molina’s interview admissions were treated as affirmative knowledge evidence: he identified the child depicted by name and age, admitted he received photos of the daughters (including sexualized references), acknowledged communications about the photos, and made a statement the jury could read as inculpatory (“shitty”). The message content further supported inferential knowledge and motive to retain the images.

The court rejected Molina’s attempt to reframe sufficiency as requiring proof he created/saved/moved/manipulated the files or proof he viewed them. The statute criminalizes knowing possession, not authorship, file management, or viewing. It also declined to treat Krause as a rigid multi-factor checklist, reiterating that sufficiency remains the combined-force analysis under Jackson.

On evidence preservation, the opinion underscores a clean waiver lesson: at trial, counsel objected to the other party’s statements as hearsay (because the declarant was not present), but on appeal Molina argued the messages were inadmissible because his statements were not authenticated as authored/controlled by him. Because the trial objection did not put the court on notice of authentication concerns, the appellate complaint did not comport with the trial objection and was waived.

Holding

The court held the evidence was legally sufficient for a rational jury to find beyond a reasonable doubt that Molina knowingly possessed child pornography, relying on the combined force of (1) seizure of the phone from his person and his ownership admissions establishing control, (2) forensic proof the images existed in multiple locations including a private folder supporting knowledge/retention, and (3) admissions and message content supporting awareness of existence and character.

Separately, the court held Molina failed to preserve his evidentiary complaint because his appellate argument (authentication) did not match his trial objection (hearsay). The judgment was affirmed.

Practical Application

Criminal sufficiency opinions rarely get cited in SAPCR/protective-order briefing, but the logic here is directly exportable to family court because it operationalizes the proof path for “digital control + digital knowledge” without needing the unicorn evidence family courts often lack (e.g., a clean admission: “I saved it,” or a perfect access log). Use it to build (or attack) the evidentiary chain in three recurring family-law scenarios:

  • SAPCR conservatorship restrictions based on digital sexual misconduct: This case provides a structured way to argue that content found on a parent’s phone can support findings about judgment, risk to the child, and the need for supervised possession—even if you cannot prove the parent created the content or viewed it at a specific time.
  • Protective orders involving sexually explicit content and coercive communications: The “combined force” approach fits protective-order evidentiary hearings where judges weigh circumstantial control (device ownership, seizure/source, account linkage) plus communications showing awareness and intent.
  • Discovery and spoliation posture: The “multiple locations/private folder” detail is a practical target for family discovery: ask for private-folder exports, backup artifacts, and device-level forensic images; it also supports arguments that deletion or “I didn’t save it” narratives are less credible when artifacts appear across locations.

Just as important, the preservation discussion is a family-law warning: evidentiary objections at trial must match the issue you want on appeal. In family court, it is common to object “hearsay” when the real issue is authentication, relevance, unfair prejudice, or lack of foundation. This opinion is a reminder that mislabeling the objection can cost you the only appellate issue that matters.

Checklists

Digital Possession Fact-Building (SAPCR/Protective Order)

  • Identify and plead the device nexus (whose phone/account/device; how obtained; chain of custody).
  • Secure forensic extraction where proportional (or at least a targeted export with metadata).
  • Establish exclusive or primary control: passcode knowledge, SIM/phone number, billing, device found on person, routine use patterns.
  • Develop multi-location artifact proof: gallery + file system + private folder/secure folder + cloud backups + messaging app media folders.
  • Capture knowledge indicators: admissions, non-surprised reactions, file naming, prior related communications, “role play” or grooming language.
  • Tie the digital evidence to risk-based relief: supervised possession, no unsupervised contact, device restrictions, counseling, no-photo orders, and geographic limits.

Proving Authentication in Family Court (Avoiding the Waiver Trap)

  • Make a record that clearly states authentication: “Objection—lack of authentication under TRE 901; no evidence this account/device is controlled by X.”
  • Offer linkage facts: phone number, email handle, profile identifiers, contact card, device seizure, admissions, witness recognition of writing style, contemporaneous responses.
  • Address screenshots: who took them, when, how stored, whether complete, whether altered; request native exports where possible.
  • If multiple grounds apply, stack them: authentication, hearsay, relevance, Rule 403, best evidence (where appropriate), completeness (TRE 106).
  • Obtain an explicit ruling on each key ground (or a running objection that clearly specifies the ground).

Cross-Exam Targets When the Other Side Claims “I Didn’t Know It Was There”

  • Was the device on their person or otherwise under their exclusive access?
  • Is the content in a secure/private folder requiring deliberate access?
  • Does the content exist in more than one location (suggesting retention rather than transient caching)?
  • Are there corroborating messages referencing the content, the child, or specific body parts?
  • Did the party identify the child or otherwise demonstrate familiarity with the content?
  • Are there alternative users of the device, and is that claim supported by hard facts (other user profiles, shared passcodes, usage logs)?

Citation

Jose Guevara-Molina v. The State of Texas, No. 04-24-00512-CR (Tex. App.—San Antonio Mar. 25, 2026) (mem. op.).

Full Opinion

Read the full opinion here

Family Law Crossover

Although this is a criminal sufficiency/preservation decision, it can be weaponized in Texas divorce and custody litigation as a disciplined evidentiary template: prove (1) control of the device, (2) circumstantial knowledge of the content, and (3) reliability/authentication of the communications that contextualize the content. In a SAPCR, that trio supports aggressive temporary relief—supervised visitation, injunctions against photographing or messaging the child, device-access restrictions during possession periods, and accelerated forensic discovery—without having to overpromise on proof you often cannot get (exact download timestamps, definitive “I saved it,” or proof of viewing). And on the defensive side, it highlights the precise seams to attack: isolate the device-access story, challenge multi-location inferences with credible alternate-user proof, and preserve the right objections (especially authentication) so an adverse temporary-order record does not calcify into an unassailable final-order narrative.

~~5f619947-89ed-4274-bfdc-ef1df9b845c7~~

Share this content:

Tom Daley is a board-certified family law attorney with extensive experience practicing across the United States, primarily in Texas. He represents clients in all aspects of family law, including negotiation, settlement, litigation, trial, and appeals.