Barlow countered that many homes have people coming and going. He argued that did not mean Boutwell was innocent.
“There are guys who come into my house all the time, that doesn’t mean they’re sexually abusing my daughter,” Barlow said. “What Mr. Boutwell wants you to think is that there is reasonable doubt.”
The State spent much of the trial establishing that Boutwell used a “guest computer” that was found to contain the more than 60 contraband photos of the victim. State witnesses testified to discovering resumes with the defendant’s name, programs and games he admitted to downloading and more than a hundred anime and henti photos. Boutwell testified that he does enjoy Japanese anime and produces anime art of his own, but denies recognizing some of the images admitted into evidence by the State.
In his testimony, Boutwell said he had the password to the computer in question, but said the password was simply in his former girlfriend’s name. He added that the computer did not always require the password. Ingham asked his client if he had much knowledge about computers.
“I have an understanding of them,” Boutwell said.
Boutwell also confirmed for Ingham that he knows deleting pictures or files from a computer does not remove them entirely. He listed techniques for erasing files from a system, such as removing and replacing the hard drive, putting a magnet on it or creating large image files to take up the space. Barlow asked if Boutwell ever used any of these techniques.
“I never had a need to,” Boutwell said.
Ingham asked the jurors why the defendant would not have utilized one of these methods if he was trying to destroy the evidence. He implied this showed that Boutwell had no knowledge of the photographs.
In response, Barlow asked jurors if they ever quickly hid or deleted a Christmas list or similar document on their computers to prevent a family member from seeing it. He further asked them if they ever thought that loved one would search through deleted files to find it. He said Boutwell never guessed police and forensic experts would get possession of the computer.