This post examines an opinion from the U.S. Army Court of Criminal Appeals: U.S. v. Schempp, 2016
WL 873852 (2016). The judge who wrote
the court’s opinion begins by explaining that a
military judge sitting as a general court-martial convicted appellant, contrary to his pleas, of two specifications
of possession of child pornography in violation of Article 134, Uniform Code of Military Justice, 10 [U.S. Code] § 934 (2012) [hereinafter UCMJ].
The military judge sentenced appellant to a dishonorable discharge, fifteen
months of confinement and reduction to the grade of E–1. The convening
authority approved the sentence as adjudged, to include 100 days of confinement
credit ordered by the military judge. The automatic forfeiture of all pay and
allowances was deferred and terminated on the appellant's expiration of term of
service.
Appellant's case is before this court
for review under Article 66, UCMJ. Appellant's counsel raises three assignments
of error, two of which merit discussion and relief.
U.S. v. Schempp,
supra.
The judge then outlined the facts that led to Schempp’s
prosecution and conviction:
In April of 2012, while conducting an
undercover operation to identify computers trading child pornography via the
internet, a Special Agent (SA) with the Naval Crime Investigative Services (NCIS) flagged appellant's Internet Protocol (IP) address as a `download
candidate’ of child pornography. Further investigation revealed that appellant's
IP address, a unique number assigned by appellant's internet service provider,
actively shared images of potential child pornography with other internet users
through a peer-to-peer program called `FrostWire.’ The NCIS agent downloaded
three digital images from appellant's shared FrostWire folder and confirmed
they were child pornography by comparing the images to the National Center for
Missing and Exploited Children's (NCMEC) database of known child victims.
NCIS, upon identifying appellant as an active
duty Army soldier, transferred the case to the Army Criminal Investigation Command (CID).
Pursuant to a military magistrate's
search authorization, CID collected from appellant's residence a Dell Alienware
tower computer (Dell) and an Iomega external hard drive (Iomega). CID then
obtained a second search authorization to conduct a digital forensic
examination of these seized items. CID's examination found child pornography on
both devices. All of the digital images on the Iomega were recovered from unallocated
space on the drive. Eight of the digital images on the Dell computer were
recovered from unallocated space. The remaining 72 images and 4 videos on the
Dell were in the active files.
U.S. v. Schempp,
supra.
Next, the judge outlined the legal standards that governed
the court’s review of Schempp’s arguments on appeal:
Article 66(c), UCMJ, establishes our
statutory duty to review a record of trial for legal and factual sufficiency de
novo. U.S. v. Walters, 58 M.J. 391, 395 (U.S. Court of Appeals for the Armed Forces 2003). Under Article 66(c), UCMJ, we may affirm only
those findings of guilty that we find correct in law and fact and determine,
based on the entire record, should be affirmed. Id.
The test for legal sufficiency of the
evidence is whether, viewing the evidence in a light most favorable to the
government, a fact-finder could rationally have found all of the essential
elements of an offense beyond a reasonable doubt. Jackson v. Virginia, 443 U.S. 307 (1979); U.S. v. Blocker, 32 M.J. 281 (U.S. Court of Military Appeals 1991). In resolving questions of legal sufficiency, this court
is `bound to draw every reasonable inference from the evidence of record in
favor of the prosecution.’ U.S. v. Craion, 64 M.J. 531, 534 (citations
omitted). In weighing factual sufficiency, we take `a fresh, impartial look at
the evidence,’ applying `neither a presumption of innocence nor a presumption
of guilt.’ U.S. v. Washington, 57 M.J. 394, 399 (U.S. Court of
Appeals for the Armed Forces 2002). `[A]fter weighing the evidence in the
record of trial and making allowances for not having personally observed the
witnesses, [we must be] convinced of the [appellant's] guilt beyond a
reasonable doubt.’ United States v. Turner, 25 M.J. 324, 325 (U.S.
Court of Military Appeals 1987).
U.S. v. Schempp,
supra.
As noted above, the opinion explained that while Schempp
raised three arguments on appeal, the court found it only needed to address two
of them. U.S. v. Schempp, supra. It
began with Schempp’s argument concerning the “images located in unallocated
space”. U.S. v. Schempp, supra. The
opinion explains that Schempp
alleges the evidence underlying
Specification 1 of The Charge and some of the evidence underlying Specification
2 of The Charge is legally insufficient to support a conviction because the
images at issue were found in the unallocated space of the Dell computer and
Iomega drive.
In Specification 1 of The Charge, the
court found appellant guilty of, on or about 20 June 2012, knowingly possessing
83 images of child pornography on the Iomega drive. In Specification 2 of
The Charge, the court found appellant guilty of, on or about 20 June 2012,
knowingly possessing 40 images and 2 videos containing child pornography.
Because of its charging decision, the
Government was required to prove for both specifications that the
appellant knowingly possessed the charged images and video
files `on or about 20 June 2012.’ Accordingly, the critical issue we must now
decide is not whether the appellant knowingly possessed these images and video
files at any time, but whether he possessed them on or about 20 June 2012.
U.S. v. Schempp, supra
(emphasis in the original).
The court goes on to explain that
[w]e conclude appellant did not possess
the 83 images underlying Specification 1 of The Charge, nor did he possess
eight of the images in Specification 2 of The Charge, which were found in
unallocated space. To support our conclusion, we first consider the
technical aspects associated with unallocated space prior to considering
whether a computer user can `possess’ a digital file, either actually or
constructively, if that file exists only in the unallocated space of a
computer.
According to the Government's expert
witness, Special Agent (SA) JB, all of the digital files charged in
Specification 1 of The Charge, and some of the digital files charged in
Specification 2 of the Charge, were deleted in December 2009, so appellant had
no access to them absent the use of forensic software. SA JB retrieved these
images using EnCase, a forensic software program that allows deleted images in
unallocated space to be seen. SA JB testified that a user does not have the
ability to access a digital file once it is moved into the unallocated space.
He further testified that, while freeware was available to undelete files in
unallocated space, he found no evidence that appellant had acquired or used
such a program. SA JB's testimony is consistent with the definition of
`unallocated space’ used in federal courts. See U.S. v. Hill, 750
F.3d 982, 988 n.6 (U.S. Court of Appeals for the 8th Circuit 2014) (`Unallocated
space is space on a hard drive that contains deleted data, usually
emptied from the operating system's trash or recycle bin folder, that
cannot be seen or accessed by the user without the use of forensic software') (emphasis in the original).
Such space is available to be written
over to store new information’) (quoting U.S. v. Flyer, 633 F.3d
911, 918 (U.S. Court of Appeals for the 9th Circuit 2011)); U.S.
v. Seiver, 692 F.3d 774, 776 (U.S. Court of Appeals for the 7th Circuit 2012) (explaining that when one deletes a file, that file goes
into a `trash’ folder; when one empties the `trash folder’ the file has not
left the computer because although the `trash folder is a wastepaper basket[,]
it has no drainage pipe to the outside’; the file may be `recoverable by
computer experts’ unless it has been overwritten) (citations omitted), cert.denied sub nom Seiver v. U.S., 133 S.Ct. 915 (2013).
U.S. v. Schempp, supra
(emphasis in the original).
The opinion goes on to explain that
`[p]ossession,’ for purposes of
determining if appellant knowingly possessed child pornography, has the same
definition as that used in Article 112a, UCMJ. See U.S.
v. Navrestad, 66 M.J. 262, 267 (U.S. Court of Appeals for the Armed
Forces 2008). `Possess,’ as used in that article, `means to exercise control of
something. Possession may be direct physical custody . . . or it may be
constructive. . . . Possession must be knowing and conscious.’ Manual for Courts–Martial, United States, pt. IV, ¶ 37.c (2). In Navrestad, the
Court of Appeals for the Armed Forces, using this definition of `possession,’
set aside a conviction for possession of child pornography as legally
insufficient where the evidence failed to show the defendant had actual or
constructive possession of child pornography. U.S. v. Navrestad, supra.
U.S. v. Schempp,
supra. The Manual for
Courts-Martial, United States definition of “possession” also appears in 10
U.S. Code § 912a, which you can find here.
The judge went on to explain that,
as the appellant was unable to access
any of the images in unallocated space, he lacked the ability to exercise
“dominion or control” over these files. Navrestad, 66 M.J. at
267; see Flyer, 633 F.3d at 919 (citing Navrestad and
holding that evidence was legally insufficient to prove knowing possession on
or about the date charged in the indictment); see also United
States v. Kuchinski, 469 F.3d 853, 863 (U.S. Court of Appeals for the 9th Circuit 2006) (holding
that in a situation in which `a defendant lacks knowledge about the cache
files, and concomitantly lacks access to and control over those files, it is
not proper to charge him with possession and control of the child pornography
images located in those files, without some other indication of dominion and
control over those images. To do so turns abysmal ignorance into knowledge and
a less than valetudinarian grasp into dominion and control’); U.S. v. Moreland, 665 F.3d 137 (U.S.Court of Appeals for the 5th Circuit 2011) (holding evidence was legally
insufficient to sustain conviction for possession of child pornography in which
Government failed to prove dominion and control over the digital images and
citing cases for the proposition that evidence is legally insufficient to show
constructive possession based solely on the fact that the accused possessed the
computer “without additional evidence of the [accused's] knowledge and dominion
or control over the images”).
U.S. v. Schempp,
supra.
The court then announced its holdings in the Schempp case:
As `possession’ for purposes of child
pornography requires the possession be both `knowing and conscious,’ U.S.
v. Navrestad, supra, we hold that the appellant did not `knowingly possess’
any of the 83 digital images in Specification 1 of the Charge nor did he
`knowingly possess’ eight of the digital images in Specification 2 of The
Charge that were all found in unallocated space on or about 20 June 2012, the
date charged.
We also conclude that the evidence was
legally insufficient to prove appellant actually or constructively possessed
the images on the date charged. For the evidence to be legally sufficient
on a constructive possession theory, a person must exercise `dominion or
control’ over the child pornography digital files.7Id.
Based on the technical aspects associated
with unallocated space, SA JB's testimony, and a lack of any evidence presented
that the appellant was a sophisticated computer user in possession of the
forensic tools or freeware necessary to retrieve digital files from unallocated
space, we conclude that the evidence is legally insufficient to prove
possession on or about the charged date of 20 June 2012. That is, all of the
evidence underlying Specification 1 of The Charge and eight of the images
underlying Specification 2 of The Charge are legally insufficient to support a
finding of guilty and therefor warrants relief.
We are, however, convinced beyond a
reasonable doubt that appellant knowingly possessed the remaining 32 images and
two videos alleged in Specification 2 of The Charge.
U.S. v. Schempp,
supra.
The court concluded its opinion by announcing that the
finding of guilty of Specification 1 of
The Charge is set aside and that Specification is DISMISSED. The court AFFIRMS
only so much of the findings of guilty of Specification 2 of The Charge as
finds that:
[Appellant] did, at or near Joint Base
Langley–Eustis, on or about 20 June 2012, knowingly and wrongfully possess
child pornography, to wit: 28 digital images and 2 videos of minors, or what
appears to be minors, engaging in sexually explicit conduct, on a Dell
Alienware Computer, such conduct being of a nature to bring discredit to the
armed forces.
We are able to reassess the sentence on
the basis of the error noted and do so after conducting a thorough analysis of
the totality of circumstances presented by appellant's case and in accordance
with the principles articulated by our superior court in U.S. v. Winckelmann, 73
M.J. 11 (U.S. Court of Appeals for the Armed Forces 2013). In evaluating
the Winckelmann factors, we first find no dramatic change in
the penalty landscape that might cause us pause in reassessing appellant's
sentence.
Additionally, appellant was tried and
sentenced at a general court-martial by a military judge and the nature of the
remaining offense still captures the gravamen of the original offenses and the
circumstances surrounding appellant's conduct. Finally, based on our
experience, we are familiar with the remaining offense so that we may reliably
determine what sentence would have been imposed at trial. We are confident that
based on the entire record and appellant's course of conduct, the military
judge would have imposed a sentence of at least that which was adjudged.
Reassessing the sentence based on the
noted errors and entire record, we AFFIRM the sentence as adjudged. We find
this reassessed sentence is not only purged of any error but is also
appropriate. All rights, privileges, and property, of which appellant has been
deprived by virtue of that portion of the findings set aside by our decision,
are ordered restored.
U.S. v. Schempp,
supra.
If the SA had shown that the files were deleted after June 2012 - would they have been considered in possession even though at the time of analysis they were in fact deleted?
ReplyDeleteAny details on how the SA determined they were deleted in December 2009?