United States v. Specialist CRAIG v. RANKINS ( 2012 )


Menu:
  • UNITED STATES ARMY COURT OF CRIMINAL APPEALS
    Before
    YOB, KRAUSS, and BURTON
    Appellate Military Judges
    UNITED STATES, Appellee
    v.
    Specialist CRAIG V. RANKINS
    United States Army, Appellant
    ARMY 20100494
    Headquarters, 3d Infantry Division and Fort Stewart
    Tara A. Osborn, Military Judge
    Lieutenant Colonel Shane E. Bartee, Staff Judge Advocate
    For Appellant: Mr. William E. Cassara, Esquire (argued); Captain A. Jason Nef, JA;
    Mr. William E. Cassara (on brief); Captain Robert A. Feldmeier.
    For Appellee: Captain Steve T. Nam, JA (argued); Lieutenant Colonel Amber J.
    Roach, JA; Captain Steve T. Nam, JA (on brief); Major Robert A. Rodrigues.
    16 October 2012
    -----------------------------------
    SUMMARY DISPOSITION
    -----------------------------------
    YOB, Senior Judge:
    Pursuant to his plea, a military judge, sitting as a general court-martial,
    convicted appellant of violating a lawful general order in violation of Article 92,
    Uniform Code of Military Justice, 
    10 U.S.C. § 892
     (2006) [hereinafter UCMJ].
    Contrary to his plea, the military judge convicted appellant of “knowingly and
    wrongfully possess[ing] eleven (11) images of child pornography, which conduct
    was prejudicial to good order and discipline in the Armed Forces and was of a nature
    to bring discredit upon the Armed Forces,” in violation of Article 134, UCMJ, 
    10 U.S.C. § 934
     (2006). The military judge sentenced appellant to a bad-conduct
    discharge, confinement for nineteen months, and reduction to the grade of E-1. The
    convening authority approved confinement for thirteen months and otherwise
    approved the remainder of the adjudged sentence.
    Appellant’s case is now before this court for review under Article 66, UCMJ.
    Appellant raises three assignments of error. After considering the record of trial,
    RANKINS—ARMY 20100494
    appellant’s assignments of error, the government’s answer, and oral argument, we
    find that appellant is not entitled to relief.
    In his first assignment of error, appellant alleges that the military judge erred
    by not suppressing the evidence seized from appellant’s computer. In essence,
    appellant argues that Specialist (SPC) TM and Sergeant (SGT) MS were acting as
    government agents when they viewed files on appellant’s computer in contravention
    of appellant’s reasonable expectation of privacy.
    On 25 September 2008, appellant brought his personal laptop computer to his
    place of duty, the “fuel standby shack” on Forward Operating Base (FOB) Iskan,
    Iraq. Appellant’s duties at that location included standing by to issue fuel to those
    who might need it. Around 1200 that day, SPC TM temporarily relieved appellant,
    and appellant left the shack to update his Servicemembers Group Life Insurance
    (SGLI) form. When appellant left, his computer was open and running in plain
    view. Specialist TM sat down at the desk with appellant’s laptop computer and saw
    it was playing a “Japanimation video.” After “roughly five minutes,” SPC TM
    closed the “Japanimation video” to look for something else to play on appellant’s
    computer. Specialist TM clicked on a folder titled “recently changed” in order to
    find a movie to play. Instead, SPC TM viewed “thumbnail images of child
    pornography” and saw film titles that indicated the files contained child
    pornography.
    Specialist TM testified that it was common for soldiers to use another’s
    computer to watch movies. This was done to help pass the time during a standard
    twelve hour shift at the fuel shack. Specialist TM’s squad leader, SGT MS, entered
    the fuel shack that day minutes after SPC TM found the images on appellant’s
    computer. When SGT MS entered the shack, SPC TM showed him what he had
    found on appellant’s computer.
    For purposes of the Fourth Amendment, a “search” constitutes “a government
    intrusion into an individual’s reasonable expectation of privacy.” United States v.
    Daniels, 
    60 M.J. 69
    , 71 (C.A.A.F. 2004) (citations omitted). To determine if
    appellant had a reasonable expectation of privacy in his computer files under the
    circumstances, we must ask “first, whether the individual by his conduct has
    exhibited an actual (subjective) expectation of privacy and, second, [whether] the
    expectation [is] one that society is prepared to recognize as reasonable.” 
    Id.
    (quoting Katz v. United States, 
    389 U.S. 347
    , 361 (1967)) (alterations in original and
    internal quotation marks omitted).
    First, appellant never prohibited SPC TM from using his computer or
    otherwise took measures to restrict the use of his computer by another fellow
    soldier. While the computer may have had a password protection feature, appellant
    did not activate this feature prior to leaving the shack. In fact, he did not turn his
    2
    RANKINS—ARMY 20100494
    computer off, carry his computer with him, or take any other steps to prevent third-
    party use of his computer prior to leaving the fuel shack. Thus, appellant’s conduct
    did not subjectively exhibit any actual expectation of privacy. See United States v.
    Barrows, 
    481 F.3d 1246
    , 1248–49 (10th Cir. 2007) (finding appellant’s “failure to
    password protect his computer, turn it off, or take any other steps to prevent third-
    party use” indicative of a lack of a subjective expectation of privacy).
    Second, appellant’s failure to take affirmative measures to limit a fellow
    soldier’s access to his computer in an area readily accessible by others makes any
    expectation unreasonable. See 
    id. at 1249
     (stating “[t]hose who bring personal
    material into public spaces, making no effort to shield that material from public
    view, cannot reasonably expect their personal materials to remain private”); United
    States v. Radar, 
    65 M.J. 30
    , 34 (C.A.A.F. 2007) (recognizing that “[i]n the personal
    computer context, courts examine whether the relevant files were password-
    protected or whether the defendant otherwise manifested an intention to restrict
    third-party access”) (citations omitted); United States v. Springer, 
    58 M.J. 164
    , 168–
    69 (C.A.A.F. 2003) (finding no reasonable expectation of privacy in the address
    information on the outside of a letter or the contents of information visible through
    an envelope because appellant knowingly exposed the envelope and contents to the
    public view). Thus, appellant’s first assignment of error is without merit.
    In his second assignment of error, appellant alleges that the military judge
    erred by not suppressing appellant’s statement to Special Agent (SA) MH of the U.S.
    Army Criminal Investigative Division Command (USACIDC). Specifically,
    appellant argues that his statement to SA MH was involuntary because SA MH used
    psychological coercion. We look to the totality of the circumstances in assessing
    whether appellant’s “will was overborne and his capacity for self-determination was
    critically impaired.” United States v. Chatfield, 
    67 M.J. 432
    , 439 (C.A.A.F. 2009)
    (quoting United States v. Bubonics, 
    45 M.J. 93
    , 95 (C.A.A.F. 1996)). In making this
    assessment, we consider “both the characteristics of the accused and the details of
    the interrogation.” 
    Id.
     (citations omitted).
    We find appellant’s second assignment of error to be without merit in light of
    appellant’s age (28), education (high school graduate), military experience (over
    five years), intelligence (103 GT score), the short length of the interrogation (less
    than 3 hours), the lack of any physical punishment such as food or sleep deprivation,
    law enforcement’s proper advisal of appellant’s right to silence and to an attorney,
    and the lack of any overbearing law enforcement tactics in this case. While SA MH
    did lie to appellant about how the images were discovered and did introduce the
    “merely curious” possession theory to appellant, lies or suggestions are “only a
    factor in the equation; they are not of themselves determinative of involuntariness.”
    United States v. Freeman, 
    65 M.J. 451
    , 455 (C.A.A.F. 2008). Here, all of the facts
    indicate that appellant made a voluntary statement to SA MH.
    3
    RANKINS—ARMY 20100494
    In his third assignment of error, appellant argues that the evidence is legally
    and factually insufficient to support the finding of guilty for knowingly and
    wrongfully possessing child pornography images. We disagree. First, appellant
    admitted to SA MH that he “did possess child pornography” and recognized in
    August 2008 that the images depicted in files on his computer constituted child
    pornography. He admitted he moved these files into a separate folder on his
    computer. While appellant stated he intended to delete the images in this separate
    folder at a later time, he admitted he maintained them for at least a month and that
    the images of child pornography could still be found on his computer despite the fact
    he eventually deleted the folder.
    Second, the government called SA BM, an expert in the field of computer
    forensic examinations. Special Agent BM found child pornography images in a
    folder titled “original images,” which is hidden from the user under the normal,
    default computer settings. An image goes into the “original images” folder only
    after the user edits the original condition of a file. Thus, the “original images”
    hidden folder only contains copies of images in their original, unedited version, and
    SA BM testified that the images in the “original images” folder were created on 28
    August 2008. Moreover, SA BM testified even if a user deletes an image, it will
    remain in the unallocated space of the computer until it is overridden by other files.
    Thus, SA BM expected to find images in the unallocated space of appellant’s
    computer. However, SA BM did not find a single image (child pornography or
    otherwise) in the unallocated space of appellant’s computer. This led SA BM “to
    conclude that more than likely an application of some sort had been run to wipe the
    unallocated space, to render files unrecoverable that were perhaps resident in [the]
    unallocated space.”
    Appellant’s statement and SA BM’s testimony regarding his forensic
    examination of appellant’s computer provide ample support for the finding that
    appellant knowingly possessed images of child pornography. Appellant admitted to
    possessing child pornography, edited images of child pornography, and then took
    steps to delete the images from the unallocated space of his computer. See United
    States v. Bass, 
    411 F.3d 1198
    , 1202 (10th Cir. 2005) (finding that appellant
    knowingly possessed child pornography because he attempted to use software
    programs to remove the images from the computer in question). As such, appellant’s
    third assignment of error is without merit.
    CONCLUSION
    On consideration of the entire record, we hold the findings of guilty and the
    sentence as approved by the convening authority to be correct in law and fact.
    Accordingly, the findings of guilty and the sentence are AFFIRMED.
    Judge KRAUSS and Judge BURTON concur.
    4
    RANKINS—ARMY 20100494
    FORTHE
    FOR  THE COURT:
    COURT:
    MALCOLM
    MALCOLM     H. H.
    SQUIRES, JR. JR.
    SQUIRES,
    Clerk
    Clerkof of
    Court
    Court
    5
    

Document Info

Docket Number: ARMY 20100494

Filed Date: 10/16/2012

Precedential Status: Non-Precedential

Modified Date: 4/17/2021