United States v. Sergeant First Class JAMES E. HOPKINS ( 2018 )


Menu:
  • UNITED STATES ARMY COURT OF CRIMINAL APPEALS
    Before
    BERGER, MULLIGAN, BURTON
    Appellate Military Judges
    UNITED STATES, Appellee
    v.
    Sergeant First Class JAMES E. HOPKINS
    United States Army, Appellant
    ARMY 20140913
    Headquarters, U.S. Army Fires Center of Excellence and Fort Sill (trial)
    Headquarters, U.S. Army Combined Arms Center and
    Fort Leavenworth (DuBay hearing)
    Jeffery R. Nance, Military Judge (arraignment)
    Charles L. Pritchard, Jr., Military Judge (trial)
    J. Harper Cook, Military Judge (DuBay hearing)
    Colonel David E. Mendelson, Staff Judge Advocate
    For Appellant: Captain Heather L. Tregle, JA; Captain Joshua G. Grubaugh, JA (on
    brief); Captain Katherine L. DePaul, JA; William E. Cassara, Esquire (on
    supplemental brief and supplemental reply brief following a DuBay Hearing);
    Lieutenant Colonel Christopher D. Carrier, JA; William E. Cassara, Esquire (on
    brief in response to specified issues upon reconsideration).
    For Appellee: Major Daniel D. Derner, JA (on brief); Colonel Mark H. Sydenham,
    JA; Lieutenant Colonel A.G. Courie III, JA; Major Melissa Dasgupta Smith, JA;
    Captain Jennifer A. Donahue, JA (on supplemental brief following a DuBay
    Hearing); Lieutenant Colonel Eric K. Stafford, JA; Captain Austin L. Fenwick, JA;
    Captain KJ Harris, JA; Captain Joshua Banister, JA (on brief in response to specified
    issues upon reconsideration); Lieutenant Colonel Eric K. Stafford, JA, Captain
    Austin L. Fenwick, JA (on reply brief in response to specified issues upon
    reconsideration).
    25 May 2018
    ------------------------------------------------------------------------------------------
    MEMORANDUM OPINION UPON RECONSIDERATION AFTER REMAND
    ------------------------------------------------------------------------------------------
    This opinion is issued as an unpublished opinion and, as such, does not serve as precedent.
    BURTON, Senior Judge:
    The government charged appellant with committing various forms of sexual
    misconduct against his two step-daughters, ZJEH and CBV, spanning from 2008 to
    2013. A military judge sitting as a general court-martial convicted appellant,
    HOPKINS—ARMY 20140913
    contrary to his pleas, of rape of a child, sexual assault, indecent act, sexual assault
    of a child, two specifications of sexual abuse of a child, wrongfully providing
    alcohol to a minor, and obstructing justice in violation of Articles 120, 120b, and
    134, Uniform Code of Military Justice (UCMJ), 
    10 U.S.C. §§ 920
    , 920b, 934. The
    military judge found appellant not guilty, in accordance with his pleas, of one
    specification each of producing and possessing child pornography in violation of
    Article 134, UCMJ. The military judge sentenced appellant to a dishonorable
    discharge, confinement for forty-two years, and reduction to the grade of E-1. The
    convening authority approved forty-one years and ten months confinement but
    otherwise approved the findings and sentence as adjudged.
    This case is before us on remand to address whether appellant was denied
    effective assistance of counsel and to “complete [our] Article 66(c), UCMJ, review.”
    United States v. Hopkins, ARMY 20140913 (C.A.A.F. 5 May 2016) (order). In our
    view, “completing” our statutory obligation requires a plenary review. See United
    States v. Swift, 
    76 M.J. 210
    , 216 (C.A.A.F. 2017). We issued a decision in the case
    addressing ineffective assistance of counsel and United States v. Hills, 
    75 M.J. 350
    (C.A.A.F. 2016), propensity error. United States v. Hopkins, ARMY 20140913,
    2017 CCA Lexis 431 (Army Ct. Crim. App. 26 June 2017) (summ. disp. on remand).
    Appellant asks us to reconsider this decision with respect to our analysis of
    appellant’s ineffective assistance of counsel claim, to evaluate the case pursuant to
    our superior court’s decision in United States v. Hukill, 
    76 M.J. 219
     (C.A.A.F.
    2017), and to address whether the search and seizure of items at appellant’s off-post
    residence was supported by probable cause. We fully adopt our previous decision
    with respect to appellant’s ineffective assistance of counsel claim, grant relief with
    respect to several specifications affected by the Hills and Hukill error, and determine
    the search of appellant’s residence complied with the Fourth Amendment.
    BACKGROUND
    The crimes appellant was convicted of committing against his two step-
    daughters included: digitally penetrating both girls’ genitalia on separate
    occasions 1; plying ZJEH and her friend JA with alcohol 2 as a means of facilitating
    1
    In Charge I, Specification 1, appellant was charged with rape of a child by digitally
    penetrating ZJEH’s genital opening with his finger when she was approximately ten
    to eleven years old. In Charge I, Specification 2, appellant was charged with sexual
    assault against CBV by digitally penetrating her vulva when she was seventeen.
    2
    In Charge III, Specification 3, appellant was charged with wrongfully providing
    alcohol to both JA and ZJEH when they were respectively fifteen and fourteen years
    old.
    2
    HOPKINS—ARMY 20140913
    another digital penetration of ZJEH’s vulva with his finger 3; committing lewd acts
    against both ZJEH and her friend JA 4; and surreptitiously video recording each of
    his step-daughters naked in the bathroom 5.
    The allegations against appellant arose approximately six months after
    appellant moved out of his marital home and filed for divorce against the girls’
    mother, BL. In June 2013, BL moved into appellant’s new residence in an attempt
    to reconcile. While BL was alone at the residence she found pictures on appellant’s
    Dell computer of appellant molesting her daughter ZJEH while ZJEH appeared to be
    asleep. 6 BL left the residence to confront appellant in person, but failed to secure
    the computer. While on the way to see appellant, she called him on the phone and
    confronted him. BL testified appellant stated “he didn’t remember doing it, that he
    must have been drunk.” She later returned to the residence to secure the computer
    and appellant was sitting on the front porch. He informed her “he had gotten rid of
    the computer, that it was destroyed as well as the SIM card.” She entered the
    residence and the computer was gone. 7
    3
    In Charge II, Specification 1, appellant was charged with sexual assault of a child
    against ZJEH by digitally penetrating her vulva with his finger when she was
    approximately fourteen years old.
    4
    In Charge II, Specification 2, appellant was charged with sexual abuse of a child by
    asking ZJEH, who was approximately fourteen years old, to take nude photographs
    of herself and provide them to him. In Charge II, Specification 3, appellant was
    charged with sexual abuse of a child by telling JA, who was approximately fifteen
    years old, she was jail bait and stating the two of them could have sexual intercourse
    together.
    5
    Appellant separately video-recorded CBV and ZJEH naked in the bathroom. In
    Charge I, Specification 3, appellant was charged with an indecent act by video
    recording the genitalia, breasts, and buttocks of CBV. The recordings also formed
    the basis for Charge III, Specifications 1 and 2, where appellant was respectively
    charged with producing and possessing child pornography resulting from three
    video-recordings of CBV and one video-recording of ZJEH. Appellant was acquitted
    of the child pornography charges.
    6
    The government used BL’s testimony regarding the existence of these photographs
    as uncharged Military Rule of Evidence [Mil. R. Evid.] 413 misconduct.
    7
    In the Specification of The Additional Charge appellant was charged with
    obstructing justice by destroying a DELL computer.
    3
    HOPKINS—ARMY 20140913
    LAW AND ANALYSIS
    A. The Erroneous Use of Propensity Evidence
    It is constitutional error to allow evidence of charged offenses to establish an
    appellant’s propensity to commit other charged offenses. See United States v.
    Guardado, 
    77 M.J. 90
    , 93 (C.A.A.F. 2017); Hukill, 76 M.J. at 220; Hills, 75 M.J. at
    352. Here, the military judge granted the government’s motion to use uncharged
    and charged misconduct as propensity evidence. The uncharged misconduct ruling
    was, and remains, uncontested by the parties. The defense counsel at trial preserved
    the issue as to the charged misconduct and appellant asserts error on appeal. The
    military judge detailed which offenses could be used as propensity evidence for
    other specific offenses. The military judge’s ruling is represented in the following
    diagram:
    Entirely Unaffected Charges:
    Ch. III, Sp. 3 – Wrongfully Providing Alcohol
    The Add. Ch., the Sp. – Obstructing Justice
    Ch. I, Sp. 2
    Sex Assault
    Digital
    Penetration of
    CBV                                                   Ch. II, Sp. 3
    (17 yrs old)            413                          Sexual Abuse of Child
    Propensity                   Statement of Jailbait and Sex
    to JA
    (15 yrs old)
    414
    Propensity
    Ch. II, Sp. 1                          Ch. II, Sp. 2
    Sex Assault of Child                  Sexual Abuse of Child
    413                                   Digital Penetration                  Request of Nude Pics
    Propensity                                    of ZJEH                                of ZJEH
    (14 yrs old)                          (14 yrs old)
    413
    Propensity
    Ch. I, Sp. 3
    Indecent Act                               414
    Video                                Propensity
    Recording of                                                 414                  Ch. I, Sp. 1
    CBV                                                   Propensity            Rape of Child
    Digital Penetration of
    Uncharged Misconduct                                ZJEH (10-11 yrs old)
    Testimony of BL saw pictures
    of appellant grabbing ZJEH’s
    breast and his finger on her                414
    genitals while ZJEH was asleep             Propensity
    (Less than 15 yrs old)
    4
    HOPKINS—ARMY 20140913
    Of considerable note, Specification 1 of Charge I, the digital penetration of
    ZJEH’s genital opening when she was approximately ten or eleven years old could
    not be used for any propensity purposes and remained unaffected by propensity
    evidence from any other charged offense, although it was affected by the
    unchallenged and uncharged propensity evidence. Furthermore, Specification 3 of
    Charge III, wrongfully providing alcohol to ZJEH and JA, and the Specification of
    The Additional Charge, obstructing justice, were entirely unaffected by any
    propensity ruling.
    The error, here, was preserved and is of constitutional dimensions. Hukill, 76
    M.J. at 221. The only remaining question is whether the error was harmless beyond
    a reasonable doubt with respect to each of the affected specifications. Id. An error
    “is not harmless beyond a reasonable doubt when there is a reasonable possibility
    that the error complained of might have contributed to the conviction.” Id. (internal
    citations omitted).
    In Guardado, the Court of Appeals for the Armed Forces (CAAF) did “not
    disturb [this court’s] finding that [the victim]’s testimony was credible” yet found
    “the lack of supporting evidence ma[de] it difficult to be certain that [MSG
    Guardado] was convicted [] on the strength of the evidence alone.” 77 M.J. at 94.
    The evidence against MSG Guardado consisted solely of the testimony of his
    accusers. Id. The court was not convinced that the erroneous propensity instruction
    played no role in MSG Guardado’s conviction and was unable to conclude the
    erroneous instruction was harmless. Id. at 95.
    In Hukill, the CAAF assessed prejudice by looking at the underlying evidence
    supporting the government’s charge. 76 M.J. at 223. The Court found “the
    government’s case was based entirely on the testimony of the victims and the alleged
    confession from [SPC] Hukill to his fiancée that he had been unfaithful, all of which
    [SPC] Hukill denied. No other evidence was offered.” Id. On these facts, the
    CAAF found, “the Government failed to prove there was no reasonable possibility
    that the error contributed to the verdict.” Id.
    Similarly, in United States v. Hills, there was “no eyewitness testimony other
    than the allegations of the accuser” and “there was no conclusive physical
    evidence.” 75 M.J. at 358. As such, the CAAF held there was no way to know
    whether the erroneous instructions “tipped the balance in the members’ ultimate
    determination.” Id.
    In contrast, our superior court has found no prejudice for a Hills error and
    summarily affirmed convictions where evidence included independent eyewitness
    testimony and incriminating admissions by an appellant. See United States v. Moore,
    
    77 M.J. 198
     (C.A.A.F. 2018); United States v. Luna, 
    77 M.J. 198
     (C.A.A.F. 2018).
    5
    HOPKINS—ARMY 20140913
    Here, our 26 June 2017 decision rested almost exclusively on the compelling
    and detailed nature of the testimony of appellant’s accusers. For each of the
    affected charges, we relied heavily on the military judge finding ZJEH to be a
    credible witness with respect to the unaffected charge of Specification 1 of Charge I
    and that uncharged propensity evidence was properly admitted against appellant.
    Yet, the credibility of the accusers in Guardado was not enough to render the
    erroneous propensity evidence harmless. 77 M.J. at 94. Here, the uncharged
    propensity evidence itself consisted solely of the testimony of BL, appellant’s ex-
    wife, who did not witness the actual uncharged acts, but rather testified she saw
    evidence of the acts on appellant’s computer. The digital evidence itself of the
    uncharged acts was never entered into evidence, as it was never found. We are
    mindful that this testimony is similar in nature to the alleged confession SPC Hukill
    made to his fiancée about being unfaithful. Hukill, 76 M.J. at 223. In both cases,
    the evidence consisted solely of testimony without any supporting physical evidence,
    and in both instances each appellant took the stand and disavowed not only the
    accusations, but the averred admissions.
    As such we are not convinced the erroneous use of propensity evidence played
    no role in appellant’s convictions with respect to Specification 2 of Charge I and
    Charge II and its specifications. We provide appropriate relief in our decretal
    paragraph below. Specification 1 of Charge I, Specification 3 of Charge III and the
    Specification of The Additional Charge were entirely unaffected by an improper use
    of propensity evidence.
    Here, the sole specification affected by the Hills error that was supported by
    physical or documentary evidence was Specification 3 of Charge I. This
    specification was supported by the digital evidence of the videos contained on Pros.
    Ex. 13. This is the type of evidence where we could rest assured that an erroneous
    propensity instruction did not contribute to the verdict. However, appellant
    additionally challenges the search and seizure that recovered this evidence.
    B. The Video Evidence of Specification 3 of Charge I
    In pretrial motions practice, trial defense counsel preserved challenges to the
    underlying video evidence supporting Specification 3 of Charge I, asserting the
    search of appellant’s residence was unsupported by probable cause and lacked
    particularity in violation of the Fourth Amendment. We hold the Federal Magistrate
    Judge had a substantial basis for finding probable cause and the warrant was not
    overbroad.
    6
    HOPKINS—ARMY 20140913
    1. The Fourth Amendment and Probable Cause
    The Fourth Amendment requires a search warrant be supported by probable
    cause. U.S. Const. amend. IV. Probable cause requires a sufficient nexus between
    the alleged crime and the item to be seized. United States v. Nieto, 
    76 M.J. 101
    , 106
    (C.A.A.F. 2017) (citing United States v. Rogers, 
    67 M.J. 162
    , 166 (C.A.A.F. 2009);
    United States v. Gallo, 
    55 M.J. 418
    , 421 (C.A.A.F. 2001)). “The question of nexus
    focuses on whether there was a ‘fair probability’ that contraband or evidence of a
    crime will be found in a particular place.” United States v. Clayton, 
    68 M.J. 419
    ,
    424 (C.A.A.F. 2010) (quoting United States v. Leedy, 
    65 M.J. 208
    , 213 (C.A.A.F.
    2007). “A nexus may be inferred from the facts and circumstances of a particular
    case, including the type of crime, the nature of the items sought, and reasonable
    inferences about where evidence is likely to be kept.” Nieto, 76 M.J. at 106 (internal
    quotations omitted).
    We review a military judge’s denial of a motion to suppress for an abuse of
    discretion and consider the evidence in the light most favorable to the prevailing
    party. United States v. Eppes, 
    2018 CAAF LEXIS 202
    , *9 (C.A.A.F. 2018). This
    court gives “‘great deference’ to [a] magistrate’s probable cause determination
    because of ‘the Fourth Amendment’s strong preference for searches conducted
    pursuant to a warrant.’” Nieto, 76 M.J. at 105 (quoting Illinois v. Gates, 
    462 U.S. 213
    , 236 (1983)). This court will uphold a military judge’s ruling to deny a
    suppression motion where the magistrate had a substantial basis for concluding
    probable cause existed. Eppes, 
    2018 CAAF LEXIS 202
    , at *12, *14 (citing Nieto,
    76 M.J. at 105). “A substantial basis exists ‘when based on the totality of the
    circumstances, a common-sense judgment would lead to the conclusion that there is
    a fair probability that evidence of a crime will be found at the identified location.’”
    Id. at *12 (quoting Nieto, 76 M.J. at 105 (quoting Gates, 
    462 U.S. at 238
    )).
    Nieto is a case in which the CAAF held a military magistrate did not have a
    substantial basis to determine probable cause existed to search a laptop. 76 M.J. at
    103. In Nieto, law enforcement suspected SPC Nieto of using his cell phone to
    surreptitiously record other male soldiers while they used the toilet on a Forward
    Operating Base. Id. at 104. Two non-commissioned officers looked through SPC
    Nieto’s phone and did not find any photographs or videos. Id. at 103. During the
    course of the investigation “somebody” had seen a cell phone and laptop on SPC
    Nieto’s bunk. Id. Law enforcement sought a search authorization to search and
    seize this cell phone and laptop. Id. In support of the search authorization a special
    agent submitted a sworn statement from one of the latrine victims, an affidavit
    concerning the investigation, and met in-person with the magistrate. Id. at 104. The
    sworn statement and the affidavit made no mention of a laptop computer. Id.
    During the in-person meeting with the magistrate the special agent informed the
    magistrate of his knowledge that Soldiers “normally” store photos taken with their
    7
    HOPKINS—ARMY 20140913
    phones on their laptops. Id. However, the agent did not provide any details about
    any laptop SPC Nieto may have owned. Id.
    The CAAF held the military magistrate did not have a substantial basis to find
    probable cause to search SPC Nieto’s laptop and the generalized profile about how
    soldiers “normally” store images was “technologically outdated.” Id. at 107-08.
    The CAAF concluded “at a minimum—there needed to be some additional showing
    such as the fact that [SPC Nieto] actually downloaded images (illicit or otherwise)
    from his cell phone to his laptop, stored images on his laptop, or transmitted images
    from his laptop. And yet, there was no such showing in [SPC Nieto’s] case.” Id. at
    107. The CAAF noted that even SPC Nieto’s ownership of a laptop was predicated
    on suspect information as the agent could not explain how he learned of the laptop.
    Id. at 108, n.4. In a footnote, the CAAF warned against “providing law enforcement
    with broad authority to search and seize all of an accused’s electronic devices and
    electronic media merely because the accused used a cell phone in furtherance of a
    crime,” stating such a generalized proposition would “run counter to the principle
    that law enforcement officials must provide specific and particular information in
    order for a magistrate to determine [probable cause].” Id. at 108, n.5.
    In contrast, Eppes is a case in which the CAAF held a civilian judge did have
    a substantial basis to determine evidence of fraud against the government would
    probably be recovered on a computer in Capt. Eppes’ home. 
    2018 CAAF LEXIS 202
    , at *14. The civilian judge authorized the search of Capt. Eppes’ home and his
    “computer hardware, computer software and digital media (e.g., computer
    equipment, digital storage devices, cameras, photographs, etc.) . . .” 
    Id. at *5
    . The
    affidavit supporting the warrant asserted Capt. Eppes had submitted numerous false
    documents to various individuals to include false claims made to a hotel’s personnel
    via email. 
    Id. at *14-15
    . The affidavit also asserted Capt. Eppes had previously
    engaged in similar misconduct involving fraud and Capt. Eppes was a law
    enforcement official. 
    Id. at 15
    .
    The CAAF held, “[t]he fact that the affidavit stated [Capt. Eppes] had used
    email to communicate with the hotel personnel raised a reasonable inference [Capt.
    Eppes] probably used a computer or other digital device or media as an
    instrumentality to pursue the suspected fraudulent scheme.” 
    Id.
     The CAAF held it
    was a reasonable inference that evidence of the criminal conduct probably resided on
    such devices and that because of Capt. Eppes’ law enforcement background it was a
    reasonable inference that such devices would be found at his residence rather than a
    shared workspace or government computer. 
    Id.
     The CAAF specifically cautioned,
    “[w]ithout some other incriminating facts, a search authority cannot reasonably infer
    that the average servicemember is more likely to store evidence of criminality on his
    home computer than on his work computer.” 
    Id. at 16, n.5
    .
    8
    HOPKINS—ARMY 20140913
    a. Ms. BL’s Discovery of the Crimes and Report to Law Enforcement
    It was late June when Ms. BL discovered approximately fifteen photographs
    of appellant molesting her daughter, ZJEH, on appellant’s computer in his new
    residence. After discussing the photographs with both of her daughters, Ms. BL
    reported appellant to the local police department on 12 July 2013. On 11 September
    2013, Ms. BL gave a sworn statement to U.S. Army Criminal Investigation
    Command (CID) special agents, informing them the computer was a Dell tower
    attached to the TV in the entertainment center of appellant’s living room and it may
    have been black and gray. She also informed them appellant told her in June he had
    destroyed both the computer and the SIM card to his phone when she confronted
    him. She stated she went into the house that night in June and the computer was
    gone. Reflecting on appellant’s comment she indicated that appellant did not have
    time to destroy the items that evening, but she was certain the items were gone now
    in mid-September. She informed investigators that the phone appellant used when
    she confronted him was a black Droid, possibly a Razor, and that she gave the
    iPhone she used that evening back to appellant because she was no longer on his
    phone plan.
    b. The Information Included in the Affidavit and Warrant
    On 25 September 2013, CID sought a search warrant of appellant’s off-post
    residence from a Federal Magistrate Judge in the Western District of Oklahoma. The
    affidavit supporting the warrant stated that the CID agent requesting the warrant had
    served since July 2012 as an agent, had participated in numerous criminal
    investigations, and had attended the Special Victims Unit Investigative Course and
    Child Abuse and Prevention Techniques Course. It stated appellant was suspected of
    committing sexual misconduct with minors to include producing child pornography.
    In pertinent part it stated:
    3. On July 12, 2013, Ms. [BL] reported the above
    allegations to Lawton Police Department, Lawton, OK
    (LPD). Ms. [BL] was initially interviewed by Lawton
    Police and later interviewed by this office on September
    11, 2013, wherein she stated sometime in late June, 2013,
    she was looking through old photographs on [appellant’s]
    computer when she ran across a folder labeled "Z". Ms.
    [BL] stated the folder contained approximately 15
    photographs of [ZJEH], who appeared to be drunk and
    passed out on [appellant’s] couch. Ms. [BL] stated the
    pictures appeared to be taken from [appellant’s] cell phone
    and she recognized his hand in them. Ms. [BL] stated
    some of the photographs depicted [appellant’s] hand
    lifting [ZJEH’s] shirt and fondling her breasts. Other
    9
    HOPKINS—ARMY 20140913
    photographs depicted [appellant’s] hand pulling [ZJEH’s]
    shorts and underwear down, exposing her genital area.
    Ms. [BL] stated she left the residence to confront
    [appellant], ·but couldn’t wait and decided to text him
    instead, asking, “What the hell is going on with pictures of
    [ZJEH] on your computer?” Ms. [BL] stated he told her
    through text message that he didn't remember taking the
    pictures and he must have been drunk. [Appellant] also
    told her that he was disgusted with himself and he didn't
    know why he would do that.
    4. Ms. [BL] further stated she went back to [appellant’s]
    residence to take the computer to the police but
    [appellant] arrived before she did and said he “destroyed”
    the computer and the SIM card from his phone. Ms. [BL]
    later asked [ZJEH] if [appellant] ever touched her
    inappropriately and both [ZJEH] and [CBV] disclosed to
    her at that time that [appellant] had molested them.
    The affidavit stated that MS. BL gave her cell phone back to appellant at the
    end of July 2013. It summarized interviews conducted with ZJEH and CBV
    regarding the sexual molestation appellant committed against each of them. The
    summaries included details that appellant used his cell phone to text sexual
    comments to both ZJEH and her friend JA. Lastly, the affidavit included a statement
    that “[b]ased on [the agent’s] training and experience as a CID Special Agent,
    suspects treat their child pornographic media as prized possessions and rarely delete
    or destroy the media.”
    The affidavit requested, “authorization to search appellant’s residence for
    information related to the listed offenses, in whatever form it may be found,
    physical, hard copy or electronic, specifically including any digital devices and
    storage media found therein, as more fully described in Attachment A, incorporated
    herein by reference, authorization to seize any such items or information found
    therein and authorization for the subsequent search of seized digital devices and
    storage media.” Attachment A consisted of three pages listing a litany of different
    digital devices, components, media, electronic access materials, and types of
    electronic evidence that could conceivably be seized and searched. The affidavit
    also included Attachment B, detailing the location of appellant’s off-post residence.
    The Federal Magistrate Judge authorized the search on 25 September 2013
    incorporating the affidavit by reference. Agents executed the warrant later that day,
    seizing several digital storage devices. The only item of evidentiary value recovered
    from appellant’s residence was an external hard drive. The hard drive contained
    10
    HOPKINS—ARMY 20140913
    three video-recordings of CBV and one video-recording of ZJEH each naked in the
    bathroom.
    c. Suppression Hearing and Ruling
    Trial defense counsel sought to suppress the videos of CBV and ZJEH based
    on a lack of probable cause and particularity contained in the warrant and underlying
    affidavit. At the suppression hearing neither party introduced any testimonial
    evidence, thereby limiting consideration of the issues to the four-corners of the
    warrant, affidavit, and attachments A and B to the affidavit.
    There was no indication that any of the other sworn statements or
    investigative files trial counsel asked the military judge to consider for purposes of
    determining the motion had been provided to the Federal Magistrate Judge on 25
    September 2013 or that the Federal Magistrate Judge had been provided any
    information orally for his consideration. In addition, the military judge requested
    the parties submit the custodial documents regarding the evidence collected from
    appellant’s residence for his consideration. These documents, App. Ex. XIII, show
    that a Dell computer and the external hard drive in question were both seized from
    the “entertainment center” in appellant’s living room. 8
    8
    At the suppression hearing, the parties did not enter any evidence regarding what if
    anything was collected from appellant’s residence or where such evidence was
    collected from within appellant’s home until the military judge specifically asked for
    the custody documents regarding the items sought to be suppressed. In this case,
    these documents failed to address the most material piece of information from the
    government’s perspective: the fact that the external hard drive on which the
    government’s evidence was found was actually connected to a Dell computer found
    in the same location as Ms. BL’s description detailed in the affidavit.
    Although not presented to the military judge for his consideration on the suppression
    motion, at trial the agent clarified “[t]he external hard drive was sitting on top of the
    computer” and “it was behind the closed cabinet door, but was connected to the
    computer.” This information was only introduced at the trial on the merits and
    therefore could not be considered in any analysis of whether or not the military
    judge abused his discretion in ruling on the motion to suppress. While this
    ultimately does not change the outcome in this case, there are cases where the
    connection of one piece of evidence to another or located nearby another that is
    clearly supported by probable cause will matter. It is also prudent practice to
    remember that application for additional warrants and search authorizations may be
    made once more specific information is known.
    11
    HOPKINS—ARMY 20140913
    After reviewing the law and detailing his findings of fact, the military judge
    made the following conclusions:
    It is true that the two girls did not state that they were
    aware of any movies or photographs being taken of them
    [in the bathroom] on those occasions. It is also true that
    Ms. [BL] stated that [appellant] told her he had destroyed
    the computer upon which she discovered the improper
    photos of [ZJEH] as well as the SIM card from his phone
    and that when she entered the residence after he told her
    those things she did not see the computer in its normal
    place. 9 Nevertheless, Ms. [BL] had seen evidence of child
    pornography and child molestation on the accused’s
    computer just weeks before the warrant was issued, there
    was evidence of other similar acts of providing alcohol to
    and molesting [ZJEH] and others in the form of the
    statements from the girls, Ms. [BL] did not see him
    destroy anything, the photos were likely created by one
    digital device and transferred to the computer, and based,
    upon the experience of [the CID agent], people who
    produce and possess child pornography tend to save it on
    other media than just the hard drive of a computer. 10
    Common sense and normal inferences provide a
    substantial basis to believe that the accused saved the
    same pictures or other similar recordings on other
    electronic media and that those and/or the original
    computer itself were still located in his residence.
    The military judge determined the Federal Magistrate Judge had a substantial
    basis to determine probable cause to conduct the search. He further held even if
    there was not actual probable cause the good faith exception to the exclusionary rule
    was satisfied because the CID agent “had an objectively reasonable belief that [the
    9
    Ms. BL’s statement that the computer was not in the house after she confronted
    appellant was not provided in the affidavit or attachments given to the Magistrate
    Judge, but was included in the sworn statements provided by trial counsel for the
    military judge to consider on the motion to suppress.
    10
    The actual statement in the affidavit asserts “suspects treat their [c]hild
    [p]ornographic media as prized possessions and rarely delete or destroy the media.”
    The affidavit does not actually mention saving files, copying them, or transferring
    them to other media.
    12
    HOPKINS—ARMY 20140913
    Federal Magistrate Judge] had a ‘substantial basis’ for determining the existence of
    probable cause and [the agent] objectively relied in good faith on the authorization
    (warrant).” Having determined the basis for probable cause, the military judge did
    not otherwise address trial defense counsel’s arguments regarding the over-breadth
    of the warrant and lack of particularity.
    d. A Substantial Basis for Probable Cause to Search Appellant’s Home
    We are mindful that our review is not to determine whether probable cause
    existed anew, but rather we review the information presented to the magistrate to
    determine whether the magistrate had a substantial basis for determining probable
    cause. Nieto, 76 MJ. at 105. “In evaluating the issuing search authority’s probable
    cause finding, we examine: 1) the facts known to the authority when he issued the
    warrant and 2) the manner in which he came to know these facts.” Eppes, 2018
    CAAF LEXIS, at *13. “Resolution of doubtful or marginal cases should be largely
    determined by the preference for warrants, and close calls will be resolved in favor
    of sustaining the search authority’s decision.” 
    Id. at *11-12
     (citations omitted).
    Here, appellant avers the affidavit supporting the Federal Magistrate Judge’s
    search warrant for appellant’s off-post residence did not provide a sufficient nexus
    between the alleged crime and the items to be seized because the affidavit contained
    generalizations based on the agent’s training and experience. However, the plain
    language of Nieto is not quite so narrow. Nieto does not stand for the proposition
    that a generalized profile may not be used, but rather a generalized profile itself is
    not enough to establish the necessary link of probable cause. 76 M.J. at 106 (“A law
    enforcement officer’s professional experience may be useful in establishing such a
    nexus. However, a law enforcement officer’s generalized profile about how people
    normally act in certain circumstances does not, standing alone, provide a substantial
    basis to find probable cause to search and seize an item in a particular case; there
    must be some additional showing that the accused fit that profile or that the accused
    engaged in such conduct.” (emphasis added) (internal citations omitted)).
    Here, the affidavit clearly establishes the requisite nexus of probable cause to
    find evidence of a crime on three specific devices: appellant’s computer; appellant’s
    phone; and the phone Ms. BL used, but gave back to appellant sometime near the
    end of July, 2013. 11 Paragraph 3 of the affidavit establishes a fair probability of
    11
    It is worth noting on 11 September 2013 law enforcement asked Ms. BL for
    descriptions of the items and determined they were: possibly a black and gray Dell
    tower computer previously attached to the TV in the entertainment center of
    appellant’s living room; a black Droid phone, possibly a Razor; and a Verizon
    iPhone. Yet, none of these descriptions were provided to the Federal Magistrate
    (continued . . .)
    13
    HOPKINS—ARMY 20140913
    finding digital evidence on the computer relating to the approximately fifteen
    photographs BL stated she saw in mid-June. Further, paragraph 3 also establishes a
    fair probability of finding on both phones text messages and call log correspondence
    regarding Ms. BL’s accusations to appellant upon her discovery of the photographs,
    along with his responses. It is also clear there was a fair probability of finding
    additional incriminating evidence on appellant’s phone because the videos of
    appellant molesting ZJEH appeared to have been recorded from a phone and
    appellant had texted sexual comments to both ZJEH and her friend JA.
    While there was probable cause to search these particular devices for evidence
    of a crime, the nexus between the information presented in the affidavit and the
    reasonable probability that the devices themselves would be found in appellant’s off-
    post residence is a much closer call. Here paragraph 4 of the affidavit establishes
    appellant informed Ms. BL that he destroyed both the computer and the SIM card
    from his phone. 12 However, it is a reasonable inference that appellant made self-
    serving statements on the night Ms. BL confronted him and given the short period of
    time between appellant being alerted of the photographs’ discovery and Ms. BL’s
    return to the residence it is likely the items were still in the home that evening. The
    problem is the time period between this confrontation and the actual search of
    appellant’s residence.
    Although the military judge characterized Ms. BL as having seen the
    computer “just weeks before the warrant issued,” a period of almost, if not more
    than, three months had elapsed. The affidavit establishes Ms. BL saw the
    photographs in late June 2013, yet the warrant was applied for and issued on 25
    September 2013. Although we disagree with the military judge regarding his
    characterization of the time period, we arrive at the same result because of the
    profile traits of suspects who have child pornography and the persisting nature of
    digital evidence.
    The affidavit underlying the warrant specifically referenced the CID agent’s
    training and experience that suspects treat their child pornographic media as prized
    possessions and rarely delete or destroy the media. The military judge extended this
    (. . . continued)
    Judge on 25 September 2017. The failure to include such details would potentially
    apply to a good faith analysis. See Mil. R. Evid. 311(c)(3); See also United States v.
    Carter, 
    54 M.J. 414
    , 419-422 (C.A.A.F. 2001).
    12
    The fact that Ms. BL went back into the house on the night she confronted
    appellant and personally saw that the computer was gone also was not provided to
    the Federal Magistrate Judge.
    14
    HOPKINS—ARMY 20140913
    rationale determining it was a fair inference appellant saved the same pictures or
    other similar recordings on other electronic media and that those and/or the original
    computer itself were still located in appellant’s residence. Such inferences, if
    reasonable, would correct for the staleness of the search and extend probable cause
    for the computer to other devices in the home, including the external hard drive on
    which the bathroom videos were ultimately found. It is here, this case finds itself
    between the circumstances of both Nieto and Eppes.
    Similar to the affidavit in Nieto, there was no information presented in the
    affidavit here regarding any type of external hard drive. Indeed, law enforcement
    had even less knowledge about the specific device on which the incriminating
    evidence was found than in Nieto. In Nieto, even though law enforcement did not
    provide any information about a laptop SPC Nieto may have owned to the military
    magistrate, at least they actually knew from “somebody” that SPC Nieto previously
    had a phone and laptop on his bunk. 76 M.J. at 103. While knowledge of SPC
    Nieto’s laptop was “suspect and credited to an unknown source,” it still existed in
    some form. Id. at 108. Here, law enforcement had no source of information
    regarding the existence of the external hard drive prior to actually conducting the
    search. Law enforcement’s knowledge about the extent and types of electronic
    devices appellant may have owned was speculative beyond the three items Ms. BL
    specifically identified: a Dell tower, a Droid phone, and an iPhone. This lack of
    specific knowledge is underscored by the wide net cast in the laundry list of generic
    terms of electronic devices in Attachment A to the affidavit for which law
    enforcement requested and received authority to search. 13
    13
    The terms used in Attachment A of “any digital devices and storage devices
    capable of being used to commit, further, or store evidence of the offense listed
    above” and “any digital devices capable of being used to facilitate the transmission,
    creation, display, encoding, or storage of data…” would have allowed law
    enforcement officers to seize a number of different smart devices in appellant’s
    home. Yet, the request never explicitly asked for the search and seizure of the
    devices known to have contained evidence: the two phones and Dell computer.
    While the breadth of the warrant here is justified by the previous transfer of the files
    and the connection between appellant’s behavior and the generic profile, law
    enforcement and magistrates would do well also to make specific requests rather
    than rely on laundry-list templates.
    This court recently had occasion to address what constitutes a specific request for
    disclosure within the context of discovery. See United States v. Ellis, __ M.J. __,
    
    2018 CCA LEXIS 155
    , * 21-28 (Army Ct. Crim. App. 
    27 Mar. 2018
    ) (First, the
    request must, on its face or by clear implication, identify the specific file, document
    or evidence in question. Second, unless the request concerns evidence in the
    (continued . . .)
    15
    HOPKINS—ARMY 20140913
    And yet, in Eppes our superior court upheld a similarly broad search for
    “computer hardware, computer software and digital media (e.g., computer
    equipment, digital storage devices, cameras, photographs, etc.)” for evidence of
    fraud against the government. Eppes, 
    2018 CAAF LEXIS 202
    , at *5. This warrant
    was upheld because the suspect, Capt. Eppes, had used an email account to
    communicate from an electronic device in furtherance of his scheme and clearly
    created fraudulent documents on an electronic device. 
    Id. at *15
    . The court
    reasoned that because Capt. Eppes was a law enforcement agent it was likely he used
    a device in his home rather than a shared computer at work. 
    Id. at *15-16
    . It is hard
    to reconcile the breadth of this search, where the affidavit did not include what
    specific devices were used or that Capt. Eppes even owned a particular device, with
    the cautionary note in Nieto of not “providing law enforcement with broad authority
    to search and seize all of an accused’s electronic devices and electronic media
    merely because the accused used a cell phone in furtherance of a crime.” Nieto, 76
    M.J. at 108, n.5.
    However, Eppes does not purport to overrule Nieto, but instead relies on it
    with respect to the proposition that “a nexus may be inferred from the facts and
    circumstances of a particular case, including the type of crime, the nature of items
    sought, and reasonable inferences about where evidence is likely to be kept.” Eppes,
    
    2018 CAAF LEXIS 201
    , at *12-13 (citing Nieto, 76 M.J. at 106). The CAAF
    rejected the generic profile and inference in Nieto about how servicemembers
    “normally” store images as outdated. Without a link between the inference that a
    transfer of data between the phone and the laptop occurred to SPC Nieto’s actual
    behavior, probable cause to seize the laptop was lacking. 76 M.J. at 107. It was for
    this reason there needed to be some additional showing that SPC Nieto actually
    downloaded images from his phone to his laptop, stored images on his laptop, or
    transmitted images from his laptop. Id. This necessary link was present in Eppes.
    (. . . continued)
    possession of the trial counsel, the request must reasonably identify the location of
    the evidence or its custodian. Third, the specific request should include a statement
    of the expected materiality of the evidence to preparation of the defense's case
    unless the relevance is plain). While such an analysis does not dictate the
    constitutional requirements of the particularity clause, it provides a useful rubric for
    practitioners as to what should be included in both an affidavit and authorization.
    While there is not a direct correlation between the ability to specify and detail the
    items and evidence sought and whether a search for such items is supported by
    probable cause, the extent to which a drafter can: 1) identify the specific file,
    document or evidence in question; and 2) articulate the items’ materiality to the
    crime under investigation, certainly bears on our ability to assess whether there was
    a substantial basis for an issuing official to conclude probable cause existed.
    16
    HOPKINS—ARMY 20140913
    In Eppes the CAAF made clear that “without some other incriminating facts, a
    search authority cannot reasonably infer that the average servicemember is more
    likely to store evidence of criminality on his home computer than on his work
    computer.” Eppes, 
    2018 CAAF LEXIS 202
    , *16, n.5. The necessary link between
    Capt. Eppes’ known use of an electronic device as an instrumentality of the crime
    and the likelihood that such a device would be found in Capt. Eppes’ home was “the
    specialized knowledge and training about criminal investigative techniques and
    where individuals engaged in criminal conduct might secret the fruits and
    instrumentalities of their crimes” that was particularized to Capt. Eppes through his
    law enforcement background. 
    Id. at *15-16
    . It was this information specific to
    Capt. Eppes that created a fair inference the instrumentalities of his frauds would be
    found in his residence.
    Unlike Nieto and like Eppes, the necessary link between a generic profile and
    appellant’s actual behavior is present in the facts and circumstances of this case.
    Here, the description of the fifteen photographs Ms. BL saw that was included in
    paragraph 3 of the affidavit were indicative of appellant producing and possessing
    child pornography. This linked appellant’s actual behavior to the generic profile in
    the affidavit. Furthermore, the affidavit also included information indicating
    appellant had already copied and transferred the files. The affidavit specifically
    included Ms. BL’s description that “the pictures appeared to be taken from
    appellant’s cell phone and she recognized his hand in them.” As Ms. BL found the
    pictures on appellant’s computer, appellant had necessarily transferred the files that
    appeared to have been taken with his phone. As a result, appellant’s behavior of
    producing images that appeared to be child pornography with one device and his
    specific transfer and storage of these images to a separate device linked his behavior
    with the general profile that suspects of child pornography treat their child
    pornographic media as prized possessions and rarely delete or destroy the media.
    Just as in Eppes, together these facts establish that the issuing magistrate judge
    could reasonably have inferred, given the nature of the criminal activity under
    investigation, that appellant was likely to still have evidence on other devices in his
    home. 14 This inference was all the more reasonable with respect to seizing the
    external hard drive, which as a device has the singular purpose of storing transferred
    information.
    14
    Admittedly this inference is based on a mere fifteen months of experience of the
    investigating agent, where it is unknown how many and what particular types of
    cases the agent investigated. However, unlike the technologically outdated profile
    in Nieto concerning how servicemembers “normally” store images from their
    cellphones on their laptops, here we find no reason to question the premise of the
    profile that suspects of child pornography treat their child pornographic media as
    prized possessions and rarely delete or destroy the media. 76 M.J. at 107.
    17
    HOPKINS—ARMY 20140913
    Lastly, the inferences that can be drawn about digital evidence are
    distinguishable from other types of evidence with respect to the potential staleness
    of probable cause. Unlike the cocaine in a suspected drug case or the knife in a
    suspected murder, digital evidence in a suspected child pornography case has a high
    degree of persistence. Unlike the contraband itself in a drug case where the cocaine
    is consumed upon use, each use of the files in a child pornography case does nothing
    to consume the contraband. Further the ease with which the contraband itself may
    be replicated, transferred, hidden, and stored amongst devices renders it more likely
    that evidence of the contraband will persist. Even the destruction of digital evidence
    is unlike the destruction of physical evidence in that is often kept and is unknown to
    the lay user. See generally United States v. Hill, 
    750 F.3d 982
    , 987 n.6 (8th Cir.
    2014) (“Unallocated space is space on a hard drive that contains deleted data,
    usually emptied from the operating system’s trash or recycle bin folder, that cannot
    be seen or accessed by the user without the use of forensic software. Such space is
    available to be written over to store new information.”) (quoting United States v.
    Flyer, 
    633 F.3d 911
    , 918 (9th Cir. 2011)); United States v. Seiver, 
    692 F.3d 774
    , 776
    (7th Cir. 2012) (explaining that when one deletes a file, that file goes into a “trash”
    folder; when one empties the “trash folder” the file has not left the computer
    because although the “trash folder is a wastepaper basket[,] it has no drainage pipe
    to the outside;” the file may be “recoverable by computer experts” unless it has been
    overwritten) (citations omitted).
    Thus, despite a nearly three month lapse in time between discovery of the
    apparent child pornography on appellant’s computer and the search of his home, it
    was a reasonable inference that evidence of child pornography would still be found
    because of both the profile traits of suspects who have child pornography and the
    persisting nature of digital evidence. Given the Fourth Amendment’s strong
    preference for searches conducted pursuant to a warrant and the commonsense
    manner in which we are required to interpret affidavits, this inference is one the
    issuing judge reasonably could have made. Eppes, 
    2018 CAAF LEXIS 202
    , *12-13.
    As such, the Federal Magistrate Judge had a substantial basis for finding probable
    cause regarding the search of the residence and the military judge did not abuse his
    discretion in ruling the warrant issued for the search was supported by probable
    cause.
    2. The Particularity Requirements of the Fourth Amendment
    The Fourth Amendment states, “no Warrants shall issue, but upon probable
    cause, supported by Oath or affirmation, and particularity describing the place to be
    searched, and the persons or things to be seized.” U.S. Const. amend. IV. At trial,
    the defense suppression motion challenged the warrant in part as being overbroad.
    As previously noted, the warrant at issue approves a search for a three-page litany of
    digital devices, components, media, electronic access materials, and types of
    electronic evidence that could conceivably be seized and searched.
    18
    HOPKINS—ARMY 20140913
    We review the issue of whether a warrant was overbroad de novo. United
    States v. Maxwell, 
    45 M.J. 406
    , 420 (C.A.A.F. 1996). The Fourth Amendment
    requires warrants to particularly describe the place to be searched and things to be
    seized so that the search will be carefully tailored to its justifications. Maryland v.
    Garrison, 
    480 U.S. 79
    , 84 (1987).
    The CAAF addressed the difficulties in applying Fourth Amendment search
    requirements to electronic devices to ensure that such searches are “expansive
    enough to allow investigators access to places where incriminating materials may be
    hidden, yet not so broad that they become the sort of free–for–all general searches
    the Fourth Amendment was designed to prevent.” United States v. Richards, 
    76 M.J. 365
    , 370 (C.A.A.F. 2017). The CAAF asserted that “[d]espite the importance of
    preserving this particularity requirement, considerable support can be found in
    federal law for the notion of achieving a balance by not overly restricting the ability
    to search electronic devices.” 
    Id. at 369
    .
    The particularity requirements of the Fourth Amendment and the overbreadth
    of a warrant are intrinsically linked to probable cause. Probable cause determines
    the lawful confines of the search and in turn whether the warrant has limited its
    authorization to those confines. Here, although a search for appellant’s Dell tower
    computer, Droid phone, and iPhone were clearly supported by probable cause, they
    were not the only items in appellant’s residence that were likely to contain evidence
    of the crimes under investigation. Appellant’s specific behavior of transferring
    apparent child pornography that he produced from one device to another within his
    home combined with the investigator’s informed opinion that “suspects of child
    pornography treat their child pornographic media as prized possessions and rarely
    delete or destroy the media,” made it a reasonable inference that digital evidence of
    the suspected crimes would be found on other, as of yet, unidentified devices and
    media within appellant’s home. Probable cause supported the search of appellant’s
    home for other such devices and evidence contained therein, and that is exactly what
    the warrant authorized. We therefore do not find the warrant was overbroad and
    affirm Specification 3 of Charge I.
    CONCLUSION
    The findings of guilty of Specification 2 of Charge I and Charge II and its
    specifications are set aside. The remaining findings of guilty are affirmed. The
    sentence is set aside. The same or a different convening authority may order a
    rehearing on Specification 2 of Charge I and Charge II and its specifications and the
    sentence. If the convening authority determines a rehearing on those charges is
    impracticable, the convening authority may dismiss the charges and order a
    rehearing on the sentence only. If the convening authority determines that a
    rehearing on the sentence likewise is impracticable, the convening authority may
    19
    HOPKINS—ARMY 20140913
    reassess the sentence, affirming no more than a dishonorable discharge, confinement
    for twenty years, and reduction to the grade of E-1. 15
    Chief Judge BERGER and Senior Judge MULLIGAN concur.
    FOR
    FOR THE
    THE COURT:
    COURT:
    MALCOLM H.  H. SQUIRES,
    SQUIRES, JR.
    JR.
    MALCOLM
    Clerk of
    Clerk of Court
    Court
    15
    In any event appellant will remain convicted of rape of a child, indecent act,
    wrongfully providing alcohol to ZJEH and JA, and obstructing justice. In
    reassessing the sentence we are satisfied that the sentence adjudged, absent the
    propensity error, would have been at least a dishonorable discharge, confinement for
    twenty years, and reduction to the grade of E-1. See United States v. Sales, 
    22 M.J. 305
    , 308 (C.M.A. 1986) and United States v. Winckelmann, 
    73 M.J. 11
    , 15-16
    (C.A.A.F. 2013). This reassessment being both appropriate and purging the record
    as it stands of error does not otherwise limit the sentence that may be adjudged at a
    rehearing. See UCMJ, art. 63.
    20
    

Document Info

Docket Number: ARMY 20140913

Filed Date: 5/25/2018

Precedential Status: Non-Precedential

Modified Date: 9/18/2019