-
UNITED STATES ARMY COURT OF CRIMINAL APPEALS Before TOZZI, CELTNIEKS, and BURTON Appellate Military Judges UNITED STATES, Appellee v. Specialist ANTHONY T. DAVENPORT United States Army, Appellant ARMY 20150322 Headquarters, Joint Readiness Training Center and Fort Polk Randall Fluke, Military Judge (arraignment) Kenneth Shahan, Military Judge (trial) Colonel Jan E. Aldykiewicz, Staff Judge Advocate For Appellant: Lieutenant Colonel Jonathan F. Potter, JA; Major Christopher D. Coleman, JA; Captain Amanda R. McNeil Williams, JA (on brief); Lieutenant Colonel Christopher D. Carrier, JA; Major Andres Vazquez, Jr., JA; Captain Scott A. Martin, JA (on reply brief). For Appellee: Colonel Mark H. Sydenham, JA; Lieutenant Colonel A.G. Courie III, JA; Major Anne C. Hsieh, JA; Major Lionel C. Martin, JA (on brief). 19 December 2016 ---------------------------------- MEMORANDUM OPINION ---------------------------------- This opinion is issued as an unpublished opinion and, as such, does not serve as precedent. BURTON, Judge: A military judge sitting as a general court-martial convicted appellant, contrary to his pleas, of two specifications of distributing child pornography, two specifications of possession of child pornography, and two specifications of possession of child erotica in violation of Article 134, Uniform Code of Military Justice,
10 U.S.C. § 934(2006 & Supp. V 2012; 2012) [hereinafter UCMJ]. The military judge sentenced appellant to a bad-conduct discharge, twenty-one months of confinement, and reduction to the grade of E-1. The convening authority approved the sentence as adjudged. DAVENPORT—ARMY 20150322 Appellant’s case is before this court for review under Article 66, UCMJ. Appellant’s counsel raises two assignments of error which merit discussion but no relief. 1 FACTS Appellant’s internet provider (IP) address was identified as viewing child pornography. On 10 June 2013, appellant was questioned by the Criminal Investigation Command (CID). He provided a sworn statement to CID and admitted to downloading child pornography on his laptop within the last five to six months and viewing images of child pornography on his laptop. Appellant stated that he would view the images of child pornography a few times and then he would delete them. Appellant further admitted that he distributed images of child pornography six to eight months before his admissions. Appellant’s laptop and cell phone were seized on 10 June 2013. A forensic examination of these devices revealed an internet history with terms commonly used for child pornography, such as “Lolita,” “pedo” and “r@ygold.” The forensic exam also discovered child pornography images in the unallocated space of appellant’s computer and in the “cache” of appellant’s cell phone. LAW AND DISCUSSION Article 66(c), UCMJ, establishes our statutory duty to review a record of trial for legal and factual sufficiency de novo. United States v. Walters,
58 M.J. 391, 395 (C.A.A.F. 2003). Under Article 66(c), UCMJ, we may affirm only those findings of guilty that we find correct in law and fact and determine, should be affirmed based on the entire record.
Id.The test for legal sufficiency of the evidence is whether, viewing the evidence in a light most favorable to the government, a fact-finder could rationally have found all of the essential elements of an offense beyond a reasonable doubt. Jackson v. Virginia,
443 U.S. 307, 318-19 (1979); United States v. Blocker,
32 M.J. 281, 284-85 (C.M.A. 1991). In resolving questions of legal sufficiency, this court is “bound to draw every reasonable inference from the record in favor of the prosecution.” United States v. Craion,
64 M.J. 531, 534 (citations omitted). In weighing factual sufficiency, we take “a fresh, impartial look at the evidence,” applying “neither a presumption of innocence nor a presumption of guilt.” United States v. Washington,
57 M.J. 394, 399 (C.A.A.F. 2002). “[A]fter weighing the evidence in the record of trial and making allowances for not having personally observed the witnesses, [we must be] convinced of the [appellant's] guilt beyond a reasonable doubt.” United States v. Turner,
25 M.J. 324, 325 (C.M.A. 1987). 1 Though appellant’s brief states that matters are personally raised by appellant pursuant to United States v. Grostefon,
12 M.J. 431(C.M.A. 1982), we have verified that no matters were in fact presented. 2 DAVENPORT—ARMY 20150322 1. Images Located in Unallocated Space Appellant alleges the evidence underlying Specifications 5 and 7 of The Charge is legally insufficient to support a conviction because the images at issue were found in the unallocated space of appellant’s computer. In Specification 5 of The Charge, the court found appellant guilty of knowingly possessing one image of child pornography on his laptop between on or about 12 January 2012 and about 10 June 2013. 2 In Specification 7 of The Charge, the court found appellant guilty of knowingly possessing three images containing child erotica on his laptop between on or about 12 January 2012 and on or about 10 June 2013. The government was required to prove for both specifications that the appellant knowingly possessed the charged images on his laptop between on or about 12 January 2012 and on or about 10 June 2013. Accordingly, the critical issue we must now decide is not whether the appellant knowingly possessed these images at any time, but whether he possessed them on his laptop between on or about 12 January 2012 and on or about 10 June 2013. We conclude appellant did possess the four images underlying Specifications 5 and 7 of The Charge that were found in unallocated space between on or about 12 January 2012 and or about 10 June 2013. To support our conclusion, we first consider the technical aspects associated with unallocated space before considering whether a computer user can “possess” a digital file, either actually or constructively, if that file exists only in the unallocated space of a computer. According to the government’s witness, Special Agent (SA) KT, all of the digital files charged in Specifications 5 and 7 of The Charge were found in the unallocated space, which is a “temporary holding area for deleted files.” SA KT retrieved these images using EnCase, a forensic software program that allows deleted images in unallocated space to be viewed. According to SA KT, a user does not have the ability to access a digital file once it is moved into unallocated space without utilizing specialized software; there was no evidence of such software on appellant’s computer. This testimony is consistent with the definition of “unallocated space” used in federal courts. See United States v. Hill,
750 F.3d 982, 988 n.6 (8th Cir. 2014) (“Unallocated space is space on a hard drive that contains deleted data, usually emptied from the operating system’s trash or recycle bin folder, that cannot be seen or accessed by the user without the use of forensic software. Such space is available to be written over to store new information.”) (quoting United States v. Flyer,
633 F.3d 911, 918 (9th Cir. 2011)); United States v. 2 Appellant was charged with possession of five images; however he was found not guilty of four of the images. 3 DAVENPORT—ARMY 20150322 Seiver,
692 F.3d 774, 776 (7th Cir. 2012) (explaining that when one deletes a file, that file goes into a “trash” folder; when one empties the “trash folder” the file has not left the computer because although the “trash folder is a wastepaper basket[,] it has no drainage pipe to the outside;” the file may be “recoverable by computer experts” unless it has been overwritten) (citations omitted). 3 Child pornography found in unallocated space can support a conviction for possession of child pornography. United States v. McArthur,
573 F.3d 608, 614-15 (8 th Cir. 2009). “Possession,” for purposes of determining if appellant knowingly possessed child pornography, has the same definition as that used in Article 112a, UCMJ. See United States v. Navrestad,
66 M.J. 262, 267 (C.A.A.F. 2008). “Possess,” as used in that article, “means to exercise control of something. Possession may be direct physical custody…or it may be constructive . . . Possession must be knowing and conscious.” Manual for Courts-Martial, United States, pt. IV, ¶37.c.(2). In Navrestad, the Court of Appeals for the Armed Forces, using this definition of “possession,” set aside a conviction for possession of child pornography as legally insufficient where the evidence failed to show the defendant had actual or constructive possession of child pornography. Navrestad, 66 M.J. at 267-68. Unlike cases where the government charges possession only on the date the computer is seized, in this case the government charged a range of dates - “between on or about 12 January 2012 and on or about 10 June 2013.” This range of dates includes dates that appellant admits he had “possession” of the child pornography. As “possession” for purposes of child pornography requires the possession be both “knowing and conscious,” Navrestad, 66 M.J. at 267, we hold that the appellant did “knowingly possess” the four images underlying Specifications 5 and 7 of The Charge which were found in unallocated space between on or about 12 January 2012 and on or 10 June 2013. 2. Images Located in the “Cache” of the cell phone. Appellant further alleges the evidence underlying Specification 4 of The Charge is factually and legally insufficient to support a conviction for knowing possession of child pornography on the dates alleged when the only evidence of 3 Digital files found in unallocated space or slack space have also been referred to as “orphan files” because “it is difficult or impossible to trace their origin or date of download.” United States v. Moreland,
665 F.3d 137,142 n.2 (5th Cir. 2011) (citing United States v. Kain,
589 F.3d 945, 948 (8th Cir. 2009) (stating that “[o]rphan files are files that were on the computer somewhere saved but were subsequently deleted, so the computer doesn’t know exactly where they came from”)). 4 DAVENPORT—ARMY 20150322 possession was that it was located in the cache of appellant’s cell phone. We disagree. Special Agent KT testified that the images found on appellant’s cell phone were found in the cache which is where images that are opened on the device are held. According to SA KT, one of the images on the cell phone was created on 19 February 2013 and was accessed approximately three seconds after it was created and never accessed again. The second image of child pornography in the cell phone cache was also viewed shortly after it was received and never accessed again. Both images appeared to be sent and received during a Skype conversation on 19 February 2013. Appellant still possessed these images as he had access to and control of them. We hold appellant did “knowingly possess” the images underlying Specification 4 of The Charge which were found in the “cache” and “active” files on his cell phone on or about 10 June 2013. CONCLUSION On consideration of the entire record and submissions by the parties, we hold the findings of guilty are correct in law in fact. The findings of guilty and sentence are AFFIRMED. Senior Judge TOZZI and Judge CELTNIEKS concur. FORTHE FOR THECOURT: COURT: MALCOLM MALCOLMH. H.SQUIRES, SQUIRES,JR. JR. Clerk of Court Clerk of Court 5
Document Info
Docket Number: ARMY 20150322
Filed Date: 12/19/2016
Precedential Status: Non-Precedential
Modified Date: 4/18/2021