U NITED S TATES AIR F ORCE
C OURT OF C RIMINAL APPEALS
________________________
No. ACM 39538
________________________
UNITED STATES
Appellee
v.
Charles D. BUFORD, Jr.
Staff Sergeant (E-5), U.S. Air Force, Appellant
________________________
Appeal from the United States Air Force Trial Judiciary
Decided 9 March 2020
________________________
Military Judge: L. Martin Powell.
Approved sentence: Dishonorable discharge, confinement for 5 months
and 1 day, total forfeiture of pay and allowances, reduction to E-1, and
a reprimand. Sentence adjudged 12 May 2018 by GCM convened at
Yokota Air Base, Japan.
For Appellant: Captain David A. Schiavone, USAF.
For Appellee: Lieutenant Colonel Joseph J. Kubler, USAF; Major Anne
M. Delmare, USAF; Mary Ellen Payne, Esquire.
Before J. JOHNSON, POSCH, and KEY, Appellate Military Judges.
Judge KEY delivered the opinion of the court, in which Chief Judge J.
JOHNSON and Judge POSCH joined.
________________________
This is an unpublished opinion and, as such, does not serve as
precedent under AFCCA Rule of Practice and Procedure 30.4.
________________________
KEY, Judge:
A general court-martial composed of officer members convicted Appellant,
contrary to his pleas, of one specification of receiving child pornography in
violation of Article 134, Uniform Code of Military Justice (UCMJ), 10 U.S.C.
United States v. Buford, No. ACM 39538
§ 934. 1,2 The court-martial sentenced Appellant to a dishonorable discharge,
confinement for six months, total forfeiture of pay and allowances, reduction
to the grade of E-1, and a reprimand. The convening authority reduced the
confinement to five months and one day, but otherwise approved the sentence
as adjudged.
On appeal, Appellant raises four issues through counsel: (1) whether the
evidence was legally and factually sufficient to support his conviction; (2)
whether the military judge erred by admitting videos of child pornography
which were not found on Appellant’s computer; (3) whether the military judge
erred by not providing the court members a definition of “receiving;” and (4)
whether the transcript is not verbatim. Appellant personally raises two addi-
tional issues: (5) whether the court-martial had jurisdiction over him; and (6)
whether he was subjected to illegal pretrial punishment in violation of Article
13, UCMJ,
10 U.S.C. § 813. 3 Finding no error prejudicial to the substantial
rights of Appellant, we affirm.
I. BACKGROUND
Appellant was charged with knowing receipt via the Internet of two vide-
os containing child pornography. These videos, however, were never found on
any electronic devices or storage media seized from Appellant. At trial, the
Government admitted and played two videos retrieved from law enforcement
archives, asserting Appellant had downloaded the same videos from some
other source. The Government’s case against Appellant focused on evidence
indicating he had used peer-to-peer networking software to download the
videos; the members convicted Appellant of receiving only one of the videos.
Appellant came to the attention of military law enforcement in the sum-
mer of 2014 when an Okinawa-based Naval Criminal Investigative Service
(NCIS) agent, Special Agent WV, identified an Internet Protocol (IP) address
1 Except as otherwise noted, all references in this opinion to the Uniform Code of Mil-
itary Justice (UCMJ) and Rules for Courts-Martial (R.C.M.) are to the Manual for
Courts-Martial, United States (2016 ed.) (2016 MCM).
2 The members convicted Appellant by excepting out certain language from the speci-
fication and acquitted him of a separate specification of possessing child pornogra-
phy, which we will discuss in this opinion.
3 Appellant personally asserts these two issues pursuant to United States v.
Grostefon,
12 M.J. 431 (C.M.A. 1982).
2
United States v. Buford, No. ACM 39538
associated with a military installation in Japan that appeared to be either
transmitting or receiving child pornography via peer-to-peer networking. 4
According to expert testimony elicited by the Government at trial, peer-to-
peer networking allows users to share files with each other by creating a
network of the users’ computers. Unlike a server-based network, the files re-
side on the individual users’ computers (“host” computers), not on centralized
servers. In order for a user to be part of a peer-to-peer network, the user must
first install peer-to-peer networking software which facilitates access to the
network. A user on the network interested in downloading files would then
look for the desired files—typically done by utilizing a search function built
into the software, specifying key words for the software to seek out on the
network. The software will return a list of relevant files found on the net-
work, and the user can then choose which files to download to his or her com-
puter.
To increase the efficiency of the network, peer-to-peer software often
downloads segments of a requested file from a number of different hosts on
the network, then assembles those segments into a completed file on the re-
questing computer. In order for this process to work, the network software
creates a unique identifier known as a “hash value” for each file on the net-
work. Sometimes referred to as “digital fingerprints,” hash values are derived
from mathematical processes based upon the data within a particular file,
unrelated to file identifiers such as filenames and extensions. 5 Unique hash
values are critical for the operation of peer-to-peer networks, as the network
software must use identical files in order to be able to download file segments
from multiple sources at once and then correctly compile those segments into
a working file.
When a user installs peer-to-peer networking software on his or her com-
puter, the software creates an empty folder for shared files. The folder is typi-
cally visible to other network users and serves dual purposes. The first is as a
repository for the user’s files which are available to others on the network to
download. The second is as a destination for the files the user has requested
to be downloaded. Users have the ability to move files in and out of their
shared folder at their discretion. The default setting for most peer-to-peer
4 Appellant’s trial originally commenced in January 2016, but for reasons not perti-
nent here, those charges were dismissed, and new charges were preferred in the lat-
ter half of 2017.
5 In this case, one of the Government’s expert witnesses testified that hash values are
“[t]rillions of times more accurate than DNA” in identifying unique files.
3
United States v. Buford, No. ACM 39538
programs is to make files in the shared folder available to be downloaded by
other users on the network. Thus, when a user downloads a file using the
network software, the file will typically be hosted on that user’s computer for
others to find and download until the user removes the file from the shared
folder.
Special Agent WV was alerted to the activity involving the IP address in
Japan by using automated software that scans peer-to-peer networks by peri-
odically searching for terms associated with child pornography. Once the
software finds a computer hosting files with filenames indicative of child por-
nography, the software executes a “browse-host” command, which displays
the files in that host computer’s shared folder. The software logs information
about the shared folder’s files in a database, including: the IP address associ-
ated with the computer where the files were found, the files’ names, their
hash values, and the percentage of the files on the host computer at the time
the browse-host command is executed.
Government expert-witness testimony further established that in local-
network configurations, such as home networks in which computers connect
to the Internet through a router, Internet service providers assign IP ad-
dresses to users’ routers, and computers or other devices connected to a given
router make use of that router’s IP address. The IP address does not indicate
which device or devices are connected to the router nor identify any particu-
lar connected device.
After being alerted to the apparently illicit Internet activity, Special
Agent WV generated a spreadsheet of the results of the browse-host com-
mands directed at the computer connected to the router with the Japan IP
address. The spreadsheet showed a number of files in various states of down-
load over a seven-day period from 22 June 2014 to 29 June 2014. For exam-
ple, on 22 June 2014, at 2045 hours, 6 the system located 40 files in this com-
puter’s shared folder with download percentages ranging from 0.14 percent to
100 percent. At 2308 hours the same day, only eight files were in the folder,
ranging from 0.15 percent to 99.14 percent. Virtually all the files on the
spreadsheet had filenames describing or suggesting sexual conduct involving
6The system reported times in Coordinated Universal Time (UTC), which was nine
hours behind Yokota Air Base, where Appellant was tried.
4
United States v. Buford, No. ACM 39538
children. Special Agent WV tried to download a file directly from the comput-
er using the Japan IP address, but was unable to do so. 7
Of the files on the spreadsheet, Special Agent WV focused on two video
files. The first file had a hash value beginning with the characters “SDHI”
and the second had a value beginning with “QAQX.” The QAQX file first ap-
peared on the spreadsheet as a result of a browse-host command executed on
22 June 2014 at 0725 hours. At that point, the file showed as 6.22 percent
downloaded, but it later appeared at 2045 hours the same day at 100 percent.
The filename associated with the QAQX file was 124 characters long (includ-
ing spaces) plus a 7-character extension and included sexually explicit terms,
words indicative of child pornography, and four first names followed by ages
ranging from 4 to 8 years old. The SDHI file—also explicitly named—
appeared in the 0725 hours search at 0.06 percent, then again at 2045 hours
at 92.56 percent. The SDHI file never appeared at 100 percent on the spread-
sheet.
Special Agent WV recognized the QAQX hash value from another case he
had investigated as being associated with a video of child pornography, a
copy of which was stored in NCIS’s local repository of child-pornography evi-
dence. He subsequently determined the SDHI hash value on the spreadsheet
matched the hash value of another video in the NCIS repository.
Armed with this information, Special Agent WV obtained a summons re-
quiring the Internet service provider to divulge the account information for
the IP address during the time period in question. In response to the sum-
mons, the provider disclosed the IP address had been assigned to Appellant,
leading the investigation to be transferred to Air Force investigators due to
Appellant’s status as an Airman. Special Agent WV passed on not just his
spreadsheet, but also copies of the videos with the QAQX and SDHI hash
values he had copied from NCIS’s repository. These two videos ultimately be-
came the basis for the specification alleging Appellant’s receipt of child por-
nography.
Pursuant to a search authorization, Air Force Office of Special Investiga-
tions agents searched Appellant’s military dormitory room and seized a lap-
top computer and multiple electronic devices along with digital storage me-
dia. There was no evidence Appellant shared his dormitory room or that any-
one else had access to it. Appellant had a wireless router in his room, and his
7He hypothesized the computer may have been offline or was no longer sharing files;
alternatively, the Internet provider may have assigned a new IP address to the rout-
er.
5
United States v. Buford, No. ACM 39538
password-protected laptop was plugged directly into it. Agents did not seize
the router or check to see if it required a password to wirelessly connect to it
or to access the Internet. Agents sent the seized electronic items to the De-
fense Cyber Crime Center’s Defense Cyber Forensics Lab for analysis by a
contractor, Mr. BW, whose examination of Appellant’s laptop found peer-to-
peer software installed on it. The software had been run 14 times between 22
June and 30 June 2014.
About 18 thumbnail-sized images of what appeared to be child pornogra-
phy were also found on the computer in a deleted temporary (“temp”) file. Mr.
BW explained that temp files are created automatically by computer applica-
tions for the purpose of temporarily storing data which facilitates the running
of those applications, and users cannot access data stored in the files without
specialized software. The temp file with the images in it was created on 16
April 2014, and the last time data was written to it was on 22 June 2014. In
addition to the 18 thumbnail-sized images, the file contained between 600
and 900 other non-contraband images. Although the folder containing the
temp file had been deleted, Mr. BW was able to recover the temp file using
forensic software. He was not able to determine what application on Appel-
lant’s computer created the temp file, what applications interacted with the
temp file, or how the temp file was being used. The 18 thumbnail-sized imag-
es became the basis for the specification alleging Appellant’s possession of
child pornography which he was later acquitted of.
Mr. BW also conducted keyword searches on a copy of the hard drive from
Appellant’s computer, finding references to a number of files with terms in-
dicative of child pornography in their names. Other than the thumbnail im-
ages in the temp file, however, Mr. BW was unable to locate any child por-
nography on Appellant’s computer. He did not find either the QAQX or SDHI
videos or any of the other files from the peer-to-peer spreadsheet on the com-
puter.
Mr. BW did note that file-shredding software had been installed on Appel-
lant’s computer, which can be used to more thoroughly remove files from a
hard drive than simply executing delete commands. The Government hy-
pothesized Appellant may have used the software to erase child pornography
files he had downloaded. Mr. BW determined the file-shredding software had
been run three times between 18 and 29 June 2014, but he could not say
which files, if any, had actually been “shredded.”
Mr. BW found a number of “jump list entries” and “linked” files, which are
items of code created when computer files are opened. Both jump list entries
and linked files assist the computer in quickly opening target files. Jump list
entries are essentially lists of files recently opened by a particular applica-
tion, while the linked files act as shortcuts, telling the computer which appli-
6
United States v. Buford, No. ACM 39538
cation to use to open a particular target file (i.e., they link the particular file
to the appropriate application). Mr. BW identified jump list entries and
linked files referencing target files which had child-pornography-related
terms in their names, but he was not able to find those target files on Appel-
lant’s computer. Nine of these target files had the same names as files on the
peer-to-peer spreadsheet, suggesting the files had been both downloaded to
Appellant’s laptop from the peer-to-peer network via Appellant’s router as
well as accessed while they resided on Appellant’s laptop. The jump list en-
tries had been created in January, April, and June of 2014. Because Mr. BW
only found the jump list entries and linked files—which contain filenames,
not the target files themselves—he could not say what was actually in those
target files, much less conclude that they were images of child pornography,
in spite of their explicit names.
One of the linked files Mr. BW found contained the same filename as the
one given to the file on the spreadsheet with the QAQX hash value. 8 The
linked file had been created on 24 June 2014 at 1345 hours, Coordinated
Universal Time (UTC), which indicated that target file had been opened by a
program of some sort on Appellant’s computer. From this linked file, Mr. BW
further determined the target file had been originally put on Appellant’s
computer on 22 June 2014 at 0653 hours, half an hour before a file with the
same name showed on the spreadsheet as 6.22 percent downloaded. Mr. BW
was unable to locate any linked files associated with the filename given to the
SDHI file.
In addition to the above, Mr. BW found two files with names indicative of
child pornography in the laptop’s recycling bin, indicating they had been de-
leted by the user in February 2014. He also found evidence on Appellant’s
computer of a user searching for a keyword related to child pornography on
both Google Images and on a website that assists in locating files on peer-to-
peer networks. The peer-to-peer search had been conducted for the same
keyword 30 times, the last time being on 2 June 2014; the Google Images
search was only conducted once on an unknown date. Mr. BW found indica-
tions that other keywords indicative of child pornography had been input by a
user as search terms within the peer-to-peer program itself. He could not,
however, say what results, if any, were returned for any of the searches.
Mr. BW testified there was no way to know what search terms had been
used to find the files Appellant was accused of downloading. He further testi-
fied that—because he did not find either the QAQX or SDHI videos on Appel-
8 Only filenames, not hash values, were found on Appellant’s laptop.
7
United States v. Buford, No. ACM 39538
lant’s computer—there was no way of knowing if the files as they existed on
the laptop were corrupt or otherwise non-playable.
At trial, Appellant stipulated that the videos retrieved from the NCIS re-
pository with the QAQX and SDHI hash values contained child pornography.
Nonetheless, trial counsel sought to show the videos—the QAQX video was
about 21 minutes in length—in their entirety to the members. The military
judge only allowed trial counsel to show the members 30 seconds of each vid-
eo over the Defense’s objection that the stipulation obviated the need to show
the videos at all.
The members acquitted Appellant of possessing the 18 thumbnail-sized
images found in the temp file. They convicted Appellant of receiving the
QAQX video, but not the SDHI video, which they excepted from the specifica-
tion.
II. DISCUSSION
A. Legal and Factual Sufficiency
Appellant argues the evidence is legally and factually insufficient to sup-
port his conviction based upon a lack of proof that he actually received the
QAQX video, the sole item of child pornography he was convicted of receiving.
1. Law
We may affirm only those findings of guilty that we determine are correct
in law and fact and, on the basis of the entire record, should be approved. Ar-
ticle 66(c), UCMJ,
10 U.S.C. § 866(c). We review issues of legal and factual
sufficiency de novo. United States v. Washington,
57 M.J. 394, 399 (C.A.A.F.
2002) (citation omitted). Our assessment of legal and factual sufficiency is
limited to the evidence produced at trial. United States v. Dykes,
38 M.J. 270,
272 (C.M.A. 1993) (citations omitted).
“The test for legal sufficiency is whether, after viewing the evidence in the
light most favorable to the prosecution, any rational trier of fact could have
found the essential elements of the crime beyond a reasonable doubt.” United
States v. Robinson,
77 M.J. 294, 297–98 (C.A.A.F. 2018) (quoting United
States v. Rosario,
76 M.J. 114, 117 (C.A.A.F. 2017)). “The term reasonable
doubt, however, does not mean that the evidence must be free from conflict.”
United States v. Wheeler,
76 M.J. 564, 568 (A.F. Ct. Crim. App. 2017) (citing
United States v. Lips,
22 M.J. 679, 684 (A.F.C.M.R. 1986)), aff’d,
77 M.J. 289
(C.A.A.F. 2018). Circumstantial evidence may suffice. See United States v.
Kearns,
73 M.J. 177, 182 (C.A.A.F. 2014) (citing United States v. Blocker,
32
M.J. 281, 285 (C.M.A. 1991)). “[I]n resolving questions of legal sufficiency, we
are bound to draw every reasonable inference from the evidence of record in
8
United States v. Buford, No. ACM 39538
favor of the prosecution.” United States v. Barner,
56 M.J. 131, 134 (C.A.A.F.
2001) (citations omitted). As a result, “[t]he standard for legal sufficiency in-
volves a very low threshold to sustain a conviction.” United States v. King,
78
M.J. 218, 221 (2019) (alteration in original) (quoting United States v.
Navrestad,
66 M.J. 262, 269 (C.A.A.F. 2008) (Effron, C.J., joined by Stucky,
J., dissenting)), cert. denied, __ U.S. __,
139 S. Ct. 1641 (2019).
The test for factual sufficiency is “whether, after weighing the evidence in
the record of trial and making allowances for not having personally observed
the witnesses, [we are ourselves] convinced of the [appellant]’s guilt beyond a
reasonable doubt.” United States v. Turner,
25 M.J. 324, 325 (C.M.A. 1987).
“In conducting this unique appellate role, we take ‘a fresh, impartial look at
the evidence,’ applying ‘neither a presumption of innocence nor a presump-
tion of guilt’ to ‘make [our] own independent determination as to whether the
evidence constitutes proof of each required element beyond a reasonable
doubt.’” Wheeler, 76 M.J. at 568 (alteration in original) (quoting Washington,
57 M.J. at 399).
2. Analysis
Appellant was convicted of a single specification of receiving child pornog-
raphy, which required the Government to prove beyond a reasonable doubt:
(1) that Appellant knowingly and wrongfully received child pornography, and
(2) that, under the circumstances, Appellant’s conduct was of a nature to
bring discredit upon the armed forces. See Manual for Courts-Martial, United
States, pt. IV, ¶ 68b.b.(1) (2012 ed.) (2012 MCM).
At trial, Appellant stipulated to the contents of the video with the QAQX
hash value retrieved from NCIS’s child-pornography repository. The stipula-
tion explicitly described sexual conduct between children and an adult that
meets the definition of child pornography.
The evidence supporting Appellant’s receipt of the QAQX video is some-
what more complex. On 22 June 2014, a computer connected to Appellant’s
wireless router downloaded a file with the QAQX hash value via peer-to-peer
networking software to a shared folder visible to other network users such
that the file appeared to have been 100 percent downloaded. The file with the
QAQX hash value had a 124-character-long filename describing sexual con-
duct involving children, including names and ages. On 24 June 2014, two
days after the file was downloaded, a linked file was created on Appellant’s
computer referencing the same 124-character filename, indicating that file
had been opened by a program on the computer.
Testimony at trial established that the computer seized from Appellant’s
room was password-protected, had been used to access social media and
email accounts belonging to Appellant, and had files uniquely related to Ap-
9
United States v. Buford, No. ACM 39538
pellant saved on it (e.g., pictures of Appellant in uniform). Moreover, Appel-
lant was the sole occupant of his dormitory room and his room was locked, at
least when agents went to search it. Thus, the evidence supports the laptop
seized belonged to Appellant, and that he was the primary, if not sole, user of
the computer. Analysis of the computer found peer-to-peer software installed
on it, evidence of search terms associated with child pornography, and evi-
dence that files with names describing sexual conduct involving children had
once resided on Appellant’s computer.
Peer-to-peer networking software was not just installed on Appellant’s
computer, it had been run multiple times over an eight-day period beginning
on the day the file with the QAQX hash value was downloaded to the com-
puter using the IP address of Appellant’s router. Although evidence of the
QAQX hash value was not found on Appellant’s computer, a linked file
showed that a file with the exact same 124-character filename had been
opened on Appellant’s computer. The linked file showed the target file—that
is, the file with the 124-character name—was originally placed on Appellant’s
computer on 22 June 2014 at 0653 hours. Special Agent WV testified his
spreadsheet showed the file had downloaded to 6.22 percent at 0725 hours
that same day to a computer connected to Appellant’s router, eventually
reaching 100 percent later in the day.
Because no videos of child pornography were ever found on Appellant’s
computer, and based upon the unique facts of this case, we have determined
three inferences must be drawn from the evidence in order to conclude Appel-
lant knowingly received child pornography. First, a factfinder would have to
infer it was Appellant’s computer, and not some other computer connected to
his wireless router, that downloaded the file with the 124-character name.
The linked file demonstrates the file with the 124-character name had been
placed on Appellant’s computer on 22 June 2014 and was later opened on
24 June 2014, indicating a file with that name did, in fact, reside on Appel-
lant’s computer. Although there is no evidence describing how Appellant
came to download this particular file, evidence of Appellant’s computer hav-
ing used search terms related to child pornography along with the utilization
of peer-to-peer networking software about the same time as the file being
placed on Appellant’s computer is strong circumstantial evidence that Appel-
lant sought out, found, and chose to download the file with the 124-character
name.
The second inference a factfinder would have to make is that the file with
the 124-character name actually contained child pornography and not licit
data. The QAQX hash value—the file’s digital fingerprint—reveals that the
file generating that hash value does, in fact, contain child pornography. No
evidence was adduced that a particular hash value could simultaneously be
10
United States v. Buford, No. ACM 39538
associated with a file containing child pornography and another file that did
not. To the contrary, the trial testimony was that such a situation was a vir-
tual impossibility. The evidentiary gap is that only the filename, and not the
hash value, was found on Appellant’s computer. This gap, however, is easily
bridged by the fact the filename was both lengthy and explicit, indicating the
sheer improbability of a user possessing innocuous data in a file with the ex-
act same filename as one containing a video of children being sexually ex-
ploited. Any lingering doubt is eradicated by the evidence the file with the
QAQX hash value—that is, the file demonstrably containing child pornogra-
phy—was being downloaded through Appellant’s router the same day a file
with the exact same name appeared on Appellant’s computer. This circum-
stantial evidence supports the conclusion that the file with the 124-character
name on Appellant’s computer was the same file as the one with the QAQX
hash value, even though no actual video of child pornography was found on
his computer.
The third necessary inference is that Appellant actually received the file
with the QAQX hash value. “[E]vidence that a person has sought out—
searched for—child pornography on the internet and has a computer contain-
ing child pornography images” can be circumstantial evidence of knowing re-
ceipt of child pornography. King, 78 M.J. at 222 (quoting United States v.
Pruitt,
638 F.3d 763, 766 (11th Cir. 2011)). The term “receive” is not defined
in the Manual for Courts-Martial, but the word “possessing” is, and posses-
sion is integral to the definition of “receive.” See, e.g., United States v.
Olander,
572 F.3d 764, 769 (9th Cir. 2009) (citations omitted). 9 “Possessing”
is defined as “exercising control of something” and “[p]ossession inherently
includes the power or authority to preclude control by others.” See 2012
MCM, pt. IV, ¶ 68b.c.(5). Our superior court has described the test for posses-
sion of child pornography as whether an accused had “dominion and control”
over the contraband. See Navrestad, 66 M.J. at 267–68. That possession also
must be knowing and conscious. Id. at 267 (citation omitted).
In order for Appellant to download files with his peer-to-peer networking
software, he had to consciously select files to be sent to his computer’s shared
folder. Once the file downloaded to the folder, Appellant had the ability to
open, move, delete, or modify the file as he saw fit. Indeed, the fact the file
disappeared from the shared folder after downloading to 100 percent is cir-
cumstantial evidence Appellant either moved or deleted the file, and the ex-
9 When a military judge does not instruct upon a definition of a term, we determine
the appropriate definition as part of our factual sufficiency analysis. See United
States v. Pease, 75 M.J 180, 184 (C.A.A.F. 2016).
11
United States v. Buford, No. ACM 39538
istence of the linked file is evidence a program on Appellant’s computer was
used to open the downloaded file. Other than opening the file, there is no evi-
dence Appellant actually viewed the video, or, if he did, for how long. 10 Unlike
a charge of viewing child pornography, the Government was not required to
prove Appellant actually saw the child pornography. The Government did,
however, have to prove Appellant’s knowing receipt of it. This knowledge is
established by Appellant’s use of his computer to search for files by using
terms indicative of child pornography, his selection of a file with a lengthy
name explicitly describing sexual conduct with children aged 8 and under,
and his use of his peer-to-peer software to completely download that file to
his shared folder on his computer. All of which evidences his intent to receive
as well as his actual receipt of the child pornography contained in the file
with the hash value of QAQX. The evidence of his computer opening the file
and his movement of the file out of his shared folder and off his hard drive
shows Appellant’s dominion and control over the file, proving his possession
of it. Thus, circumstantial evidence establishes Appellant’s knowing receipt of
the charged video, despite the lack of evidence he ever watched the video and
despite the fact the video was never found on his computer.
The final element of the offense requires proof that Appellant’s conduct
was of a nature to bring discredit upon the armed forces. Appellant was an
American Airman stationed at a military installation in Japan and living in a
military dormitory. He connected to the Internet using a local Internet ser-
vice provider and used that connection to seek out and download a video of
graphic child pornography. While he was downloading that file and while it
remained in his shared folder, the sexually explicit filename describing the
sexual abuse of small children was visible to—at a minimum—every user on
the peer-to-peer network. Notably, Appellant came to the attention of law en-
forcement when an automated search utility saw Appellant’s computer pub-
licly sharing files with names indicative of child pornography. Although Ap-
pellant’s conduct seemingly occurred in the privacy of his dormitory room un-
beknownst to anyone else, his use of the peer-to-peer network to download
child pornography was visible to untold numbers of other network users
around the world, conduct which “has a tendency to bring the service into
10 At trial, trial counsel argued that because another linked file was created six
minutes later, Appellant must have watched the video for six minutes. The military
judge was skeptical of this leap of logic, as are we. Considering the absence of any
evidence as to how long Appellant had the video open for or that he even watched it
at all, we conclude all the Government proved was that a program on Appellant’s
computer opened the file, creating a linked file in the process.
12
United States v. Buford, No. ACM 39538
disrepute or which tends to lower it in public esteem.” See 2012 MCM, pt. IV,
¶ 60.c.(3).
Having weighed all the evidence in the record of trial and made allowanc-
es for not having personally observed the witnesses, we find that a rational
factfinder could have found Appellant guilty beyond a reasonable doubt of all
the elements of receiving child pornography. Furthermore, we ourselves are
convinced of Appellant’s guilt beyond a reasonable doubt. Therefore, we find
Appellant’s conviction both legally and factually sufficient.
B. Admission of Video Files into Evidence
Over the Defense’s objection, the military judge admitted as a prosecution
exhibit the two video files retrieved from the NCIS repository of child pornog-
raphy with the hash values of QAQX and SDHI. At trial and on appeal, Ap-
pellant argues these two videos were neither found on nor downloaded from
his computer, rendering their probative value slight and substantially out-
weighed by the danger of unfair prejudice and of confusing the members. Ap-
pellant further argues that because any offense of receipt was committed at
the time the files were downloaded, any later viewing of the videos was irrel-
evant to the question of whether Appellant had knowingly received the vide-
os. If the viewing was irrelevant, Appellant argues, then the videos them-
selves had little or no relevance and they therefore should not have been
shown to the members in light of their inflammatory nature.
1. Additional Background
Trial defense counsel objected to the admission of the videos on an au-
thentication theory because the videos came from the NCIS repository and
not from the data seized from Appellant. Trial defense counsel further object-
ed on relevancy grounds, arguing the probative value of the evidence was
outweighed by the undue prejudice of showing the videos themselves, espe-
cially in light of Appellant’s offer and ultimate agreement to stipulate to the
graphic content of the videos. Although the military judge overruled trial de-
fense counsel’s objections to the admissibility of the videos, he determined
playing the videos in their entirety “would be substantially more unfairly
prejudicial than probative,” considering the parties’ stipulation. The military
judge ruled trial counsel would be allowed to show only a 30-second segment
from each of the two video files in order to permit the Prosecution to prove
Appellant’s knowledge of the videos’ content and “to generally orient the
members to the nature of the materials in question.” 11 The military judge fur-
11During sentencing proceedings, the military judge permitted trial counsel to show
a different 30-second segment than they showed during findings.
13
United States v. Buford, No. ACM 39538
ther allowed trial counsel to show the first few moments of the QAQX video,
consisting of text purporting to be from the video’s creator that claimed to set
out names and ages of the children in the video.
The military judge later sought to clarify his ruling, explaining that the
entirety of the two videos was admissible, but that members would only be
permitted to view the 30-second segments, as “limited clips are all that [Mil.
R. Evid.] 403 would allow.” The military judge then said he would consider
allowing the members to view “other short clips as necessary” if the members
are unable “to make a factual determination in this case” after viewing the
original 30-second segments.
Trial counsel played the two 30-second segments and the introductory
text from QAQX for the members during their case in findings. The military
judge later instructed the members that he had “determined that the clips
that [the members] saw were all that’s necessary that [the members] see,”
but that the members could request to see more if needed “to make determi-
nations in this case to determine whether the prosecution has proven its case
beyond a reasonable doubt.”
2. Law
We review a military judge’s decision to admit or exclude evidence for an
abuse of discretion. United States v. Ediger,
68 M.J. 243, 248 (C.A.A.F. 2010)
(citation omitted). “The abuse of discretion standard is a strict one, calling for
more than a mere difference of opinion. The challenged action must be ‘arbi-
trary, fanciful, clearly unreasonable, or clearly erroneous.’” United States v.
White,
69 M.J. 236, 239 (C.A.A.F. 2010) (quoting United States v. Lloyd,
69
M.J. 95, 99 (C.A.A.F. 2010)). Military judges are afforded “considerable dis-
cretion” in deciding whether to admit evidence. See United States v. Henley,
48 M.J. 864, 871 (A.F. Ct. Crim. App. 1998), aff’d,
53 M.J. 488 (C.A.A.F.
2000).
Under Mil. R. Evid. 403, a military judge may exclude relevant evidence
when that evidence’s probative value is substantially outweighed by the dan-
ger of unfair prejudice. In assessing whether to admit evidence, the military
judge must discount the probative value of the disputed evidence when: (1)
the disputed evidence poses a risk of unfair prejudice, and (2) when there is
an evidentiary alternative to the disputed evidence which has equal or great-
er probative value. Old Chief v. United States,
519 U.S. 172, 182–83 (1997).
An accused’s offer to stipulate to certain evidence “does not generally consti-
tute an evidentiary alternative having equal or greater probative value.”
United States v. Sewell,
457 F.3d 841, 844 (8th Cir. 2006) (citation omitted).
As a general matter, the prosecution is permitted to choose what evidence to
use to prove its case, and an accused “may not stipulate or admit his way out
14
United States v. Buford, No. ACM 39538
of the full evidentiary force of the case as the Government chooses to present
it.” Old Chief,
519 U.S. at 186–87.
In Old Chief, the United States Supreme Court determined the defend-
ant’s legal status as a felon would be adequately proven by a stipulation to
that fact, and that evidence of the crimes leading to his status as a felon
should not be admitted. Old Chief,
519 U.S. 191–92. In so ruling, the Court
noted the “peculiarities of the element of felony-convict status” and explained
in cases involving such elements, the general rule would be that a stipulation
as to felon status would render evidence about the earlier offenses inadmissi-
ble.
Id. On the other hand, when the evidence sought to be admitted is “evi-
dence creating a coherent narrative of [the accused’s] thoughts and actions in
perpetrating the offense for which he is being tried,” such evidence will “gen-
erally survive” an unfair prejudice challenge.
Id.
Once exhibits are admitted in evidence, court members are generally giv-
en the exhibits to take with them into their deliberations. Rule for Courts-
Martial (R.C.M.) 921(b). This general rule is subject to the caveat of “[u]nless
otherwise directed by the military judge,” highlighting judicial discretion re-
garding the delivery of exhibits to the members.
Id. Showing excerpts of vide-
os of child pornography admitted in evidence is a well-accepted practice in
the federal courts for balancing the probative value of video evidence against
its prejudicial effect, even over defense offers to stipulate to the videos’ con-
tent and over objections similar to those raised here. See, e.g., United States
v. Dudley,
804 F.3d 506, 517–18 (1st Cir. 2015); United States v. Cunning-
ham,
694 F.3d 372, 389–91 (3d Cir. 2012); United States v. Caldwell,
586 F.3d
338, 343 (5th Cir. 2009); United States v. Ganoe,
538 F.3d 1117, 1124 (9th
Cir. 2008); United States v. McCourt,
468 F.3d 1088, 1091–93 (8th Cir. 2006).
3. Analysis
As discussed above, the evidence supporting the conclusion that the file
with the QAQX hash value was downloaded to and opened by a program on
Appellant’s computer is compelling, and we are convinced beyond a reasona-
ble doubt Appellant knowingly received that file. As a result, the fact the file
was not found on his computer and the fact Special Agent WV was unable to
download the file from Appellant are of no moment.
The Government was required to prove Appellant knowingly received
child pornography. Part and parcel of that requirement was to establish Ap-
pellant’s actual receipt of child pornography which, in this case, was the file
with the QAQX hash value. The file itself proved that the data in the file was,
in fact, material containing a visual depiction of minors engaging in sexually
explicit conduct—child pornography. Although far from conclusive, there is
some evidence Appellant viewed the video in question. The linked file on Ap-
15
United States v. Buford, No. ACM 39538
pellant’s hard drive is evidence the video was opened by a program on Appel-
lant’s computer. The Government was free to argue—and the members to
conclude—that the linked file’s existence supported the proposition that Ap-
pellant had purposely opened the file and viewed some or all of the video. 12
The probative value of the video itself is four-fold. First, it proved the na-
ture of the contraband Appellant had received. Second, the content of the vid-
eo was probative of Appellant’s knowledge that he was receiving child por-
nography, as opposed to a file containing innocuous data. Third, because pos-
session is inherently included in receipt, the contents of the video along with
evidence suggesting Appellant may have viewed the video tended to prove he
knowingly and consciously possessed the child pornography. Fourth, the ex-
plicit nature of the video undercut the suggestion Appellant accidentally or
unintentionally received the video, as an innocent recipient of the video
would have likely taken such steps as alerting authorities or ceasing the use
of peer-to-peer networking software.
We recognize the parties’ stipulation did not simply brand the video as
“child pornography;” it explicitly described the sexual conduct in the video.
Nonetheless, we are mindful of the adage that a picture is worth a thousand
words. Images of child pornography such as those in the videos at issue here
are indisputably disturbing, amounting to visual records of severe child
abuse. Appellant’s attempts to shield the contents of the videos from the
members is essentially an acknowledgment of the powerful impact of the evi-
dence, the corollary of which is the gravity of Appellant’s offense. Because
child pornography is illegal, most people have never seen it and they may
have an inaccurate impression of what it is. Moreover, the spectrum of child
pornography is wide, both in terms of the conduct involved and the ages of
the victims. The sheer severity depicted in the video Appellant downloaded is
not readily reduceable to the written word without a substantial diminution
in the viewer’s ability to conceptualize what is occurring in the video and to
appreciate the degree of criminality involved with downloading it. We cannot
conclude the written stipulation in this case is an evidentiary alternative that
has equal or greater probative value than the video itself. See Sewell, 457
F.3d at 844.
12We have greater reservations regarding the admissibility of the file with the SDHI
hash value due to the absence of any evidence that file was ever opened by Appellant
or by any program on his computer. Appellant, however, was acquitted of receiving
this file, rendering harmless any error in admitting and showing that video.
16
United States v. Buford, No. ACM 39538
We agree with the military judge, however, that there is a point at which
the probative value of playing the video for the members is overwhelmed by
its unfairly prejudicial impact. The military judge’s decision to limit the
presentation of the video to its introductory text and a 30-second segment
was an acceptable approach to balancing the Government’s right to prove its
case with the court’s obligation to avoid unfair prejudice to Appellant based
upon the facts presented here. The 30 seconds shown to the members was a
small fraction of the video’s overall length and provided the members with
sufficient information to allow them to understand the video’s contents, con-
sistent with the practice adopted in federal courts. The decision to restrict the
Government to showing only an excerpt of a video is one within the discretion
of the military judge, and we conclude the military judge did not abuse his
discretion by doing so here.
C. The Definition of “Receiving”
Appellant argues for the first time on appeal that the military judge erred
by not providing the members a definition of the word “receiving” when de-
scribing the elements of the offense and relevant definitions.
1. Additional Background
At trial, both the Government and Defense were given the opportunity to
review the military judge’s proposed instructions and to either object to those
or to request additional instructions. Trial defense counsel indicated they
“may have a special instruction with regard to some of the language either
from Navrestad or [United States v.] Yohe, 13 essentially sort of similar to our
[R.C.M.] 917 [motion].”
Trial defense counsel’s unsuccessful R.C.M. 917 motion for a finding of
not guilty focused on the specification alleging possession of child pornogra-
phy, of which Appellant was ultimately acquitted. The thrust of the argument
for the motion was that Appellant did not exercise the requisite dominion and
control over the thumbnail images due to them being in a temporary file in
unallocated space on Appellant’s hard drive. Without proving this dominion
and control, trial defense counsel argued the Government had failed to prove
Appellant’s possession of the thumbnail images. Trial defense counsel’s ar-
gument on the motion made no reference to the receipt specification.
Just after ruling on the R.C.M. 917 motion, the military judge said, “I
note the [D]efense did send me a proposed instruction regarding citing [sic]
13No. ACM 37950,
2013 CCA LEXIS 686 (A.F. Ct. Crim. App. 22 Jul. 2013) (unpub.
op.).
17
United States v. Buford, No. ACM 39538
U.S. v. Yohe . . . [and] U.S. v. Navrestad, and I did incorporate in large part
the gist of the [D]efense instruction as requested.” Unfortunately, the mili-
tary judge neither attached what was sent to him to the record as an appel-
late exhibit, nor did he explain what part of the Defense’s proposed instruc-
tion he decided not to incorporate, so we are unable to determine with any
precision either what the Defense requested or what “large part” of that re-
quest the military judge chose to incorporate. Nonetheless, we conclude trial
defense counsel’s instruction request pertained to the definition of possession,
and not receipt. 14
After the military judge announced he was incorporating a portion of the
Defense’s proposed instruction, he asked whether the Defense had any objec-
tion to the instructions or requested any additional instructions. Trial de-
fense counsel answered in the negative.
Shortly thereafter, the military judge gave his instructions to the mem-
bers. Rather than provide definitions for terms after each specification, the
military judge set out the elements for both of the specifications, and then he
provided a series of definitions. In this list of definitions, he defined “pos-
sessing” without specifying whether the term applied to the possession speci-
fication or the receipt specification or to both. After defining “possessing,” the
military judge said:
[I]f you are convinced beyond a reasonable doubt that the ac-
cused exercised control over the charged images during the
charged time frame, you may find the accused guilty of the of-
fense of possession of child pornography if you otherwise find
14 It appears that the instruction the military judge gave by virtue of trial defense
counsel’s request added a fifth sentence, as emphasized below, to the standard defini-
tion of “possessing.” The instruction, as given to the members, was:
“Possessing” means exercising control of something. Possession may
be direct physical custody like holding an item in one’s hand, or it
may be constructive, as in the case of a person who hides something
in a locker or a car to which that person may return to retrieve it.
Possession must be knowing and conscious. Possession inherently in-
cludes the power or authority to preclude control by others. In order
for an accused to be convicted of possessing files that were only con-
tained in areas of a computer that are inaccessible to an average user,
the evidence must demonstrate beyond a reasonable doubt that the ac-
cused knew the images were located in that location and that the ac-
cused had the ability to exercise control of the files in that space.
(Emphasis added).
18
United States v. Buford, No. ACM 39538
that each element of the offense has been established beyond a
reasonable doubt.
(Emphasis added). For other terms, the military judge indicated they per-
tained to both possession and receipt.
2. Law
Military judges have wide discretion in fashioning instructions, but those
instructions must give the members “an accurate, complete, and intelligible
statement of the law.” United States v. Behenna,
71 M.J. 228, 232 (C.A.A.F.
2012) (citations omitted). We review military judges’ instructions de novo.
United States v. Hale,
78 M.J. 268, 274 (C.A.A.F. 2019) (citation omitted). In
assessing whether an instruction was erroneous, we must determine whether
the instruction sufficiently covers the issues in the case and whether, in the
context of all the instructions given, the instruction “completed its purpose.”
Behenna, 71 M.J. at 232 (citation omitted); see United States v. McDonald,
57
M.J. 18, 20 (C.A.A.F. 2002) (citation omitted).
Under R.C.M. 920(f), the absence of an objection to a particular instruc-
tion or to the omission of an instruction prior to the members starting their
deliberations means the objection is forfeited. United States v. Davis, ___ M.J.
___, No. 19-0104,
2020 CAAF LEXIS 76, at *7 (C.A.A.F. 12 Feb. 2020) (cita-
tions omitted). Forfeited objections on instructions are unpreserved for ap-
peal and reviewed for plain error. United States v. Tunstall,
72 M.J. 191, 193
(C.A.A.F. 2013) (citation omitted). However, the United States Court of Ap-
peals for the Armed Forces (CAAF) has held that if an appellant affirmatively
waives any objection to findings instructions, the issue is waived and there is
“nothing left for us to correct on appeal.” Davis,
2020 CAAF LEXIS 76, at *7
(citations omitted).
Pursuant to Article 66(c), UCMJ, the courts of criminal appeals have the
unique statutory responsibility to affirm only such findings of guilt we find
correct and “should be approved.” Thus, we retain the power to address errors
raised for the first time on appeal in the face of waiver of those errors at the
trial level. See, e.g., United States v. Hardy,
77 M.J. 438, 442–43 (C.A.A.F.
2018); United States v. Chin,
75 M.J. 220, 223 (C.A.A.F. 2016); United States
v. Quiroz,
55 M.J. 334, 338–39 (C.A.A.F. 2001).
3. Analysis
Appellant argues that the military judge should have provided a defini-
tion of receipt which explained, at a minimum, that possession is an integral
part of receipt. Without proposing a specific definition, Appellant asserts the
absence of a definition deprived his trial defense counsel of the ability to ar-
gue he never exercised sufficient dominion or control over the file with the
QAQX hash value in order to legally possess it (and therefore did not receive
19
United States v. Buford, No. ACM 39538
it). Due trial defense counsel affirmatively stating they did not object to the
instructions and did not request any additional instructions, this alleged er-
ror was waived. We have considered whether we should grant relief under
our Article 66(c) authority in spite of this waiver, and we decline to do so
based upon the absence of material prejudice to Appellant.
As explained above, we agree with Appellant that possession is inherent
in the concept of receipt. One cannot receive something without also pos-
sessing it, even if for just a fleeting moment. We disagree, however, with Ap-
pellant’s proposition that the military judge should have sua sponte fashioned
a definition of receipt for his instructions. As we have noted, the Manual for
Courts-Martial defines “possession,” but it does not define “receiving.” Yet,
the term is not so esoteric or complex to give rise to plain error when a mili-
tary judge does not provide a definition. The fact the term appears, unde-
fined, in more than a dozen other punitive articles in the Manual for Courts-
Martial is a strong indication the term “receiving” is an ordinary word well
within the common knowledge of court members. 15 To receive a tangible item
simply means to take possession or delivery of it, or to knowingly accept it. 16
“[W]ords generally known and in universal use do not need judicial defini-
tion.” United States v. Bailey,
77 M.J. 11, 15 (C.A.A.F. 2017) (quoting United
States v. Nelson,
53 M.J. 319, 321 (C.A.A.F. 2000)). Although there are other
uses of the term—such as receiving guests, receiving news, or receiving a
scholarly degree—receiving child pornography can only logically mean taking
possession of the material which contains the child pornography, whether it
is a magazine, a disc, or a file downloaded from the Internet. 17 Although
there is overlap between “possessing” and “receiving” materials containing
child pornography, as a person who receives such material simultaneously
possesses it, the concept of receiving material indicates an accused engaged
15See, e.g., Article 101, UCMJ,
10 U.S.C. § 901 (disclosing a countersign to a person
not entitled to receive it); Article 132, UCMJ,
10 U.S.C. § 932 (receiving a receipt for
a payment less than the actual payment); 2016 MCM, pt. IV, ¶ 53.c.(2) (receiving a
threat as part of extortion); 2016 MCM, pt. IV ¶ 66.b.(1) (receiving a thing of value as
part of bribery or graft); 2016 MCM, pt. IV, ¶ 97.b.(4) (receiving consideration for ar-
ranging for sexual acts); 2016 MCM, pt. IV, ¶ 106.b (receiving stolen property).
See, e.g., Webster’s Third New International Dictionary: Unabridged, 1894 (1966);
16
United States v. Olander,
572 F.3d 764, 768–69 (9th Cir. 2009).
17 The child pornography provision in the Manual for Courts-Martial also prohibits
“viewing” child pornography, undercutting any argument that “receiving” in this con-
text would include a case of looking at child pornography without actually taking
possession of it.
20
United States v. Buford, No. ACM 39538
in some sort of transaction or exchange with another to obtain the material,
whereas possession is simply the state of having the material. In the child
pornography arena, the concept of receipt takes on a heightened significance,
as it is the incessant sharing and distribution of these images that causes the
harm to the victims and society to metastasize at a precipitous pace. A recipi-
ent of these images is a consumer in the global child-pornography market-
place, driving up demand in some incremental degree each time the recipient
downloads another image or video. In that sense, the criminality behind re-
ceiving child pornography is distinct from simple possession of the same. See,
e.g., United States v. Burrows,
905 F.3d 1061, 1064–65 (7th Cir. 2018).
Where the military judge did inject confusion into the instructions was
when he failed to explain that the definition of possession applied to the of-
fense of receiving child pornography. By not providing definitions separately
to each specification, the military judge’s definitions are read to apply to both
specifications unless he indicated otherwise. The military judge did not say
that the definition of possession only applied to the possession specification,
leaving the members free to use the term to determine whether or not Appel-
lant had possessed the videos he was charged with receiving. But the military
judge went further by explaining Appellant could be convicted of the posses-
sion offense if the members were convinced he had “exercised control over”
the thumbnail images. He did not, however, explain that Appellant could be
convicted of the receipt offense only upon a conclusion Appellant had exer-
cised control over the videos. The members could thereby interpret the mili-
tary judge’s instructions as saying that they only needed to find control over
the contraband for possession, and not for receipt. Such an interpretation
would be an incorrect view of the law. The members, however, could also rea-
sonably interpret the military judge’s instructions to mean that the Govern-
ment was required to prove “control over” the images for the possession speci-
fication and “receipt of” for the receiving specification. Applying the ordinary
definition of “receiving,” the members could have then correctly concluded
that receiving entailed possession (as defined by the military judge) and not
placed any significance on the fact the military judge said the Government
only had to prove “control over” the images for the possession specification.
The military judge was responsible for giving “accurate, complete, and in-
telligible” instructions. See Behenna, 71 M.J. at 232 (citation omitted). On
this point, he fell short, and we find his limitation of the “control over” in-
struction to the possession specification to be error. As explained above, the
military judge’s instructions were ambiguous on this point because they were
incomplete. In this case, the members could have reached the wrong legal
understanding if they concluded the military judge was telling them that
possession was not a component of receipt and that the Government need not
prove Appellant’s control over the videos in order to find receipt. The better
21
United States v. Buford, No. ACM 39538
approach to these instructions would have been to clearly apply the concept of
possession to both the receipt and the possession specifications, defining the
term receipt as taking possession of something.
The military judge’s error, however, was attenuated by the definition of
“wrongful” he gave the members, which was:
“Wrongful” means without any legal justification or excuse.
Any facts or circumstances that show that a visual depiction of
child pornography was unintentionally or inadvertently ac-
quired are relevant to wrongfulness, including, but not limited
to, the method by which the visual depiction was acquired, the
length of time the visual depiction was maintained, and wheth-
er the visual depiction was promptly, and in good faith, de-
stroyed or reported to law enforcement.
The requirement that Appellant’s conduct be proven to be wrongful ap-
plied to both the possession and the receipt specification. By so instructing
the members, the military judge reinforced the concept that Appellant needed
to “acquire”—that is, take possession of—the child pornography in question
in order to be convicted of either possessing or receiving it.
We further conclude Appellant’s defense was not hampered in any way by
the military judge’s instructions. His trial defense counsel did not argue Ap-
pellant never received the video files in question, rather they argued the
members should infer Appellant deleted the files because he did not want
them. 18 Considering the Defense’s decision to not argue Appellant had never
downloaded the videos in the first place, instead arguing he had downloaded
and then deleted them, the military judge’s failure to clarify that possession
was inherent in receipt did not impact the Defense’s argument. The Defense
effectively conceded Appellant’s possession of the videos by arguing he had
the ability to delete them, and Appellant was not prejudiced by the military
judge’s instructions as to the definitions relevant to the offenses he was
charged with. As a result, Appellant is not entitled to relief.
D. Verbatim Transcript
Appellant argues that the transcript of his trial is not verbatim, rendering
his record of trial defective. As a remedy, Appellant asks this court to set
aside his dishonorable discharge. Although flawed, we find the transcript in
18For example, when discussing the receipt charge, trial defense counsel argued Ap-
pellant “saw some weird stuff and then he deleted it,” and, “[m]ost likely he’s just a
guy who saw some stuff and opted to get rid of some things he didn’t want.”
22
United States v. Buford, No. ACM 39538
this case to be substantially verbatim, and we will not disturb his discharge
based upon this alleged error.
1. Additional Background
The 1008-page transcript of Appellant’s trial contains nearly 300 instanc-
es of the annotation, “[indiscernible].” The annotations appear to replace por-
tions of testimony, although the record does not indicate the lengths of those
portions. The first “[indiscernible]” annotation occurs on page 23 of the rec-
ord, and subsequent annotations appear regularly through page 1006. From
counsels’ questions to witnesses’ answers to comments from the military
judge to statements by the members, no part of the record is untouched by
the annotations.
The annotations appear in a wide variety of passages throughout the rec-
ord. Some are plainly unrelated to any significant aspect of the case, for ex-
ample:
[Senior Defense Counsel (SDC)]: I’m going to retrieve that from
you.
[Documents almost dropped.]
[Witness (WIT)]: Sorry, sir.
SDC: Could have been a disaster if we—
WIT: Yeah. I’m going to go ahead and—
SDC: [Indiscernible] I apologize about that.
(Second and fourth alterations in original).
Many passages are more substantive, but tend to provide context for the
deleted text. For example:
[Senior Trial Counsel]: So is this an indication to you at all that
he was—that there was an installing, uninstalling, do you
have—was there evidence that that kind of thing was going on?
[Mr. BW]: Yes, ma’am, there was [indiscernible] an uninstalled
script related to this Shareaza program that was run I believe
like three times, I want to say like on 22 June. But it looks
like—it appeared to us that it was just being uninstalled rein-
stalled.
(Third alteration in original).
Some passages, however, are far more inscrutable, such as:
[Mr. BW]: So [indiscernible] email three [indiscernible] what
was found in email one from the page before same email ad-
23
United States v. Buford, No. ACM 39538
dress just different send date and time and last modified and
viewed date and times.
(Second and third alterations in original).
2. Law
We review questions of whether a record of trial is complete and a tran-
script is verbatim de novo. United States v. Davenport,
73 M.J. 373, 376
(C.A.A.F. 2014) (citation omitted). “Article 54(c)(1), UCMJ,
10 U.S.C. §
854(c)(1), requires a ‘complete’ record of the proceedings and testimony to be
prepared for any general court-martial resulting in a punitive discharge.”
United States v. Lovely,
73 M.J. 658, 676 (A.F. Ct. Crim. App. 2014). A com-
plete record of trial in such a case includes a verbatim transcript. R.C.M.
1103(b)(2)(B). “A verbatim transcript includes: all proceedings including side-
bar conferences, arguments of counsel, and rulings and instructions by the
military judge . . . .”
Id., Discussion.
Although the Rules for Courts-Martial call for “verbatim” transcripts, this
requirement has been read by our superior court to not mean “word for word,”
but rather, “substantially verbatim.” Davenport, 73 M.J. at 377 (citation
omitted); see also United States v. Lashley,
14 M.J. 7, 9 (C.M.A. 1982) (“literal
compliance with this requirement is impossible”); United States v. Nelson,
13
C.M.R. 38, 42 (C.M.A. 1953) (“Many, if not all, records fail to record every
word spoken at a hearing.”). To determine whether a record is complete or
whether a transcript is verbatim, “the threshold question is ‘whether the
omitted material was substantial,’ either qualitatively or quantitatively.”
Davenport, 73 M.J. at 377 (quoting Lashley, 14 M.J. at 9) (internal quotation
marks omitted) (additional citation omitted). This threshold is met when the
omitted material “‘related directly to the sufficiency of the Government’s evi-
dence on the merits,’ and ‘the testimony could not ordinarily have been re-
called with any degree of fidelity.’” Id. (quoting Lashley, 14 M.J. at 9). “Omis-
sions are quantitatively substantial unless ‘the totality of omissions . . . be-
comes so unimportant and so uninfluential when viewed in the light of the
whole record, that it approaches nothingness.’” Id. (alteration in original)
(quoting Nelson, 13 C.M.R. at 43).
Each case is analyzed individually to decide whether an omission is sub-
stantial. United States v. Abrams,
50 M.J. 361, 363 (C.A.A.F. 1999) (citation
omitted). “A substantial omission renders a record of trial incomplete and
raises a presumption of prejudice that the Government must rebut.” United
States v. Henry,
53 M.J. 108, 111 (C.A.A.F. 2000) (citing United States v.
McCullah,
11 M.J. 234, 237 (C.M.A. 1981)) (additional citations omitted). “In-
substantial omissions from a record of trial do not raise a presumption of
prejudice or affect that record’s characterization as a complete one.”
Id. Rec-
24
United States v. Buford, No. ACM 39538
ords which are not substantially verbatim or which are incomplete will not
support sentences including either a punitive discharge or more than six
months of confinement. R.C.M. 1103(b)(2)(B), 1103(f).
3. Analysis
This transcript contains more than its fair share of annotations indicating
information is missing from the record. The record, however, is more than
1,000 pages long, meaning it contains approximately 25,000 lines of tran-
scription. Placed in that context, the “[indiscernible]” annotation appears in
just over one percent of the lines in the record. In other words, when consid-
ering the transcription on a line-by-line basis, nearly 99 percent of the lines
in the record do not reflect omissions. Based upon our careful review of the
record, considering the context of the words surrounding the omissions, to
include follow-up and clarifying comments, we are confident nearly all the
omissions constitute one or two words.
For example, the record shows the military judge asked one witness, “So
of that million images it might be [indiscernible] actual separate images just
represented by different hash values?” The witness then answered, “The oth-
er way around. It’s about a million images but between them probably about
five million hash values.” The military judge then added, “Okay, so a million
independent, [indiscernible] separate images, okay, gotcha.” The context of
this particular exchange is that the witness was explaining that a particular
repository of child pornography had approximately one million images in it
and that there are different algorithms for creating hash values; thus, a sin-
gle file will have multiple hash values. Although not completely clear, we
conclude where the record shows “[indiscernible]” annotations, the military
judge likely said “five million” the first time and something like “discrete” or
“individual” the second time.
We do not see any evidence that lengthy exchanges or passages have been
replaced by the “[indiscernible]” annotations. Other than these annotations,
the record indicates a focused attention to detail by the court reporter. For
example, when one of the trial counsel inappropriately mocked one of the tri-
al defense counsel, the court reporter carefully described the trial counsel’s
affect in the record. In comparing portions of the record describing the dense,
data-filled exhibits in this case, we find the record to be precise, even where
counsel were referencing lengthy filenames with unconventional spellings,
times, file extensions, and IP addresses. This degree of care leads us to con-
clude that had the court reporter been unable to transcribe any significant
quantity of the proceedings, she would have indicated that in the record it-
self. We do not find a quantitatively substantial amount of the trial is miss-
ing from the transcript.
25
United States v. Buford, No. ACM 39538
We have also considered whether qualitatively substantial information is
missing from the record, and we answer that question in the negative. Be-
cause of the complex nature of the evidence in this case, most of the contested
issues were covered and re-covered multiple times during the testimony. In
many cases, trial counsel, trial defense counsel, the military judge, and even
the members asked clarifying questions. Moreover, the arguments by counsel,
including trial defense counsel’s argument on the R.C.M. 917 motion, flowed
clearly from the the record. Had substantial information been omitted from
the record, we would expect to find portions of the arguments untethered to
the record or referring to concepts presented by witnesses uncaptured earlier
in the transcript. We found counsels’ arguments directly tied to or fairly aris-
ing from the record, leading us to conclude the information omitted by virtue
of the “[indiscernible]” annotations was not qualitatively substantial. The
transcript in this case is substantially verbatim.
E. Jurisdiction over Appellant
Appellant asserts his court-martial was lacking jurisdiction over him un-
der the theory he had been medically retired from the Air Force prior to trial.
1. Additional Background
Although Appellant’s offense occurred in June 2014, he was not brought
to trial until 7 May 2018. In the interim, Appellant met a medical evaluation
board and was notified on 18 October 2017 that he would be “permanently
disability retired” effective 1 January 2018. Two days before that effective
date, Appellant asserts he received an email stating his DD Form 214 “was
official, and would be ready for download the day after [his] effective separa-
tion date” from the Air Force’s online personnel system. He was also given a
retiree identification card and information about the retiree benefits he
would receive once he returned to the United States. He was further told he
would receive “payments for [his] disability,” and such payments were about
to commence. But, on 26 January 2018, he received another email notifying
him that his retirement had been “rescinded” that same day, and that he
should destroy the DD Form 214, due to it being “no longer official.”
Unsurprisingly, Appellant’s pay went into disarray after these events.
Appellant did not receive pay after the effective date of his later-rescinded
medical retirement until mid-February, and even then he only received a
fraction of it, about one-third of his monthly E-5 pay. The Defense Finance
and Accounting Service (DFAS) persisted in underpaying Appellant through
his May court-martial.
Appellant did not raise the subject of jurisdiction at his court-martial. The
issue of jurisdiction only came up while the members were deliberating on
findings when the military judge asked trial defense counsel whether they
26
United States v. Buford, No. ACM 39538
agreed that Appellant had been “extended on active duty for administrative
purposes for these proceedings.” Trial defense counsel answered in the af-
firmative.
Even after Appellant was well into serving his term of confinement, his
trial defense counsel effectively conceded the court-martial’s jurisdiction in
the letter she submitted as part of Appellant’s request for clemency in which
she primarily discussed the impact Appellant’s punitive discharge would
have on his ability to get medical treatment. In her 23 August 2018 letter,
she wrote:
The prosecutors had to cancel [Appellant’s] retirement orders
and bring him back onto active duty in order to complete his
court martial. It is not the Defense’s contention that this is in-
an-of-itself [sic] unjust. The enforcement of the rule of law is
crucial to a democratic society and an efficient military force.
The Government has not sought to rebut the foregoing, instead arguing
the evidence is insufficient to prove Appellant had retired or otherwise sepa-
rated from the service prior to trial.
2. Law
Article 2, UCMJ,
10 U.S.C. § 802, sets out court-martial in personam ju-
risdiction. The Government has the burden of proving jurisdiction by a pre-
ponderance of the evidence when jurisdiction is challenged. Hale, 78 M.J. at
270 (citation omitted). Jurisdiction ceases to exist over servicemembers dis-
charged from the military, “absent some saving circumstance or statutory au-
thorization.” United States v. Hart,
66 M.J. 273, 275 (C.A.A.F. 2008) (quoting
United States v. Howard,
20 M.J. 353, 354 (C.M.A. 1985)) (additional citation
omitted). We review issues of personal jurisdiction de novo. United States v.
Christensen,
78 M.J. 1, 4 (C.A.A.F. 2018) (citation omitted).
Our superior court has looked to three criteria in considering whether a
servicemember’s discharge is final and jurisdiction has terminated: “(1) the
delivery of a discharge certificate (a DD Form 214); (2) a ‘final accounting of
pay;’ and (3) the completion of the ‘clearing’ process that is required under
service regulations.”
Id. (quoting Hart, 66 M.J. at 276–79). These criteria
amount to guidance, and they are not binding when they yield a result that
goes against reason or policy. Id. (quoting United States v. Nettles,
74 M.J.
289, 291 (C.A.A.F. 2015)).
Court-martial jurisdiction extends to retired servicemembers who are en-
titled to pay. Article 2(a)(4), UCMJ,
10 U.S.C. § 802(a)(4); United States v.
Dinger,
77 M.J. 447, 453 (C.A.A.F. 2018). This jurisdiction encompasses
members both temporarily and permanently retired due to disability. United
27
United States v. Buford, No. ACM 39538
States v. Stevenson,
53 M.J. 257, 260 (C.A.A.F. 2000); United States v. Bowie,
34 C.M.R. 411, 412 (C.M.A. 1964).
3. Analysis
At trial, Appellant affirmed the position that he had been “extended on
active duty for administrative purposes” for trial proceedings. Now, on ap-
peal, Appellant asserts he had been medically retired and placed on the per-
manent disability retirement list prior to his trial. There is no evidence—and
Appellant does not argue—that he was simply discharged from active duty.
Instead, Appellant points to receiving his retiree identification card and in-
formation about the benefits he would receive from the Veterans Administra-
tion, to include “payments for [his] disability,” as evidence of his medical re-
tirement.
Our superior court has pointed out that the “overarching interest impli-
cated by the law of personal jurisdiction, and especially discharge jurispru-
dence, is the need—of both servicemember and service—to know with cer-
tainty and finality what the person’s military status is and when that status
changes.” Nettles, 74 M.J. at 291 (citation omitted); see also Howard, 20 M.J.
at 354. Unquestionably, the Government’s actions clouded Appellant’s precise
status in the months leading up to his court-martial by sending him a retiree
identification card, preparing his DD Form 214, notifying him his DD Form
214 was available for him to download, and stopping his pay while at the
same time requiring him to stay on base and continue his military duties.
Recognizing at least a portion of its error, the Government told Appellant to
destroy the DD Form 214 and canceled his retirement after the earlier-
established effective date. For reasons we cannot divine, the Government
never did determine how to correctly pay Appellant.
In spite of the confusion over Appellant’s status, we are confident he was
still on active duty at the time of his trial based upon the absence of evidence
Appellant completed any sort of clearing process to separate him from the
service. Indeed, Appellant himself points to the fact he was not permitted to
depart Japan and return to the United States prior to trial. Moreover, Appel-
lant’s argument he was medically retired is squarely opposed to the position
he took, through counsel, both at trial and in his clemency submission. Based
upon the evidence presented, we are not persuaded by his new post-trial
claim that he was, in fact, not extended on active duty for the purpose of trial,
but rather had been placed on the permanent disability retirement list. The
Government’s sending of contradictory messages to Appellant about his duty
status is far from a practice to be emulated, but the totality of the circum-
stances leads us to conclude Appellant’s medical retirement had not been fi-
nally executed prior to his trial. We further note that even if he had been
medically retired, such retirement would not have severed military court-
28
United States v. Buford, No. ACM 39538
martial jurisdiction over him. Thus, we conclude Appellant’s period of active
duty had been extended for the purposes of his trial, his court-martial had
jurisdiction over him, and he is not entitled to relief.
F. Appellant’s Pay
Appellant argues for the first time on appeal he was subjected to illegal
pretrial punishment by virtue of not receiving the full pay he was entitled to
from January to May 2018 and by the Government seeking to recoup some
portion, if not all, of what he was paid during that time. Appellant asks this
court to set aside his punitive discharge as a remedy. The Government as-
serts we have no jurisdiction to consider the issue, arguing Article 66(c),
UCMJ, does not grant us jurisdiction over a pay dispute unconnected to the
approved sentence in a case. Alternatively, the Government argues Appellant
is not entitled to relief under Article 13, UCMJ, due to the fact he was not in
pretrial confinement at the time of the pay issues.
1. Additional Background
As noted above, DFAS underpaid Appellant from January through May
2018. In the declaration he filed with this court, Appellant states he tried to
rectify his pay at the time by going to the base Finance office where he was
told, “they didn’t want to overpay [him] which would result in [him] owing
the government money.” Finance personnel also told Appellant he would be
paid once “the system has corrected itself.” Despite his efforts, Appellant did
not receive his full E-5 pay.
Appellant did not raise any issues regarding his pay during his May 2018
court-martial or otherwise assert he had been punished illegally prior to trial.
However, in his August 2018 clemency request, Appellant wrote:
I had my retiree ID, my DD-214 and started receiving my bene-
fits. Nonetheless, I was still trapped in Japan not able to leave,
still having to put on the military uniform and come into work
because my leadership still said I had to even though I wasn’t
getting paid. No one cared about me enough to even make sure
I got a pay check or was even kept on active duty. . . . Even as a
retiree with an ID card, a DD-214, and no paycheck (either ac-
tive duty or retired) my unit still had me on a curfew. The [U.S.
Department of Veterans Affairs] was waiting for my arrival
back in the [U.S.] so they could start my benefits ASAP. Four
months of me stuck in Japan they sent me a letter saying they
will at least start my payments for my disability. . . . I was
trapped in Japan unable to go live out whatever life I have left.
I know I wasn’t in confinement, but over the last four years, I
certainly haven’t been free.
29
United States v. Buford, No. ACM 39538
Near the end of 2018, after Appellant had completed his term of confine-
ment, DFAS sought to take back a portion of the partial payments he had re-
ceived, asserting he owed a debt to the Department of Defense. When Appel-
lant disputed this debt, DFAS sent him letter on 15 March 2019 stating:
Your debt $692.83, is due to payments received after you en-
tered a No Pay Status (NPS), due to Date of Separation
(D.O.S.) on January 01, 2018. These payments are as follows, a
partial payment in the amount of $1,000.00 dated April 17,
2018, and a partial payment in the amount of $2,000.00 dated
May 01, 2018. while [sic] on active duty with the United States
Air Force. Your debt is due to Separation Payment. We have no
record of returned payments.
DFAS further informed Appellant the debt had been sent to collections.
When Appellant tried again to dispute the debt, he received a terse response
on 25 March 2019 that simply said, “Per the agency, the debt is valid and col-
lection should continue.”
According to the declaration filed with this court, Appellant asked his
first sergeant to contact DFAS and help resolve the problem, and Appellant
says he “contacted a former supervisor to notify him of the issue.” We cannot
ascertain what, if anything, either of these two individuals did in response to
Appellant’s entreaties. The Government has not sought to rebut Appellant’s
factual allegations.
2. Law
Whether Appellant should receive relief for illegal pretrial punishment is
a question we review de novo. United States v. Mosby,
56 M.J. 309, 310
(C.A.A.F. 2002). Appellant has the burden of establishing his entitlement to
credit for an alleged Article 13 violation.
Id. (citation omitted). Under Article
13, UCMJ:
No person, while being held for trial, may be subjected to pun-
ishment or penalty other than arrest or confinement upon the
charges pending against him, nor shall the arrest or confine-
ment imposed upon him be any more rigorous than the circum-
stances required to insure his presence, but he may be subject-
ed to minor punishment during that period for infractions of
discipline.
This provision prohibits “intentional imposition of punishment” prior to trial,
as well as unnecessarily rigorous arrest or pretrial confinement conditions.
United States v. Crawford,
62 M.J. 411, 414 (C.A.A.F. 2006) (citations omit-
ted). Confinement is not a prerequisite for relief under Article 13. See, e.g.,
United States v. Guardado, ___ M.J. ___, No. 19-0139,
2020 CAAF LEXIS 17,
30
United States v. Buford, No. ACM 39538
at *8–9 (C.A.A.F. 15 Jan. 2020); Howell v. United States,
75 M.J. 386, 393–94
(C.A.A.F. 2016); United States v. Combs,
47 M.J. 330, 332–34 (C.A.A.F. 1997).
In assessing whether an appellant was subjected to illegal pretrial punish-
ment, the test is: “was there an intent to punish or stigmatize a person await-
ing disciplinary action, and if not, were the conditions . . . in furtherance of a
legitimate, nonpunitive, government objective.” United States v. Starr,
53
M.J. 380, 382 (C.A.A.F. 2000) (citations omitted).
In the face of an Article 13 violation, meaningful relief in the circum-
stances of a particular case may extend beyond confinement credit and may
involve setting aside or mitigating a punitive discharge. See United States v.
Zarbatany,
70 M.J. 169, 177 (C.A.A.F. 2011).
When an appellant fails to seek sentence relief for pretrial punishment at
trial, the issue is waived absent plain error. United States v. Inong,
58 M.J.
460, 465 (C.A.A.F. 2003) (citation omitted). Even if waived, Article 66(c),
UCMJ, calls upon the courts of criminal appeals to only affirm sentences
which are correct in law and fact and which should be approved. See, e.g.,
United States v. Gay,
74 M.J. 736 (A.F. Ct. Crim. App. 2015), aff’d,
75 M.J.
264 (C.A.A.F. 2006).
3. Analysis
We disagree with the Government’s position that we do not have jurisdic-
tion to review Appellant’s claim. Appellant has raised his denial of pay as al-
legedly illegal pretrial punishment under Article 13, UCMJ, which we and
our superior court have consistently exercised jurisdiction over. Indeed, the
CAAF just recently considered whether the partial withholding of pay from a
servicemember awaiting a rehearing after his sentence had been set aside
amounted to an Article 13 violation. Guardado,
2020 CAAF LEXIS 17, at *5–
9; see also Howell, 75 M.J. at 393–94.
The Government’s position that Article 13 requires an appellant to have
been in pretrial confinement is similarly misplaced. In Combs, the CAAF de-
termined that Article 13 applies to servicemembers “held for trial,” and con-
cluded the appellant in that case—who was awaiting a rehearing on the set-
aside findings as to one charge and the sentence—was protected by Article 13
(the CAAF noted that the appellant was not afforded “complete freedom of
movement”). 47 M.J. at 333. Appellant here was similarly awaiting trial after
an earlier charge was withdrawn after he was arraigned on it. Whatever can
be said of DFAS’s view of Appellant’s active-duty status, it is clear Appellant
was not free to simply leave Japan at the end of his term of service or upon
his medical retirement, as he was involuntarily retained on active duty for
the purpose of being tried by court-martial. Although not in pretrial confine-
31
United States v. Buford, No. ACM 39538
ment, Appellant was being held for trial, and was therefore covered by the
protections of Article 13.
Appellant’s pay issues arise from two related, yet distinct, sets of circum-
stances. The first is Appellant’s diminished pay in the months leading up to
his confinement when the Government processed Appellant’s medical retire-
ment and then subsequently rescinded that retirement. The second is the
Government’s later establishment of a debt on Appellant’s part based upon
some portion of the funds he was paid during the medical-retirement tumult.
Appellant did not raise the diminished-pay issue at trial. In fact, his trial
defense counsel asserted on the record that Appellant had not been punished
in any way prior to trial constituting illegal pretrial punishment under Arti-
cle 13. The military judge then turned to Appellant and said:
Article 13 of the UCMJ talks about what the command or what
the Air Force can do with someone prior to trial, essentially
saying that no one should be punished prior to trial because
you shouldn’t be punished until you’ve been convicted. Do you
believe that anybody in a position of command or authority has
done anything to you prior to trial that’s been done for punish-
ment purposes?
Appellant answered in the negative.
As a result, Appellant has waived this issue absent plain error. Having
reviewed Appellant’s post-trial submissions along with all the evidence in
this case, we find no indication of any intent to punish or stigmatize him. To
the contrary, it appears Appellant’s medical condition had triggered his med-
ical retirement, catching those responsible for military justice off-guard. This
led Appellant’s command to scramble to reverse the retirement in light of the
fact Appellant was pending court-martial (and had been at least since charg-
es were originally preferred in 2015). Amidst this confusion, Appellant’s pay
was sent into a tailspin from which it would never recover. The attention be-
ing paid to Appellant’s duty status as he approached trial was lacking, but we
see no command intent to punish him, especially since command cannot be
imputed with the knowledge that DFAS would the stop Appellant’s pay. Per-
sonnel at Appellant’s finance office seemed to be operating under the as-
sumption that “the system” would correct his pay. These same personnel sug-
gested the reason for Appellant’s pay decrease was to avoid creating a debt on
Appellant’s part—a legitimate, non-punitive objective, even if seemingly dis-
connected from the facts of Appellant’s case. Had Appellant raised this issue
at trial, we would have a more complete record to review his claim. Instead,
he waived the issue. Looking for plain error, we find none, and Appellant is
not entitled to relief under Article 13 for his reduced pay leading up to his
32
United States v. Buford, No. ACM 39538
trial. Based upon the evidence presented, we similarly find no relief warrant-
ed under Article 66(c), UCMJ.
Appellant’s debt issue did not arise until after he completed his term of
confinement, so we would not have expected him to raise it at trial. But, once
Appellant was tried, he was no longer being “held for trial,” and Article 13
ceased to apply to him. See United States v. Kreutzer,
70 M.J. 444, 447–48
(C.A.A.F. 2012). Although the payments purportedly creating Appellant’s
debt occurred while he was being held for trial, the actual enforcement of the
debt (if not the determination Appellant had the debt in the first place) oc-
curred after Appellant’s trial, rendering Article 13 inapplicable to this claim.
Whatever merit, or lack thereof, there is to DFAS’s conclusion that Appellant
owes a debt by virtue of being underpaid, this issue falls outside the purview
of Article 13, and we cannot grant him relief.
III. CONCLUSION
The findings and sentence are correct in law and fact, and no error mate-
rially prejudicial to the substantial rights of Appellant occurred. Articles
59(a) and 66(c), UCMJ,
10 U.S.C. §§ 859(a), 866(c). Accordingly, the findings
and sentence are AFFIRMED.
FOR THE COURT
CAROL K. JOYCE
Clerk of the Court
33