DocketNumber: ACM 39538
Filed Date: 3/9/2020
Status: Non-Precedential
Modified Date: 3/9/2020
U NITED S TATES AIR F ORCE C OURT OF C RIMINAL APPEALS ________________________ No. ACM 39538 ________________________ UNITED STATES Appellee v. Charles D. BUFORD, Jr. Staff Sergeant (E-5), U.S. Air Force, Appellant ________________________ Appeal from the United States Air Force Trial Judiciary Decided 9 March 2020 ________________________ Military Judge: L. Martin Powell. Approved sentence: Dishonorable discharge, confinement for 5 months and 1 day, total forfeiture of pay and allowances, reduction to E-1, and a reprimand. Sentence adjudged 12 May 2018 by GCM convened at Yokota Air Base, Japan. For Appellant: Captain David A. Schiavone, USAF. For Appellee: Lieutenant Colonel Joseph J. Kubler, USAF; Major Anne M. Delmare, USAF; Mary Ellen Payne, Esquire. Before J. JOHNSON, POSCH, and KEY, Appellate Military Judges. Judge KEY delivered the opinion of the court, in which Chief Judge J. JOHNSON and Judge POSCH joined. ________________________ This is an unpublished opinion and, as such, does not serve as precedent under AFCCA Rule of Practice and Procedure 30.4. ________________________ KEY, Judge: A general court-martial composed of officer members convicted Appellant, contrary to his pleas, of one specification of receiving child pornography in violation of Article 134, Uniform Code of Military Justice (UCMJ), 10 U.S.C. United States v. Buford, No. ACM 39538 § 934. 1,2 The court-martial sentenced Appellant to a dishonorable discharge, confinement for six months, total forfeiture of pay and allowances, reduction to the grade of E-1, and a reprimand. The convening authority reduced the confinement to five months and one day, but otherwise approved the sentence as adjudged. On appeal, Appellant raises four issues through counsel: (1) whether the evidence was legally and factually sufficient to support his conviction; (2) whether the military judge erred by admitting videos of child pornography which were not found on Appellant’s computer; (3) whether the military judge erred by not providing the court members a definition of “receiving;” and (4) whether the transcript is not verbatim. Appellant personally raises two addi- tional issues: (5) whether the court-martial had jurisdiction over him; and (6) whether he was subjected to illegal pretrial punishment in violation of Article 13, UCMJ,10 U.S.C. § 813
. 3 Finding no error prejudicial to the substantial rights of Appellant, we affirm. I. BACKGROUND Appellant was charged with knowing receipt via the Internet of two vide- os containing child pornography. These videos, however, were never found on any electronic devices or storage media seized from Appellant. At trial, the Government admitted and played two videos retrieved from law enforcement archives, asserting Appellant had downloaded the same videos from some other source. The Government’s case against Appellant focused on evidence indicating he had used peer-to-peer networking software to download the videos; the members convicted Appellant of receiving only one of the videos. Appellant came to the attention of military law enforcement in the sum- mer of 2014 when an Okinawa-based Naval Criminal Investigative Service (NCIS) agent, Special Agent WV, identified an Internet Protocol (IP) address 1 Except as otherwise noted, all references in this opinion to the Uniform Code of Mil- itary Justice (UCMJ) and Rules for Courts-Martial (R.C.M.) are to the Manual for Courts-Martial, United States (2016 ed.) (2016 MCM). 2 The members convicted Appellant by excepting out certain language from the speci- fication and acquitted him of a separate specification of possessing child pornogra- phy, which we will discuss in this opinion. 3 Appellant personally asserts these two issues pursuant to United States v. Grostefon,12 M.J. 431
(C.M.A. 1982). 2 United States v. Buford, No. ACM 39538 associated with a military installation in Japan that appeared to be either transmitting or receiving child pornography via peer-to-peer networking. 4 According to expert testimony elicited by the Government at trial, peer-to- peer networking allows users to share files with each other by creating a network of the users’ computers. Unlike a server-based network, the files re- side on the individual users’ computers (“host” computers), not on centralized servers. In order for a user to be part of a peer-to-peer network, the user must first install peer-to-peer networking software which facilitates access to the network. A user on the network interested in downloading files would then look for the desired files—typically done by utilizing a search function built into the software, specifying key words for the software to seek out on the network. The software will return a list of relevant files found on the net- work, and the user can then choose which files to download to his or her com- puter. To increase the efficiency of the network, peer-to-peer software often downloads segments of a requested file from a number of different hosts on the network, then assembles those segments into a completed file on the re- questing computer. In order for this process to work, the network software creates a unique identifier known as a “hash value” for each file on the net- work. Sometimes referred to as “digital fingerprints,” hash values are derived from mathematical processes based upon the data within a particular file, unrelated to file identifiers such as filenames and extensions. 5 Unique hash values are critical for the operation of peer-to-peer networks, as the network software must use identical files in order to be able to download file segments from multiple sources at once and then correctly compile those segments into a working file. When a user installs peer-to-peer networking software on his or her com- puter, the software creates an empty folder for shared files. The folder is typi- cally visible to other network users and serves dual purposes. The first is as a repository for the user’s files which are available to others on the network to download. The second is as a destination for the files the user has requested to be downloaded. Users have the ability to move files in and out of their shared folder at their discretion. The default setting for most peer-to-peer 4 Appellant’s trial originally commenced in January 2016, but for reasons not perti- nent here, those charges were dismissed, and new charges were preferred in the lat- ter half of 2017. 5 In this case, one of the Government’s expert witnesses testified that hash values are “[t]rillions of times more accurate than DNA” in identifying unique files. 3 United States v. Buford, No. ACM 39538 programs is to make files in the shared folder available to be downloaded by other users on the network. Thus, when a user downloads a file using the network software, the file will typically be hosted on that user’s computer for others to find and download until the user removes the file from the shared folder. Special Agent WV was alerted to the activity involving the IP address in Japan by using automated software that scans peer-to-peer networks by peri- odically searching for terms associated with child pornography. Once the software finds a computer hosting files with filenames indicative of child por- nography, the software executes a “browse-host” command, which displays the files in that host computer’s shared folder. The software logs information about the shared folder’s files in a database, including: the IP address associ- ated with the computer where the files were found, the files’ names, their hash values, and the percentage of the files on the host computer at the time the browse-host command is executed. Government expert-witness testimony further established that in local- network configurations, such as home networks in which computers connect to the Internet through a router, Internet service providers assign IP ad- dresses to users’ routers, and computers or other devices connected to a given router make use of that router’s IP address. The IP address does not indicate which device or devices are connected to the router nor identify any particu- lar connected device. After being alerted to the apparently illicit Internet activity, Special Agent WV generated a spreadsheet of the results of the browse-host com- mands directed at the computer connected to the router with the Japan IP address. The spreadsheet showed a number of files in various states of down- load over a seven-day period from 22 June 2014 to 29 June 2014. For exam- ple, on 22 June 2014, at 2045 hours, 6 the system located 40 files in this com- puter’s shared folder with download percentages ranging from 0.14 percent to 100 percent. At 2308 hours the same day, only eight files were in the folder, ranging from 0.15 percent to 99.14 percent. Virtually all the files on the spreadsheet had filenames describing or suggesting sexual conduct involving 6The system reported times in Coordinated Universal Time (UTC), which was nine hours behind Yokota Air Base, where Appellant was tried. 4 United States v. Buford, No. ACM 39538 children. Special Agent WV tried to download a file directly from the comput- er using the Japan IP address, but was unable to do so. 7 Of the files on the spreadsheet, Special Agent WV focused on two video files. The first file had a hash value beginning with the characters “SDHI” and the second had a value beginning with “QAQX.” The QAQX file first ap- peared on the spreadsheet as a result of a browse-host command executed on 22 June 2014 at 0725 hours. At that point, the file showed as 6.22 percent downloaded, but it later appeared at 2045 hours the same day at 100 percent. The filename associated with the QAQX file was 124 characters long (includ- ing spaces) plus a 7-character extension and included sexually explicit terms, words indicative of child pornography, and four first names followed by ages ranging from 4 to 8 years old. The SDHI file—also explicitly named— appeared in the 0725 hours search at 0.06 percent, then again at 2045 hours at 92.56 percent. The SDHI file never appeared at 100 percent on the spread- sheet. Special Agent WV recognized the QAQX hash value from another case he had investigated as being associated with a video of child pornography, a copy of which was stored in NCIS’s local repository of child-pornography evi- dence. He subsequently determined the SDHI hash value on the spreadsheet matched the hash value of another video in the NCIS repository. Armed with this information, Special Agent WV obtained a summons re- quiring the Internet service provider to divulge the account information for the IP address during the time period in question. In response to the sum- mons, the provider disclosed the IP address had been assigned to Appellant, leading the investigation to be transferred to Air Force investigators due to Appellant’s status as an Airman. Special Agent WV passed on not just his spreadsheet, but also copies of the videos with the QAQX and SDHI hash values he had copied from NCIS’s repository. These two videos ultimately be- came the basis for the specification alleging Appellant’s receipt of child por- nography. Pursuant to a search authorization, Air Force Office of Special Investiga- tions agents searched Appellant’s military dormitory room and seized a lap- top computer and multiple electronic devices along with digital storage me- dia. There was no evidence Appellant shared his dormitory room or that any- one else had access to it. Appellant had a wireless router in his room, and his 7He hypothesized the computer may have been offline or was no longer sharing files; alternatively, the Internet provider may have assigned a new IP address to the rout- er. 5 United States v. Buford, No. ACM 39538 password-protected laptop was plugged directly into it. Agents did not seize the router or check to see if it required a password to wirelessly connect to it or to access the Internet. Agents sent the seized electronic items to the De- fense Cyber Crime Center’s Defense Cyber Forensics Lab for analysis by a contractor, Mr. BW, whose examination of Appellant’s laptop found peer-to- peer software installed on it. The software had been run 14 times between 22 June and 30 June 2014. About 18 thumbnail-sized images of what appeared to be child pornogra- phy were also found on the computer in a deleted temporary (“temp”) file. Mr. BW explained that temp files are created automatically by computer applica- tions for the purpose of temporarily storing data which facilitates the running of those applications, and users cannot access data stored in the files without specialized software. The temp file with the images in it was created on 16 April 2014, and the last time data was written to it was on 22 June 2014. In addition to the 18 thumbnail-sized images, the file contained between 600 and 900 other non-contraband images. Although the folder containing the temp file had been deleted, Mr. BW was able to recover the temp file using forensic software. He was not able to determine what application on Appel- lant’s computer created the temp file, what applications interacted with the temp file, or how the temp file was being used. The 18 thumbnail-sized imag- es became the basis for the specification alleging Appellant’s possession of child pornography which he was later acquitted of. Mr. BW also conducted keyword searches on a copy of the hard drive from Appellant’s computer, finding references to a number of files with terms in- dicative of child pornography in their names. Other than the thumbnail im- ages in the temp file, however, Mr. BW was unable to locate any child por- nography on Appellant’s computer. He did not find either the QAQX or SDHI videos or any of the other files from the peer-to-peer spreadsheet on the com- puter. Mr. BW did note that file-shredding software had been installed on Appel- lant’s computer, which can be used to more thoroughly remove files from a hard drive than simply executing delete commands. The Government hy- pothesized Appellant may have used the software to erase child pornography files he had downloaded. Mr. BW determined the file-shredding software had been run three times between 18 and 29 June 2014, but he could not say which files, if any, had actually been “shredded.” Mr. BW found a number of “jump list entries” and “linked” files, which are items of code created when computer files are opened. Both jump list entries and linked files assist the computer in quickly opening target files. Jump list entries are essentially lists of files recently opened by a particular applica- tion, while the linked files act as shortcuts, telling the computer which appli- 6 United States v. Buford, No. ACM 39538 cation to use to open a particular target file (i.e., they link the particular file to the appropriate application). Mr. BW identified jump list entries and linked files referencing target files which had child-pornography-related terms in their names, but he was not able to find those target files on Appel- lant’s computer. Nine of these target files had the same names as files on the peer-to-peer spreadsheet, suggesting the files had been both downloaded to Appellant’s laptop from the peer-to-peer network via Appellant’s router as well as accessed while they resided on Appellant’s laptop. The jump list en- tries had been created in January, April, and June of 2014. Because Mr. BW only found the jump list entries and linked files—which contain filenames, not the target files themselves—he could not say what was actually in those target files, much less conclude that they were images of child pornography, in spite of their explicit names. One of the linked files Mr. BW found contained the same filename as the one given to the file on the spreadsheet with the QAQX hash value. 8 The linked file had been created on 24 June 2014 at 1345 hours, Coordinated Universal Time (UTC), which indicated that target file had been opened by a program of some sort on Appellant’s computer. From this linked file, Mr. BW further determined the target file had been originally put on Appellant’s computer on 22 June 2014 at 0653 hours, half an hour before a file with the same name showed on the spreadsheet as 6.22 percent downloaded. Mr. BW was unable to locate any linked files associated with the filename given to the SDHI file. In addition to the above, Mr. BW found two files with names indicative of child pornography in the laptop’s recycling bin, indicating they had been de- leted by the user in February 2014. He also found evidence on Appellant’s computer of a user searching for a keyword related to child pornography on both Google Images and on a website that assists in locating files on peer-to- peer networks. The peer-to-peer search had been conducted for the same keyword 30 times, the last time being on 2 June 2014; the Google Images search was only conducted once on an unknown date. Mr. BW found indica- tions that other keywords indicative of child pornography had been input by a user as search terms within the peer-to-peer program itself. He could not, however, say what results, if any, were returned for any of the searches. Mr. BW testified there was no way to know what search terms had been used to find the files Appellant was accused of downloading. He further testi- fied that—because he did not find either the QAQX or SDHI videos on Appel- 8 Only filenames, not hash values, were found on Appellant’s laptop. 7 United States v. Buford, No. ACM 39538 lant’s computer—there was no way of knowing if the files as they existed on the laptop were corrupt or otherwise non-playable. At trial, Appellant stipulated that the videos retrieved from the NCIS re- pository with the QAQX and SDHI hash values contained child pornography. Nonetheless, trial counsel sought to show the videos—the QAQX video was about 21 minutes in length—in their entirety to the members. The military judge only allowed trial counsel to show the members 30 seconds of each vid- eo over the Defense’s objection that the stipulation obviated the need to show the videos at all. The members acquitted Appellant of possessing the 18 thumbnail-sized images found in the temp file. They convicted Appellant of receiving the QAQX video, but not the SDHI video, which they excepted from the specifica- tion. II. DISCUSSION A. Legal and Factual Sufficiency Appellant argues the evidence is legally and factually insufficient to sup- port his conviction based upon a lack of proof that he actually received the QAQX video, the sole item of child pornography he was convicted of receiving. 1. Law We may affirm only those findings of guilty that we determine are correct in law and fact and, on the basis of the entire record, should be approved. Ar- ticle 66(c), UCMJ,10 U.S.C. § 866
(c). We review issues of legal and factual sufficiency de novo. United States v. Washington,57 M.J. 394
, 399 (C.A.A.F. 2002) (citation omitted). Our assessment of legal and factual sufficiency is limited to the evidence produced at trial. United States v. Dykes,38 M.J. 270
, 272 (C.M.A. 1993) (citations omitted). “The test for legal sufficiency is whether, after viewing the evidence in the light most favorable to the prosecution, any rational trier of fact could have found the essential elements of the crime beyond a reasonable doubt.” United States v. Robinson,77 M.J. 294
, 297–98 (C.A.A.F. 2018) (quoting United States v. Rosario,76 M.J. 114
, 117 (C.A.A.F. 2017)). “The term reasonable doubt, however, does not mean that the evidence must be free from conflict.” United States v. Wheeler,76 M.J. 564
, 568 (A.F. Ct. Crim. App. 2017) (citing United States v. Lips,22 M.J. 679
, 684 (A.F.C.M.R. 1986)), aff’d,77 M.J. 289
(C.A.A.F. 2018). Circumstantial evidence may suffice. See United States v. Kearns,73 M.J. 177
, 182 (C.A.A.F. 2014) (citing United States v. Blocker,32 M.J. 281
, 285 (C.M.A. 1991)). “[I]n resolving questions of legal sufficiency, we are bound to draw every reasonable inference from the evidence of record in 8 United States v. Buford, No. ACM 39538 favor of the prosecution.” United States v. Barner,56 M.J. 131
, 134 (C.A.A.F. 2001) (citations omitted). As a result, “[t]he standard for legal sufficiency in- volves a very low threshold to sustain a conviction.” United States v. King,78 M.J. 218
, 221 (2019) (alteration in original) (quoting United States v. Navrestad,66 M.J. 262
, 269 (C.A.A.F. 2008) (Effron, C.J., joined by Stucky, J., dissenting)), cert. denied, __ U.S. __,139 S. Ct. 1641
(2019). The test for factual sufficiency is “whether, after weighing the evidence in the record of trial and making allowances for not having personally observed the witnesses, [we are ourselves] convinced of the [appellant]’s guilt beyond a reasonable doubt.” United States v. Turner,25 M.J. 324
, 325 (C.M.A. 1987). “In conducting this unique appellate role, we take ‘a fresh, impartial look at the evidence,’ applying ‘neither a presumption of innocence nor a presump- tion of guilt’ to ‘make [our] own independent determination as to whether the evidence constitutes proof of each required element beyond a reasonable doubt.’” Wheeler, 76 M.J. at 568 (alteration in original) (quoting Washington, 57 M.J. at 399). 2. Analysis Appellant was convicted of a single specification of receiving child pornog- raphy, which required the Government to prove beyond a reasonable doubt: (1) that Appellant knowingly and wrongfully received child pornography, and (2) that, under the circumstances, Appellant’s conduct was of a nature to bring discredit upon the armed forces. See Manual for Courts-Martial, United States, pt. IV, ¶ 68b.b.(1) (2012 ed.) (2012 MCM). At trial, Appellant stipulated to the contents of the video with the QAQX hash value retrieved from NCIS’s child-pornography repository. The stipula- tion explicitly described sexual conduct between children and an adult that meets the definition of child pornography. The evidence supporting Appellant’s receipt of the QAQX video is some- what more complex. On 22 June 2014, a computer connected to Appellant’s wireless router downloaded a file with the QAQX hash value via peer-to-peer networking software to a shared folder visible to other network users such that the file appeared to have been 100 percent downloaded. The file with the QAQX hash value had a 124-character-long filename describing sexual con- duct involving children, including names and ages. On 24 June 2014, two days after the file was downloaded, a linked file was created on Appellant’s computer referencing the same 124-character filename, indicating that file had been opened by a program on the computer. Testimony at trial established that the computer seized from Appellant’s room was password-protected, had been used to access social media and email accounts belonging to Appellant, and had files uniquely related to Ap- 9 United States v. Buford, No. ACM 39538 pellant saved on it (e.g., pictures of Appellant in uniform). Moreover, Appel- lant was the sole occupant of his dormitory room and his room was locked, at least when agents went to search it. Thus, the evidence supports the laptop seized belonged to Appellant, and that he was the primary, if not sole, user of the computer. Analysis of the computer found peer-to-peer software installed on it, evidence of search terms associated with child pornography, and evi- dence that files with names describing sexual conduct involving children had once resided on Appellant’s computer. Peer-to-peer networking software was not just installed on Appellant’s computer, it had been run multiple times over an eight-day period beginning on the day the file with the QAQX hash value was downloaded to the com- puter using the IP address of Appellant’s router. Although evidence of the QAQX hash value was not found on Appellant’s computer, a linked file showed that a file with the exact same 124-character filename had been opened on Appellant’s computer. The linked file showed the target file—that is, the file with the 124-character name—was originally placed on Appellant’s computer on 22 June 2014 at 0653 hours. Special Agent WV testified his spreadsheet showed the file had downloaded to 6.22 percent at 0725 hours that same day to a computer connected to Appellant’s router, eventually reaching 100 percent later in the day. Because no videos of child pornography were ever found on Appellant’s computer, and based upon the unique facts of this case, we have determined three inferences must be drawn from the evidence in order to conclude Appel- lant knowingly received child pornography. First, a factfinder would have to infer it was Appellant’s computer, and not some other computer connected to his wireless router, that downloaded the file with the 124-character name. The linked file demonstrates the file with the 124-character name had been placed on Appellant’s computer on 22 June 2014 and was later opened on 24 June 2014, indicating a file with that name did, in fact, reside on Appel- lant’s computer. Although there is no evidence describing how Appellant came to download this particular file, evidence of Appellant’s computer hav- ing used search terms related to child pornography along with the utilization of peer-to-peer networking software about the same time as the file being placed on Appellant’s computer is strong circumstantial evidence that Appel- lant sought out, found, and chose to download the file with the 124-character name. The second inference a factfinder would have to make is that the file with the 124-character name actually contained child pornography and not licit data. The QAQX hash value—the file’s digital fingerprint—reveals that the file generating that hash value does, in fact, contain child pornography. No evidence was adduced that a particular hash value could simultaneously be 10 United States v. Buford, No. ACM 39538 associated with a file containing child pornography and another file that did not. To the contrary, the trial testimony was that such a situation was a vir- tual impossibility. The evidentiary gap is that only the filename, and not the hash value, was found on Appellant’s computer. This gap, however, is easily bridged by the fact the filename was both lengthy and explicit, indicating the sheer improbability of a user possessing innocuous data in a file with the ex- act same filename as one containing a video of children being sexually ex- ploited. Any lingering doubt is eradicated by the evidence the file with the QAQX hash value—that is, the file demonstrably containing child pornogra- phy—was being downloaded through Appellant’s router the same day a file with the exact same name appeared on Appellant’s computer. This circum- stantial evidence supports the conclusion that the file with the 124-character name on Appellant’s computer was the same file as the one with the QAQX hash value, even though no actual video of child pornography was found on his computer. The third necessary inference is that Appellant actually received the file with the QAQX hash value. “[E]vidence that a person has sought out— searched for—child pornography on the internet and has a computer contain- ing child pornography images” can be circumstantial evidence of knowing re- ceipt of child pornography. King, 78 M.J. at 222 (quoting United States v. Pruitt,638 F.3d 763
, 766 (11th Cir. 2011)). The term “receive” is not defined in the Manual for Courts-Martial, but the word “possessing” is, and posses- sion is integral to the definition of “receive.” See, e.g., United States v. Olander,572 F.3d 764
, 769 (9th Cir. 2009) (citations omitted). 9 “Possessing” is defined as “exercising control of something” and “[p]ossession inherently includes the power or authority to preclude control by others.” See 2012 MCM, pt. IV, ¶ 68b.c.(5). Our superior court has described the test for posses- sion of child pornography as whether an accused had “dominion and control” over the contraband. See Navrestad, 66 M.J. at 267–68. That possession also must be knowing and conscious. Id. at 267 (citation omitted). In order for Appellant to download files with his peer-to-peer networking software, he had to consciously select files to be sent to his computer’s shared folder. Once the file downloaded to the folder, Appellant had the ability to open, move, delete, or modify the file as he saw fit. Indeed, the fact the file disappeared from the shared folder after downloading to 100 percent is cir- cumstantial evidence Appellant either moved or deleted the file, and the ex- 9 When a military judge does not instruct upon a definition of a term, we determine the appropriate definition as part of our factual sufficiency analysis. See United States v. Pease, 75 M.J 180, 184 (C.A.A.F. 2016). 11 United States v. Buford, No. ACM 39538 istence of the linked file is evidence a program on Appellant’s computer was used to open the downloaded file. Other than opening the file, there is no evi- dence Appellant actually viewed the video, or, if he did, for how long. 10 Unlike a charge of viewing child pornography, the Government was not required to prove Appellant actually saw the child pornography. The Government did, however, have to prove Appellant’s knowing receipt of it. This knowledge is established by Appellant’s use of his computer to search for files by using terms indicative of child pornography, his selection of a file with a lengthy name explicitly describing sexual conduct with children aged 8 and under, and his use of his peer-to-peer software to completely download that file to his shared folder on his computer. All of which evidences his intent to receive as well as his actual receipt of the child pornography contained in the file with the hash value of QAQX. The evidence of his computer opening the file and his movement of the file out of his shared folder and off his hard drive shows Appellant’s dominion and control over the file, proving his possession of it. Thus, circumstantial evidence establishes Appellant’s knowing receipt of the charged video, despite the lack of evidence he ever watched the video and despite the fact the video was never found on his computer. The final element of the offense requires proof that Appellant’s conduct was of a nature to bring discredit upon the armed forces. Appellant was an American Airman stationed at a military installation in Japan and living in a military dormitory. He connected to the Internet using a local Internet ser- vice provider and used that connection to seek out and download a video of graphic child pornography. While he was downloading that file and while it remained in his shared folder, the sexually explicit filename describing the sexual abuse of small children was visible to—at a minimum—every user on the peer-to-peer network. Notably, Appellant came to the attention of law en- forcement when an automated search utility saw Appellant’s computer pub- licly sharing files with names indicative of child pornography. Although Ap- pellant’s conduct seemingly occurred in the privacy of his dormitory room un- beknownst to anyone else, his use of the peer-to-peer network to download child pornography was visible to untold numbers of other network users around the world, conduct which “has a tendency to bring the service into 10 At trial, trial counsel argued that because another linked file was created six minutes later, Appellant must have watched the video for six minutes. The military judge was skeptical of this leap of logic, as are we. Considering the absence of any evidence as to how long Appellant had the video open for or that he even watched it at all, we conclude all the Government proved was that a program on Appellant’s computer opened the file, creating a linked file in the process. 12 United States v. Buford, No. ACM 39538 disrepute or which tends to lower it in public esteem.” See 2012 MCM, pt. IV, ¶ 60.c.(3). Having weighed all the evidence in the record of trial and made allowanc- es for not having personally observed the witnesses, we find that a rational factfinder could have found Appellant guilty beyond a reasonable doubt of all the elements of receiving child pornography. Furthermore, we ourselves are convinced of Appellant’s guilt beyond a reasonable doubt. Therefore, we find Appellant’s conviction both legally and factually sufficient. B. Admission of Video Files into Evidence Over the Defense’s objection, the military judge admitted as a prosecution exhibit the two video files retrieved from the NCIS repository of child pornog- raphy with the hash values of QAQX and SDHI. At trial and on appeal, Ap- pellant argues these two videos were neither found on nor downloaded from his computer, rendering their probative value slight and substantially out- weighed by the danger of unfair prejudice and of confusing the members. Ap- pellant further argues that because any offense of receipt was committed at the time the files were downloaded, any later viewing of the videos was irrel- evant to the question of whether Appellant had knowingly received the vide- os. If the viewing was irrelevant, Appellant argues, then the videos them- selves had little or no relevance and they therefore should not have been shown to the members in light of their inflammatory nature. 1. Additional Background Trial defense counsel objected to the admission of the videos on an au- thentication theory because the videos came from the NCIS repository and not from the data seized from Appellant. Trial defense counsel further object- ed on relevancy grounds, arguing the probative value of the evidence was outweighed by the undue prejudice of showing the videos themselves, espe- cially in light of Appellant’s offer and ultimate agreement to stipulate to the graphic content of the videos. Although the military judge overruled trial de- fense counsel’s objections to the admissibility of the videos, he determined playing the videos in their entirety “would be substantially more unfairly prejudicial than probative,” considering the parties’ stipulation. The military judge ruled trial counsel would be allowed to show only a 30-second segment from each of the two video files in order to permit the Prosecution to prove Appellant’s knowledge of the videos’ content and “to generally orient the members to the nature of the materials in question.” 11 The military judge fur- 11During sentencing proceedings, the military judge permitted trial counsel to show a different 30-second segment than they showed during findings. 13 United States v. Buford, No. ACM 39538 ther allowed trial counsel to show the first few moments of the QAQX video, consisting of text purporting to be from the video’s creator that claimed to set out names and ages of the children in the video. The military judge later sought to clarify his ruling, explaining that the entirety of the two videos was admissible, but that members would only be permitted to view the 30-second segments, as “limited clips are all that [Mil. R. Evid.] 403 would allow.” The military judge then said he would consider allowing the members to view “other short clips as necessary” if the members are unable “to make a factual determination in this case” after viewing the original 30-second segments. Trial counsel played the two 30-second segments and the introductory text from QAQX for the members during their case in findings. The military judge later instructed the members that he had “determined that the clips that [the members] saw were all that’s necessary that [the members] see,” but that the members could request to see more if needed “to make determi- nations in this case to determine whether the prosecution has proven its case beyond a reasonable doubt.” 2. Law We review a military judge’s decision to admit or exclude evidence for an abuse of discretion. United States v. Ediger,68 M.J. 243
, 248 (C.A.A.F. 2010) (citation omitted). “The abuse of discretion standard is a strict one, calling for more than a mere difference of opinion. The challenged action must be ‘arbi- trary, fanciful, clearly unreasonable, or clearly erroneous.’” United States v. White,69 M.J. 236
, 239 (C.A.A.F. 2010) (quoting United States v. Lloyd,69 M.J. 95
, 99 (C.A.A.F. 2010)). Military judges are afforded “considerable dis- cretion” in deciding whether to admit evidence. See United States v. Henley,48 M.J. 864
, 871 (A.F. Ct. Crim. App. 1998), aff’d,53 M.J. 488
(C.A.A.F. 2000). Under Mil. R. Evid. 403, a military judge may exclude relevant evidence when that evidence’s probative value is substantially outweighed by the dan- ger of unfair prejudice. In assessing whether to admit evidence, the military judge must discount the probative value of the disputed evidence when: (1) the disputed evidence poses a risk of unfair prejudice, and (2) when there is an evidentiary alternative to the disputed evidence which has equal or great- er probative value. Old Chief v. United States,519 U.S. 172
, 182–83 (1997). An accused’s offer to stipulate to certain evidence “does not generally consti- tute an evidentiary alternative having equal or greater probative value.” United States v. Sewell,457 F.3d 841
, 844 (8th Cir. 2006) (citation omitted). As a general matter, the prosecution is permitted to choose what evidence to use to prove its case, and an accused “may not stipulate or admit his way out 14 United States v. Buford, No. ACM 39538 of the full evidentiary force of the case as the Government chooses to present it.” Old Chief,519 U.S. at
186–87. In Old Chief, the United States Supreme Court determined the defend- ant’s legal status as a felon would be adequately proven by a stipulation to that fact, and that evidence of the crimes leading to his status as a felon should not be admitted. Old Chief,519 U.S. 191
–92. In so ruling, the Court noted the “peculiarities of the element of felony-convict status” and explained in cases involving such elements, the general rule would be that a stipulation as to felon status would render evidence about the earlier offenses inadmissi- ble.Id.
On the other hand, when the evidence sought to be admitted is “evi- dence creating a coherent narrative of [the accused’s] thoughts and actions in perpetrating the offense for which he is being tried,” such evidence will “gen- erally survive” an unfair prejudice challenge.Id.
Once exhibits are admitted in evidence, court members are generally giv- en the exhibits to take with them into their deliberations. Rule for Courts- Martial (R.C.M.) 921(b). This general rule is subject to the caveat of “[u]nless otherwise directed by the military judge,” highlighting judicial discretion re- garding the delivery of exhibits to the members.Id.
Showing excerpts of vide- os of child pornography admitted in evidence is a well-accepted practice in the federal courts for balancing the probative value of video evidence against its prejudicial effect, even over defense offers to stipulate to the videos’ con- tent and over objections similar to those raised here. See, e.g., United States v. Dudley,804 F.3d 506
, 517–18 (1st Cir. 2015); United States v. Cunning- ham,694 F.3d 372
, 389–91 (3d Cir. 2012); United States v. Caldwell,586 F.3d 338
, 343 (5th Cir. 2009); United States v. Ganoe,538 F.3d 1117
, 1124 (9th Cir. 2008); United States v. McCourt,468 F.3d 1088
, 1091–93 (8th Cir. 2006). 3. Analysis As discussed above, the evidence supporting the conclusion that the file with the QAQX hash value was downloaded to and opened by a program on Appellant’s computer is compelling, and we are convinced beyond a reasona- ble doubt Appellant knowingly received that file. As a result, the fact the file was not found on his computer and the fact Special Agent WV was unable to download the file from Appellant are of no moment. The Government was required to prove Appellant knowingly received child pornography. Part and parcel of that requirement was to establish Ap- pellant’s actual receipt of child pornography which, in this case, was the file with the QAQX hash value. The file itself proved that the data in the file was, in fact, material containing a visual depiction of minors engaging in sexually explicit conduct—child pornography. Although far from conclusive, there is some evidence Appellant viewed the video in question. The linked file on Ap- 15 United States v. Buford, No. ACM 39538 pellant’s hard drive is evidence the video was opened by a program on Appel- lant’s computer. The Government was free to argue—and the members to conclude—that the linked file’s existence supported the proposition that Ap- pellant had purposely opened the file and viewed some or all of the video. 12 The probative value of the video itself is four-fold. First, it proved the na- ture of the contraband Appellant had received. Second, the content of the vid- eo was probative of Appellant’s knowledge that he was receiving child por- nography, as opposed to a file containing innocuous data. Third, because pos- session is inherently included in receipt, the contents of the video along with evidence suggesting Appellant may have viewed the video tended to prove he knowingly and consciously possessed the child pornography. Fourth, the ex- plicit nature of the video undercut the suggestion Appellant accidentally or unintentionally received the video, as an innocent recipient of the video would have likely taken such steps as alerting authorities or ceasing the use of peer-to-peer networking software. We recognize the parties’ stipulation did not simply brand the video as “child pornography;” it explicitly described the sexual conduct in the video. Nonetheless, we are mindful of the adage that a picture is worth a thousand words. Images of child pornography such as those in the videos at issue here are indisputably disturbing, amounting to visual records of severe child abuse. Appellant’s attempts to shield the contents of the videos from the members is essentially an acknowledgment of the powerful impact of the evi- dence, the corollary of which is the gravity of Appellant’s offense. Because child pornography is illegal, most people have never seen it and they may have an inaccurate impression of what it is. Moreover, the spectrum of child pornography is wide, both in terms of the conduct involved and the ages of the victims. The sheer severity depicted in the video Appellant downloaded is not readily reduceable to the written word without a substantial diminution in the viewer’s ability to conceptualize what is occurring in the video and to appreciate the degree of criminality involved with downloading it. We cannot conclude the written stipulation in this case is an evidentiary alternative that has equal or greater probative value than the video itself. See Sewell, 457 F.3d at 844. 12We have greater reservations regarding the admissibility of the file with the SDHI hash value due to the absence of any evidence that file was ever opened by Appellant or by any program on his computer. Appellant, however, was acquitted of receiving this file, rendering harmless any error in admitting and showing that video. 16 United States v. Buford, No. ACM 39538 We agree with the military judge, however, that there is a point at which the probative value of playing the video for the members is overwhelmed by its unfairly prejudicial impact. The military judge’s decision to limit the presentation of the video to its introductory text and a 30-second segment was an acceptable approach to balancing the Government’s right to prove its case with the court’s obligation to avoid unfair prejudice to Appellant based upon the facts presented here. The 30 seconds shown to the members was a small fraction of the video’s overall length and provided the members with sufficient information to allow them to understand the video’s contents, con- sistent with the practice adopted in federal courts. The decision to restrict the Government to showing only an excerpt of a video is one within the discretion of the military judge, and we conclude the military judge did not abuse his discretion by doing so here. C. The Definition of “Receiving” Appellant argues for the first time on appeal that the military judge erred by not providing the members a definition of the word “receiving” when de- scribing the elements of the offense and relevant definitions. 1. Additional Background At trial, both the Government and Defense were given the opportunity to review the military judge’s proposed instructions and to either object to those or to request additional instructions. Trial defense counsel indicated they “may have a special instruction with regard to some of the language either from Navrestad or [United States v.] Yohe, 13 essentially sort of similar to our [R.C.M.] 917 [motion].” Trial defense counsel’s unsuccessful R.C.M. 917 motion for a finding of not guilty focused on the specification alleging possession of child pornogra- phy, of which Appellant was ultimately acquitted. The thrust of the argument for the motion was that Appellant did not exercise the requisite dominion and control over the thumbnail images due to them being in a temporary file in unallocated space on Appellant’s hard drive. Without proving this dominion and control, trial defense counsel argued the Government had failed to prove Appellant’s possession of the thumbnail images. Trial defense counsel’s ar- gument on the motion made no reference to the receipt specification. Just after ruling on the R.C.M. 917 motion, the military judge said, “I note the [D]efense did send me a proposed instruction regarding citing [sic] 13No. ACM 37950,2013 CCA LEXIS 686
(A.F. Ct. Crim. App. 22 Jul. 2013) (unpub. op.). 17 United States v. Buford, No. ACM 39538 U.S. v. Yohe . . . [and] U.S. v. Navrestad, and I did incorporate in large part the gist of the [D]efense instruction as requested.” Unfortunately, the mili- tary judge neither attached what was sent to him to the record as an appel- late exhibit, nor did he explain what part of the Defense’s proposed instruc- tion he decided not to incorporate, so we are unable to determine with any precision either what the Defense requested or what “large part” of that re- quest the military judge chose to incorporate. Nonetheless, we conclude trial defense counsel’s instruction request pertained to the definition of possession, and not receipt. 14 After the military judge announced he was incorporating a portion of the Defense’s proposed instruction, he asked whether the Defense had any objec- tion to the instructions or requested any additional instructions. Trial de- fense counsel answered in the negative. Shortly thereafter, the military judge gave his instructions to the mem- bers. Rather than provide definitions for terms after each specification, the military judge set out the elements for both of the specifications, and then he provided a series of definitions. In this list of definitions, he defined “pos- sessing” without specifying whether the term applied to the possession speci- fication or the receipt specification or to both. After defining “possessing,” the military judge said: [I]f you are convinced beyond a reasonable doubt that the ac- cused exercised control over the charged images during the charged time frame, you may find the accused guilty of the of- fense of possession of child pornography if you otherwise find 14 It appears that the instruction the military judge gave by virtue of trial defense counsel’s request added a fifth sentence, as emphasized below, to the standard defini- tion of “possessing.” The instruction, as given to the members, was: “Possessing” means exercising control of something. Possession may be direct physical custody like holding an item in one’s hand, or it may be constructive, as in the case of a person who hides something in a locker or a car to which that person may return to retrieve it. Possession must be knowing and conscious. Possession inherently in- cludes the power or authority to preclude control by others. In order for an accused to be convicted of possessing files that were only con- tained in areas of a computer that are inaccessible to an average user, the evidence must demonstrate beyond a reasonable doubt that the ac- cused knew the images were located in that location and that the ac- cused had the ability to exercise control of the files in that space. (Emphasis added). 18 United States v. Buford, No. ACM 39538 that each element of the offense has been established beyond a reasonable doubt. (Emphasis added). For other terms, the military judge indicated they per- tained to both possession and receipt. 2. Law Military judges have wide discretion in fashioning instructions, but those instructions must give the members “an accurate, complete, and intelligible statement of the law.” United States v. Behenna,71 M.J. 228
, 232 (C.A.A.F. 2012) (citations omitted). We review military judges’ instructions de novo. United States v. Hale,78 M.J. 268
, 274 (C.A.A.F. 2019) (citation omitted). In assessing whether an instruction was erroneous, we must determine whether the instruction sufficiently covers the issues in the case and whether, in the context of all the instructions given, the instruction “completed its purpose.” Behenna, 71 M.J. at 232 (citation omitted); see United States v. McDonald,57 M.J. 18
, 20 (C.A.A.F. 2002) (citation omitted). Under R.C.M. 920(f), the absence of an objection to a particular instruc- tion or to the omission of an instruction prior to the members starting their deliberations means the objection is forfeited. United States v. Davis, ___ M.J. ___, No. 19-0104,2020 CAAF LEXIS 76
, at *7 (C.A.A.F. 12 Feb. 2020) (cita- tions omitted). Forfeited objections on instructions are unpreserved for ap- peal and reviewed for plain error. United States v. Tunstall,72 M.J. 191
, 193 (C.A.A.F. 2013) (citation omitted). However, the United States Court of Ap- peals for the Armed Forces (CAAF) has held that if an appellant affirmatively waives any objection to findings instructions, the issue is waived and there is “nothing left for us to correct on appeal.” Davis,2020 CAAF LEXIS 76
, at *7 (citations omitted). Pursuant to Article 66(c), UCMJ, the courts of criminal appeals have the unique statutory responsibility to affirm only such findings of guilt we find correct and “should be approved.” Thus, we retain the power to address errors raised for the first time on appeal in the face of waiver of those errors at the trial level. See, e.g., United States v. Hardy,77 M.J. 438
, 442–43 (C.A.A.F. 2018); United States v. Chin,75 M.J. 220
, 223 (C.A.A.F. 2016); United States v. Quiroz,55 M.J. 334
, 338–39 (C.A.A.F. 2001). 3. Analysis Appellant argues that the military judge should have provided a defini- tion of receipt which explained, at a minimum, that possession is an integral part of receipt. Without proposing a specific definition, Appellant asserts the absence of a definition deprived his trial defense counsel of the ability to ar- gue he never exercised sufficient dominion or control over the file with the QAQX hash value in order to legally possess it (and therefore did not receive 19 United States v. Buford, No. ACM 39538 it). Due trial defense counsel affirmatively stating they did not object to the instructions and did not request any additional instructions, this alleged er- ror was waived. We have considered whether we should grant relief under our Article 66(c) authority in spite of this waiver, and we decline to do so based upon the absence of material prejudice to Appellant. As explained above, we agree with Appellant that possession is inherent in the concept of receipt. One cannot receive something without also pos- sessing it, even if for just a fleeting moment. We disagree, however, with Ap- pellant’s proposition that the military judge should have sua sponte fashioned a definition of receipt for his instructions. As we have noted, the Manual for Courts-Martial defines “possession,” but it does not define “receiving.” Yet, the term is not so esoteric or complex to give rise to plain error when a mili- tary judge does not provide a definition. The fact the term appears, unde- fined, in more than a dozen other punitive articles in the Manual for Courts- Martial is a strong indication the term “receiving” is an ordinary word well within the common knowledge of court members. 15 To receive a tangible item simply means to take possession or delivery of it, or to knowingly accept it. 16 “[W]ords generally known and in universal use do not need judicial defini- tion.” United States v. Bailey,77 M.J. 11
, 15 (C.A.A.F. 2017) (quoting United States v. Nelson,53 M.J. 319
, 321 (C.A.A.F. 2000)). Although there are other uses of the term—such as receiving guests, receiving news, or receiving a scholarly degree—receiving child pornography can only logically mean taking possession of the material which contains the child pornography, whether it is a magazine, a disc, or a file downloaded from the Internet. 17 Although there is overlap between “possessing” and “receiving” materials containing child pornography, as a person who receives such material simultaneously possesses it, the concept of receiving material indicates an accused engaged 15See, e.g., Article 101, UCMJ,10 U.S.C. § 901
(disclosing a countersign to a person not entitled to receive it); Article 132, UCMJ,10 U.S.C. § 932
(receiving a receipt for a payment less than the actual payment); 2016 MCM, pt. IV, ¶ 53.c.(2) (receiving a threat as part of extortion); 2016 MCM, pt. IV ¶ 66.b.(1) (receiving a thing of value as part of bribery or graft); 2016 MCM, pt. IV, ¶ 97.b.(4) (receiving consideration for ar- ranging for sexual acts); 2016 MCM, pt. IV, ¶ 106.b (receiving stolen property). See, e.g., Webster’s Third New International Dictionary: Unabridged, 1894 (1966); 16 United States v. Olander,572 F.3d 764
, 768–69 (9th Cir. 2009). 17 The child pornography provision in the Manual for Courts-Martial also prohibits “viewing” child pornography, undercutting any argument that “receiving” in this con- text would include a case of looking at child pornography without actually taking possession of it. 20 United States v. Buford, No. ACM 39538 in some sort of transaction or exchange with another to obtain the material, whereas possession is simply the state of having the material. In the child pornography arena, the concept of receipt takes on a heightened significance, as it is the incessant sharing and distribution of these images that causes the harm to the victims and society to metastasize at a precipitous pace. A recipi- ent of these images is a consumer in the global child-pornography market- place, driving up demand in some incremental degree each time the recipient downloads another image or video. In that sense, the criminality behind re- ceiving child pornography is distinct from simple possession of the same. See, e.g., United States v. Burrows,905 F.3d 1061
, 1064–65 (7th Cir. 2018). Where the military judge did inject confusion into the instructions was when he failed to explain that the definition of possession applied to the of- fense of receiving child pornography. By not providing definitions separately to each specification, the military judge’s definitions are read to apply to both specifications unless he indicated otherwise. The military judge did not say that the definition of possession only applied to the possession specification, leaving the members free to use the term to determine whether or not Appel- lant had possessed the videos he was charged with receiving. But the military judge went further by explaining Appellant could be convicted of the posses- sion offense if the members were convinced he had “exercised control over” the thumbnail images. He did not, however, explain that Appellant could be convicted of the receipt offense only upon a conclusion Appellant had exer- cised control over the videos. The members could thereby interpret the mili- tary judge’s instructions as saying that they only needed to find control over the contraband for possession, and not for receipt. Such an interpretation would be an incorrect view of the law. The members, however, could also rea- sonably interpret the military judge’s instructions to mean that the Govern- ment was required to prove “control over” the images for the possession speci- fication and “receipt of” for the receiving specification. Applying the ordinary definition of “receiving,” the members could have then correctly concluded that receiving entailed possession (as defined by the military judge) and not placed any significance on the fact the military judge said the Government only had to prove “control over” the images for the possession specification. The military judge was responsible for giving “accurate, complete, and in- telligible” instructions. See Behenna, 71 M.J. at 232 (citation omitted). On this point, he fell short, and we find his limitation of the “control over” in- struction to the possession specification to be error. As explained above, the military judge’s instructions were ambiguous on this point because they were incomplete. In this case, the members could have reached the wrong legal understanding if they concluded the military judge was telling them that possession was not a component of receipt and that the Government need not prove Appellant’s control over the videos in order to find receipt. The better 21 United States v. Buford, No. ACM 39538 approach to these instructions would have been to clearly apply the concept of possession to both the receipt and the possession specifications, defining the term receipt as taking possession of something. The military judge’s error, however, was attenuated by the definition of “wrongful” he gave the members, which was: “Wrongful” means without any legal justification or excuse. Any facts or circumstances that show that a visual depiction of child pornography was unintentionally or inadvertently ac- quired are relevant to wrongfulness, including, but not limited to, the method by which the visual depiction was acquired, the length of time the visual depiction was maintained, and wheth- er the visual depiction was promptly, and in good faith, de- stroyed or reported to law enforcement. The requirement that Appellant’s conduct be proven to be wrongful ap- plied to both the possession and the receipt specification. By so instructing the members, the military judge reinforced the concept that Appellant needed to “acquire”—that is, take possession of—the child pornography in question in order to be convicted of either possessing or receiving it. We further conclude Appellant’s defense was not hampered in any way by the military judge’s instructions. His trial defense counsel did not argue Ap- pellant never received the video files in question, rather they argued the members should infer Appellant deleted the files because he did not want them. 18 Considering the Defense’s decision to not argue Appellant had never downloaded the videos in the first place, instead arguing he had downloaded and then deleted them, the military judge’s failure to clarify that possession was inherent in receipt did not impact the Defense’s argument. The Defense effectively conceded Appellant’s possession of the videos by arguing he had the ability to delete them, and Appellant was not prejudiced by the military judge’s instructions as to the definitions relevant to the offenses he was charged with. As a result, Appellant is not entitled to relief. D. Verbatim Transcript Appellant argues that the transcript of his trial is not verbatim, rendering his record of trial defective. As a remedy, Appellant asks this court to set aside his dishonorable discharge. Although flawed, we find the transcript in 18For example, when discussing the receipt charge, trial defense counsel argued Ap- pellant “saw some weird stuff and then he deleted it,” and, “[m]ost likely he’s just a guy who saw some stuff and opted to get rid of some things he didn’t want.” 22 United States v. Buford, No. ACM 39538 this case to be substantially verbatim, and we will not disturb his discharge based upon this alleged error. 1. Additional Background The 1008-page transcript of Appellant’s trial contains nearly 300 instanc- es of the annotation, “[indiscernible].” The annotations appear to replace por- tions of testimony, although the record does not indicate the lengths of those portions. The first “[indiscernible]” annotation occurs on page 23 of the rec- ord, and subsequent annotations appear regularly through page 1006. From counsels’ questions to witnesses’ answers to comments from the military judge to statements by the members, no part of the record is untouched by the annotations. The annotations appear in a wide variety of passages throughout the rec- ord. Some are plainly unrelated to any significant aspect of the case, for ex- ample: [Senior Defense Counsel (SDC)]: I’m going to retrieve that from you. [Documents almost dropped.] [Witness (WIT)]: Sorry, sir. SDC: Could have been a disaster if we— WIT: Yeah. I’m going to go ahead and— SDC: [Indiscernible] I apologize about that. (Second and fourth alterations in original). Many passages are more substantive, but tend to provide context for the deleted text. For example: [Senior Trial Counsel]: So is this an indication to you at all that he was—that there was an installing, uninstalling, do you have—was there evidence that that kind of thing was going on? [Mr. BW]: Yes, ma’am, there was [indiscernible] an uninstalled script related to this Shareaza program that was run I believe like three times, I want to say like on 22 June. But it looks like—it appeared to us that it was just being uninstalled rein- stalled. (Third alteration in original). Some passages, however, are far more inscrutable, such as: [Mr. BW]: So [indiscernible] email three [indiscernible] what was found in email one from the page before same email ad- 23 United States v. Buford, No. ACM 39538 dress just different send date and time and last modified and viewed date and times. (Second and third alterations in original). 2. Law We review questions of whether a record of trial is complete and a tran- script is verbatim de novo. United States v. Davenport,73 M.J. 373
, 376 (C.A.A.F. 2014) (citation omitted). “Article 54(c)(1), UCMJ,10 U.S.C. § 854
(c)(1), requires a ‘complete’ record of the proceedings and testimony to be prepared for any general court-martial resulting in a punitive discharge.” United States v. Lovely,73 M.J. 658
, 676 (A.F. Ct. Crim. App. 2014). A com- plete record of trial in such a case includes a verbatim transcript. R.C.M. 1103(b)(2)(B). “A verbatim transcript includes: all proceedings including side- bar conferences, arguments of counsel, and rulings and instructions by the military judge . . . .”Id.,
Discussion. Although the Rules for Courts-Martial call for “verbatim” transcripts, this requirement has been read by our superior court to not mean “word for word,” but rather, “substantially verbatim.” Davenport, 73 M.J. at 377 (citation omitted); see also United States v. Lashley,14 M.J. 7
, 9 (C.M.A. 1982) (“literal compliance with this requirement is impossible”); United States v. Nelson,13 C.M.R. 38
, 42 (C.M.A. 1953) (“Many, if not all, records fail to record every word spoken at a hearing.”). To determine whether a record is complete or whether a transcript is verbatim, “the threshold question is ‘whether the omitted material was substantial,’ either qualitatively or quantitatively.” Davenport, 73 M.J. at 377 (quoting Lashley, 14 M.J. at 9) (internal quotation marks omitted) (additional citation omitted). This threshold is met when the omitted material “‘related directly to the sufficiency of the Government’s evi- dence on the merits,’ and ‘the testimony could not ordinarily have been re- called with any degree of fidelity.’” Id. (quoting Lashley, 14 M.J. at 9). “Omis- sions are quantitatively substantial unless ‘the totality of omissions . . . be- comes so unimportant and so uninfluential when viewed in the light of the whole record, that it approaches nothingness.’” Id. (alteration in original) (quoting Nelson, 13 C.M.R. at 43). Each case is analyzed individually to decide whether an omission is sub- stantial. United States v. Abrams,50 M.J. 361
, 363 (C.A.A.F. 1999) (citation omitted). “A substantial omission renders a record of trial incomplete and raises a presumption of prejudice that the Government must rebut.” United States v. Henry,53 M.J. 108
, 111 (C.A.A.F. 2000) (citing United States v. McCullah,11 M.J. 234
, 237 (C.M.A. 1981)) (additional citations omitted). “In- substantial omissions from a record of trial do not raise a presumption of prejudice or affect that record’s characterization as a complete one.”Id.
Rec- 24 United States v. Buford, No. ACM 39538 ords which are not substantially verbatim or which are incomplete will not support sentences including either a punitive discharge or more than six months of confinement. R.C.M. 1103(b)(2)(B), 1103(f). 3. Analysis This transcript contains more than its fair share of annotations indicating information is missing from the record. The record, however, is more than 1,000 pages long, meaning it contains approximately 25,000 lines of tran- scription. Placed in that context, the “[indiscernible]” annotation appears in just over one percent of the lines in the record. In other words, when consid- ering the transcription on a line-by-line basis, nearly 99 percent of the lines in the record do not reflect omissions. Based upon our careful review of the record, considering the context of the words surrounding the omissions, to include follow-up and clarifying comments, we are confident nearly all the omissions constitute one or two words. For example, the record shows the military judge asked one witness, “So of that million images it might be [indiscernible] actual separate images just represented by different hash values?” The witness then answered, “The oth- er way around. It’s about a million images but between them probably about five million hash values.” The military judge then added, “Okay, so a million independent, [indiscernible] separate images, okay, gotcha.” The context of this particular exchange is that the witness was explaining that a particular repository of child pornography had approximately one million images in it and that there are different algorithms for creating hash values; thus, a sin- gle file will have multiple hash values. Although not completely clear, we conclude where the record shows “[indiscernible]” annotations, the military judge likely said “five million” the first time and something like “discrete” or “individual” the second time. We do not see any evidence that lengthy exchanges or passages have been replaced by the “[indiscernible]” annotations. Other than these annotations, the record indicates a focused attention to detail by the court reporter. For example, when one of the trial counsel inappropriately mocked one of the tri- al defense counsel, the court reporter carefully described the trial counsel’s affect in the record. In comparing portions of the record describing the dense, data-filled exhibits in this case, we find the record to be precise, even where counsel were referencing lengthy filenames with unconventional spellings, times, file extensions, and IP addresses. This degree of care leads us to con- clude that had the court reporter been unable to transcribe any significant quantity of the proceedings, she would have indicated that in the record it- self. We do not find a quantitatively substantial amount of the trial is miss- ing from the transcript. 25 United States v. Buford, No. ACM 39538 We have also considered whether qualitatively substantial information is missing from the record, and we answer that question in the negative. Be- cause of the complex nature of the evidence in this case, most of the contested issues were covered and re-covered multiple times during the testimony. In many cases, trial counsel, trial defense counsel, the military judge, and even the members asked clarifying questions. Moreover, the arguments by counsel, including trial defense counsel’s argument on the R.C.M. 917 motion, flowed clearly from the the record. Had substantial information been omitted from the record, we would expect to find portions of the arguments untethered to the record or referring to concepts presented by witnesses uncaptured earlier in the transcript. We found counsels’ arguments directly tied to or fairly aris- ing from the record, leading us to conclude the information omitted by virtue of the “[indiscernible]” annotations was not qualitatively substantial. The transcript in this case is substantially verbatim. E. Jurisdiction over Appellant Appellant asserts his court-martial was lacking jurisdiction over him un- der the theory he had been medically retired from the Air Force prior to trial. 1. Additional Background Although Appellant’s offense occurred in June 2014, he was not brought to trial until 7 May 2018. In the interim, Appellant met a medical evaluation board and was notified on 18 October 2017 that he would be “permanently disability retired” effective 1 January 2018. Two days before that effective date, Appellant asserts he received an email stating his DD Form 214 “was official, and would be ready for download the day after [his] effective separa- tion date” from the Air Force’s online personnel system. He was also given a retiree identification card and information about the retiree benefits he would receive once he returned to the United States. He was further told he would receive “payments for [his] disability,” and such payments were about to commence. But, on 26 January 2018, he received another email notifying him that his retirement had been “rescinded” that same day, and that he should destroy the DD Form 214, due to it being “no longer official.” Unsurprisingly, Appellant’s pay went into disarray after these events. Appellant did not receive pay after the effective date of his later-rescinded medical retirement until mid-February, and even then he only received a fraction of it, about one-third of his monthly E-5 pay. The Defense Finance and Accounting Service (DFAS) persisted in underpaying Appellant through his May court-martial. Appellant did not raise the subject of jurisdiction at his court-martial. The issue of jurisdiction only came up while the members were deliberating on findings when the military judge asked trial defense counsel whether they 26 United States v. Buford, No. ACM 39538 agreed that Appellant had been “extended on active duty for administrative purposes for these proceedings.” Trial defense counsel answered in the af- firmative. Even after Appellant was well into serving his term of confinement, his trial defense counsel effectively conceded the court-martial’s jurisdiction in the letter she submitted as part of Appellant’s request for clemency in which she primarily discussed the impact Appellant’s punitive discharge would have on his ability to get medical treatment. In her 23 August 2018 letter, she wrote: The prosecutors had to cancel [Appellant’s] retirement orders and bring him back onto active duty in order to complete his court martial. It is not the Defense’s contention that this is in- an-of-itself [sic] unjust. The enforcement of the rule of law is crucial to a democratic society and an efficient military force. The Government has not sought to rebut the foregoing, instead arguing the evidence is insufficient to prove Appellant had retired or otherwise sepa- rated from the service prior to trial. 2. Law Article 2, UCMJ,10 U.S.C. § 802
, sets out court-martial in personam ju- risdiction. The Government has the burden of proving jurisdiction by a pre- ponderance of the evidence when jurisdiction is challenged. Hale, 78 M.J. at 270 (citation omitted). Jurisdiction ceases to exist over servicemembers dis- charged from the military, “absent some saving circumstance or statutory au- thorization.” United States v. Hart,66 M.J. 273
, 275 (C.A.A.F. 2008) (quoting United States v. Howard,20 M.J. 353
, 354 (C.M.A. 1985)) (additional citation omitted). We review issues of personal jurisdiction de novo. United States v. Christensen,78 M.J. 1
, 4 (C.A.A.F. 2018) (citation omitted). Our superior court has looked to three criteria in considering whether a servicemember’s discharge is final and jurisdiction has terminated: “(1) the delivery of a discharge certificate (a DD Form 214); (2) a ‘final accounting of pay;’ and (3) the completion of the ‘clearing’ process that is required under service regulations.”Id.
(quoting Hart, 66 M.J. at 276–79). These criteria amount to guidance, and they are not binding when they yield a result that goes against reason or policy. Id. (quoting United States v. Nettles,74 M.J. 289
, 291 (C.A.A.F. 2015)). Court-martial jurisdiction extends to retired servicemembers who are en- titled to pay. Article 2(a)(4), UCMJ,10 U.S.C. § 802
(a)(4); United States v. Dinger,77 M.J. 447
, 453 (C.A.A.F. 2018). This jurisdiction encompasses members both temporarily and permanently retired due to disability. United 27 United States v. Buford, No. ACM 39538 States v. Stevenson,53 M.J. 257
, 260 (C.A.A.F. 2000); United States v. Bowie,34 C.M.R. 411
, 412 (C.M.A. 1964). 3. Analysis At trial, Appellant affirmed the position that he had been “extended on active duty for administrative purposes” for trial proceedings. Now, on ap- peal, Appellant asserts he had been medically retired and placed on the per- manent disability retirement list prior to his trial. There is no evidence—and Appellant does not argue—that he was simply discharged from active duty. Instead, Appellant points to receiving his retiree identification card and in- formation about the benefits he would receive from the Veterans Administra- tion, to include “payments for [his] disability,” as evidence of his medical re- tirement. Our superior court has pointed out that the “overarching interest impli- cated by the law of personal jurisdiction, and especially discharge jurispru- dence, is the need—of both servicemember and service—to know with cer- tainty and finality what the person’s military status is and when that status changes.” Nettles, 74 M.J. at 291 (citation omitted); see also Howard, 20 M.J. at 354. Unquestionably, the Government’s actions clouded Appellant’s precise status in the months leading up to his court-martial by sending him a retiree identification card, preparing his DD Form 214, notifying him his DD Form 214 was available for him to download, and stopping his pay while at the same time requiring him to stay on base and continue his military duties. Recognizing at least a portion of its error, the Government told Appellant to destroy the DD Form 214 and canceled his retirement after the earlier- established effective date. For reasons we cannot divine, the Government never did determine how to correctly pay Appellant. In spite of the confusion over Appellant’s status, we are confident he was still on active duty at the time of his trial based upon the absence of evidence Appellant completed any sort of clearing process to separate him from the service. Indeed, Appellant himself points to the fact he was not permitted to depart Japan and return to the United States prior to trial. Moreover, Appel- lant’s argument he was medically retired is squarely opposed to the position he took, through counsel, both at trial and in his clemency submission. Based upon the evidence presented, we are not persuaded by his new post-trial claim that he was, in fact, not extended on active duty for the purpose of trial, but rather had been placed on the permanent disability retirement list. The Government’s sending of contradictory messages to Appellant about his duty status is far from a practice to be emulated, but the totality of the circum- stances leads us to conclude Appellant’s medical retirement had not been fi- nally executed prior to his trial. We further note that even if he had been medically retired, such retirement would not have severed military court- 28 United States v. Buford, No. ACM 39538 martial jurisdiction over him. Thus, we conclude Appellant’s period of active duty had been extended for the purposes of his trial, his court-martial had jurisdiction over him, and he is not entitled to relief. F. Appellant’s Pay Appellant argues for the first time on appeal he was subjected to illegal pretrial punishment by virtue of not receiving the full pay he was entitled to from January to May 2018 and by the Government seeking to recoup some portion, if not all, of what he was paid during that time. Appellant asks this court to set aside his punitive discharge as a remedy. The Government as- serts we have no jurisdiction to consider the issue, arguing Article 66(c), UCMJ, does not grant us jurisdiction over a pay dispute unconnected to the approved sentence in a case. Alternatively, the Government argues Appellant is not entitled to relief under Article 13, UCMJ, due to the fact he was not in pretrial confinement at the time of the pay issues. 1. Additional Background As noted above, DFAS underpaid Appellant from January through May 2018. In the declaration he filed with this court, Appellant states he tried to rectify his pay at the time by going to the base Finance office where he was told, “they didn’t want to overpay [him] which would result in [him] owing the government money.” Finance personnel also told Appellant he would be paid once “the system has corrected itself.” Despite his efforts, Appellant did not receive his full E-5 pay. Appellant did not raise any issues regarding his pay during his May 2018 court-martial or otherwise assert he had been punished illegally prior to trial. However, in his August 2018 clemency request, Appellant wrote: I had my retiree ID, my DD-214 and started receiving my bene- fits. Nonetheless, I was still trapped in Japan not able to leave, still having to put on the military uniform and come into work because my leadership still said I had to even though I wasn’t getting paid. No one cared about me enough to even make sure I got a pay check or was even kept on active duty. . . . Even as a retiree with an ID card, a DD-214, and no paycheck (either ac- tive duty or retired) my unit still had me on a curfew. The [U.S. Department of Veterans Affairs] was waiting for my arrival back in the [U.S.] so they could start my benefits ASAP. Four months of me stuck in Japan they sent me a letter saying they will at least start my payments for my disability. . . . I was trapped in Japan unable to go live out whatever life I have left. I know I wasn’t in confinement, but over the last four years, I certainly haven’t been free. 29 United States v. Buford, No. ACM 39538 Near the end of 2018, after Appellant had completed his term of confine- ment, DFAS sought to take back a portion of the partial payments he had re- ceived, asserting he owed a debt to the Department of Defense. When Appel- lant disputed this debt, DFAS sent him letter on 15 March 2019 stating: Your debt $692.83, is due to payments received after you en- tered a No Pay Status (NPS), due to Date of Separation (D.O.S.) on January 01, 2018. These payments are as follows, a partial payment in the amount of $1,000.00 dated April 17, 2018, and a partial payment in the amount of $2,000.00 dated May 01, 2018. while [sic] on active duty with the United States Air Force. Your debt is due to Separation Payment. We have no record of returned payments. DFAS further informed Appellant the debt had been sent to collections. When Appellant tried again to dispute the debt, he received a terse response on 25 March 2019 that simply said, “Per the agency, the debt is valid and col- lection should continue.” According to the declaration filed with this court, Appellant asked his first sergeant to contact DFAS and help resolve the problem, and Appellant says he “contacted a former supervisor to notify him of the issue.” We cannot ascertain what, if anything, either of these two individuals did in response to Appellant’s entreaties. The Government has not sought to rebut Appellant’s factual allegations. 2. Law Whether Appellant should receive relief for illegal pretrial punishment is a question we review de novo. United States v. Mosby,56 M.J. 309
, 310 (C.A.A.F. 2002). Appellant has the burden of establishing his entitlement to credit for an alleged Article 13 violation.Id.
(citation omitted). Under Article 13, UCMJ: No person, while being held for trial, may be subjected to pun- ishment or penalty other than arrest or confinement upon the charges pending against him, nor shall the arrest or confine- ment imposed upon him be any more rigorous than the circum- stances required to insure his presence, but he may be subject- ed to minor punishment during that period for infractions of discipline. This provision prohibits “intentional imposition of punishment” prior to trial, as well as unnecessarily rigorous arrest or pretrial confinement conditions. United States v. Crawford,62 M.J. 411
, 414 (C.A.A.F. 2006) (citations omit- ted). Confinement is not a prerequisite for relief under Article 13. See, e.g., United States v. Guardado, ___ M.J. ___, No. 19-0139,2020 CAAF LEXIS 17
, 30 United States v. Buford, No. ACM 39538 at *8–9 (C.A.A.F. 15 Jan. 2020); Howell v. United States,75 M.J. 386
, 393–94 (C.A.A.F. 2016); United States v. Combs,47 M.J. 330
, 332–34 (C.A.A.F. 1997). In assessing whether an appellant was subjected to illegal pretrial punish- ment, the test is: “was there an intent to punish or stigmatize a person await- ing disciplinary action, and if not, were the conditions . . . in furtherance of a legitimate, nonpunitive, government objective.” United States v. Starr,53 M.J. 380
, 382 (C.A.A.F. 2000) (citations omitted). In the face of an Article 13 violation, meaningful relief in the circum- stances of a particular case may extend beyond confinement credit and may involve setting aside or mitigating a punitive discharge. See United States v. Zarbatany,70 M.J. 169
, 177 (C.A.A.F. 2011). When an appellant fails to seek sentence relief for pretrial punishment at trial, the issue is waived absent plain error. United States v. Inong,58 M.J. 460
, 465 (C.A.A.F. 2003) (citation omitted). Even if waived, Article 66(c), UCMJ, calls upon the courts of criminal appeals to only affirm sentences which are correct in law and fact and which should be approved. See, e.g., United States v. Gay,74 M.J. 736
(A.F. Ct. Crim. App. 2015), aff’d,75 M.J. 264
(C.A.A.F. 2006). 3. Analysis We disagree with the Government’s position that we do not have jurisdic- tion to review Appellant’s claim. Appellant has raised his denial of pay as al- legedly illegal pretrial punishment under Article 13, UCMJ, which we and our superior court have consistently exercised jurisdiction over. Indeed, the CAAF just recently considered whether the partial withholding of pay from a servicemember awaiting a rehearing after his sentence had been set aside amounted to an Article 13 violation. Guardado,2020 CAAF LEXIS 17
, at *5– 9; see also Howell, 75 M.J. at 393–94. The Government’s position that Article 13 requires an appellant to have been in pretrial confinement is similarly misplaced. In Combs, the CAAF de- termined that Article 13 applies to servicemembers “held for trial,” and con- cluded the appellant in that case—who was awaiting a rehearing on the set- aside findings as to one charge and the sentence—was protected by Article 13 (the CAAF noted that the appellant was not afforded “complete freedom of movement”). 47 M.J. at 333. Appellant here was similarly awaiting trial after an earlier charge was withdrawn after he was arraigned on it. Whatever can be said of DFAS’s view of Appellant’s active-duty status, it is clear Appellant was not free to simply leave Japan at the end of his term of service or upon his medical retirement, as he was involuntarily retained on active duty for the purpose of being tried by court-martial. Although not in pretrial confine- 31 United States v. Buford, No. ACM 39538 ment, Appellant was being held for trial, and was therefore covered by the protections of Article 13. Appellant’s pay issues arise from two related, yet distinct, sets of circum- stances. The first is Appellant’s diminished pay in the months leading up to his confinement when the Government processed Appellant’s medical retire- ment and then subsequently rescinded that retirement. The second is the Government’s later establishment of a debt on Appellant’s part based upon some portion of the funds he was paid during the medical-retirement tumult. Appellant did not raise the diminished-pay issue at trial. In fact, his trial defense counsel asserted on the record that Appellant had not been punished in any way prior to trial constituting illegal pretrial punishment under Arti- cle 13. The military judge then turned to Appellant and said: Article 13 of the UCMJ talks about what the command or what the Air Force can do with someone prior to trial, essentially saying that no one should be punished prior to trial because you shouldn’t be punished until you’ve been convicted. Do you believe that anybody in a position of command or authority has done anything to you prior to trial that’s been done for punish- ment purposes? Appellant answered in the negative. As a result, Appellant has waived this issue absent plain error. Having reviewed Appellant’s post-trial submissions along with all the evidence in this case, we find no indication of any intent to punish or stigmatize him. To the contrary, it appears Appellant’s medical condition had triggered his med- ical retirement, catching those responsible for military justice off-guard. This led Appellant’s command to scramble to reverse the retirement in light of the fact Appellant was pending court-martial (and had been at least since charg- es were originally preferred in 2015). Amidst this confusion, Appellant’s pay was sent into a tailspin from which it would never recover. The attention be- ing paid to Appellant’s duty status as he approached trial was lacking, but we see no command intent to punish him, especially since command cannot be imputed with the knowledge that DFAS would the stop Appellant’s pay. Per- sonnel at Appellant’s finance office seemed to be operating under the as- sumption that “the system” would correct his pay. These same personnel sug- gested the reason for Appellant’s pay decrease was to avoid creating a debt on Appellant’s part—a legitimate, non-punitive objective, even if seemingly dis- connected from the facts of Appellant’s case. Had Appellant raised this issue at trial, we would have a more complete record to review his claim. Instead, he waived the issue. Looking for plain error, we find none, and Appellant is not entitled to relief under Article 13 for his reduced pay leading up to his 32 United States v. Buford, No. ACM 39538 trial. Based upon the evidence presented, we similarly find no relief warrant- ed under Article 66(c), UCMJ. Appellant’s debt issue did not arise until after he completed his term of confinement, so we would not have expected him to raise it at trial. But, once Appellant was tried, he was no longer being “held for trial,” and Article 13 ceased to apply to him. See United States v. Kreutzer,70 M.J. 444
, 447–48 (C.A.A.F. 2012). Although the payments purportedly creating Appellant’s debt occurred while he was being held for trial, the actual enforcement of the debt (if not the determination Appellant had the debt in the first place) oc- curred after Appellant’s trial, rendering Article 13 inapplicable to this claim. Whatever merit, or lack thereof, there is to DFAS’s conclusion that Appellant owes a debt by virtue of being underpaid, this issue falls outside the purview of Article 13, and we cannot grant him relief. III. CONCLUSION The findings and sentence are correct in law and fact, and no error mate- rially prejudicial to the substantial rights of Appellant occurred. Articles 59(a) and 66(c), UCMJ,10 U.S.C. §§ 859
(a), 866(c). Accordingly, the findings and sentence are AFFIRMED. FOR THE COURT CAROL K. JOYCE Clerk of the Court 33
United States v. Pruitt , 638 F.3d 763 ( 2011 )
Old Chief v. United States , 117 S. Ct. 644 ( 1997 )
United States v. Caldwell , 586 F.3d 338 ( 2009 )
United States v. Michael Shawn McCourt , 468 F.3d 1088 ( 2006 )
United States v. Olander , 572 F.3d 764 ( 2009 )