United States v. Baker

CourtUnited States Air Force Court of Criminal Appeals
DecidedNovember 13, 2018
DocketACM 39311
StatusUnpublished

This text of United States v. Baker (United States v. Baker) is published on Counsel Stack Legal Research, covering United States Air Force Court of Criminal Appeals primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Baker, (afcca 2018).

Opinion

U NITED S TATES AIR F ORCE C OURT OF C RIMINAL APPEALS ________________________

No. ACM 39311 ________________________

UNITED STATES Appellee v. Tony A. BAKER Staff Sergeant (E-5), U.S. Air Force, Appellant ________________________

Appeal from the United States Air Force Trial Judiciary Decided 13 November 2018 ________________________

Military Judge: Charles E. Wiedie (arraignment); Patricia A. Gruen (pretrial Article 39(a), UCMJ, session); Brendon K. Tukey (trial). Approved sentence: Bad-conduct discharge, confinement for 6 months, forfeiture of all pay and allowances, reduction to E-1, and a repri- mand. Sentence adjudged 24 March 2017 by GCM convened at Osan Air Base, Republic of Korea. For Appellant: Captain Dustin J. Weisman, USAF. For Appellee: Lieutenant Colonel Joseph J. Kubler, USAF; Captain Pe- ter F. Kellett, USAF; Mary Ellen Payne, Esquire; Justin P. Kenyon, Legal Extern. 1 Before JOHNSON, DENNIS, and LEWIS, Appellate Military Judges. Senior Judge JOHNSON delivered the opinion of the court, in which Judge DENNIS and Judge LEWIS joined. ________________________

1Mr. Kenyon was a law student extern with the Air Force Legal Operations Agency and was at all times supervised by attorneys admitted to practice before this court. United States v. Baker, No. ACM 39311

This is an unpublished opinion and, as such, does not serve as precedent under AFCCA Rule of Practice and Procedure 18.4. ________________________

JOHNSON, Senior Judge: A general court-martial composed of a military judge alone convicted Ap- pellant, contrary to his pleas, of one specification of violating a lawful general regulation and one specification of wrongful possession of child pornography in violation of Articles 92 and 134, Uniform Code of Military Justice (UCMJ), 10 U.S.C. §§ 892, 934. 2 The military judge sentenced Appellant to a bad- conduct discharge, confinement for 12 months, total forfeiture of pay and al- lowances, reduction to the grade of E-1, and a reprimand. The convening au- thority approved the adjudged sentence with the exception of the term of con- finement, which he reduced to six months. On appeal, Appellant challenges the legal and factual sufficiency of both specifications of which he was convicted. In addition, we address a facially un-reasonable delay in the post-trial processing of Appellant’s case. We find no relief is warranted and we affirm the findings and sentence.

I. BACKGROUND In June 2014, an agent of the Air Force Office of Special Investigations (AFOSI) stationed at Kadena Air Base (AB), Okinawa, Japan, detected a number of files containing suspected child pornography being downloaded to a particular Internet Protocol (IP) address located on Okinawa. In coordina- tion with the Naval Criminal Investigative Service, AFOSI sought the identi- ty of the user of that IP address from the off-base Internet service provider. In March 2015, AFOSI finally learned the user of that address had been Ap- pellant, who had since transferred to Osan AB, Republic of Korea, in January 2015. Agents of the Osan AB AFOSI detachment interviewed Appellant on 27 March 2015. Appellant acknowledged that when he was stationed at Kadena AB he used a peer-to-peer file-sharing program known as “eMule” to obtain and share files over the Internet. Through this program he collected porno- graphic and non-pornographic materials; in particular, he collected large

2 The military judge found Appellant not guilty of one specification of wrongfully re- ceiving child pornography, one specification of wrongfully viewing child pornography, and one specification of possessing obscene visual representations of the sexual abuse of children, all in violation of Article 134, UCMJ, 10 U.S.C. § 934.

2 United States v. Baker, No. ACM 39311

amounts of material related to Japanese animation and comics known as anime and manga. Appellant described for the agents how he would conduct searches on eMule based on certain terms using one particular laptop com- puter. He would screen video files he received this way by watching five or ten seconds of the video. If he did not want to keep the file, he would delete it. If Appellant wanted to keep the file, he would save it to a folder. Appellant estimated that he deleted 99 percent of the files he downloaded through eMule in this way. 3 Appellant admitted he possessed animated and drawn images of “cartoon” pornography, including animated videos depicting children “having sex,” as well as “real” pornography depicting actual adult humans. However, he per- sistently denied intentionally or knowingly downloading or possessing “real” child pornography. At different points in the interview, Appellant acknowl- edged that he either “probably” or was “sure” he unintentionally received child pornography in mass downloads from eMule, and he “maybe” acci- dentally saw files containing child pornography perhaps a dozen times, alt- hough he could not recall any specific details or actual sexual acts involving children. However, he denied keeping any such files. Appellant consented to the search of his electronic devices, saying the agents “should not” find any child pornography on them. AFOSI agents searched Appellant’s dormitory room and seized a number of items, notably a laptop computer they labeled Tag 15, a data card they la- beled Tag 4, and another laptop they labeled Tag 10. Subsequent analysis by the Defense Computer Forensics Laboratory (DCFL) indicated the computer labeled Tag 15 had its operating system installed in January or February 2013 and the eMule program installed in March 2013. JP, the DCFL forensic examiner who analyzed these items, testified at trial as an expert in forensic computer examination. According to JP, analysis indicated a pattern whereby files were downloaded onto the laptop labeled Tag 15, placed on the data card labeled Tag 4, and then transferred from Tag 4 to the second laptop labeled Tag 10, which did not have eMule installed. JP provided the following expla- nation of how eMule works:

3 We note that, in place of Prosecution Exhibit 6, a compact disc containing a video recording of Appellant’s interview with AFOSI, the original record of trial includes a piece of paper stating “Prosecution Exhibit 6 . . . can be located in the original Record of Trial.” Nevertheless, we are confident the record is complete for our review as this compact disc is included as an attachment to Appellate Exhibit X.

3 United States v. Baker, No. ACM 39311

A [JP]: [eMule is] a program where computers can share files with each other without the need for a centralized server. So, files can be transferred from many people at once to one com- puter, you can download files off—usually a lot faster than you can from, say a direct server download. Q [Trial Counsel]: And so, can you just describe, sort of, gener- ally, how a user would operate eMule? A: Sure. You would open up the application, connect to one of the eMule servers, type in a search term, and see what you’re looking for. Then you could download the files from those search results. Q: And you said that’s pulling from—where do those files pull from? A: From multiple people. Q: And how does that work? They’re all—all the other people are connected to that server as well? A: Yes. Q: . . . . How does the system operate to get that file onto your computer? A: So, what it will do is it will go out to see if there’s 20 or 30 other users that have that file and are willing to share it. And if they’re willing to share it, it’ll download a partial file, which is a .part file in eMule, into the temporary directory. Once enough pieces are downloaded from that part [sic] file a user is able to preview that file.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Tucker
305 F.3d 1193 (Tenth Circuit, 2002)
United States v. Dobbs
629 F.3d 1199 (Tenth Circuit, 2011)
United States v. Flyer
633 F.3d 911 (Ninth Circuit, 2011)
United States v. Stuart Romm
455 F.3d 990 (Ninth Circuit, 2006)
United States v. Navrestad
66 M.J. 262 (Court of Appeals for the Armed Forces, 2008)
United States v. Toohey
63 M.J. 353 (Court of Appeals for the Armed Forces, 2006)
United States v. Moreno
63 M.J. 129 (Court of Appeals for the Armed Forces, 2006)
Toohey v. United States
60 M.J. 100 (Court of Appeals for the Armed Forces, 2004)
United States v. Jones
61 M.J. 80 (Court of Appeals for the Armed Forces, 2005)
United States v. Gay
74 M.J. 736 (Air Force Court of Criminal Appeals, 2015)
Animal Legal Defense Fund v. Veneman
469 F.3d 826 (Ninth Circuit, 2006)
United States v. Tardif
57 M.J. 219 (Court of Appeals for the Armed Forces, 2002)
United States v. Humpherys
57 M.J. 83 (Court of Appeals for the Armed Forces, 2002)
United States v. Barner
56 M.J. 131 (Court of Appeals for the Armed Forces, 2001)
United States v. Reed
54 M.J. 37 (Court of Appeals for the Armed Forces, 2000)
United States v. Rosario
76 M.J. 114 (Court of Appeals for the Armed Forces, 2017)
United States v. Ahern
76 M.J. 194 (Court of Appeals for the Armed Forces, 2017)
United States v. Wheeler
76 M.J. 564 (Air Force Court of Criminal Appeals, 2017)
United States v. Haverty
76 M.J. 199 (Court of Appeals for the Armed Forces, 2017)
United States v. Davis
76 M.J. 224 (Court of Appeals for the Armed Forces, 2017)

Cite This Page — Counsel Stack

Bluebook (online)
United States v. Baker, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-baker-afcca-2018.