United States v. Moss

CourtUnited States Air Force Court of Criminal Appeals
DecidedApril 7, 2023
Docket40249
StatusUnpublished

This text of United States v. Moss (United States v. Moss) is published on Counsel Stack Legal Research, covering United States Air Force Court of Criminal Appeals primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Moss, (afcca 2023).

Opinion

U NITED S TATES A IR F ORCE C OURT OF C RIMINAL APPEALS ________________________

No. ACM 40249 ________________________

UNITED STATES Appellee v. Derek N. MOSS Senior Airman (E-4), U.S. Air Force, Appellant ________________________

Appeal from the United States Air Force Trial Judiciary Decided 7 April 2023 ________________________

Military Judge: Elijah F. Brown (arraignment and motions); Christina M. Jimenez (motions and trial). Sentence: Sentence adjudged on 10 September 2021 by GCM convened at Cannon Air Force Base, New Mexico. Sentence entered by military judge on 17 November 2021: Bad-conduct discharge, confinement for 10 months, and reduction to E-1. For Appellant: Major Megan E. Hoffman, USAF. For Appellee: Lieutenant Colonel Thomas J. Alford, USAF; Major John P. Patera, USAF; Captain Olivia B. Hoff, USAF; Captain Jocelyn Q. Wright, USAF; Mary Ellen Payne, Esquire. Before JOHNSON, GOODWIN, and GRUEN, Appellate Military Judges. Judge GOODWIN delivered the opinion of the court, in which Chief Judge JOHNSON and Judge GRUEN joined. ________________________

This is an unpublished opinion and, as such, does not serve as precedent under AFCCA Rule of Practice and Procedure 30.4. ________________________ United States v. Moss, No. ACM 40249

GOODWIN, Judge: A general court-martial composed of officer members convicted Appellant, contrary to his pleas, of one specification of wrongfully viewing child pornogra- phy in violation of Article 134, Uniform Code of Military Justice (UCMJ), 10 U.S.C. § 934.1 The military judge sentenced Appellant to a bad-conduct dis- charge, confinement for ten months, and reduction to the grade of E-1. The convening authority took no action on the findings or sentence. Appellant raises four issues for our consideration which we have reordered and reworded: (1) whether Appellant’s conviction is legally and factually suffi- cient; (2) whether trial defense counsel were ineffective when they did not ob- ject to a National Center for Missing and Exploited Children (NCMEC) CyberTipline report being admitted into evidence; (3) whether, despite lack of objection, the military judge erred by admitting the CyberTipline report into evidence; and (4) whether the Air Force violated Appellant’s right to a speedy trial when it did not docket his record with this court within 150 days of his sentence.

I. BACKGROUND Appellant was stationed at Cannon Air Force Base (AFB), New Mexico, at the time of the offense for which he was convicted. On 4 May 2020, NCMEC sent the New Mexico Attorney General’s Office (NMAGO) a CyberTipline re- port regarding suspected Internet child exploitation involving an Internet Pro- tocol (IP) address in Clovis, New Mexico. The assigned NMAGO analyst, Ms. HR, notified local law enforcement in Clovis, New Mexico, and was told that Air Force Office of Special Investigation (AFOSI) agents at Cannon AFB were already investigating the case. Thereafter, Ms. HR forwarded the CyberTipline report to AFOSI agents. According to the CyberTipline report, someone used the IP address issued to an Air Force member, Mr. AS,2 to conduct a reverse image Internet search using a known image of child pornography.3 Appellant shared Mr. AS’s resi- dence and Internet access; the CyberTipline report did not specify the identity of the Internet user who conducted the reverse image search. AFOSI agents

1The court-martial found Appellant not guilty of one specification of possessing child pornography in violation of Article 134, UCMJ. 2 Mr. AS was an active-duty Air Force member during the investigation but had sepa- rated from the service by the time of the court-martial. Mr. AS was a civilian when he testified at Appellant’s court-martial. 3This particular search engine allows users to provide an image, after which the pro- gram will return search results of similar images.

2 United States v. Moss, No. ACM 40249

arrested Mr. AS and searched his electronic devices. Although he was their initial primary suspect, agents ultimately determined Mr. AS had not viewed or possessed child pornography. AFOSI agents also interviewed Appellant, who denied viewing or possessing child pornography and consented to a search of his electronic devices. AFOSI agents sent Appellant’s devices to the DoD Cyber Crime Center (DC3). During the analysis of Appellant’s laptop, which was named “Derek- PC” and was password protected, DC3 analysts discovered seven still images of suspected child pornography.4 These seven still images were located in the laptop’s Mozilla Firefox Internet browser cache folder and had been automati- cally cached by the web browser on or about 18 July 2018. DC3 analysts did not find the image of known child pornography that triggered the CyberTipline report regarding Appellant’s laptop. DC3 analysts, however, did discover five still images similar to the CyberTipline image in the laptop’s Google Chrome cache. According to the Government’s digital forensic expert, Mr. BM, when a com- puter user goes to an Internet website containing images, the Internet web browsers automatically save image files to cache folders specific to that partic- ular browser. A computer user does not control what images are stored in the browser cache folder and, while a user can delete all files in the cache folder, a user cannot delete specific files from browser cache. Furthermore, an average computer user cannot access files located in browser cache. When the suspected images of child pornography were cached, the laptop’s web browsers were caching approximately 80 images per minute. The seven charged still images of suspected child pornography were among over 1700 to- tal images in the Internet web browser cache of Appellant’s laptop. The seven charged images were all “thumbnails,” and all had creation timestamps of 18 July 2018, between 5:20:23 a.m. and 5:40:56 a.m. Two still images were created simultaneously in a web browser cache folder, and a third was created four seconds later. Mr. BM conceded that the presence of an image in an Internet web browser cache does not prove that a user had seen the file, and that non-pornography searches might lead a computer user to pornographic images. Mr. BM also found no data-wiping or deleting software on Appellant’s laptop. No testimony was presented regarding whether Appellant’s laptop had been connected to Mr. AS’s IP address.

4None of Appellant’s devices besides his Alienware laptop contained suspected child pornography.

3 United States v. Moss, No. ACM 40249

However, the DC3 analysis discovered that, also on 18 July 2018, the user of the laptop’s “Derek” user profile had entered search terms commonly asso- ciated with child pornography into multiple Internet web browsers. According to Ms. HR, locating child pornography on the Internet is “pretty difficult . . . without seeking it out” because Internet platforms and service providers dili- gently remove such content to avoid fines. A pediatrician, Dr. JS, reviewed the seven still images and testified that the persons depicted in six of them ranged between approximately 5 and 11 years of age. However, Dr. JS was unable to give a specific age for the seventh image because of the individual’s body position. The Government produced ev- idence that the girls in these still images were photographed in ways that con- stitute “sexually explicit conduct” as defined in the Manual for Courts-Martial, United States (2019 ed.) (MCM), pt. IV, ¶ 95.c.(10).5 In addition to the seven still images, DC3 analysts discovered a partially downloaded video of apparent child pornography in the “downloads” folder of the “Derek” user profile on Appellant’s laptop.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Cronic
466 U.S. 648 (Supreme Court, 1984)
Strickland v. Washington
466 U.S. 668 (Supreme Court, 1984)
United States v. Sweeney
70 M.J. 296 (Court of Appeals for the Armed Forces, 2011)
United States v. Gooch
69 M.J. 353 (Court of Appeals for the Armed Forces, 2011)
United States v. Mazza
67 M.J. 470 (Court of Appeals for the Armed Forces, 2009)
United States v. Toohey
63 M.J. 353 (Court of Appeals for the Armed Forces, 2006)
United States v. Moreno
63 M.J. 129 (Court of Appeals for the Armed Forces, 2006)
United States v. Datavs
71 M.J. 420 (Court of Appeals for the Armed Forces, 2012)
Toohey v. United States
60 M.J. 100 (Court of Appeals for the Armed Forces, 2004)
United States v. Jones
61 M.J. 80 (Court of Appeals for the Armed Forces, 2005)
United States v. Gay
74 M.J. 736 (Air Force Court of Criminal Appeals, 2015)
United States v. Akbar
74 M.J. 364 (Court of Appeals for the Armed Forces, 2015)
United States v. Chin
75 M.J. 220 (Court of Appeals for the Armed Forces, 2016)
United States v. Tardif
57 M.J. 219 (Court of Appeals for the Armed Forces, 2002)
United States v. Barner
56 M.J. 131 (Court of Appeals for the Armed Forces, 2001)
United States v. Gilley
56 M.J. 113 (Court of Appeals for the Armed Forces, 2001)
United States v. Grigoruk
52 M.J. 312 (Court of Appeals for the Armed Forces, 2000)
United States v. Wheeler
76 M.J. 564 (Air Force Court of Criminal Appeals, 2017)
United States v. Hardy
76 M.J. 732 (Air Force Court of Criminal Appeals, 2017)
United States v. Turner
25 M.J. 324 (United States Court of Military Appeals, 1987)

Cite This Page — Counsel Stack

Bluebook (online)
United States v. Moss, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-moss-afcca-2023.