United States v. Ober

66 M.J. 393, 2008 CAAF LEXIS 768, 2008 WL 2439689
CourtCourt of Appeals for the Armed Forces
DecidedJune 16, 2008
Docket07-0722/AR
StatusPublished
Cited by82 cases

This text of 66 M.J. 393 (United States v. Ober) is published on Counsel Stack Legal Research, covering Court of Appeals for the Armed Forces primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Ober, 66 M.J. 393, 2008 CAAF LEXIS 768, 2008 WL 2439689 (Ark. 2008).

Opinions

Chief Judge EFFRON delivered the opinion of the Court.

A general court-martial composed of officer and enlisted members convicted Appellant, contrary to his pleas, of making a false official statement, knowingly and wrongfully transporting child pornography in interstate commerce, and knowingly and wrongfully possessing child pornography, in violation of Articles 107 and 134, Uniform Code of Military Justice (UCMJ), 10 U.S.C. §§ 907, 934 (2000). The sentence adjudged by the court-martial included confinement for three years, a dishonorable discharge, forfeiture of all pay and allowances, and reduction to the lowest enlisted grade. The convening authority approved confinement for thirty months and approved the balance of the sentence. The United States Army Court of Criminal Appeals affirmed. United States v. Ober, No. ARMY 20040081 (ACt.Crim.App. May 25, 2007) (unpublished).

On Appellant’s petition, we granted review of the following issues:

I. WHETHER THE EVIDENCE IS LEGALLY INSUFFICIENT TO SUPPORT A FINDING OF GUILT FOR TRANSPORTING CHILD PORNOGRAPHY IN INTERSTATE COMMERCE WHEN NO EVIDENCE EXISTS THAT APPELLANT UPLOADED CHILD PORNOGRAPHY FROM HIS COMPUTER TO THE INTERNET FILE-SHARING PROGRAM “KAZAA.”
II. WHETHER THE ARMY COURT ERRED IN AFFIRMING THE FINDING OF GUILTY FOR SPECIFICATION 1 OF CHARGE I WHEN THE COURT AFFIRMED UNDER A DIFFERENT THEORY OF LIABILITY THAN WAS PROFFERED TO THE MILITARY PANEL, IN CONTRAVENTION OF CHIARELLA v. UNITED STATES, 445 U.S. 222, 100 S.Ct. 1108, 63 L.Ed.2d 348 (1980).
III. WHETHER THE MILITARY JUDGE FAILED TO PROPERLY INSTRUCT THE PANEL ON THE ELEMENTS FOR SPECIFICATION 1 OF CHARGE I, BY: (1) OMITTING THE CHARGED LANGUAGE “CAUSE TO BE TRANS[395]*395PORTED” FROM THE ORAL AND WRITTEN INSTRUCTIONS; (2) FAILING TO INSTRUCT ON A POSSIBLE GOVERNMENT ALTERNATE THEORY OF LIABILITY UNDER ARTICLE 77, UCMJ, 10 U.S.C. § 877; AND (3) FAILING TO PROPERLY INSTRUCT ON THE TERM “UPLOADING” WHEN THE COMPUTER EXPERTS AT TRIAL PROVIDED TWO VARYING DEFINITIONS.

For the reasons set forth below, we affirm.

I. BACKGROUND

The present appeal focuses on the circumstances under which child pornography was obtained through the use of Appellant’s computer. The prosecution’s primary theory was that Appellant used a peer-to-peer file sharing program to obtain child pornography from other participants in the file sharing network. The primary defense theory of the case was that other individuals were responsible because they had access to Appellant’s computer, Appellant had an alibi for the times when child pornography was transported to the computer, and there was ample exculpatory evidence to place the blame on others.

Section A describes the file sharing program at issue in this case. Section B summarizes the evidence developed during the initial investigation. Section C sets forth the evidence and the theories presented by the parties at trial.

A. APPELLANT’S FILE SHARING PROGRAM

Appellant built a computer from individual parts, which he maintained in his barracks room. He also created a network that connected his computer with the computers of three other soldiers in the barracks, enabling them to utilize his high-speed Internet connection. The computers on the network included the computer of Appellant’s roommate, Specialist B. Appellant permitted Specialist B and several other soldiers to use his computer.

Appellant installed various programs on his computer, including KaZaA, a peer-to-peer file sharing program.1 According to expert testimony introduced at trial, the Ka-ZaA program installed on Appellant’s computer enabled KaZaA users to share computer files, including music, movies, and images, over the Internet with other KaZaA users.

The KaZaA program provided two primary means of moving files between users of the program. In the first method, a KaZaA user who wanted to make files hosted on his or her computer available to other KaZaA users could do so by configuring the KaZaA program preferences to permit access by others. Setting the preferences involved a simple adjustment that could be changed at will by the host computer’s user to enable or preclude access to files by other KaZaA users.

In the second method, the KaZaA program enabled a user to utilize a search function, similar to an Internet web browser, to obtain files hosted on the computers of other Ka-ZaA users. To obtain files from other computers, the KaZaA user would open the Ka-ZaA program and enter a search term. In response to the search request, the KaZaA program would display a list of file names and descriptions obtained from other KaZaA users whose preferences permitted such access. The KaZaA user who initiated the search could then view the names and file descriptions identified by the search and double click on the name of the files that the user wanted to obtain. The download process would begin once the user double clicked on the desired file. The KaZaA program would complete the download without further action by the user. The KaZaA user could limit the number of downloads that could take place at any one time. If the host logged out of the KaZaA program or otherwise blocked access to a file before the requested download was completed, the KaZaA program would attempt to obtain the file from another available user or would reinitiate the download when the host subsequently [396]*396reopened the KaZaA program. Through the search function, the KaZaA program enabled the user, through a series of keystrokes, to identify a file, upload the file from the host computer, and download the file to the user’s computer. From the perspective of the Ka-ZaA user seeking to obtain a file hosted by another computer, the actions of uploading and downloading were part of a continuous process managed by that user.

B. THE INITIAL INVESTIGATION

Appellant spent a substantial amount of his free time maintaining and upgrading his computer. The chain of events leading to the present case began when he returned from shopping for a computer device and thought that he was locked out of his third-floor barracks room. He attempted to enter through an outside window, but fell to the ground and suffered a serious injury requiring about a week of hospitalization and thirty days of convalescent leave.

While Appellant was absent from the barracks on convalescent leave, Specialist B and another soldier used Appellant’s computer to play video games. As they were perusing his files for other available video games, they came across a file titled “13 year old,” located in a KaZaA folder. They opened the file, saw a picture of a young, naked female, and closed the file. At that time, they did not advise anyone of what they had seen. A month later, Specialist B mentioned the incident in the course of a casual conversation with a noncommissioned officer. After an initial inquiry by the noncommissioned officer, the Army’s Criminal Investigation Command (CID) initiated a formal investigation.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Nelson
Air Force Court of Criminal Appeals, 2025
United States v. Specialist PHILLIP THOMPSON
Army Court of Criminal Appeals, 2025
United States v. Nestor
Air Force Court of Criminal Appeals, 2023
United States v. Kitchen
Air Force Court of Criminal Appeals, 2023
United States v. Solomon
Air Force Court of Criminal Appeals, 2022
United States v. Lattin
Air Force Court of Criminal Appeals, 2022
United States v. Westcott
Air Force Court of Criminal Appeals, 2022
United States v. Quezada
Court of Appeals for the Armed Forces, 2021
United States v. Campbell
Air Force Court of Criminal Appeals, 2021
United States v. Hale
Court of Appeals for the Armed Forces, 2019
United States v. Nicola
Court of Appeals for the Armed Forces, 2019
United States v. Rich
Air Force Court of Criminal Appeals, 2018
United States v. Hoffman
Navy-Marine Corps Court of Criminal Appeals, 2018
United States v. Gomez
Navy-Marine Corps Court of Criminal Appeals, 2018
United States v. Preston
Air Force Court of Criminal Appeals, 2017
United States v. Motsenbocker
Navy-Marine Corps Court of Criminal Appeals, 2017
United States v. Henry
76 M.J. 595 (Air Force Court of Criminal Appeals, 2017)
United States v. Sergeant ELIAS J. DUARTE
Army Court of Criminal Appeals, 2017
United States v. McClour
76 M.J. 23 (Court of Appeals for the Armed Forces, 2017)
United States v. Rendon
75 M.J. 908 (Navy-Marine Corps Court of Criminal Appeals, 2016)

Cite This Page — Counsel Stack

Bluebook (online)
66 M.J. 393, 2008 CAAF LEXIS 768, 2008 WL 2439689, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-ober-armfor-2008.