United States v. Private E1 NICHOLAS A. YANCEY

CourtArmy Court of Criminal Appeals
DecidedDecember 8, 2014
DocketARMY 20120393
StatusUnpublished

This text of United States v. Private E1 NICHOLAS A. YANCEY (United States v. Private E1 NICHOLAS A. YANCEY) is published on Counsel Stack Legal Research, covering Army Court of Criminal Appeals primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Private E1 NICHOLAS A. YANCEY, (acca 2014).

Opinion

UNITED STATES ARMY COURT OF CRIMINAL APPEALS Before TOZZI, CAMPANELLA, and CELTNIEKS Appellate Military Judges

UNITED STATES, Appellee v. Private E1 NICHOLAS A. YANCEY United States Army, Appellant

ARMY 20120393

Headquarters, U.S. Army Signal Center of Excellence and Fort Gordon Tiernan P. Dolan, Military Judge Colonel John P. Carrell, Staff Judge Advocate

For Appellant: Colonel Kevin Boyle, JA; Lieutenant Colonel Peter Kageleiry, Jr., JA; Captain J. Fred Ingram, JA (on brief)

For Appellee: Major Robert A. Rodrigues, JA; Captain Daniel H. Karna, JA (on brief).

8 December 2014 --------------------------------- MEMORANDUM OPINION ---------------------------------

This opinion is issued as an unpublished opinion and, as such, does not serve as precedent.

CAMPANELLA, Judge:

A military judge sitting as a general court-martial convicted appellant, contrary to his pleas, of one specification of possession of child pornography in violation of Article 134, Uniform Code of Military Justice, 10 U.S.C. § 934 (2006) [hereinafter UCMJ]. The military judge sentenced appellant to a bad-conduct discharge and to be confined for eight months. The convening authority approved the adjudged sentence.

Appellant’s case is now before this court pursuant to Article 66, UMCJ. Appellant raises three assignments of error, one of which merits discussion and relief. As our relief consists of setting aside the findings and sentence, we need not discuss the other two assignments of error or the matters personally submitted by appellant pursuant to United States v. Grostefon, 12 M.J. 431 (C.M.A. 1982). YANCEY—ARMY 20120393

BACKGROUND

a. Background of the Offenses

In September 2010, appellant was listening to music on his laptop computer in his barracks room at Fort Gordon. Appellant’s roommate, Private (PV2) JH, was enjoying the music and got appellant’s permission to look through appellant’s music collection on that laptop computer. Private JH began to scroll through appellant’s music files and noticed some video files. A video file with an “odd” title caught his attention, so he opened it.

The video displayed an adult male with his exposed erect penis prodding , smacking, and rubbing a naked female toddler child on her genitals with his penis.

Private JH, disgusted by the contents of the video, confronted appellant and asked, “[w]hat the hell is this?” Appellant started laughing and responded, “[s]he looks likes she’s enjoying it.” Appellant then told PVT JH he downloaded the video from a program called “Lime Wire.” Private JH warned appellant about the dangers of downloading viruses while using the Lime Wire peer-to-peer file sharing program. Private JH also told appellant to delete the file. At some point, the file was deleted from appellant’s computer.

In November 2010, after speaking with another soldier about seeing the video on appellant’s computer, PVT JH reported the incident to Criminal Investigation Command (CID). CID seized and searched appellant’s computer. Three child pornography videos were found on appellant’s computer and formed the basis of the sole charge and specification in this case. 1

According to the government’s expert, o ne suspected child pornography video was partially downloaded via the “Frost Wire” peer-to-peer program. The expert could not state what interrupted the download.

A second suspected child pornography video, fully downloaded via Frost Wire, was also found on appellant’s computer. The government’s expert also testified the Frost Wire program was installed on 11 November 2010, and the two aforementioned videos, along with the third multiplicious preview video, were downloaded within 30 minutes of the program being downloaded. A third non-active

1 A fourth video, a “preview” of the fully downloaded video, was found on appellant’s computer. The military judge viewed the video and determined that because it was a portion of the full length video already contained in the specification, it was multiplicious. Hence, he deleted it from the charged offense.

2 YANCEY—ARMY 20120393

video was found in the “free space” of the computer’s hard drive among deleted files. This file had been partially written over by other files since its deletion. CID was able to recover and extract portions of the deleted file, allowing PVT JH to identify it as the file he viewed in appellant’s room in September. This was the video that the government alleged was downloaded via Lime Wire.

The government’s expert witness also testified that she discovered approximately 118 pornographic video files in appellant’s Frost Wire folder. However, in the opinion of the expert, none of these files contained child pornography. These Frost Wire files were downloaded under the password-protected username “Nick,” which is a variation of appellant’s first name. Of these files, approximately 95% had file names associated with child pornography, such as “child” or “preteen.” However, the expert could not forensically link any search terms to any Frost Wire files because she could not find any corroborating evidence of forensic markers establishing that the person at appellant’s computer was the person typing the search terms. The government’s expert witness further testified that another person at another computer could “piggyback” search terms on to appellant’s computer, and that the owner of the computer would not know that his computer was being piggybacked. 2 As a result of piggybacking, the search terms from the other computer would be left on the piggybacked computer.

b. Appellant’s Cross-Examination of PVT JH at Trial

A primary defense theory at trial was that the child pornography was unintentionally and mistakenly downloaded from Lime Wire.

On direct examination, the government asked PVT JH what appellant said to him after PVT JH discovered the video. Private JH answered that appellant commented, “she looks like she’s enjoying it.” Neither appellant’s comment nor the record indicates whether appellant had seen the video before commenting or was seeing it for the first time and commenting. The government also elicited from PVT JH that appellant told PVT JH he downloaded the video from Lime Wire.

On cross-examination, the defense counsel asked PVT JH a series of leading questions, to which PVT JH overwhelmingly answered in the affirmative. Defense counsel elicited that PVT JH believed appellant was not very smart about computers. Defense counsel also established PVT JH held himself out to be knowledgeable about computers. The defense then asked PVT JH if appellant told him “he was

2 The government’s expert testified that reason for “piggybacking” is so slower computers can piggyback onto faster computers “to help speed up connections for other users that may not have quite as fast an internet connection.”

3 YANCEY—ARMY 20120393

clicking on random things on Lime Wire?” The government objected on hearsay grounds. Defense counsel argued the statement was admissible pursuant to the “rule of completeness.” Defense counsel cited back to PVT JH’s testimony referencing appellant’s statement that appellant downloaded the files from Li me Wire. The military judge then had a puzzling exchange with defense counsel :

ADC: [Appellant] told you that he had been clicking random things on Lime Wire?

TC: Objection. Hearsay.

MJ: Sustained.

ADC: Your honor, it’s a statement - - -

MJ: Made by whom?

ADC: It’s made by the accused in this case under the rule of completeness of the conversation between [appellant] and [PVT JH].

MJ: What’s your question - - complete your question.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Chapman v. California
386 U.S. 18 (Supreme Court, 1967)
Beech Aircraft Corp. v. Rainey
488 U.S. 153 (Supreme Court, 1988)
United States v. Toohey
63 M.J. 353 (Court of Appeals for the Armed Forces, 2006)
United States v. Johnson
62 M.J. 31 (Court of Appeals for the Armed Forces, 2005)
United States v. Salyer
72 M.J. 415 (Court of Appeals for the Armed Forces, 2013)
United States v. Benton
57 M.J. 24 (Court of Appeals for the Armed Forces, 2002)
United States v. McDonald
57 M.J. 18 (Court of Appeals for the Armed Forces, 2002)
United States v. Gilbride
56 M.J. 428 (Court of Appeals for the Armed Forces, 2002)
United States v. Rodriguez
56 M.J. 336 (Court of Appeals for the Armed Forces, 2002)
United States v. Ayala
43 M.J. 296 (Court of Appeals for the Armed Forces, 1995)
United States v. Garcia
44 M.J. 27 (Court of Appeals for the Armed Forces, 1996)
United States v. Adams
44 M.J. 251 (Court of Appeals for the Armed Forces, 1996)
United States v. Ndanyi
45 M.J. 315 (Court of Appeals for the Armed Forces, 1996)
United States v. Foisy
69 M.J. 562 (Navy-Marine Corps Court of Criminal Appeals, 2010)
United States v. Harvey
8 C.M.A. 538 (United States Court of Military Appeals, 1957)
United States v. Grostefon
12 M.J. 431 (United States Court of Military Appeals, 1982)

Cite This Page — Counsel Stack

Bluebook (online)
United States v. Private E1 NICHOLAS A. YANCEY, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-private-e1-nicholas-a-yancey-acca-2014.