United States v. Rieber

CourtUnited States Air Force Court of Criminal Appeals
DecidedMay 22, 2014
DocketACM 38226
StatusUnpublished

This text of United States v. Rieber (United States v. Rieber) is published on Counsel Stack Legal Research, covering United States Air Force Court of Criminal Appeals primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Rieber, (afcca 2014).

Opinion

UNITED STATES AIR FORCE COURT OF CRIMINAL APPEALS

UNITED STATES

v.

Staff Sergeant DUSTIN R. RIEBER United States Air Force

ACM 38226

22 May 2014

Sentence adjudged 8 August 2012 by GCM convened at Yokota Air Base, Japan. Military Judge: W. Shane Cohen.

Approved Sentence: Bad-conduct discharge, confinement for 90 days, and reduction to E-3.

Appellate Counsel for the Appellant: Major Daniel E. Schoeni.

Appellate Counsel for the United States: Colonel Don M. Christensen; Lieutenant Colonel C. Taylor Smith; Major Rhea A. Lagano; Major Brian C. Mason; and Gerald R. Bruce, Esquire.

Before

HARNEY, MITCHELL, and WEBER Appellate Military Judges

OPINION OF THE COURT

This opinion is subject to editorial correction before final release.

MITCHELL, Judge:

The appellant was tried by a general court-martial composed of officer members. Contrary to his pleas, the appellant was found guilty of knowing and wrongful possession of one or more visual depictions of a minor engaged in sexually explicit conduct, in violation of Article 134, UCMJ, 10 U.S.C. § 934. The members sentenced the appellant to a bad-conduct discharge, confinement for 90 days, and reduction to E-3. The convening authority approved the sentence as adjudged. The appellant raises seven issues for our consideration: (1) whether the evidence is factually and legally sufficient; (2) whether it was plain error for the military judge not to provide an instruction that possession must be “knowing and conscious”; (3) whether the curative instruction that was given overcame the unconstitutional burden shift in trial counsel’s closing argument; (4) whether the curative instructions overcame error caused by trial counsel’s argument of facts not in evidence during closing argument; (5) whether the military judge erred in instructing that to be guilty of possession of child pornography the images must be of a child under 18 years of age when the defense requested an instruction that the correct age under the Uniform Code of Military Justice is 16 years of age; (6) whether the military judge erred in denying a challenge for cause against a member; and (7) whether the cumulative error in this case merits relief.

We determine that the evidence regarding the three videos allegedly possessed by the appellant is factually insufficient to support his conviction. Of the remaining 198 images offered into evidence, we find that 186 of the images do not meet the legal definition of child pornography. We apply the standard described in United States v. Piolunek, 72 M.J. 830 (A.F. Ct. Crim. App. 2013) and set aside the findings and sentence.1

Background

Air Force Office of Special Investigations Special Agent (SA) KA used a web- based tool to discover that an IP address assigned to a location on Yokota Air Base, Japan had file names indicative of child pornography. Based on this information, a search authorization was obtained, and SA KA seized electronic devices from the appellant’s dorm room. The devices included two laptops, a hard drive, a “couple of cell phones,” and a variety of other electronic devices. All the items were sent to the Defense Computer Forensics Laboratory (DCFL) for analysis.

At trial, Mr. FK, from DCFL, testified for the Government as a computer forensics expert. He completed the second examination of the media sent to DCFL. 2 He examined the 27 files identified by SA KA, along with reviewing all the media submitted to DCFL. Of the 27 files SA KA identified, Mr. FK determined that all of them were obtained through using either FrostWire or LimeWire.

1 Because we set aside the findings and sentence on this basis, the other issues are moot and we do not address them. 2 The first Defense Computer Forensics Laboratory analyst concluded that “there was no evidence found indicating the [appellant] was intentionally searching for CP (child pornography) websites or files.” Special Agent KA asked for a second analysis after receiving this report. When trial counsel sought to admit the second analysis, which included portions of the first report, trial defense counsel sought to have the initial conclusion that there was no evidence of the appellant intentionally searching for CP included in the report. Trial counsel objected to its inclusion based on hearsay, and the military judge sustained the objection.

2 ACM 38226 Both FrostWire and LimeWire are peer-to-peer file sharing applications. Once a user selects a file to download, the file is placed in a temporary directory or incomplete folder with a “T” prefix designation until the download is complete. Once the download is complete, the “T” is removed and the file is moved out of the incomplete folder into another location, in this case into a folder designated “LimeWire saved.” The saved folder is by default shared with other LimeWire users. The appellant also had a “Limewire1” folder on one of the laptops, which contained files he moved from the “LimeWire saved” folder. This “Limewire1” folder was also copied onto the external hard drive.

At trial, the Government admitted into evidence a screenshot of the “Limewire1” folder, exhibiting thumbnail images of all of the photos in this folder, along with their file names. This exhibit was admitted without any limitation or objection. On cross- examination, Mr. FK agreed that of the roughly 200 images captured in this exhibit, more than 180 of them were of adults. One of the images that had been identified as suspected child pornography had been opened, but there was no evidence that any of the other suspected child pornography images were ever viewed. However, the first forensic report from DCFL stated, “No link files were found that point to any agent-selected files or files that appear to be [child pornography] related.”

Trial counsel also admitted three videos into evidence. The videos of suspected child pornography were all contained in the incomplete folder on the appellant’s laptop computer. The videos of suspected child pornography were not complete and were not found anywhere else on the appellant’s computer media. A “jump-list” indicated the appellant had previewed or attempted to view the files as they were being downloaded. The court members viewed no more than 60 seconds of each of the videos. The Government’s expert testified that the reason the videos most likely were contained in the incomplete folder was that the appellant intentionally cancelled the downloads as they were occurring. The incomplete folder also contained 15 other movie files that did not involve suspected child pornography.

Investigators found no search terms in the peer-to-peer programs or in the internet history indicative of searches for child pornography. The appellant had conducted an internet search for “lolicon,” which is a Japanese style of animation that depicts underage characters who are often in sexual situations; however, investigators found no lolicon images on the appellant’s computer media. Mr. FK described the appellant as having a “significant amount” of adult pornography.

Trial defense counsel also called a computer forensics expert, Mr. KP of Global CompuSearch. Mr. KP also testified that “the only reasonable conclusion” as for why the three videos at issue were in the temporary folder was that the appellant intentionally cancelled the download. The “LimeWire1” folder was created by the user and contained 197 photos, including all of the images SA KA had identified as suspected child

3 ACM 38226 pornography. Mr. KP described the folder contents as “obviously fully developed women mostly; many of them celebrity look-alike type of images.” Mr.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Stromberg v. California
283 U.S. 359 (Supreme Court, 1931)
Chapman v. California
386 U.S. 18 (Supreme Court, 1967)
Jackson v. Virginia
443 U.S. 307 (Supreme Court, 1979)
Zant v. Stephens
462 U.S. 862 (Supreme Court, 1983)
Griffin v. United States
502 U.S. 46 (Supreme Court, 1991)
United States v. Edwin E. Wiegand
812 F.2d 1239 (Ninth Circuit, 1987)
United States v. Barberi
71 M.J. 127 (Court of Appeals for the Armed Forces, 2012)
United States v. Beaty
70 M.J. 39 (Court of Appeals for the Armed Forces, 2011)
United States v. Rodriguez
66 M.J. 201 (Court of Appeals for the Armed Forces, 2008)
United States v. Young
64 M.J. 404 (Court of Appeals for the Armed Forces, 2007)
United States v. Roderick
62 M.J. 425 (Court of Appeals for the Armed Forces, 2006)
United States v. Cendejas
62 M.J. 334 (Court of Appeals for the Armed Forces, 2006)
United States v. Dost
636 F. Supp. 828 (S.D. California, 1986)
United States v. Pullen
41 M.J. 886 (Air Force Court of Criminal Appeals, 1995)
United States v. Piolunek
72 M.J. 830 (Air Force Court of Criminal Appeals, 2013)
United States v. Turner
25 M.J. 324 (United States Court of Military Appeals, 1987)
United States v. Blocker
32 M.J. 281 (United States Court of Military Appeals, 1991)
United States v. Washington
57 M.J. 394 (Court of Appeals for the Armed Forces, 2002)

Cite This Page — Counsel Stack

Bluebook (online)
United States v. Rieber, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-rieber-afcca-2014.