United States v. Saxman

69 M.J. 540, 2010 WL 2109815
CourtNavy-Marine Corps Court of Criminal Appeals
DecidedMay 27, 2010
DocketNMCCA 200900412
StatusPublished
Cited by3 cases

This text of 69 M.J. 540 (United States v. Saxman) is published on Counsel Stack Legal Research, covering Navy-Marine Corps Court of Criminal Appeals primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Saxman, 69 M.J. 540, 2010 WL 2109815 (N.M. 2010).

Opinion

PUBLISHED OPINION OF THE COURT

MAKSYM, Senior Judge:

A general court-martial composed of officer members convicted the appellant, contrary to his pleas, of one specification of knowing possession of child pornography in violation of 18 U.S.C. § 2252A(a)(5)(A), as charged under Article 134 of the Uniform Code of Military Justice, 10 U.S.C. § 934. The appellant was sentenced to a bad-conduct discharge. The convening authority approved the sentence as adjudged.

On appeal, the appellant alleges that this court cannot properly conduct its Article 66, UCMJ, 10 U.S.C. § 866, review because the members found him guilty by exceptions and substitutions of possessing only four’ of the charged 22 videos, but did not specify which four videos formed the basis of their guilty finding.1

We have reviewed the record of trial, the pleadings of the parties and heard oral argument on 26 January 2010. We conclude that we cannot conduct a proper Article 66 review in this case. Accordingly, we set aside the findings and sentence and dismiss the charge and its sole specification.

[541]*541FACTUAL BACKGROUND

On 14 December 2007, Naval Criminal Investigative Service (NCIS) Special Agent (SA) Sean Devinny initiated an undercover operation in order to identify and investigate Hawaii-based servieemembers in possession of child pornography on their personal computers. Record at 216. On that day, SA Devinny opened a peer-to-peer file sharing program on his computer and began inputting search terms indicative of child pornography into the program’s search engine. Id. at 220. Within moments, the program had searched the internet and identified numerous files located on computers throughout the world whose names contained these terms, indicating to SA Devinny that the files likely contained child pornography. Id. at 221. Listed next to each file was an internet protocol (IP) address, a unique number that identified the computer from which each file was being shared. Id. at 205, 228.

SA Devinny next sorted through the list of IP addresses and identified an IP address in Hawaii from which a computer was sharing a file of child pornography. Id. at 228-29. Using this information, SA Devinny subpoenaed the Internet Service Provider (ISP) which owned the rights to assign the IP address in an attempt to identify the user of the address. Id. at 234. The ISP informed SA Devinny that the IP address was assigned to the appellant, who was then living in a barracks room at Marine Corps Base Kaneohe, Hawaii. Id. at 234, 236; Prosecution Exhibit 2 at 1.

SA Devinny subsequently sought and was given authorization to search the appellant’s barracks room for computer media containing child pornography. Id. at 263. Prior to executing the warrant, however, SA Devinny decided to interview the appellant at the NCIS Kaneohe Bay Field Office. Id. at 236. During the interview, the appellant admitted that his computer contained images of child pornography, but denied knowing how the images got there. Id. at 242. The appellant stated that many different Marines had access to his computer and implied that others had downloaded child pornography to his computer without his permission or knowledge. Id.

Following the interview, SA Devinny and SA Paul Lerza searched the appellant’s barracks room, seized the appellant’s desktop computer, and entered the computer into evidence. Id. at 246, 265, 267. Several weeks later, NCIS sent the computer to the Defense Computer Forensic Laboratory (DCFL) for analysis to determine if the computer’s hard drive contained any images of child pornography. PE 2 at 1.

After the computer arrived at DCFL, forensic examiner Michael Donhauser and other DCFL technicians conducted an examination of the computer’s hard drive and discovered 22 videos they believed to be child pornography. Id. at 295, 330. Once they identified the 22 videos, Mr. Donhauser compared the videos to images in a database compiled by the National Center for Missing and Exploited Children (NCMEC). Id. at 481-82. The database contained a collection of pornographic images depicting “known child images,” images that have been identified by NCMEC experts as depicting children who are under the age of consent. Id. at 481. Utilizing this database, Mr. Donhauser determined that of the 22 videos on the appellant’s hard drive, only four contained videos with “known child images.” Id. at 483.

The Government preferred charges against the appellant on 16 May 2008. The charge sheet read, in pertinent part:

In that [the appellant] ... did, at Building 7062, on board Marine Corps Base, Ka-neohe Bay, Hawaii, on or about December 14, 2007, knowingly possess, on land under the control of the Government of the United States, 22 video files of child pornography in violation of 18 U.S.C. § 2252A(a)(5)(A).

Trial commenced almost one year later, on 6 April 2009. During trial, the defense attacked the Government’s case from several angles, including by advancing a theory that another Marine with access to the appellant’s computer had downloaded child pornography to the computer without the appellant’s knowledge.

The military judge instructed the members, after the defense case but prior to [542]*542closing arguments, as to the elements of the offense:

In order to find the accused guilty of this offense, you must be convinced by legal and competent evidence beyond a reasonable doubt:
One, that ... the accused knowingly possessed 22 video files of child pornography; Two, that the accused did so in the special maritime and territorial jurisdiction of the United States ...;
Three, that at the time the accused knew the material he possessed contained an image of child pornography; ...
Four, that the accused’s acts were wrongful; and
Five, that at the time Title 18, U.S.Code Section 2252(a)(5)(A) [sic] was in existence.

Record at 759-60. The military judge then supplemented his recitation of the elements and provided the members with additional information, including, inter alia, an instruction that:

The offense of possession requires the accused to have knowingly possessed material containing an image of child pornography and to have known that the image was child pornography.

Id. at 762-63. Upon a request from trial counsel for a variance instruction and likely recognizing that the evidence raised during trial might lead to an acquittal on' some but not all of the images, the military judge then instructed the members on the option of finding guilt by exception and substitution. Id. at 766; Appellate Exhibit XXXVI.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Kelley
2025 WL 1198116 (U S Coast Guard Court of Criminal Appeals, 2025)
United States v. Tinsley
Navy-Marine Corps Court of Criminal Appeals, 2017
United States v. Peterson
Navy-Marine Corps Court of Criminal Appeals, 2017

Cite This Page — Counsel Stack

Bluebook (online)
69 M.J. 540, 2010 WL 2109815, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-saxman-nmcca-2010.