United States v. Staff Sergeant SCOTT T. SCHEMPP

CourtArmy Court of Criminal Appeals
DecidedFebruary 26, 2016
DocketARMY 20140313
StatusUnpublished

This text of United States v. Staff Sergeant SCOTT T. SCHEMPP (United States v. Staff Sergeant SCOTT T. SCHEMPP) is published on Counsel Stack Legal Research, covering Army Court of Criminal Appeals primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Staff Sergeant SCOTT T. SCHEMPP, (acca 2016).

Opinion

UNITED STATES ARMY COURT OF CRIMINAL APPEALS Before MULLIGAN, CELTNIEKS, and BURTON Appellate Military Judges

UNITED STATES, Appellee v. Staff Sergeant SCOTT T. SCHEMPP United States Army, Appellant

ARMY 20140313

United States Army Combined Arms Support Command James W. Herring, Jr., Military Judge Colonel Ralph J. Tremaglio III, Staff Judge Advocate

For Appellant: Colonel Kevin Boyle, JA; Major Aaron R. Inkenbrandt, JA; Captain Amanda R. McNeil, JA (on brief).

For Appellee: Major A.G. Courie III, JA; Major Steven J. Collins, JA; Captain Scott L. Goble, JA (on brief).

26 February 2016 ---------------------------------- MEMORANDUM OPINION ----------------------------------

This opinion is issued as an unpublished opinion and, as such, does not serve as precedent.

BURTON, Judge:

A military judge sitting as a general court-martial convicted appellant, contrary to his pleas, of two specifications of possession of child pornography in violation of Article 134, Uniform Code of Military Justice, 10 USC § 934 (2012) [hereinafter UCMJ]. The military judge sentenced appellant to a dishonorable discharge, fifteen months of confinement and reduction to the grade of E-1. The convening authority approved the sentence as adjudged, to include 100 days of confinement credit ordered by the military judge. The automatic forfeiture of all pay and allowances was deferred and terminated on the appellant’s expiration of term of service. SCHEMPP—ARMY 20140313

Appellant’s case is before this court for review under Article 66, UCMJ. Appellant’s counsel raises three assignments of error, two of which merit discussion and relief. 1

FACTS

In April of 2012, while conducting an undercover operation to identify computers trading child pornography via the internet, a Special Agent (SA) with the Naval Crime Investigative Services (NCIS) flagged appellant’s Internet Protocol (IP) address as a “download candidate” of child pornography. Further investigation revealed that appellant’s IP address, a unique number assigned by appellant’s internet service provider, actively shared images of potential child pornography with other internet users through a peer-to-peer program called “FrostWire.” The NCIS agent downloaded three digital images from appellant’s shared FrostWire folder and confirmed they were child pornography by comparing the images to the National Center for Missing and Exploited Children’s (NCMEC) database of known child victims.

NCIS, upon identifying appellant as an active duty Army soldier, transferred the case to the Army Criminal Investigation Command (CID).

Pursuant to a military magistrate’s search authorization, CID collected from appellant’s residence a Dell Alienware tower computer (Dell) and an Iomega external hard drive (Iomega). CID then obtained a second search authorization to conduct a digital forensic examination of these seized items. CID’s examination found child pornography on both devices. All of the digital images on the Iomega were recovered from unallocated space on the drive. Eight of the digital images on the Dell computer were recovered from unallocated space. The remaining 72 images and 4 videos on the Dell were in the active files.

LAW AND DISCUSSION

Article 66(c), UCMJ, establishes our statutory duty to review a record of trial for legal and factual sufficiency de novo. United States v. Walters, 58 M.J. 391, 395 (C.A.A.F. 2003). Under Article 66(c), UCMJ, we may affirm only those findings of guilty that we find correct in law and fact and determine, based on the entire record, should be affirmed. Id. The test for legal sufficiency of the evidence is whether, viewing the evidence in a light most favorable to the government, a fact-finder could rationally have found all of the essential elements of an offense beyond a reasonable doubt. Jackson v. Virginia, 443 U.S. 307, 318-19 (1979); United States v. Blocker, 32 M.J. 281, 284-85 (C.M.A. 1991). In resolving questions of legal sufficiency, this

1 We have also reviewed those matters personally raised by appellant pursuant to United States v. Grostefon, 12 M.J. 431 (C.M.A. 1982), and they are without merit.

2 SCHEMPP—ARMY 20140313

court is “bound to draw every reasonable inference from the evidence of record in favor of the prosecution.” United States v. Craion, 64 M.J. 531, 534 (citations omitted). In weighing factual sufficiency, we take “a fresh, impartial look at the evidence,” applying “neither a presumption of innocence nor a presumption of guilt.” United States v. Washington, 57 M.J. 394, 399 (C.A.A.F. 2002). "[A]fter weighing the evidence in the record of trial and making allowances for not having personally observed the witnesses, [we must be] convinced of the [appellant's] guilt beyond a reasonable doubt.” United States v. Turner, 25 M.J. 324, 325 (C.M.A. 1987).

1. Images Located in Unallocated Space

Appellant alleges the evidence underlying Specification 1 of The Charge and some of the evidence underlying Specification 2 of The Charge is legally insufficient to support a conviction because the images at issue were found in the unallocated space of the Dell computer and Iomega drive.

In Specification 1 of The Charge, the court found appellant guilty of, on or about 20 June 2012, knowingly possessing 83 images of child pornography on the Iomega drive. 2 In Specification 2 of The Charge, the court found appellant guilty of, on or about 20 June 2012, knowingly possessing 40 images and 2 videos containing child pornography. 3

Because of its charging decision, the Government was required to prove for both specifications that the appellant knowingly possessed the charged images and video files “on or about 20 June 2012.” Accordingly, the critical issue we must now decide is not whether the appellant knowingly possessed these images and video files at any time, but whether he possessed them on or about 20 June 2012.

We conclude appellant did not possess the 83 images underlying Specification 1 of The Charge, nor did he possess eight of the images in Specification 2 of The

2 After arraignment but before entry of pleas, Specification 1 of The Charge was amended by striking the figure “90” and substituting therefor the figure “85”. Of Specification 1 of The Charge, appellant was found Guilty, except the figure “85”, and substituting therefor the figure “83”. Of the excepted figure: Not Guilty. Of the substituted figure: Guilty.

3 After arraignment but before entry of please, Specification 2 of the Charge was amended by striking the figures “80” and “4” and substituting therefor the figures “41” and “3.” Of Specification 2 of The Charge, appellant was found Guilty, except the figures “41” and “3,” substituting therefor the figures “40” and “2.” Of the excepted figures: Not Guilty. Of the substituted figure: Guilty.

3 SCHEMPP—ARMY 20140313

Charge, which were found in unallocated space. 4 To support our conclusion, we first consider the technical aspects associated with unallocated space prior to considering whether a computer user can “possess” a digital file, either actually or constructively, if that file exists only in the unallocated space of a computer.

According to the Government’s expert witness, Special Agent (SA) JB, all of the digital files charged in Specification 1 of The Charge, and some of the digital files charged in Specification 2 of the Charge, were deleted in December 2009, so appellant had no access to them absent the use of forensic software. SA JB retrieved these images using EnCase, a forensic software program that allows deleted images in unallocated space to be seen.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Jackson v. Virginia
443 U.S. 307 (Supreme Court, 1979)
United States v. Flyer
633 F.3d 911 (Ninth Circuit, 2011)
United States v. Moreland
665 F.3d 137 (Fifth Circuit, 2011)
United States v. John Charles Kuchinski
469 F.3d 853 (Ninth Circuit, 2006)
United States v. Navrestad
66 M.J. 262 (Court of Appeals for the Armed Forces, 2008)
United States v. Ronald Seiver
692 F.3d 774 (Seventh Circuit, 2012)
United States v. Kain
589 F.3d 945 (Eighth Circuit, 2009)
United States v. Winckelmann
73 M.J. 11 (Court of Appeals for the Armed Forces, 2013)
United States v. Jason Hill
750 F.3d 982 (Eighth Circuit, 2014)
United States v. Walters
58 M.J. 391 (Court of Appeals for the Armed Forces, 2003)
United States v. Craion
64 M.J. 531 (Army Court of Criminal Appeals, 2006)
United States v. Grostefon
12 M.J. 431 (United States Court of Military Appeals, 1982)
United States v. Turner
25 M.J. 324 (United States Court of Military Appeals, 1987)
United States v. Blocker
32 M.J. 281 (United States Court of Military Appeals, 1991)
United States v. Washington
57 M.J. 394 (Court of Appeals for the Armed Forces, 2002)

Cite This Page — Counsel Stack

Bluebook (online)
United States v. Staff Sergeant SCOTT T. SCHEMPP, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-staff-sergeant-scott-t-schempp-acca-2016.