United States v. White

CourtNavy-Marine Corps Court of Criminal Appeals
DecidedMarch 11, 2020
Docket201900221
StatusPublished

This text of United States v. White (United States v. White) is published on Counsel Stack Legal Research, covering Navy-Marine Corps Court of Criminal Appeals primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. White, (N.M. 2020).

Opinion

This opinion is subject to administrative correction before final disposition.

Before TANG, LAWRENCE, and STEPHENS, Appellate Military Judges

_________________________

UNITED STATES Appellant

v.

Jerry R. WHITE Aviation Electrician’s Mate First Class (E-6), U.S. Navy Appellee

No. 201900221

Decided: 11 March 2020.

Appeal by the United States Pursuant to Article 62, UCMJ. Military Judge: Jonathan T. Stephens, JAGC, USN (arraignment); Aaron C. Rugh, JAGC, USN (motions). Arraignment: 9 May 2019 by a general court-martial convened at Naval Base San Diego, California.

For Appellant: Lieutenant Joshua C. Fiveson, JAGC, USN; Captain Brian L. Farrell, USMC.

For Appellee: Captain Mary Claire Finnen, USMC.

This opinion does not serve as binding precedent, but may be cited as persuasive authority under NMCCA Rule of Appellate Procedure 30.2.

_________________________ United States v. White, NMCCA No. 201900221

STEPHENS, Judge: This is a Government interlocutory appeal 1 from a military judge’s ruling suppressing evidence of child pornography found on Appellee’s computers. When the Department of Homeland Security (DHS) investigated sexual exploitation of children in the Philippines, Aviation Electrician’s Mate First Class (AE1) Jerry White’s name turned up. The connection, though somewhat tenuous, was enough for Naval Criminal Investigative Service (NCIS) Special Agent (SA) Mark Garhart to obtain a search authorization for AE1 White’s home and any electronics in it. When NCIS agents searched his off-base home near Naval Air Facility Atsugi, Japan, they seized nine computer hard drives; three of them contained suspected child pornography. As a result, the Government preferred charges alleging violations of Article 134, Uniform Code of Military Justice (UCMJ), for possession of child pornography on three separate devices, and referred the charges to a general court-martial. The military judge suppressed the evidence because the search authorization lacked probable cause. We agree that it lacked probable cause, but the salient question before us is whether SA Garhart acted in good faith in seeking and executing the search authorization. We find it was reasonable for SA Garhart to believe the commanding officer who authorized the search had a substan- tial basis to determine probable cause existed. Accordingly, we apply the good faith exception to vacate the military judge’s ruling that suppressed the fruits of the search and remand.

I. BACKGROUND

A. The Department of Homeland Security Investigation Christopher Villanueva raped young girls for the enjoyment of a paying live-stream Internet audience. He operated out of Taguig City in Manila, an area known for child sexual exploitation, and collected payment through wire transfers. An undercover Homeland Security Investigations (HSI) agent attempted to purchase a pornographic child-rape show from Villanueva, who directed the agent to send payment to an account in the name of Jusan Noriega. It was unknown whether Noriega was an associate of Villanueva or an alias. 2 HSI agents suspected AE1 White may have been one of Villanue-

1 10 U.S.C. § 862 (2016).

2 The HSI report indicated Noriega was an associate of Villanueva and never referred to him as an alias. In his affidavit, SA Garhart referred to Noriega as an “alias” for Villanueva, a contention that appears to be adopted by both trial defense counsel and trial counsel. See App. Ex. IV (Defense Motion to Suppress) at 1; App.

2 United States v. White, NMCCA No. 201900221

va’s customers because a Xoom wire transfer account under the name “Jared White” 3 was used to attempt to wire Noriega exactly ten dollars in May of 2015. Less than four weeks after this attempted transfer, the Philippine government arrested Villanueva. With “Jared White’s” money unclaimed, the wire-transfer company returned it to the sending account. After AE1 White became a suspect in the investigation, HSI obtained records showing the history of his other suspected wire transfers using the name “Jared White.” They located a MoneyGram account belonging to “Jared White,” listing the same Norfolk address used for the Xoom account. Between May 2012 and December 2014, the “Jared White” MoneyGram account was used to make 167 wire transfers—nearly all to the Philippines—totaling almost 5,000 dollars. The payments were all between 10 and 180 dollars, with the majority under 50 dollars. None of the recipients’ identities were known, but 60 percent of them were in Taguig City. From May 2015 to May 2016, “Jared White” made another 22 wire transfers, using Xoom, totaling over 700 dollars to 11 different people. 4 One of the transfers was the 10 dollars transferred to Jusan Noriega. An e-mail and a physical address were associated with the Xoom account. The e-mail matched the one HSI had in its intelligence file for AE1 White, and the physical address was the address of his Norfolk command. The Xoom records also showed “Jared White” used 19 different Internet protocol (IP) addresses to wire money between May 2015 and May 2016. All the IP addresses were registered to KDDI, a Japanese Internet service provider. AE1 White left Norfolk for assignment to Naval Air Station Atsugi, Japan, in October 2015. In February 2017, DHS transferred the case to NCIS.

Ex. V (Government Response to Defense Motion to Suppress) at 1; and Record at 41- 42. The military judge made a Finding of Fact that it “may” have been an alias, noting the DHS report indicated Noriega was an associate. Whether Noriega was a separate person or an alias for Villanueva himself is not relevant to our analysis. 3 The account was registered to “Jared White,” using an e-mail address of “jared[ ]@[ ].com” and listed an address belonging to AE1 White’s prior squadron in Norfolk, VA. The HSI report indicates that agents were also able to link the “jared[ ]@[ ].com” e-mail address with AE1 White but did not indicate how. 4 The HSI report states AE1 White made wire transfers to “Jusan Noriega and

the (10) other recipients in the Philippines.” See App. Ex. IV (Defense Motion to Suppress), Enclosure (A) (DHS Report) at 4.

3 United States v. White, NMCCA No. 201900221

B. The Command Authorized Search and Seizure After he received the HSI investigation, SA Garhart reviewed AE1 White’s military records, but found nothing of evidentiary value, though he was able to confirm his off-base residence. With the above information, SA Garhart—who then had about 15 years of experience, including three years at Naval Air Station Atsugi, and more than 50 child pornography cases under his belt—drafted an affidavit and a search authorization for the commanding officer’s (CO) signature. 5 He forwarded the documents to the CO and his staff judge advocate (SJA) for legal review. 6 Just as he had done many times in the past, as it was his usual course of business, SA Garhart followed up by meeting with the CO. He personally briefed the CO and answered his questions. In his affidavit, SA Garhart included a “typology” section stating that, based on his experience, collectors of child pornography rarely permanently disposed of their images or videos. The CO signed the search authorization allowing SA Garhart to search AE1 White’s off-base home for electronic media storage devices that could contain child pornography. Three of the nine hard drives that were seized contained such contraband. NCIS also found software for recording live-streamed videos.

C. The Military Judge Suppressed the Evidence The Government charged AE1 White with possessing child pornography in violation of Article 134, UCMJ. 7 The Defense moved to suppress the suspected child pornography found on AE1 White’s hard drives.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Weeks v. United States
232 U.S. 383 (Supreme Court, 1914)
Wolf v. Colorado
338 U.S. 25 (Supreme Court, 1949)
Mapp v. Ohio
367 U.S. 643 (Supreme Court, 1961)
California v. Minjares
443 U.S. 916 (Supreme Court, 1979)
Illinois v. Gates
462 U.S. 213 (Supreme Court, 1983)
United States v. Leon
468 U.S. 897 (Supreme Court, 1984)
United States v. Wuterich
67 M.J. 63 (Court of Appeals for the Armed Forces, 2008)
United States v. Hoffmann
75 M.J. 120 (Court of Appeals for the Armed Forces, 2016)
United States v. Henning
75 M.J. 187 (Court of Appeals for the Armed Forces, 2016)
United States v. Carter
54 M.J. 414 (Court of Appeals for the Armed Forces, 2001)
United States v. Nieto
76 M.J. 101 (Court of Appeals for the Armed Forces, 2017)
United States v. Darnall
76 M.J. 326 (Court of Appeals for the Armed Forces, 2017)
Davis v. United States
180 L. Ed. 2d 285 (Supreme Court, 2011)
United States v. Ayala
43 M.J. 296 (Court of Appeals for the Armed Forces, 1995)
United States v. Lopez
35 M.J. 35 (United States Court of Military Appeals, 1992)

Cite This Page — Counsel Stack

Bluebook (online)
United States v. White, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-white-nmcca-2020.