United States v. Yohe

CourtUnited States Air Force Court of Criminal Appeals
DecidedSeptember 3, 2015
DocketACM 37950 (recon)
StatusUnpublished

This text of United States v. Yohe (United States v. Yohe) is published on Counsel Stack Legal Research, covering United States Air Force Court of Criminal Appeals primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Yohe, (afcca 2015).

Opinion

UNITED STATES AIR FORCE COURT OF CRIMINAL APPEALS

UNITED STATES

v.

Airman First Class CHARLES N. YOHE United States Air Force

ACM 37950 (recon)

3 September 2015

Sentence adjudged 27 April 2011 by GCM convened at Offutt Air Force Base, Nebraska. Military Judge: William C. Muldoon.

Approved sentence: Bad-conduct discharge, confinement for 9 months, and reduction to E-1.

Appellate Counsel for the Appellant: Major Matthew T. King, Major Shane A. McCammon, Captain Johnathan D. Legg.

Appellate Counsel for the United States: Colonel Don M. Christensen; Lieutenant Colonel Nurit Anderson, Major Daniel J. Breen; Captain Brian C. Mason; and Gerald R. Bruce, Esquire.

Before

ALLRED, MITCHELL, and HECKER Appellate Military Judges

OPINION OF THE COURT UPON RECONSIDERATION

This opinion is issued as an unpublished opinion and, as such, does not serve as precedent under AFCCA Rule of Practice and Procedure 18.4.

HECKER, Senior Judge:

Appellant was convicted, contrary to his pleas, by a general court-martial composed of officer members of possessing and viewing sexually explicit depictions of minors, in violation of Article 134, UCMJ, 10 U.S.C. § 934. He was sentenced to a dishonorable discharge, confinement for 9 months and reduction to the grade of E-1. The convening authority reduced the punitive discharge to a bad-conduct discharge and approved the remainder of the sentence as adjudged.

Procedural History

On 9 April 2013, we issued a decision affirming the findings and sentence in Appellant’s case. United States v. Yohe, ACM 37950 (A.F. Ct. Crim. App. 9 April 2013) (unpub. op.). Mr. Laurence M. Soybel was an appellate judge on the panel that issued the decision, pursuant to an appointment by The Judge Advocate General of the Air Force. After the Secretary of Defense issued a memorandum on 25 June 2013 appointing Mr. Soybel to this court, we vacated our initial decision and issued a second one on 22 July 2013, reaffirming the substance and holdings of the prior decision. United States v. Yohe, ACM 37950 (A.F. Ct. Crim. App. 22 July 2013) (unpub. op.).

In September 2013, Appellant filed a petition for grant of review with our superior court. On 31 October 2013, our superior court dismissed the petition for review without prejudice. United States v. Yohe, 73 M.J. 91 (C.A.A.F. 2013) (mem.). The record of trial was returned to our court on 13 March 2014.

On 15 April 2014, our superior court issued its decision in United States v. Janssen, 73 M.J. 221, 225 (C.A.A.F. 2014), holding that the Secretary of Defense did not have the legislative authority to appoint appellate military judges and that his appointment of Mr. Soybel to this Court was “invalid and of no effect.” In light of Janssen, we granted reconsideration on 29 April 2014, and permitted counsel for Appellant to file a supplemental pleading.

When Appellant’s case was initially before us, he argued (1) the evidence was factually and legally insufficient to support his convictions, (2) the military judge violated his right to confrontation by admitting testimonial hearsay into evidence and (3) the military judge erred by admitting certain evidence. After we permitted Appellant to submit a supplemental assignment of errors, he raised the issue of post-trial delay, arguing his due process right to speedy appellate processing was violated under United States v. Moreno, 63 M.J. 129, 135 (C.A.A.F. 2006), and United States v. Tardif, 57 M.J. 219, 224 (C.A.A.F. 2002). In September 2014 and January 2015, we specified two issues: (1) whether the trial court’s findings and sentence or this court’s review are affected by the possibility that certain non-admitted evidence was improperly brought to the attention of the panel, and (2) whether the general verdict in the case must be set aside because certain images in the case were constitutionally protected.

With a properly constituted panel, we have reviewed Appellant’s case, to include Appellant’s previous and current filings and the previous opinions issued by this court. We affirm the findings, but, for the reasons provided below, consolidate the specifications. We affirm the sentence as adjudged.

2 ACM 37950 (recon) Background

In May 2009, an investigator with the Nebraska state police used a law enforcement program to identify Internet protocol (IP) addresses that were sharing child pornography through peer-to-peer networks, including Limewire.1 This automated program was operated from the investigator’s computer and sent out queries using certain key words commonly associated with child pornography. If a peer-to-peer user’s computer was on-line and the program was being used, his computer would automatically respond to the query by indicating it had a responsive file or files. The law enforcement program used this response to compare the suspect file to over four million items of known child pornography found in a law enforcement database, through a comparison of their “hash values,” which are unique characters associated with digital files. 2 If the “hash values” of a suspect file matched one found in the law enforcement database, the program would automatically generate a report containing the “hash value,” the name of the file, and the IP address of the computer that offered to share the file. Law enforcement personnel then used that information to conduct further investigation.

On 6 May 2009, the law enforcement program detected that an individual file of child pornography was present and available for sharing in a Limewire folder on a computer associated with a particular IP address. On 11 May 2009, the program repeated the query but no longer detected that file as present in the shared folder. It did, however, find a second file of child pornography there. The titles of these two files suggested sexual activity by 15- and 7-year-old children, and their “hash values” matched those for two child pornography videos found in a law enforcement database of known child pornography. The law enforcement program did not download either video onto the investigator’s computer. Subsequent queries by the law enforcement program in June, July and August 2009, did not receive any responses indicating this IP address had made child pornography available for sharing.

Through a subpoena served on the Internet service provider, investigators learned the relevant IP address was assigned to Appellant in his on-base dormitory room, where he lived alone. Appellant’s laptop computer was seized on 8 October 2009. A forensic examination of the computer’s contents was conducted by the Defense Computer Forensic Laboratory (DCFL).

1 Peer-to-peer file sharing is a means of obtaining and sharing files directly from other computer users who are connected to the Internet and who are also using the peer-to-peer file sharing software. Once the peer-to-peer file sharing software has been installed by the user, the user may interface directly with other computers that have the same file sharing software, and is able to browse and obtain files that have been made available for sharing on those other computers by typing search terms into the program’s search field. 2 The values are calculated using a mathematical algorithm and are also known as “Secure Hash Algorithm” (SHA) values. This mathematical figure will remain the same for an unchanged file, no matter where the file is found or on which computer the file is located. Changing the file name will not make a change to this value. Investigators compare the hash values of files in order to determine whether they are identical, a process described by the civilian investigator in this case as “thousands of times more reliable” than DNA testing.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Kotteakos v. United States
328 U.S. 750 (Supreme Court, 1946)
Barker v. Wingo
407 U.S. 514 (Supreme Court, 1972)
Delaware v. Van Arsdall
475 U.S. 673 (Supreme Court, 1986)
United States v. Flyer
633 F.3d 911 (Ninth Circuit, 2011)
United States v. Moreland
665 F.3d 137 (Fifth Circuit, 2011)
United States v. John Charles Kuchinski
469 F.3d 853 (Ninth Circuit, 2006)
United States v. Campbell
71 M.J. 19 (Court of Appeals for the Armed Forces, 2012)
United States v. Sweeney
70 M.J. 296 (Court of Appeals for the Armed Forces, 2011)
United States v. Arriaga
70 M.J. 51 (Court of Appeals for the Armed Forces, 2011)
United States v. Roach
69 M.J. 17 (Court of Appeals for the Armed Forces, 2010)
United States v. Clayton
67 M.J. 283 (Court of Appeals for the Armed Forces, 2009)
United States v. Navrestad
66 M.J. 262 (Court of Appeals for the Armed Forces, 2008)
United States v. Harcrow
66 M.J. 154 (Court of Appeals for the Armed Forces, 2008)
United States v. Rankin
64 M.J. 348 (Court of Appeals for the Armed Forces, 2007)
United States v. Harvey
64 M.J. 13 (Court of Appeals for the Armed Forces, 2006)
United States v. Allison
63 M.J. 365 (Court of Appeals for the Armed Forces, 2006)
United States v. Toohey
63 M.J. 353 (Court of Appeals for the Armed Forces, 2006)
United States v. Reyes
63 M.J. 265 (Court of Appeals for the Armed Forces, 2006)
United States v. Moreno
63 M.J. 129 (Court of Appeals for the Armed Forces, 2006)

Cite This Page — Counsel Stack

Bluebook (online)
United States v. Yohe, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-yohe-afcca-2015.