United States v. Buford

UNITED STATES AIR FORCE COURT OF CRIMINAL APPEALS U N I T E D S T A T E S, ) Misc. Dkt. No. 2013-26 Appellant ) ) v. ) ) ORDER Senior Airman (E-4) ) AARON M. BUFORD, ) USAF, ) Appellee ) Panel No. 1 ORR, Senior Judge: The military judge in this case determined a Security Forces member was acting in an official capacity when, at the appellee’s spouse’s request, the Security Forces member viewed and collected evidence from the appellee’s Facebook account, e-mail account, and thumb drive. In doing so, she ruled the Government violated the appellee’s reasonable expectation of privacy under the Fourth Amendment1 and suppressed all of the images and chat logs found on the appellee’s wife’s Dell laptop computer, the appellee’s Hewlett Packard laptop computer, and the appellee’s Centon thumb drive. The military judge further suppressed all derivative evidence. The Government claims the evidence was obtained lawfully, arguing the Security Forces member was not acting in an official capacity. The images and chat logs are the primary source of evidence showing the appellee wrongfully committed indecent conduct and wrongfully received and possessed child pornography in violation of Articles 120 and 134, UCMJ, 10 U.S.C. §§ 920, 934. After the military judge denied a request for reconsideration, the Government brought an appeal of her ruling under Article 62, UCMJ, 10 U.S.C. § 862. We heard oral argument on this issue on 16 January 2014.2 Jurisdiction and Standard of Review The United States may appeal “[a]n order or ruling of the military judge which terminates the proceedings with respect to a charge or specification” in a trial by court-martial in which a punitive discharge may be adjudged. Article 62(a)(1)(A), UCMJ, 10 U.S.C. § 862(a)(1)(A). Each of the dismissed specifications in this case carries a maximum punishment that includes a punitive discharge. Manual for 1 U.S CONST. amend. IV. 2 Senior Judge Orr took part in oral argument and drafted this opinion prior to his retirement. 1 Misc. Dkt. No. 2013-26 Courts-Martial (MCM), United States, Part IV, ¶ 68b.e. (2012 ed.); MCM, A27, ¶ 45.e.; MCM, A27, ¶ 87.e.; MCM, A28, ¶ 45.f.(6). We review de novo matters of law in appeals under Article 62, UCMJ. In ruling on issues under Article 62, UCMJ, we “may act only with respect to matters of law.” Article 62(b), UCMJ, 10 U.S.C. § 862(b). On matters of fact, we are bound by the military judge’s factual determinations unless they are unsupported by the record or clearly erroneous. United States v. Gore, 60 M.J. 178, 185 (C.A.A.F. 2004). “Nonetheless, in entering a finding of fact, the military judge must rely on evidence of record which fairly supports that finding; in the absence of any such evidence, the finding is error as a matter of law.” United States v. Bradford, 25 M.J. 181, 184 (C.M.A. 1987) (emphasis in original). We also review the judge’s ruling on the suppression motion for an abuse of discretion. United States v. Cote, 72 M.J. 41, 44 (C.A.A.F. 2013). “The courts may make a de novo ad hoc judgment on the meaning of relevant facts when dealing with constitutional issues.” Francis A. Gilligan & Fredric I. Lederer, Court-Martial Procedure § 25-83.00 (2d ed.1999) (citing United States v. Abell, 23 M.J. 99, 102-03 (C.M.A.1986)). “Similarly, the appellate courts normally should have the power to reverse when the trial judge misunderstood the legal significance of a fact found by the judge when that misunderstanding causes an error as to the court’s ultimate finding.” Id. (citing United States v. Shakur, 817 F.2d 189 (2d Cir.1987)). We have reviewed the military judge’s findings of fact and conclude that the findings are neither unsupported by the record nor clearly erroneous. We are thus bound by the military judge’s findings of fact and summarize them below. Military Judge’s Findings In March 2012, AB3, wife of the appellee, found a “fake” Facebook account that was associated with the appellee’s e-mail address. AB identified the page as a “fake” account because the name and photo associated with the account were not of the appellee, but the e-mail address belonged to him. She became curious and logged onto the appellee’s e-mail account. On or about 17 May 2012, Airman First Class (A1C) RM4 was an active duty Security Forces member who was at the home of CH. AB was also present in the home, but the appellee was not. At some point that evening, A1C RM noticed AB was distraught while she was looking at the screen of her Dell laptop. AB, knowing that A1C RM was a Security Forces member, asked him to look at the laptop where he saw the appellee’s “fake” Facebook page. While A1C RM thought it might involve 3 While noting that the appellee and his wife both have the initials AB, for the purpose of this order, AB is only in reference to the appellee’s wife and not the appellee. 4 Airman First Class (A1C) RM is no longer on active duty in the Air Force and is now Mr. RM. Nevertheless, during the entire timeframe he was involved in this investigation, he was an active duty Security Forces member. Therefore, for the purpose of this order, he will be referred to as A1C RM. 2 Misc. Dkt. No. 2013-26 something like the appellee cheating on his wife, A1C RM proceeded to search further for more information. He went into the “messages” section where he allegedly found multiple conversations with females, pictures of male genitalia, and other sexually explicit communication. A1C RM created “screen shots” of what he saw on the Facebook page as well as what was in the messages section. He saved these screen shots to a portable flash-drive. He then continued his search by going into the “Yahoo” e-mail account associated with the “fake” Facebook page using a password provided by AB. AB gave A1C RM consent to search her Dell laptop. However, the “fake” Facebook account and the associated e-mail account belonged to the appellee. The e-mail account was password protected. There was no evidence on how AB obtained the password to either of these accounts. Although the Facebook account and the e-mail account were accessed through AB’s laptop, they do not physically reside on the laptop. Based upon his law enforcement background, A1C RM encouraged AB to go to the Security Forces investigations flight chief. A1C RM drove her to the Security Forces Squadron (SFS) and explained to the SFS flight chief what was happening. The SFS flight chief looked at the information on the flash-drive and turned the case over to the Air Force Office of Special Investigations (AFOSI). In an interview with the AFOSI, AB provided a written statement and signed a form consenting to the search and seizure of a Dell laptop, a PN 8GB Flashdrive, and a one gigabyte memory card. Later that day, the AFOSI agents conducted a search of the joint residence of the appellee and AB. A1C RM informed AB, that based on his knowledge and experience investigations could take quite a bit of time, and that during that time she would not have access to any items she gave to the AFOSI. During the search, A1C RM acted as a “conduit” between AB and the AFOSI agents because “he was a cop and he could relate to them.” AB became upset when the AFOSI agents were seizing a video camera that contained photos and/or pictures of her son, so A1C RM, on her behalf, asked about a warrant. A1C RM “didn’t want [AFOSI] to overstep their bounds.” Because of A1C RM’s question about a warrant, the AFOSI agents stopped the search and obtained a warrant. After retuning with a warrant, they seized a Hewlett Packard (HP) laptop which belonged to the appellee. In early June 2012, AB gave A1C RM a Centon thumb drive5 that AB found behind the television in her home. A1C RM conducted his own “search” to see whether there was actually evidence on it. A1C RM opened multiple folders in the thumb drive, some of which contained work materials such as Air Force Instructions and others which contained pornography. Based on the information on the thumb drive, A1C RM determined it belonged to the appellee. A1C RM contacted an AFOSI agent to turn in the thumb drive. The AFOSI agents took possession of the thumb drive the next day. 5 We use “Centon thumb drive” or “thumb drive” throughout this order to distinguish it from the flash drive used by A1C RM on 17 May 2012 to save screenshots from his search of the appellee’s Facebook and e-mail account, which he conducted on AB’s Dell laptop. 3 Misc. Dkt. No. 2013-26 Although A1C RM stated he was not acting in his official capacity, his testimony was inconsistent with this position. A1C RM stated, “[AB] asked [me] to look at the laptop because [I] was a cop; that [I] began searching for and collecting evidence; that [I] didn’t want evidence to get lost; that [I]was going off [my] instincts as a SFS member; that [I] searched the messages section because [I] knew that’s where people hide stuff; that once [I] saw the names associated with the pictures [I] became more curious.” He also stated, “[I] encouraged [AB] to go to investigations and that [I] felt responsible until the laptop was turned over to SFOI then OSI.” An AFOSI agent testified that if AB had brought only the information regarding the adultery and “fake” Facebook account to their attention, they were unlikely to open an investigation. The agent’s impression of A1C RM was that he “took screen shots to preserve evidence; that he wanted to be involved in the investigation, and that the AFOSI agents actually questioned his motivation and whether or not he ‘planted’ evidence.” Discussion We accept the judge’s factual findings, which leaves us only to review her application of the law. In reviewing a military judge’s ruling on a motion to suppress, we review factfinding under the clearly-erroneous standard and conclusions of law under the de novo standard. We apply this standard when reviewing evidentiary rulings under Article 62(b), UCMJ. Therefore, on mixed questions of law and fact, a military judge abuses his discretion if his findings of fact are clearly erroneous or his conclusions of law are incorrect. The abuse of discretion standard calls for more than a mere difference of opinion. The challenged action must be arbitrary. . . , clearly unreasonable, or clearly erroneous. United States v. Wicks, 73 M.J. 93, 98 (C.A.A.F. 2014) (internal quotation marks and citations omitted). The military judge granted the defense motion to suppress after concluding that, although A1C RM stated he was not acting in an official capacity, his testimony led the military judge to believe otherwise. In support this ruling, the military judge stated A1C RM’s actions went far beyond those expected of a private citizen. The military judge noted the deficiencies in the Government’s argument and concluded that but for the actions of A1C RM, a “conduit” between AB and the AFOSI, the search of the Dell laptop would not have occurred. As a result, the Government had not proven by a preponderance of the evidence that the items seized and ultimately searched (the Dell Laptop, the Hewlett Packard Laptop and Centon thumb drive) were seized in accordance with the Fourth Amendment and the Military Rules of Evidence. 4 Misc. Dkt. No. 2013-26 Government Agent The Fourth Amendment protects the “right of the people to be secure in their persons, houses, papers and effects, against unreasonable searches and seizures.”6 The Supreme Court has determined that “[a] ‘search’ occurs when an expectation of privacy that society is prepared to consider reasonable is infringed[,]” and “a ‘seizure’ of property occurs when there is some meaningful interference with an individual’s possessory interests in that property.” United States v. Jacobsen, 466 U.S. 109, 113 (1984). It is well established that the protection against unreasonable searches and seizures only applies to Governmental action and is not applicable when effected by a private individual who is not acting as a Government agent or with participation or knowledge of any Governmental official. Id. When determining whether someone was acting as a Government agent, it does not matter what the person’s individual/subjective motivation may have been, you must look at the “degree of the Government’s participation in the private party’s activities, a question that can only be resolved ‘in light of all the circumstances.’” United States v. Daniels, 60 M.J. 69, 71 (C.A.A.F. 2004) (quoting Skinner v. Railway Labor Executives’ Ass’n, 489 U.S. 602, 614-15 (1989)). To trigger the Fourth Amendment in this way, it must be clear that the Government encouraged, endorsed, and participated in the challenged search. Id. Not every search by a military member constitutes a Government search. United States v. Volante, 16 C.M.R. 263, 266 (C.M.A. 1954). Our Superior Court has stated, “[A] search by a person duly assigned to law enforcement duty and made for the sole purpose of enforcing military law, is conducted by a person acting under the authority of the United States.” Id. However, not all searches by law enforcement individuals have been deemed Government searches. United States v. Portt, 21 M.J. 333 (C.M.A. 1986) (holding that a security policeman acted in his private capacity when he searched the accused’s locker out of curiosity while performing janitorial duties). Therefore, A1C RM’s status as a Security Forces member does not categorically make him a Government actor for the purpose of the searches at issue. Instead, the analysis is fact specific as to whether A1C RM was acting under the authority of the United States. Unlike the security policeman in Portt, in the case at hand, there is substantial evidence in the record of trial to support the finding that A1C RM was acting as a Government agent. Consistent with the military judge’s conclusions and in light of all the circumstances, we are convinced A1C RM acted as a Government agent for several reasons to include: (1) As a Security Forces member his job was to enforce the law; (2) A1C RM and AB were mere acquaintances prior to this investigation; (3) AB asked for A1C RM’s help knowing he was a law enforcement officer; (4) He actively inserted himself on multiple occasions into the role of an investigator both prior to and during the formal investigation; and (5) He participated in the challenged search and collected evidence for future law enforcement use. 6 U.S CONST. amend. IV. 5 Misc. Dkt. No. 2013-26 Because we concur with the military judge that A1C RM was acting as a Government agent, we then turn to whether his warrantless search fell within one of the few specifically established and well-delineated exceptions. Wicks, 73 M.J. at 99. Warrantless Search When the Government obtains evidence in a warrantless search that was conducted pursuant to one of the few specific exceptions allowing such a search, the Government bears the burden of establishing that the exception applies. Id. Voluntary consent to search by a person possessing authority is one of the “carefully drawn” exceptions. United States v. Weston, 67 M.J. 390, 392 (C.A.A.F. 2009). We concur with the military judge’s determination on the issue of consent. AB gave consent to the search of the Dell laptop and had both actual and apparent authority over that laptop. Nevertheless, we also agree that consent to search the Dell laptop did not extend to the Facebook and email accounts of the appellee. Consent to search an electronic device does not automatically extend to consent to search all electronic “papers” not contained on the device but accessed through the device. Here, A1C RM had clear indications the “fake” Facebook account and the e-mail account belonged to the appellee. The e-mail account was password protected. The evidence is that A1C RM should have known the e-mail account was not under the authority of AB. Cf. United States v. Gallagher, 66 M.J. 250 (2008) (“[A]bsent evidence tending to show that an officer should have known that the closed container was not under the authority of person who consented to the search, the search of a closed container belonging to a third party will be deemed reasonable.”) Although AB had knowledge of the password, this does not automatically result in a conclusion that she had actual or apparent authority over an otherwise private separate account maintained by her husband. In an Article 62, UCMJ, appeal for a motion to suppress, we review the evidence in the light most favorable to the prevailing party at trial. United States v. Barker, 70 M.J. 283, 288 (C.A.A.F. 2011). A third-party’s control over property or effects is a question of fact. United States v. Rader, 65 M.J. 30, 33 (C.A.A.F. 2007). We concur with the military judge’s ruling that the Government failed to meet its burden of establishing that the consent exception applied to the search of the Facebook and e-mail accounts. We next consider whether AB’s search of the appellee’s Facebook account amounted to a private search that frustrated the appellee’s expectation of privacy. There are two limitations to the private search exception: (1) The Government cannot conduct or participate in the private search; and (2) The Government may not go beyond the scope of the private party’s search, to include expanding the search into a general search. Wicks, 73 M.J. at 100. When applied to modern computerized devices such as laptops and cell phones, “[T]he scope of the private search can be measured by what the private actor actually viewed as opposed to what the private actor had access to view.” Wicks, 73 M.J. at 100. AB accessed the appellee’s Facebook and email accounts in March 2012 6 Misc. Dkt. No. 2013-26 and was accessing his Facebook account again on 17 May 2012 when she asked A1C RM to look at the account. Because the record is not clear about exactly what AB viewed during her private searches of the appellee’s Facebook messages and e-mail account, we are not convinced A1C RM’s subsequent search mirrored AB’s private search. Therefore, because we must review the evidence in the light most favorable to the prevailing party, Barker, 70 M.J. at 288, it is impossible for us to conclude the Government met the requirements of this exception. Therefore, the private search exception does not apply to these subsequent searches. Subsequent Search Warrant Next, we must determine whether the Government had proper search authority with regards to the HP laptop. The probable cause necessary to warrant a search cannot be based on illegally obtained information or evidence. United States v. Turck, 49 C.M.R. 49 (A.F.C.M.R. 1974). The search warrant used for the search of the home of AB and the appellant where the HP laptop was seized was based on information obtained by A1C RM’s unconstitutional search of the appellee’s Facebook and e-mail accounts. Therefore, the Government cannot rely on the subsequent search warrant as legal authorization to search the HP laptop. Consent Search We turn next to the Centon thumb drive. A few weeks after the AFOSI’s thorough search of her home, AB found a thumb drive near her television. AB provided the thumb drive to A1C RM. A1C RM then searched the thumb drive to determine if it contained any evidence. The thumb drive was not password protected. Because A1C RM was a Government agent, we examine to see if an exception applies. In this instance, we disagree with the military judge and conclude that AB was authorized to provide consent to the search of the thumb drive. “Where one party has joint access and control to a property and voluntarily consents to a search, the warrantless search is reasonable.” United States v. Weston, 67 M.J. 390, 393 (C.A.A.F. 2009). “Common authority over a home extends to all items within the home, unless the item reasonably appears to be within the exclusive domain of the third party.” Id. at 392. Here the thumb drive was in the home AB shared with the appellee. There is no evidence the thumb drive was in the exclusive domain of the appellee. In the context of personal computers and associated digital devices, “[C]ourts examine whether the relevant files were password-protected or whether the [appellee] otherwise manifested an intention to restrict third-party access.” United States v. Rader, 65 M.J. 30, 34 (C.A.A.F. 2007). Examining the evidence in the light most favorable to the appellee, (1) He had a thumb drive he solely used; (2) He left it in the common area of the house he shared with his wife; and (3) He did not password protect it to prevent her access to the device. The thumb drive is not like a cellphone or a laptop connected to the internet, it is a “static storage container” more akin to an electronic briefcase. Cf. Wicks, 73 M.J. at 102. Much like the briefcase in Gallagher, the thumb drive “was kept in a common area and opened without manipulation of the 7 Misc. Dkt. No. 2013-26 tumblers.” United States v. Gallagher, 66 M.J. 250, 254 (C.A.A.F. 2008). We conclude AB had common authority over this unsecured device in her home, and like any other unsecured storage device, she had the ability to consent to the search of the thumb drive. Because proper search authority was given by AB’s consent, the military judge abused her discretion in the application of the law by suppressing the evidence from the search of the Centon thumb drive. Similarly, the military judge found that AB gave consent to A1C RM to search the Dell laptop. AB also gave written consent for the AFOSI to search the Dell laptop when she provided it to the AFOSI on 18 May 2012. While there is some evidence that AB became upset as the AFOSI agents searched and planned to seize additional items from her home, there is no evidence that she ever revoked her consent to search her Dell laptop. For the reasons explained above, AB had actual and apparent authority over the Dell laptop and was able to provide consent to search the device. We distinguish the search of the hard drive which is a physical component of the laptop from using the laptop as a conduit to access electronic data through internet based services. We conclude that AB was able to consent to the search of the Dell laptop. The military judge abused her discretion in the application of the law as to AB’s consent to the search of the Dell laptop.7 Conclusion We hold the military judge did not err in granting the motion to suppress the evidence derived from the appellee’s Facebook account, e-mail account, and HP laptop. The military judge made detailed findings of facts supported by the record, accurately described the applicable law, and reasonably concluded the Government had not met its burden on the admissibility of those items of evidence. As such, with regards to the evidence derived from the appellee’s Facebook account, e-mail account, and HP laptop, the military judge did not abuse her discretion. We hold that the military judge erred when granting the motion to suppress the evidence contained on the Dell laptop and the Centon thumb drive. We remand the case to the trial court for further proceedings. On consideration of the Appeal by the United States under Article 62, UCMJ, it is by the Court on this 4th day of April, 2014, 7 As our fact finding power is limited during an Article 62 appeal, we leave as unresolved the issue as to whether the evidence obtained from the Dell laptop is evidence that was contained on the laptop prior to the illegal search or was derivative evidence that was created by the illegal search. 8 Misc. Dkt. No. 2013-26 ORDERED: That the Government’s appeal is hereby DENIED in part and GRANTED in part. The Government’s appeal is denied as to the suppression of evidence from the Hewlett-Packard (HP) laptop. The Government’s appeal is granted as to the suppression of evidence from the Dell laptop and Centon thumb drive. . HARNEY, Senior Judge, and MITCHELL, Judge, concur. FOR THE COURT STEVEN LUCAS Clerk of the Court 9 Misc. Dkt. No. 2013-26