UNITED STATES ARMY COURT OF CRIMINAL APPEALS
Before
JOHNSON, COOK, and BURTON
Appellate Military Judges
UNITED STATES, Appellee
v.
Specialist MATTHEW J. MCCLAIN
United States Army, Appellant
ARMY 20090446
Headquarters, Fort Drum
Andrew Glass, Military Judge
Lieutenant Colonel Steven P. Hester, Staff Judge Advocate (pretrial)
Lieutenant Colonel Michael O. Lacey, Staff Judge Advocate (post-trial)
For Appellant: Captain Matthew T. Grady, JA (argued); Colonel Mark Tellitocci, JA; Lieutenant
Colonel Imogene M. Jamison, JA; Major Laura R. Kesler, JA; Captain Matthew T. Grady, JA (on brief).
For Appellee: Captain Frank E. Kostik, Jr., JA (argued); Major Amber J. Williams, JA; Major
LaJohnne A. White, JA; Captain Frank E. Kostik, Jr., JA (on brief).
19 August 2011
---------------------------------
MEMORANDUM OPINION
---------------------------------
This opinion is issued as an unpublished opinion and, as such, does not serve as precedent.
BURTON, Judge:
A military judge, sitting as a general court-martial, convicted appellant, contrary to his
pleas, of one specification each of possession of child pornography and distribution of visual
depictions of minors engaging in sexually explicit conduct to internet users, in violation of
Article 134, Uniform Code of Military Justice, 10 U.S.C. § 934 [hereinafter UCMJ]. The military
judge sentenced appellant to a bad-conduct discharge, confinement for fourteen months, and reduction
to E1. The convening authority approved only so much of the sentence as provided for thirteen
months’ confinement and otherwise approved the adjudged sentence.
This case is before the court for review under Article 66, UCMJ. Appellant raised three assignments
of error, one of which merits discussion and relief. Appellant claims the evidence is legally and
factually insufficient to support his conviction for “distributing visual depictions of minors
engaging in sexually explicit conduct to internet users” in Specification 2 of The Charge. We
concur and take corrective action in our decretal paragraph.
BACKGROUND
In March 2008, Special Agent (SA) D, an investigator for the Naval Criminal Investigative Service
(NCIS), was conducting an undercover investigation for personnel distributing child pornography over
the internet. SA D testified that, using the Limewire peer-to-peer file sharing software, he could
view a file in another Limewire user’s shared file when (1) the other user was online with Limewire
actively running and (2) the complete file was located in the Limewire shared folder. As part of
the investigation, SA D found eleven video files he suspected contained child pornography in the
Limewire shared folder of a specific “Internet Protocol” (IP) address belonging to appellant. SA D
attempted to download all of the videos located in appellant’s folder, but was successful in
downloading only three files. There is no explanation in the record as to why he could not download
or view all of the videos he suspected contained child pornography. SA D downloaded two of the
files exclusively from appellant, but appellant was not charged with possessing or distributing
either of those videos. “Over 90 percent” of the third video was downloaded exclusively from
appellant.[1] Though appellant was charged with distributing this video, he was not charged with
its possession.
Appellant was charged with possession of four other video files containing child pornography in
violation of 18 U.S.C. § 2252A. SA D was unable to download those four videos directly from
appellant’s shared folder. However, using his file-sharing software, SA D was able to locate,
download, and view from other internet file-sharing users four of the same files that had been in
appellant’s shared folder. SA D testified that he believed the files were the same because they had
the same long titles, they were the same type of file, they were the same size, and they had a
shared “SHA1 value.”[2] In a sworn statement, appellant admitted to downloading child pornography
because he was “curious.”
With regard to SHA1 values, the military judge noted that he permitted SA D to testify that the SHA1
values from the files on appellant’s computer matched the files SA D suspected contained child
pornography that SA D downloaded from other users. He also noted that the defense “can certainly
argue that [the matching SHA1 numbers] do[es not] mean anything, because there’s no expert testimony
in front of the court that it does.”
LAW AND DISCUSSION
Appellant asserts the evidence was legally and factually insufficient to find him guilty of
“knowingly and wrongfully distribut[ing] by computer to internet users, visual depictions of minors
engaging in sexually explicit conduct . . . which conduct was of a nature to bring discredit upon
the armed forces.” We agree with appellant’s assertion; there is insufficient evidence in the
record that appellant distributed “visual depictions of minors engaged in sexually explicit
conduct.”[3]
It is undisputed that of the “approximately four” video files appellant was charged with
distributing in Specification 2 of The Charge, only one is alleged to contain “visual depictions of
minors engaged in sexually explicit conduct.” According to SA D’s testimony, that file was located
in appellant’s shared Limewire folder. Citing to United States v. Craig, appellant claims the facts
are legally insufficient to sustain a conviction for distribution because there is no evidence that
he “distribute[d] any videos as charged because there is zero evidence showing ‘the transfer of an
item from the possession of one person into the possession of another.” 67 M.J. 742, 745 (N.M. Ct.
Crim. App. 2009). Our superior court has relied on United States v. Shaffer, 472 F3d. 1219 (10th
Cir. 2007) in defining the term “distribute” within the context of the Child Pornography Protection
Act (CPPA). United States v. Kuemmerle, 67 M.J. 141, 144 (C.A.A.F. 2009). In Kuemmerle the Court
of Appeals for the Armed Forces (C.A.A.F.) held that posting an image in a shared folder where
another user accessed and viewed an image of child pornography constituted “distribution” under the
CPPA. Id.
Our sister court, looking specifically at peer-to-peer file sharing, held that distribution can
occur for purposes of the CPPA where images are kept in a peer-to-peer file sharing application if
the images “were downloaded to other subscribers of the application.” United States v. Craig, 67
M.J. 742, 745 (N.M. Ct. Crim. App. 2009), aff’d 68 M.J. 399 (C.A.A.F. 2010). However, the Navy-
Marine Corps Court noted that the C.A.A.F. “specifically declined in Kuemmerle to decide whether
‘posting an image’ alone may constitute distribution.” 67 M.J. at 745. The court then “conclude[d]
that [it had] no authority to include incomplete transfers of possession within the meaning of
‘distribute’ as it relates to child pornography.” Id. at 746.
We note appellant was not charged under an assimilated CPPA violation through clause 3 of Article
134, UCMJ. Rather, he was charged under clauses one and two of Article 134, UCMJ, and convicted
only of a violation of clause two. We need not determine whether making available a file containing
child pornography in peer-to-peer file sharing folders constitutes “delivery” under clause 2 of
Article 134, UCMJ, because we have insufficient evidence that what appellant “distributed” to SA D
was child pornography. There is insufficient evidence in the record to show that the estimated “90
percent” of the file SA D downloaded from appellant contained “visual depictions of minors engaging
in sexually explicit conduct.” SA D testified that his attempts to download the file exclusively
from appellant failed and he received parts of the video from other internet users. It is
impossible to tell which part of the viewable file SA D received from appellant and which he
received from other internet users. Upon our review of the video file in question, we note the file
contains some images that are not “visual depictions of minors engaged in sexually explicit
conduct.” It is impossible to discern from the record what the portion of the file SA D downloaded
from appellant actually contained versus what was downloaded from other internet users. It is also
impossible to determine if the estimated 90 percent of the file downloaded from the appellant was
viewable. Thus, we are not convinced beyond a reasonable doubt that the estimated 90 percent of the
video file appellant is alleged to have distributed to SA D in Specification 2 of The Charge
actually contained prohibited material.
The government alternately urges us to affirm a lesser-included offense of attempt under Article 80,
UCMJ. We are unable to do so—no evidence supports a finding that appellant had the specific intent
to distribute child pornography. Neither can we support an inference of such. Appellant testified
at the time of trial he “still [did not] know what a shared folder” was and was not aware of whether
he had a shared folder on his computer. He specifically stated he “didn’t know that somebody could
come in and access whatever you had on your computer and take it.” He believed the images he
downloaded came from “the internet” and not from other Limewire users. He also testified that he
believed he had deleted the one image that he had viewed by hitting a “red ‘X’ in Limewire.” We
distinguish this case from Shaffer, where the appellant “concede[d] that ‘[h]e allowed, or caused,
distribution by leaving his files on his computer that other [peer-to-peer software] users could
access.” 472 F.3d at 1223. We are not convinced beyond a reasonable doubt appellant maintained the
specific intent to place child pornography in a shared, peer-to-peer software program and make that
child pornography available for viewing or downloading by other Limewire users. Thus, we cannot
affirm a lesser-included offense of attempted distribution. Because we find the evidence legally
and factually insufficient to support a conviction for distribution of “visual depictions of minors
engaging in sexually explicit conduct” or a lesser-included offense of attempted distribution, we
must set aside the specification.
Conclusion
Upon consideration of the entire record, including those matters personally specified by
appellant pursuant to United States v. Grostefon, 12 M.J. 431 (C.M.A. 1982), the finding of guilty
of Specification 2 of the Charge is set aside and that Specification is dismissed. The remaining
findings of guilty are affirmed. Reassessing the sentence on the basis of the errors noted, the
entire record, and in accordance with the principles of United States v. Sales, 22 M.J. 305 (C.M.A.)
and United States v. Moffeit, 63 M.J. 40 (C.A.A.F. 2006), including the factors identified by Judge
Baker in his concurring opinion, the court affirms the approved sentence.
Senior Judge JOHNSON and Judge COOK concur.
FOR THE COURT:
MALCOLM H. SQUIRES, JR.
Clerk of Court
-----------------------
[1] SA D testified at an Article 39(a), UCMJ, session that he downloaded the file from multiple
users because it helped increase the download speed of the file.
[2] Because SA D testified as a lay witness under Military Rule of Evidence [hereinafter Mil. R.
Evid.] 701, the military judge refused to consider evidence about what a “SHA1” value was.
[3] Because of the corrective action we take in this case, we need not address appellant’s assertion
that the evidence was not legally and factually sufficient to find his conduct for Specification 2
of The Charge was of a nature to bring discredit upon the armed forces under clause 2 of Article
134, UCMJ.