UNITED STATES, Appellee
v.
Andrew P. OBER, Specialist
U.S. Army, Appellant
No. 07-0722
Crim. App. No. 20040081
United States Court of Appeals for the Armed Forces
Argued March 17, 2008
Decided June 16, 2008
EFFRON, C.J., delivered the opinion of the Court, in which
BAKER, STUCKY, and RYAN, JJ., joined. ERDMANN, J., filed a
dissenting opinion.
Counsel
For Appellant: Captain William J. Stephens (argued); Major
Teresa L. Raymond (on brief); Lieutenant Colonel Steven C.
Henricks, Captain Seth A. Director, and Captain Sean F. Mangan.
For Appellee: Captain Larry W. Downend (argued); Colonel John
W. Miller II and Major Elizabeth G. Marotta (on brief).
Military Judges: Debra L. Boudreau (arraignment) and Gregory A.
Gross (trial)
THIS OPINION IS SUBJECT TO REVISION BEFORE FINAL PUBLICATION.
United States v. Ober, No. 07-0722/AR
Chief Judge EFFRON delivered the opinion of the Court.
A general court-martial composed of officer and enlisted
members convicted Appellant, contrary to his pleas, of making a
false official statement, knowingly and wrongfully transporting
child pornography in interstate commerce, and knowingly and
wrongfully possessing child pornography, in violation of
Articles 107 and 134, Uniform Code of Military Justice (UCMJ),
10 U.S.C. §§ 907, 934 (2000). The sentence adjudged by the
court-martial included confinement for three years, a
dishonorable discharge, forfeiture of all pay and allowances,
and reduction to the lowest enlisted grade. The convening
authority approved confinement for thirty months and approved
the balance of the sentence. The United States Army Court of
Criminal Appeals affirmed. United States v. Ober, No. ARMY
20040081 (A. Ct. Crim. App. May 25, 2007) (unpublished).
On Appellant’s petition, we granted review of the following
issues:
I. WHETHER THE EVIDENCE IS LEGALLY INSUFFICIENT TO
SUPPORT A FINDING OF GUILT FOR TRANSPORTING CHILD
PORNOGRAPHY IN INTERSTATE COMMERCE WHEN NO
EVIDENCE EXISTS THAT APPELLANT UPLOADED CHILD
PORNOGRAPHY FROM HIS COMPUTER TO THE INTERNET
FILE-SHARING PROGRAM “KAZAA.”
II. WHETHER THE ARMY COURT ERRED IN AFFIRMING THE
FINDING OF GUILTY FOR SPECIFICATION 1 OF CHARGE I
WHEN THE COURT AFFIRMED UNDER A DIFFERENT THEORY
OF LIABILITY THAN WAS PROFFERED TO THE MILITARY
PANEL, IN CONTRAVENTION OF CHIARELLA v. UNITED
STATES, 445 U.S. 222 (1980).
2
United States v. Ober, No. 07-0722/AR
III. WHETHER THE MILITARY JUDGE FAILED TO PROPERLY
INSTRUCT THE PANEL ON THE ELEMENTS FOR
SPECIFICATION 1 OF CHARGE I, BY: (1) OMITTING
THE CHARGED LANGUAGE “CAUSE TO BE TRANSPORTED”
FROM THE ORAL AND WRITTEN INSTRUCTIONS; (2)
FAILING TO INSTRUCT ON A POSSIBLE GOVERNMENT
ALTERNATE THEORY OF LIABILITY UNDER ARTICLE 77,
UCMJ; AND (3) FAILING TO PROPERLY INSTRUCT ON THE
TERM “UPLOADING” WHEN THE COMPUTER EXPERTS AT
TRIAL PROVIDED TWO VARYING DEFINITIONS.
For the reasons set forth below, we affirm.
I. BACKGROUND
The present appeal focuses on the circumstances under which
child pornography was obtained through the use of Appellant’s
computer. The prosecution’s primary theory was that Appellant
used a peer-to-peer file sharing program to obtain child
pornography from other participants in the file sharing network.
The primary defense theory of the case was that other
individuals were responsible because they had access to
Appellant’s computer, Appellant had an alibi for the times when
child pornography was transported to the computer, and there was
ample exculpatory evidence to place the blame on others.
Section A describes the file sharing program at issue in
this case. Section B summarizes the evidence developed during
the initial investigation. Section C sets forth the evidence
and the theories presented by the parties at trial.
3
United States v. Ober, No. 07-0722/AR
A. APPELLANT’S FILE SHARING PROGRAM
Appellant built a computer from individual parts, which he
maintained in his barracks room. He also created a network that
connected his computer with the computers of three other
soldiers in the barracks, enabling them to utilize his high-
speed Internet connection. The computers on the network
included the computer of Appellant’s roommate, Specialist B.
Appellant permitted Specialist B and several other soldiers to
use his computer.
Appellant installed various programs on his computer,
including KaZaA, a peer-to-peer file sharing program.1 According
to expert testimony introduced at trial, the KaZaA program
installed on Appellant’s computer enabled KaZaA users to share
computer files, including music, movies, and images, over the
Internet with other KaZaA users.
The KaZaA program provided two primary means of moving
files between users of the program. In the first method, a
KaZaA user who wanted to make files hosted on his or her
computer available to other KaZaA users could do so by
configuring the KaZaA program preferences to permit access by
others. Setting the preferences involved a simple adjustment
1
The opinion of the court below and the parties’ briefs refer to
various spellings of the program’s name. For purposes of this
opinion, we use the spelling reflected in the record of trial.
4
United States v. Ober, No. 07-0722/AR
that could be changed at will by the host computer’s user to
enable or preclude access to files by other KaZaA users.
In the second method, the KaZaA program enabled a user to
utilize a search function, similar to an Internet web browser,
to obtain files hosted on the computers of other KaZaA users.
To obtain files from other computers, the KaZaA user would open
the KaZaA program and enter a search term. In response to the
search request, the KaZaA program would display a list of file
names and descriptions obtained from other KaZaA users whose
preferences permitted such access. The KaZaA user who initiated
the search could then view the names and file descriptions
identified by the search and double click on the name of the
files that the user wanted to obtain. The download process
would begin once the user double clicked on the desired file.
The KaZaA program would complete the download without further
action by the user. The KaZaA user could limit the number of
downloads that could take place at any one time. If the host
logged out of the KaZaA program or otherwise blocked access to a
file before the requested download was completed, the KaZaA
program would attempt to obtain the file from another available
user or would reinitiate the download when the host subsequently
reopened the KaZaA program. Through the search function, the
KaZaA program enabled the user, through a series of keystrokes,
to identify a file, upload the file from the host computer, and
5
United States v. Ober, No. 07-0722/AR
download the file to the user’s computer. From the perspective
of the KaZaA user seeking to obtain a file hosted by another
computer, the actions of uploading and downloading were part of
a continuous process managed by that user.
B. THE INITIAL INVESTIGATION
Appellant spent a substantial amount of his free time
maintaining and upgrading his computer. The chain of events
leading to the present case began when he returned from shopping
for a computer device and thought that he was locked out of his
third-floor barracks room. He attempted to enter through an
outside window, but fell to the ground and suffered a serious
injury requiring about a week of hospitalization and thirty days
of convalescent leave.
While Appellant was absent from the barracks on
convalescent leave, Specialist B and another soldier used
Appellant’s computer to play video games. As they were perusing
his files for other available video games, they came across a
file titled “13 year old,” located in a KaZaA folder. They
opened the file, saw a picture of a young, naked female, and
closed the file. At that time, they did not advise anyone of
what they had seen. A month later, Specialist B mentioned the
incident in the course of a casual conversation with a
noncommissioned officer. After an initial inquiry by the
6
United States v. Ober, No. 07-0722/AR
noncommissioned officer, the Army’s Criminal Investigation
Command (CID) initiated a formal investigation.
CID agents obtained a statement from Appellant in which he
acknowledged using his computer to access adult pornography but
denied using it to access child pornography. In the course of
the interview, Appellant provided CID with consent to examine
the hard drive of his computer.
CID arranged for an analysis of the hard drive by a
forensic expert. The forensic analysis identified 592 files
containing possible child pornography on the hard drive,
including 460 files located in a KaZaA folder. At the time of
the forensic analysis, the preferences for the KaZaA program on
Appellant’s computer were set to: (1) permit the user to obtain
files from other KaZaA users and download up to ten files at a
time; and (2) preclude other KaZaA users from obtaining files
from Appellant’s computer.
In a second interview with CID, Appellant stated that he
had downloaded and saved approximately forty files containing
child pornography on his computer. He acknowledged that he had
been viewing child pornography on his computer “[o]nce every two
weeks” for about eight months, and that he knew that it was
illegal to view and download child pornography. When asked
whether he knew that the files contained pictures of children
before he opened the files and viewed them, he said: “Some of
7
United States v. Ober, No. 07-0722/AR
the pictures did not have accurate descriptions of what was in
the file. Others had a description. I knew that some of the
files would contain underage people in the pictures before I
opened them.” In response to the question of whether he saved
some of the pictures, he stated: “You can’t open the pictures
until you download them. After I downloaded the pictures and
viewed them I never deleted them.” When asked whether he had
passed on the child pornography to anyone else through the
computer, he responded: “No.” Appellant explained that in his
previous statement to CID agents, he had denied using his
computer to view child pornography because he was afraid of the
consequences. In addition, Appellant stated that he had acted
out of a lack of self-control and he knew that what he did was
wrong.
Following the investigation, the Government charged
Appellant with three offenses: (1) transporting child
pornography in violation of Article 134, UCMJ; (2) possessing
child pornography in violation of Article 134, UCMJ; and (3)
making a false official statement about the use of his computer
to access child pornography in violation of Article 107, UCMJ.
The present appeal focuses primarily on the first offense, in
which Appellant was convicted of a charge that he “did . . .
knowingly and wrongfully cause to be transported in interstate
commerce child pornography by uploading pictures of child
8
United States v. Ober, No. 07-0722/AR
pornography to a shared internet file named ‘KAZAA’, in
violation of 18 U.S.C. 2252A(a)(1).”
C. DEVELOPMENTS AT TRIAL
1. The prosecution and defense theories of the case
The prosecution, in its opening statement, advised the
members that the evidence would show that Appellant “searched
for, possessed, stored, shared, and viewed child pornography on
his personal computer” and that “the evidence is going to show .
. . that he was downloading child pornography on [his]
computer.” The prosecution stated that it would offer expert
testimony to show that the KaZaA program “allows subscribers to
download files.” The prosecution also noted that the expert
testimony would show that KaZaA “allows subscribers to upload
their own personal files and retrieve files from other
computers, and that these pornographic images, these movies, and
these still photographs were obtained via this file sharing
program.” The prosecution described two methods used by
Appellant to transport pornography: (1) Appellant “downloaded
these images and possessed them on his computer”; and (2) “he
allowed others to view them as they were transmitted from his
computer.”
Defense counsel, in his opening statement, observed that
“if what the government promises you is true, it looked like
they’ve got a pretty good case.” Defense counsel reminded the
9
United States v. Ober, No. 07-0722/AR
panel that the issues of “alibi” and “false confessions” had
been discussed during voir dire.
With respect to the forensic evidence, counsel emphasized
that the defense was going to focus on whether the evidence
established that Appellant was the person responsible for the
child pornography on his computer:
They’re going to bring in detectives to show you
there’s child pornography on this computer; and they
may, in fact, show you that there is real child
pornography on the computer, but the issue here is
that the government’s got the wrong guy. Now that may
be hard to believe based on what you’ve heard.
Now, what the defense is going to ask you to do
is take a look as this case develops, keep an open
mind, and see how good a job CID did do, how good a
job the Defense Computer Forensic Lab did. Take a
look at Specialist Ober and figure out if this is
really the right guy for this crime.
Defense counsel proceeded to detail the defense theory of
the case, based on alibi and exculpatory evidence: many others
had direct access to Appellant’s computer and access through the
network established by Appellant; Appellant was in the field or
on leave for extended periods when others had access to the
computer; and his admissions to CID agents were the product of
traumatic brain injury and stress. Defense counsel told the
members that “at the end of this trial you’re going to see the
government does have the wrong guy.”
10
United States v. Ober, No. 07-0722/AR
2. Evidence presented by the prosecution
The prosecution introduced into evidence Appellant’s
confession that he downloaded child pornography on his computer
knowing that it was illegal to do so, as well as related
testimony regarding the circumstances surrounding the CID
investigation and interrogation of Appellant. The prosecution
also introduced into evidence specific images of the alleged
child pornography, as well as expert testimony identifying the
images as depictions of actual children. The defense stipulated
that certain of the images consisted of child pornography of
actual children.
The prosecution presented the testimony of a computer
forensics expert, Jason Upchurch, regarding the alleged child
pornography on Appellant’s computer. The evidence presented by
Mr. Upchurch indicated that there were 592 images of possible
child pornography on the hard drive of Appellant’s computer, and
that the majority of the images were in the folder used for
sharing files through KaZaA. Mr. Upchurch testified that there
was no evidence that a computer virus had placed the pornography
on the hard drive.
In response to a question from the prosecution, Mr.
Upchurch noted that from his analysis, he could not determine
the individual responsible for the images on Appellant’s
computer. Mr. Upchurch explained: “We can determine in most
11
United States v. Ober, No. 07-0722/AR
cases . . . which account it came from, as well as, file dates
and times; but as far as who put the images there, no, we can’t
determine that.” When asked whether there were “any pointers”
to Appellant as “the individual who downloaded the child
pornography found on the computer,” Mr. Upchurch testified that
“the majority of the images belonged to the account called
‘Oberator,’ as well as, the computer was registered to a Mr.
Ober.”
Mr. Upchurch testified that the KaZaA preferences on
Appellant’s computer were set so that Appellant could obtain
files from other KaZaA users. The settings permitted him to
“download 10 files at a time,” which was “a fairly optimized
setting to maximize your download.”
Mr. Upchurch explained how files were moved to Appellant’s
computer using KaZaA. He noted that there were “many versions”
of KaZaA, and the version on Appellant’s computer operated as a
modified web browser. When the computer was turned on and the
Internet connection was active, the user of the KaZaA program
could “click on the search button,” which enabled the user to
“search for anything from movies to music or any other files by
either keywords or file name.” The KaZaA program also provided
the user with the ability to search for particular types of
files by descriptions.
12
United States v. Ober, No. 07-0722/AR
According to Mr. Upchurch, KaZaA would not cause child
pornography to be downloaded on the computer without the user’s
knowledge. He explained the specific actions that a user would
have to take to obtain files from another computer using KaZaA:
When you do the search it doesn’t automatically
download everything. All it does is present you with
files to download. So you go through and look at
which files that you particularly want to download,
the human element in it, and download those particular
files. So the search term gives you the results, and
then a human goes in and picks those results.
The expert added that the user could not view the image
based upon the results of the search. The user first had to
make a determination whether to download the file based upon the
file name and other information associated with the file. He
added that with regard to some of the child pornography found in
the KaZaA file on Appellant’s computer, the file names and other
information associated with the files were consistent with the
age of the children depicted in the images.
The expert further explained the process used by KaZaA to
obtain files selected by the user from another computer:
[I]f the computer is on and KaZaA is running and
you’ve selected files, KaZaA will continue to try to
download those continuously until you tell it to stop.
Even if at the other end if somebody logs off and the
. . . file transfer is stopped because the other end
is no longer available[, w]hen that other end comes
back up KaZaA will see that and begin downloading
again from the . . . same user because it all actually
keeps track of files . . . .
13
United States v. Ober, No. 07-0722/AR
Q. So the user can be away from the computer at the
time that the --
A. Absolutely, days, weeks, yes.
At the time Appellant’s computer was seized, the settings
for the KaZaA program were set to prohibit other users from
obtaining files from Appellant’s computer. However, there was
no way to determine when those settings took effect.
Defense counsel used the cross-examination of Mr. Upchurch
to confirm that other KaZaA users could not upload files from
Appellant’s computer when the file sharing option was turned
off. Counsel then focused on the dates that files were
downloaded and accessed on Appellant’s computer, with a view
toward showing that someone other than Appellant had downloaded
the files. On recross-examination, defense counsel again
focused on questions that would suggest that Appellant was not
the person who obtained the files.
During cross-examination of the other Government witnesses,
defense counsel pointed to evidence that other individuals had
access to Appellant’s computer and the potential that others may
have been responsible for the child pornography on his computer,
the impact of the injury from Appellant’s fall on his cognitive
abilities and emotional state, the extended period in which
Appellant was not in his barracks room, and related matters
concerning the reliability of his confession.
14
United States v. Ober, No. 07-0722/AR
3. Motion to dismiss
At the conclusion of the prosecution’s case, the defense
moved to dismiss the transportation of child pornography charge
(Specification 1 of Charge I) on two grounds. First, the
defense asserted that the prosecution “has failed to prove the
element of distribution.” Second, the defense contended that
the prosecution “has failed to show any evidence that pictures
were uploaded to the KaZaA file. All the evidence that came in
this case indicated that pictures were downloaded to that file .
. . .”
The prosecution responded that the charged offense at issue
involved transportation, not distribution, of child pornography.
The prosecution also noted that the manner in which a user of
the KaZaA program obtained a file involved transportation:
“Specification 1 merely requires that we show that child
pornography was transported via the Internet so even by virtue
of conducting a search and accessing child pornography from
another KaZaA user that causes that particular image to be
transported via the Internet.”
The military judge observed that Appellant was charged with
transporting, not distributing, child pornography; that he would
give the members a definition of transporting; and that there
was enough evidence on every element of the offense for the
15
United States v. Ober, No. 07-0722/AR
issue to be decided by the panel rather than by a motion to
dismiss.
4. The defense
Appellant testified as the first witness called by the
defense. In response to defense counsel’s question as to
whether he committed the charged offenses, he responded: “No.
I never did the offenses I’m accused of.” He detailed the
number of other individuals who had access to his computer. He
also stated that he was not protective of his password, that he
rarely logged off of his computer, that he frequently kept the
computer on when he left his room, and that he was frequently
away from his room performing assignments in the field.
Appellant explained that other individuals who had access to his
computer had an interest in pornography. He testified that his
fall from the third floor of the barracks left him barely
conscious, unable to eat, and fatigued, that he spent time on
convalescent leave away from the base, and that the accident
affected his memory and his performance.
Appellant acknowledged that he used the KaZaA program on
his computer, that he had viewed adult pornography on his
computer, and that child pornography was found on his computer.
He denied downloading the child pornography himself or knowing
that it was there before CID confronted him with the accusation.
He stated that he confessed to downloading child pornography
16
United States v. Ober, No. 07-0722/AR
during his second interview with CID because of his brain
injury. Appellant testified that after a CID agent accused him
of offenses involving child pornography, he felt his situation
was hopeless. Appellant further explained that the agent told
him that if he cooperated, the command would go easy on him.
Appellant stated that the confession he gave to the CID agent
was not true.
With respect to KaZaA, Appellant testified that it “was
accessible to everyone.” He added: “I used KaZaA to download
music, and -- music was pretty much all I downloaded.” He
stated that he did not use KaZaA to download any pornography,
child or adult.
The defense presented the testimony of a computer forensics
expert who had performed an examination of Appellant’s computer
similar to the examination conducted by the prosecution’s
expert. The defense expert testified that he reviewed the
computer files at issue in the present case to determine where
in the hard drive they were located, the dates and times
associated with the files, and “where those files came from.”
He also sought to determine whether other individuals had
connected to Appellant’s computer, and identified information
indicating that at a particular time “someone was on this
computer system, and the name does not correspond with the
defendant.” When the trial counsel questioned the relevance of
17
United States v. Ober, No. 07-0722/AR
the defense expert’s testimony, defense counsel responded:
“[F]irst we’re showing alibi, and the second portion is for
showing that other people used Specialist Ober’s computer, and
that goes to possible exculpatory evidence.” The military judge
overruled the prosecution’s objection. The expert then
testified that there was information indicating that a person
with a user name other than the name typically employed by
Appellant used the computer at the time that child pornography
“came into the system” onto Appellant’s computer, and that the
date in question was a date on which Appellant was in the
hospital.
In response to questions from the military judge about the
meaning of the “File Created” designation on the computer, the
defense expert noted that the date of creation would be “the
date that [the] file was, in this situation, brought in . . .
from KaZaA.” The expert also noted that files could be added to
the hard drive without a person actually sitting at the computer
if the person had scheduled the downloads to take place on a
particular date.
The military judge asked about the relationship between
“download” and “upload.” The defense expert responded that
downloading “is brining [sic] something to you.” He then noted
that uploading could involve two different types of activity by
the user of the computer hosting the files: first, “if you had
18
United States v. Ober, No. 07-0722/AR
an open portal where you’re allowing somebody to take away from
you,” and second, if “you’re physically going out and sending
something out.”
The military judge then asked the defense expert whether it
would be “fair to make an analysis or an analogy that
downloading is pulling, and uploading is pushing.” The expert
responded that the evidence in the present case involved the
host allowing another user to obtain the material from the
host’s computer:
In this situation, which we really didn’t see any
uploading going on, but in that type of situation it’s
-- if you were to open up the portal you are letting
people pull it from you. You’re not pushing it to
them.
The expert also testified that he had seen no evidence that
files from Appellant’s computer had been pulled to another
computer, but the expert noted that he did not have the
equipment necessary to verify that determination. In addition,
the expert stated that files could have been placed on
Appellant’s hard drive by another computer in the network.
The military judge then asked the defense expert whether it
was necessary for a person to participate actively in the
physical downloading of material from KaZaA:
Q. Could a file that is on that hard drive that came
from KaZaA . . . be inserted or put onto that hard
drive, whatever the correct term might be, without
someone sitting at the computer and downloading that?
19
United States v. Ober, No. 07-0722/AR
A. That’s always possible. Yes.
In response to a question from the prosecution, the expert
clarified that a download from KaZaA might be initiated by a
virus; otherwise, however, it would be necessary for an
individual to start the download by clicking on a file.
During recross-examination by the prosecution, the defense
expert witness emphasized that: “[I]f you are using KaZaA you
are actually searching for something.” The expert also
explained that a download may not be completed on the day that
the user first seeks to obtain the material. For example, if
the user of the host computer prevented access to a particular
file during the downloading process, that file could not be
downloaded. In such a case, KaZaA would continue searching, and
once another host opened up the file to permit access, KaZaA
would complete the download of the file. Similarly, if the
requested file was large, or if a user’s KaZaA settings limited
the number of downloads, the download might take place on a
different day.
The military judge asked the defense expert about the
origin of files downloaded through KaZaA. The expert reflected
his agreement with the description of KaZaA offered by the
prosecution’s expert:
KaZaA is just a tool, for instance, like Mr. Upchurch
had said it’s like a browser and you’re looking at the
whole Internet and other folks who have KaZaA running
20
United States v. Ober, No. 07-0722/AR
and shares running on their computer systems. You --
depending on the software, if you’re using their
versions you can get an address of who it’s coming
from, but it’s coming from somebody else’s computer
generally out there on the World Wide Web.
The expert’s answers to a member’s questions clarified that the
expert was able to identify use by different user names, but not
by specific individuals.
5. Rebuttal
In rebuttal, the prosecution recalled Mr. Upchurch to
discuss the evidence in light of the defense theories that
others had used Appellant’s computer at the time child
pornography had been obtained. During the rebuttal testimony,
the military judge asked the expert whether any action was
required on the part of the owner of the host computer beyond
making the host computer’s files available through the KaZaA
settings:
Q. Mr. Upchurch, another question that was asked in
this case was the definition of upload. I believe Mr.
Lakes stated that when you -- uploading something is
actually -- is not necessarily receiving --
A. Giving.
Q. Giving. Right. Now, on KaZaA when a user
conducts a search on KaZaA or if you download a file
from KaZaA, what happens on the computer that you’re
downloading from, on the actual user that you’re
trying to share from? What happens on that computer?
A. So if I was downloading a file from my computer --
from someone else’s computer, what happens on the
other person’s computer?
21
United States v. Ober, No. 07-0722/AR
Q. On the other person’s computer if you seek to
access a file on the other computer?
A. It causes an upload to occur on the other person’s
computer.
Q. Okay, and is that -- does that person have to
specifically do anything to cause that upload?
A. No. Everything is done prior in his settings.
Q. So by virtue of the software you can cause the
uploading [of] something on another individual’s
computer?
A. On your computer.
Q. On your computer?
A. Yes, on your computer.
In its cross-examination of Mr. Upchurch, the defense
focused on matters related to Appellant’s alibi defense,
suggesting that the use of the computer to play a particular
computer game pointed to another individual as the user. The
defense did not challenge Mr. Upchurch’s explanation of the
process used to obtain files by KaZaA.
At one point during Mr. Upchurch’s testimony, he identified
a series of dates and times that suspected child pornography was
created and accessed on Appellant’s computer. The military
judge specifically instructed the members that the information
about dates was being offered in regards to the defense of
alibi; that the defense had stipulated that several of the
images consisted of actual minors; and that it was the panel’s
22
United States v. Ober, No. 07-0722/AR
responsibility to decide whether the other images consisted of
real children.
6. The military judge’s instructions to the panel
The military judge provided the parties with his proposed
instructions. He noted for the record that he had “asked if
there were any specific instructions that either side wanted”
and that the parties had replied in the negative. Later,
following argument, the military judge asked if there were any
objections to the instructions or requests for additional
instructions, and noted that no objections were made.
The military judge instructed the members regarding the
transporting charge:
In Specification 1 of Charge I, the accused is
charged with the offense of knowingly transporting
child pornography in interstate commerce, in violation
of Title 10 [sic], U.S. Code, Section 2252A(a)(1). In
order to find the accused guilty of this offense, you
must be convinced by legal and competent evidence
beyond a reasonable doubt:
One, that on or about and between 1 April 2002
and 27 December 2002, at Fort Hood, Texas, the accused
knowingly transported material containing one or more
visual depictions by uploading the material to a
shared Internet file named KaZaA . . . .
The military judge provided further instructions on the
remaining elements of the transporting charge, along with
specific instructions on the terms “wrongful,” “visual
depiction,” “minor,” “sexually explicit conduct,” “lascivious,”
“interstate commerce,” and “knowingly.”
23
United States v. Ober, No. 07-0722/AR
In defining “visual depiction,” the military judge noted
that the term “includes . . . data stored on a computer disk or
hard drive or by electronic means, which is capable of
conversion into a visual image.” With respect to interstate
commerce, the military judge stated:
Material traveling over the Internet, by its very
nature, is within the definition of interstate
commerce. The use of the Internet to send an image
from one computer to another constitutes transporting
the image in interstate commerce even if the receiving
computer and the sending computer are located in the
same state.
With respect to the term “knowingly,” the military judge
explained that the accused must have known the “nature and
character of the material being transported . . . that it was a
minor engaged in sexually explicit conduct.” He added that
“while the accused did not have to know that he was placing the
items in interstate commerce, the items must have actually been
transported in interstate commerce.”
The military judge’s instructions also expressly recognized
Appellant’s alibi defense:
The evidence has raised the defense of alibi in
relation to the offense of transporting child
pornography. “Alibi” means that the accused could not
have committed the offense charged because the accused
was at another place when the offense occurred. Alibi
is a complete defense to the offense of transporting
child pornography. In this regard, there has been
evidence that the accused was in the field and/or on
leave during portions of time alleged in the
specification.
24
United States v. Ober, No. 07-0722/AR
The burden is on the prosecution to establish the
guilt of the accused. If you are convinced by [sic] a
reasonable doubt that the accused was present at the
time and place of the alleged offense, then the
defense of alibi does not exist.
The military judge’s instructions provided that the offense
of transporting was not limited to the question of whether the
accused committed the offense by uploading:
[I]f you have doubt that the alleged material was
transported by uploading, you may still reach a
finding of guilty so long as the elements of the
offense are proved beyond a reasonable doubt, but you
must modify the specification to correctly reflect
your findings.
7. Closing arguments by the parties
The prosecution, in its closing argument, noted Appellant’s
confession to knowingly downloading, retaining, and repeatedly
viewing child pornography on his computer. The prosecution also
addressed the evidence in the case apart from the confession,
particularly in light of the defense position that Appellant did
not know that there was child pornography on his computer,
including his alibi defense. In the course of arguing that the
members should reject Appellant’s alibi defense, the prosecution
noted: “Don’t step on that land mine. He downloaded that child
pornography. He viewed that child pornography.”
With respect to the charge of transporting child
pornography, the prosecution specifically addressed the
mechanics of transporting images over the Internet using KaZaA.
25
United States v. Ober, No. 07-0722/AR
The prosecution reiterated its argument that Appellant was
guilty of transporting child pornography because downloading the
images caused an upload to occur on the host computer. The
trial counsel said to the members:
On the Internet it’s not like someone has to deliver
it to you. You can deliver it to yourself, and read
the specification. He’s charged with causing child
pornography to be uploaded and transported via the
Internet, so he could -- on the Internet you could
reach out that long arm, and nobody has to give it to
you. It’s there. It’s just sitting there out in
cyberspace, and all you’ve got to do is reach out,
grab it, and carry it over interstate lines to your
computer, and that’s what he did. No one caused that
file to be uploaded on the Internet except him because
KaZaA allows you to reach out and grab it, and that’s
what he did. So consider the definition of transport,
consider the nature of the Internet and how it allows
us to transport without it being a two-party
transaction.
The defense, in its closing argument, emphasized the alibi
defense:
Members of the Panel, we’ve seen a lot of evidence on
the case today. We talked with you a lot about could
somebody else have done it? Do they have the wrong
guy?
The defense described the time periods in which Appellant was in
the hospital or otherwise away from his computer. In addition,
the defense focused on the evidence that other individuals had
access to his computer, the different accounts used to access
child pornography, and the relationship between his injury and
the likelihood of a false confession.
26
United States v. Ober, No. 07-0722/AR
In an effort to underscore Appellant’s alibi defense, the
defense counsel specifically acknowledged the use of the KaZaA
program on Appellant’s computer to access child pornography:
Now, we also know that KaZaA was used at the same
time Specialist [B] was on the computer. You found
that KaZaA logo floating out there at the same time
that [Specialist B] was on the computer, again, from
Specialist Ober’s hard drive.
Defense counsel also acknowledged the presence of child
pornography in the KaZaA folder in the course of contending that
the material was accessed by someone else, as suggested by the
presence of child pornography in other folders associated with a
different user name.
While suggesting that the members should not rely on
Appellant’s confession, defense counsel sought to contrast the
presence of child pornography in the KaZaA folder with the
absence of any reference to KaZaA in his confession: “Is there
child pornography on this computer? No one’s denying that
there’s child pornography on his computer, but this statement is
not corroborated by the evidence.” Moreover, in discussing the
expert testimony, defense counsel questioned whether the
Government expert’s testimony could be used to identify who was
using Appellant’s computer when files were downloaded via the
KaZaA program, and highlighted the defense expert’s testimony to
suggest that another person was using the computer at that time.
27
United States v. Ober, No. 07-0722/AR
Defense counsel’s closing argument addressed the charge of
transporting from two different perspectives -- whether
Appellant permitted others to transport child pornography from
his computer and whether Appellant used KaZaA to obtain images
from other computers:
Let’s talk about that first charge that he’s charged
with, uploading files to the Internet using KaZaA.
Well, we know from his end of it, the KaZaA shared
feature was disable[d], and so nobody took a single
file off of his computer. We have no evidence one way
or the other to tell you if Specialist Ober was even
using it to take MP3 files, but you’ve got zero
evidence that he himself was going out and reaching
for these things, and there’s zero evidence to tell
you a single file was taken off of his computer.
Defense counsel proceeded on the basis that KaZaA had been used
to access child pornography on Appellant’s computer, but asked
the members to conclude that “access” to child pornography on
Appellant’s computer occurred “when Ober wasn’t there,”
emphasizing that his roommate, Specialist B, had access during
that period. As such, defense counsel’s closing argument
focused on who used Appellant’s computer to access child
pornography, not whether the computer was used to transport
child pornography.
II. DISCUSSION
We are presented with three separate questions in this
appeal: (1) whether the evidence is legally sufficient to
support Appellant’s conviction for transporting child
28
United States v. Ober, No. 07-0722/AR
pornography; (2) even if the evidence is legally sufficient,
whether the Court of Criminal Appeals affirmed on a different
theory of liability than was presented by the prosecution at
trial; and (3) whether the military judge failed to properly
instruct the members.
A. LEGAL SUFFICIENCY OF THE EVIDENCE
We review de novo the question whether the evidence is
legally sufficient to support a finding of guilty for
transporting child pornography in interstate commerce. See
United States v. Young, 64 M.J. 404, 407 (C.A.A.F. 2007). The
test for legal sufficiency of the evidence is “whether,
considering the evidence in the light most favorable to the
prosecution, a reasonable factfinder could have found all the
essential elements beyond a reasonable doubt.” United States v.
Turner, 25 M.J. 324, 324 (C.M.A. 1987) (citing Jackson v.
Virginia, 443 U.S. 307, 319 (1979)).
At trial, the prosecution initially offered two theories of
transporting: (1) that Appellant used KaZaA to download child
pornography on his computer; and (2) that Appellant made child
pornography available to other KaZaA users. See supra Part
I.C.1. These two theories were not mutually dependent. Even if
the prosecution did not provide sufficient evidence to prove
that Appellant allowed other KaZaA users to obtain child
pornography hosted on his computer, the prosecution could rely
29
United States v. Ober, No. 07-0722/AR
on its other theory, that Appellant transported child
pornography by using KaZaA to obtain files hosted on other
computers.
During its case-in-chief, the prosecution offered extensive
testimony about how KaZaA operated to prove that Appellant
transported child pornography by obtaining it from other KaZaA
users. See supra Part I.C.2. The evidence demonstrated that a
user could obtain child pornography via KaZaA by entering search
terms into the KaZaA program, reviewing a list of shared file
names and descriptions generated by the search, and initiating a
process that uploaded files from the host computer and
downloaded them to his computer.
The defense did not challenge the prosecution’s evidence
that child pornography was transported from a host computer to
Appellant’s computer through the KaZaA program. The defense and
Government experts both agreed that a file could be moved
through the Internet via the KaZaA program when a KaZaA user
selected a file from a host computer’s shared files and caused
the host computer to upload the requested file. See supra Part
I.C.2, I.C.4, I.C.5. The contested issue at trial was not
whether Appellant’s computer had been used to upload child
pornography from another computer and download it to Appellant’s
computer. The issue at trial was whether the person using the
30
United States v. Ober, No. 07-0722/AR
computer to transport child pornography was Appellant or whether
it was another person who had access to the computer.
On appeal, Appellant argues that there is no evidence that
he “uploaded those [child pornography] files, made those files
available for uploading, or stored those files in a location
where other individuals could access them through the internet.”
This argument fails to take into account Appellant’s admissions
that he acquired child pornography via the Internet, the
evidence introduced by both the prosecution and the defense
regarding the use of Appellant’s computer to transport child
pornography, and the expert testimony that using KaZaA to
download files also involved uploading from the host computer.
See supra Part I.C.2, I.C.4, I.C.5. In light of Appellant’s
pretrial confession to CID agents, the expert testimony
regarding the files found on Appellant’s computer, and the
testimony regarding the underlying investigation of Appellant,
the evidence at trial provided a legally sufficient basis upon
which a reasonable factfinder could have found beyond a
reasonable doubt that Appellant transported and possessed child
pornography.
B. THE THEORY OF LIABILITY ON APPEAL
An appellate court cannot affirm a criminal conviction on
the basis of a theory of liability not presented to the trier of
fact. Chiarella v. United States, 445 U.S. 222, 236-37 (1980).
31
United States v. Ober, No. 07-0722/AR
“To uphold a conviction on a charge that was neither alleged in
an indictment nor presented to a jury at trial offends the most
basic notions of due process.” Dunn v. United States, 442 U.S.
100, 106 (1979); see also United States v. Riley, 50 M.J. 410,
415 (C.A.A.F. 1999).
As noted above, Appellant was expressly charged with
“knowingly and wrongfully caus[ing] to be transported in
interstate commerce child pornography by uploading pictures of
child pornography to a shared internet file named ‘KAZAA.’” The
prosecution offered two different theories of transporting at
the outset of the trial: (1) that Appellant downloaded child
pornography onto his computer via the KaZaA program; and (2)
that Appellant allowed other KaZaA users to obtain child
pornography from his shared files. See supra Part I.C.1. After
the Government’s computer forensics expert testified that
Appellant’s KaZaA settings did not permit other KaZaA users to
access his files, the Government focused primarily on the theory
that Appellant was guilty of transporting child pornography
based on his act of downloading such files via KaZaA. See supra
Part I.C.2, I.C.5. The Government’s expert testified that
downloading images to Appellant’s computer through KaZaA caused
an upload to occur on the host computer. The prosecution’s
closing argument specifically contended that by downloading
32
United States v. Ober, No. 07-0722/AR
child pornography via the KaZaA program, Appellant “caused that
file to be uploaded on the Internet.”
The Army Court of Criminal Appeals sustained Appellant’s
transporting conviction on the theory that “[A]ppellant’s method
of acquiring child pornography through use of peer-to-peer file
sharing constituted transportation by uploading.” Ober, No.
ARMY 20040081, slip op. at 4. In reaching its decision, the
Court of Criminal Appeals cited the testimony of the
Government’s computer forensics expert that a KaZaA user’s
download caused an upload on the host user’s computer. Id. at
2-3. Although that specific description was not initially
placed before the members in the prosecution’s opening
statement, it was referenced in the charging document
(“uploading pictures of child pornography to a shared internet
file named ‘KAZAA’”) and it was presented through expert
testimony during the course of the trial. That is sufficient
under Chiarella. Chiarella, 445 U.S. at 236. Under these
circumstances, we conclude that the theory of liability relied
upon by the Court of Criminal Appeals was one of the alternative
theories of liability presented by the Government at trial, not
a different theory.
C. ADEQUACY OF THE INSTRUCTIONS
Whether a panel was properly instructed is a question of
law reviewed de novo. United States v. Maxwell, 45 M.J. 406,
33
United States v. Ober, No. 07-0722/AR
424 (C.A.A.F. 1996) (citing United States v. Snow, 82 F.3d 935,
938-39 (10th Cir. 1996)). The military judge has an independent
duty to determine and deliver appropriate instructions. United
States v. Westmoreland, 31 M.J. 160, 163-64 (C.M.A. 1990).
“‘[T]he military judge must bear the primary responsibility for
assuring that the jury properly is instructed on the elements of
the offenses raised by the evidence as well as potential
defenses and other questions of law.’” Id. at 164 (quoting
United States v. Graves, 1 M.J. 50, 53 (C.M.A. 1975)).
On appeal, Appellant argues that the military judge made
three errors in instructing the members. First, he argues that
the military judge erred by omitting the charged language “cause
to be” from the oral and written instructions on the
transporting charge. According to Appellant, this omission was
plain error because the military judge failed to give proper
guidance to the members. Second, Appellant claims that the
military judge erred by failing to instruct the members on a
theory of aiding and abetting under Article 77, UCMJ, 10 U.S.C.
§ 877 (2000). Appellant claims that this instruction was
mandatory because the Government theory of liability on the
transporting charge involved the participation of another party.
Third, Appellant argues that the military judge erred by failing
to give the members a definition of “uploading.” He contends
that “uploading” was used by the Government in a manner
34
United States v. Ober, No. 07-0722/AR
inconsistent with its normal usage, and thus the military judge
should have provided a definition of the term to the members to
eliminate any confusion as to its meaning or effect.
We address each of these contentions in turn. With
respect to omission of the words “cause to be,” we note that the
military judge instructed the members that Appellant was charged
with “knowingly transporting child pornography in interstate
commerce.” He further instructed that to convict Appellant, the
members had to be convinced beyond a reasonable doubt that,
among other elements, Appellant “knowingly transported material
containing one or more visual depictions by uploading the
material to a shared Internet file named KaZaA.” Regarding the
omission of the “cause to be” language that appeared in the
specification, Appellant contends that the panel might have
ignored that language or used it to convict Appellant under
another theory of liability for which they were not instructed.
As a threshold matter, Appellant has not demonstrated how
omission of the words “cause to be” -- which are not part of the
underlying statute -- changed the nature of the offense or left
the members with a misunderstanding of the transporting charge
and its specification. The defense did not object to the
military judge’s proposed instructions on the transporting
charge, nor did the defense request any additional instructions
to clarify the elements of the offense. Appellant’s speculation
35
United States v. Ober, No. 07-0722/AR
about the effect of the omission does not carry his burden to
show an unfair prejudicial impact on the members’ deliberations
or material prejudice to his substantial rights. See United
States v. Powell, 49 M.J. 460, 465 (C.A.A.F. 1998) (holding that
plain error not objected to at trial does not compel reversal
without a further determination that the error materially
prejudiced the accused’s substantial rights).
With respect to whether the military judge should have
instructed on an aiding and abetting theory, we note that
Appellant was charged and prosecuted with transporting child
pornography as a primary actor. See Article 77, UCMJ. The
Government focused its case on proving that Appellant was guilty
of transporting child pornography based on his own act of
obtaining files via KaZaA. Neither party requested an aiding
and abetting instruction. Irrespective of whether the
Government could have relied on an aider and abettor theory in
this case, Appellant was not prejudiced by the decision of the
military judge to focus his instructions on the primary theory
presented by the prosecution.
The military judge did not provide a definition of
“uploading” during the instruction phase of the trial. However,
the computer forensics experts who testified for the Government
and the defense offered comprehensive explanations of the KaZaA
process, including uploading. See supra Part I.C.2, I.C.4,
36
United States v. Ober, No. 07-0722/AR
I.C.5. The testimony did not produce a material difference
between the parties or their experts regarding the operation of
KaZaA or how KaZaA could be used to obtain files. The defense
did not challenge the Government expert’s testimony that
downloading files through KaZaA caused an upload to occur on the
host computer. Instead, the defense embraced the evidence of
how KaZaA worked in an effort to convince the panel members that
someone other than Appellant was responsible for downloading the
child pornography on Appellant’s computer. See supra Part
I.C.1, I.C.4, I.C.7. The defense did not object to the military
judge’s proposed instructions, nor did the defense request
additional instructions on uploading. In light of the manner in
which both parties presented their evidence and theories at
trial regarding the use of KaZaA, Appellant has not demonstrated
that the absence of a further description of uploading -- a
description not requested by the defense -- constituted material
prejudice to the substantial rights of Appellant. See Article
59(a), UCMJ, 10 U.S.C. § 859(a) (2000).
III. DECISION
The decision of the United States Army Court of Criminal
Appeals is affirmed.
37
United States v. Ober, No. 07-0722/AR
ERDMANN, Judge (dissenting):
Because of the cumulative effect of errors at both the
court-martial and Court of Criminal Appeals levels, I
respectfully dissent. This case involves the Internet-based,
peer-to-peer file-sharing network Kazaa. The Kazaa network does
not utilize a main server where members can post images and
other files, but rather Kazaa allows members to search for and
download files located in the Kazaa folders on the individual
computers of other members. Ober was a member of Kazaa and had
the application on his computer. Images of child pornography
which had been downloaded using Kazaa were found on Ober’s
computer. In addition to being charged with possession of child
pornography, Ober was also charged with transporting child
pornography by “uploading pictures of child pornography to a
shared internet file named ‘KAZAA.’”
My initial concern is that in affirming Ober’s
“transporting” conviction, the Court of Criminal Appeals relied
on a theory not presented to Ober or the members until the
Government’s case in rebuttal. Consistent with the charged
language, the Government initially proceeded on a theory that
Ober had made images available to other Kazaa users by putting
the images in his shared folder. Accordingly, in his opening
statement the trial counsel stated Ober was guilty because “he
allowed others to view [child pornography images on his
United States v. Ober, No. 07-0722/AR
computer] as they were transmitted from his computer.” Ober had
notice and the opportunity to respond to this “uploading” theory
because it was presented in the specification and the opening
statement.
In developing this theory during its case-in-chief,
however, the Government’s computer forensic expert testified
that the Kazaa application on Ober’s computer was set to prevent
uploading. Under this setting Ober could obtain files using
Kazaa, but other Kazaa users could not access files on Ober’s
computer. In other words there could be no “upload” from Ober’s
computer.
The Government did not present the theory upon which the
Court of Criminal Appeals based its decision until rebuttal,
when the defense had already responded to the Government’s case-
in-chief.1 This alternative theory of the case was presented
when the Government’s expert testified on rebuttal that when an
1
The majority contends that the Government presented both
theories in its opening statement because trial counsel
discussed downloading of images. See United States v. Ober, __
M.J. __ (9, 32) (C.A.A.F. 2008). However, trial counsel never
equated downloading images with “causing an upload” during his
opening statement, nor did any witness make this strained
connection during the Government’s case-in-chief. Instead,
trial counsel discussed downloading during his opening statement
in the context of explaining why Ober would be found guilty of
the possession charge, which is not in issue before this court.
Only one theory of liability for the transportation
specification was presented to the panel before the defense
responded with its case-in-chief.
2
United States v. Ober, No. 07-0722/AR
individual downloads a file using Kazaa that action “causes an
upload to occur on the other person’s computer.” During closing
arguments, trial counsel focused on the Government expert’s
rebuttal testimony: “No one caused that file to be uploaded on
the Internet except him.” While evidence was presented in the
Government’s case-in-chief that images of child pornography had
been downloaded to Ober’s computer using Kazaa, this evidence
supported the possession specification and the Government did
not equate this action with “uploading” until rebuttal. The
Government abandoned the theory it relied upon in its case-in-
chief and contended that Ober “caused an upload” when he
“downloaded” files via Kazaa. The Court of Criminal Appeals
affirmed Ober’s conviction on this basis. See United States v.
Ober, No. ARMY 20040081, slip op. at 3-4 (A. Ct. Crim. App. May
25, 2007) (unpublished).
Affirming a conviction based on a theory not presented in
the Government’s case-in-chief raises concerns regarding basic
notions of due process.2 Based on the charging language and the
Government’s case-in-chief, Ober did not have notice that when
the Government charged him with “uploading,” they intended the
term to mean “downloading.” Such a convoluted theory begs the
2
Cf. United States v. Russo, 74 F.3d 1383, 1396 (2d Cir. 1996)
(concluding that the prosecutor’s behavior was improper where he
created a “last minute” argument on rebuttal to which the
defendant could not properly respond).
3
United States v. Ober, No. 07-0722/AR
question as to why the Government just didn’t charge him with
“downloading.” Due process notice and fundamental fairness
require that the Government present its theory of the case to
the factfinder and the accused before the accused’s case-in-
chief.
If this were the only error, I would be inclined to affirm
as the “download means upload” theory was at least presented
during rebuttal and the defense did not request additional time
to respond. This error is compounded, however, by the military
judge’s failure to instruct the members on the definition of
“uploading” and “downloading” and his failure to instruct the
members as to the “cause to be” element in the charged offense.
As Ober was specifically charged with “uploading pictures
of child pornography to a shared internet file named ‘KAZAA’”,
the meaning of the term “uploading” was critical to the members’
deliberations. There was, however, conflicting testimony as to
the meaning of the term. While the military judge provided the
members with definitions of a number of terms referenced in the
elements of the offense,3 he failed to instruct the members as to
the definition of the most critical term -- “uploading.”
During the Government’s case-in-chief, the Government
expert testified that Ober’s computer contained child
pornography that had been downloaded from Kazaa and that, under
3
See Ober, __ M.J. at __ (23-25).
4
United States v. Ober, No. 07-0722/AR
Ober’s computer settings, no one could “upload” files from
Ober’s computer. This testimony would have been helpful to the
Government had Ober been charged with “downloading” rather than
“uploading.” On rebuttal the Government expert revised his
definition when he essentially testified that utilizing the
Kazaa network, if member A “downloads” a file from member B’s
computer, that “download” causes an “upload” from member B’s
computer.
In regard to these terms, the defense expert testified
that: “‘Downloading’ is brining [sic] something to you; and
‘uploading,’ in this situation, would be is if you had an open
portal where you’re allowing somebody to take away from you, or
you’re physically going out and sending something out.” At best
the various definitions discussed by the experts are very
confusing.
While the majority concludes that the experts provided
“comprehensive explanations of the KaZaA process, including
uploading” and that these explanations were not materially
different, this conclusion discounts the significant
distinctions between the language initially used by both experts
and the Government expert’s subsequent recasting of the term.
See United States v. Ober, __ M.J. __ (36-37) (C.A.A.F. 2008).
Additionally, the “uploading means downloading” definition upon
which the Government relies is counterintuitive and contrary to
5
United States v. Ober, No. 07-0722/AR
the common understanding of the term “uploading,”4 which further
supports the need to define the term for the members. In this
instance the definition of the term “uploading” is not a
disputed fact to ultimately be found by the members, but is a
legal term in the specification. Because the experts provided
conflicting definitions of this crucial term, the military judge
erred in not providing an instruction as to its meaning.
A military judge has an obligation to “instruct the members
of the court as to the elements of the offense.” Article 51(c),
Uniform Code of Military Justice (UCMJ), 10 U.S.C. § 851(c)
(2000); see also Rule for Courts-Martial (R.C.M.) 920(e)(1)
(requiring the military judge to describe the elements of the
offense to the panel). These instructions must be “tailored to
fit the circumstances of the case, and should fairly and
adequately cover the issues presented.” R.C.M. 920(a)
Discussion.
Specification 1 charged that Ober did: “knowingly and
wrongfully cause to be transported in interstate commerce child
pornography by uploading pictures of child pornography to a
shared internet file named ‘KAZAA’, in violation of 18 U.S.C.
4
See, e.g., A & M Records, Inc. v. Napster, Inc., 239 F.3d 1004,
1011 n.1 (9th Cir. 2001) (“To download means to receive
information, typically a file, from another computer to yours
via modem. . . . The opposite term is upload, which means to
send a file to another computer.”) (citation and quotation marks
omitted).
6
United States v. Ober, No. 07-0722/AR
[§] 2252A(a)(1).” While the military judge did explain the
various elements of this specification in his instruction, he
did not reference or define the “cause to be” language.
Although the Government has argued that the “cause to be”
language is merely surplusage, it is clear that “cause to be
transported” is not the same as “transported.” As instructed,
the members convicted Ober of “transporting” rather than
“caus[ing] to be transported.”
Before this court, the Government relied extensively on the
Government expert’s rebuttal testimony that accessing files on
Kazaa “causes an upload to occur on the other person’s
computer.” “Causes to be” must have meaning in order for the
Government’s rebuttal theory to be successful. As such, the
term was critical to the Government’s case and cannot be
considered surplusage. When a case is premised on particular
language in the specification, it cannot be disregarded. See
United States v. Smith, 21 C.M.A. 264, 267, 45 C.M.R. 38, 41
(1972); United States v. Rowe, 13 C.M.A. 302, 310, 32 C.M.R.
302, 310 (1962). The military judge, therefore, erred when he
failed to explain this phrase to the members in his
instructions.5 The military judge did not meet his clear
obligation to present each element to the panel, tailor the
5
Although the military judge informed that parties that he would
define the term “transporting”, he also failed to define that
term.
7
United States v. Ober, No. 07-0722/AR
instructions to the facts of the case, and give definitions of
key terms, particularly those in conflict.
Given the cumulative effect of the due process error and
the instructional errors, I would reverse the decision of the
United States Army Court of Criminal Appeals as to this
specification and order the record of trial returned to the Army
Judge Advocate General for a new trial.
8