United States v. Lancina

U NITED S TATES N AVY –M ARINE C ORPS C OURT OF C RIMINAL A PPEALS _________________________ No. 201600242 _________________________ UNITED STATES OF AMERICA Appellee v. JOSEPH A. LANCINA Information Systems Technician First Class (E-6), U.S. Navy Appellant _________________________ Appeal from the United States Navy-Marine Corps Trial Judiciary Military Judge: Captain David M. Harrison, JAGC, USN. Convening Authority: Commander, U.S. Naval Forces Japan, Yokosuka, Japan. Staff Judge Advocate’s Recommendation: Commander Timothy D. Stone, JAGC, USN. For Appellant: Captain Daniel Douglass, USMC. For Appellee: Major Cory A. Carver, USMC; Lieutenant James M. Belforti, JAGC, USN. _________________________ Decided 30 June 2017 _________________________ Before C AMPBELL , F ULTON , and H UTCHISON , Appellate Military Judges _________________________ This opinion does not serve as binding precedent, but may be cited as persuasive authority under NMCCA Rule of Practice and Procedure 18.2. _________________________ CAMPBELL, Senior Judge: A military judge sitting as a general court-martial convicted the appellant, pursuant to his conditional guilty pleas, of wrongfully possessing child pornography in violation of Article 134, Uniform Code of Military Justice (UCMJ), 10 U.S.C. § 934 (2012). The military judge sentenced the United States v. Lancina, No. 201600242 appellant to eight years’ confinement, reduction to pay grade E-1, forfeiture of all pay and allowances, and a dishonorable discharge. The convening authority approved the sentence as adjudged.1 The appellant’s sole assignment of error avers that criminal investigators presented false information that mislead the military commander who granted authorization to search for and seize evidence related to this case, and the military judge erred in denying a motion to suppress that evidence. We find no prejudicial error and affirm. I. BACKGROUND In June 2014, the Information Systems Security Manager (“security manager”) for the “ONENET” Navy computer network in Japan notified Naval Criminal Investigative Service (NCIS) that the appellant’s assigned government computer had accessed a suspicious website, (“the website”). As part of the investigation initiated by NCIS Special Agent (SA) R, the security manager covertly cloned the hard drive of the appellant’s government computer, placed the cloned copy into that computer, and provided the original hard drive to NCIS. SA R later requested that the Commander, Fleet Activities Yokosuka (“CO”) sign a command authorization for search and seizure (CASS) to search the appellant and his home—including “[t]he premises and all parts therein and any other area which may be feasible to contain evidence of items that may contain child pornography, and child sexual exploitation images”2—and seize for further searches “[a]ny [e]lectronic [m]edia [s]torage [d]evices” including “desktop computers, laptop computers, cellular/mobile telephones, [and] tablets[.]”3 In January 2015, about a week after the CO signed the CASS, NCIS executed the search, in coordination with Japanese police officers. At the appellant’s residence, a Filipino national, Ms. O, answered the door and explained she was the appellant’s live-in fiancée. Because Ms. O was a third party residing in the home, and a Japanese permanent resident, the NCIS agents received legal advice to seek her permission for the search in order to comply with the U.S.-Japan Status of Forces Agreement. In Tagalog, Japanese, and English, the NCIS agents explained to Ms. O that they were there to execute the command authorized search and seizure in a child pornography investigation. They read a permissive authorization for search and seizure (PASS) form to Ms. O in all three languages. She 1 Pursuant to a pretrial agreement, the convening authority also suspended the execution of all confinement in excess of 60 months. 2 Appellate Exhibit (AE) V, Encl. (3) at 2 (CASS at Attachment A). 3 Id. at 3 (CASS at Attachment B). 2 United States v. Lancina, No. 201600242 confirmed that she understood the PASS, that she was not required to consent to or sign the PASS, and why the investigators were there before she provided verbal and written consent to execute the search. At the NCIS agents’ request, Ms. O identified the appellant’s personal belongings. Investigators conducted a cursory search of the appellant’s laptop computer and desktop computer, which had an external hard drive. Before leaving, they explained to Ms. O what media devices they were seizing. The investigation later revealed thousands of child pornography images and videos in password-protected folders on the home laptop and hard drive. The military judge denied a pretrial motion to suppress this evidence. II. DISCUSSION A. Probable cause for the CASS The Fourth Amendment provides, “[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated . . . .” U.S. CONST. amend. IV. Searches conducted pursuant to a warrant or authorization based on probable cause are presumptively reasonable. United States v. Hoffmann, 75 M.J. 120, 123 (C.A.A.F. 2016). “While he issues no warrants, the commanding officer is bound by the same rules in authorizing a search as [a Federal magistrate]; that is, probable cause to believe that the things to be seized are on or within the premises to be searched.” United States v. Stuckey, 10 M.J. 347, 357 (C.M.A. 1981). Evidence obtained in violation of the Fourth Amendment is generally inadmissible against an accused. MILITARY RULE OF EVIDENCE (MIL. R. EVID.) 311, MANUAL FOR COURTS-MARTIAL, UNITED STATES (2016 ed.). “We review a military judge’s denial of a motion to suppress evidence for an abuse of discretion.” United States v. Nieto, 76 M.J. 101, 105 (C.A.A.F. 2017) (citation omitted). When “a military magistrate has a substantial basis to find probable cause, a military judge [does] not abuse his discretion in denying a motion to suppress.” Id. (citation and internal quotation marks omitted) (alteration in original). “A substantial basis” for probable cause to search an area exists where “based on the totality of the circumstances, a common-sense judgment would lead to the conclusion that there is a fair probability that evidence of a crime will be found[.]” Id. (citations and internal quotation marks omitted). In determining whether an affidavit provides a substantial basis to find probable cause, “we rely alone on information that we know was presented to the magistrate at the time of his determination, as reflected in the affidavit, the military judge’s findings and conclusions of law, and testimony in the record of trial addressed to the suppression motion that is consistent with the military judge’s findings.” United States v. Leedy, 65 M.J. 208, 214 n.5 3 United States v. Lancina, No. 201600242 (C.A.A.F. 2007) (emphasis added). With no evidence that SA R orally briefed the CO beyond the contents of the affidavit, our analysis focuses on those contents. Id. Before any allegedly false information that may have misled a magistrate is “set aside” from an affidavit, an accused must make ‘“a substantial preliminary showing that a government agent included a false statement knowingly and intentionally or with reckless disregard for the truth in the information presented to the authorizing officer”’—and then prove this ‘“by a preponderance of the evidence”’ in a hearing. United States v. Cravens, 56 M.J. 370, 375 (C.A.A.F. 2002) (emphasis added) (quoting MIL. R. EVID. 311(g)(2)). Similarly, to receive a hearing on alleged material omissions from affidavits, the defense must demonstrate that the omissions were “both intentional or reckless, and that their hypothetical inclusion would have prevented a finding of probable cause.” United States v. Mason, 59 M.J. 416, 422 (C.A.A.F. 2004) (emphasis in original) (citation omitted). A military judge’s finding of fact that the defense did not meet its burden of showing knowing and intentional falsity or reckless disregard for the truth is binding unless clearly erroneous. United States v. Allen, 53 M.J. 402, 408 (C.A.A.F. 2000). Here, the military judge found generally that “[t]he defense . . . failed to meet its burden on both” making “a preliminary showing that [SA R] made false statements knowingly and intentionally or with reckless disregard for the truth, and then . . . establish[ing] by a preponderance of the evidence the statements’ knowing and intentional falsity or reckless disregard for the truth.”4 Thus, we review the suppression motion record only to ascertain whether the military judge clearly erred in his determination that the statements in the affidavit were not “false” or “mislead[ing],” or that any such statements by SA R was not made “knowingly and intentionally or with reckless disregard for the truth.” Cravens, 56 M.J. at 375. “[W]hen there are misstatements or improperly obtained information” in an affidavit, “we sever those from the affidavit and examine the remainder to determine if probable cause still exists.” United States v. Gallo, 55 M.J. 418, 421 (C.A.A.F. 2001) (citation omitted). We find the totality of the facts in the affidavit, and the reasonable inferences the CO could draw from them, provided a substantial basis for the CO to conclude there was a fair probability that 1) the appellant committed the offenses alleged in the command authorization—violations of “Title 18 U.S.C. § 2252 and 2252A, relating to material involving the sexual 4 AE XVII at 17 (emphasis added) (citation omitted). 4 United States v. Lancina, No. 201600242 exploitation of minors”5—and 2) given the nexus to the appellant’s home, NCIS would find evidence of those offenses in his digital devices there. 1. Probable cause to believe the alleged crimes occurred and the appellant committed them SA R’s affidavit, attached to the authorization request, stated: i. His 11 years of experience as an NCIS agent included his “participat[ion] in child pornography investigations which have resulted [sic] convictions” and “120 hours of advanced sex crimes investigation training[.]”6 ii. On the appellant’s government computer hard drive, he found “two thumbnail images7 which [each] depict an apparent female child’s buttocks being spread open by an adult male hand exposing the child’s anus and vagina,” where “[i]n one of the two photos the child’s genitals are covered with apparent semen”—and, a “pedo bear icon . . . a type of visual code that indicates the presence of child pornography.”8 iii. The security manager had told SA R that the website the appellant accessed is a “known incest/child pornography (CP) website.”9 iv. After creating an undercover, online profile on the website, SA R “located only one profile” for website members in Japan—“LANCE ALOT,” whose listed birthday exactly matched the appellant’s.10 v. The “LANCE ALOT” profile’s “avatar photo” showed “a white male’s erect penis” (the appellant is white), and “LANCE ALOT” posted that he “loves to tease and please young horny wet girls to multiple orgasms.”11 vi. Evidence on the appellant’s government computer hard drive showed that, before 21 August 2014, the appellant “had viewed 13 separate member profiles” on the website.12 Using his own undercover, online 5 AE V, Encl. (3) (Affidavit for Search Authorization of 13 Jan 2015 at 1). 6 Id. at ¶ 2. 7 The appellant incorrectly states SA R “omitted [from the affidavit] that the two images of suspected child pornography were . . . thumbnails.” Appellant’s Brief of 15 Nov 2016 at 5. 8 AE V, Encl. (3) at ¶ 6e. 9 Id. at ¶ 6a. 10 Id. at ¶ 6f. 11 Id. 12 Id. at ¶¶ 6c, 6e. 5 United States v. Lancina, No. 201600242 profile, SA R found 10 of the 13 profiles that the appellant had viewed on the website. One of them, Ms. A,13 listed a birthdate indicating she was “under 18 years of age” as of 20 October 2014.14 SA R determined that the appellant had friended two other users of the website, Ms. B and Ms. C, while, according to their listed birthdays, they were younger than 18 years old. LANCE ALOT had messaged Ms. C that she was “incredibly beautiful with a sexy and stunning body.” Ms. C’s profile had nude photos. SA R found “three other profiles which LANCE ALOT had communicated with where the [sic] two of the females were 17 years old and one was 16 years old.”15 a. The thumbnail images Thumbnail images of child pornography can provide probable cause for a search authorization.16 But the appellant first suggests that the affidavit’s details of the child pornography thumbnail images cannot provide a substantial basis for probable cause because “[t]hose two images were not associated with known child pornography in the NCMEC [National Center for Missing and Exploited Children] database, nor were the images looked at by a medical professional to determine the age of the people depicted in the pictures[,]” or by the Defense Computer Forensics Laboratory.17 Moreover, he claims these facts were “omitted” from the affidavit.18 13 The profile names are pseudonyms. 14 AE V, Encl. (3) at ¶ 6f. 15 Id. 16 See, e.g., United States v. Howe, 545 F. App’x. 64, 65 (2d Cir. 2013) (finding that the “district court did not err in concluding that probable cause existed to seize Howe’s laptop” where a police officer had “viewed . . . at least one thumbnail image that the magistrate judge determined was lascivious” in the “Sample Pictures folder on that computer”) (citation and internal quotation marks omitted). 17 Appellant’s Brief at 3, 12. 18 Id. at 5. Although the appellant did not expressly raise this issue at trial, we find that under either a plain error or abuse of discretion standard of review, he has failed to demonstrate any prejudice by showing how the “hypothetical inclusion” of this information “would have prevented a finding of probable cause.” Mason, 59 M.J. at 422. NCMEC databases do not contain the entire universe of child pornography images, and non-medical professionals—particularly an investigator for previous child pornography cases like SA R—are capable of recognizing child pornography for purposes of addressing probable cause. See Record at 67; 102-03 (“[Trial Counsel: [W]hy, based on your training and experience . . . was [it] apparent to you that these were children? [SA R:] . . . . The labia were not very distinct, not very developed. There was no pubic hair, and the pubic hair was not shaved. It appeared to be naturally not pubic hair.”). 6 United States v. Lancina, No. 201600242 Our superior court in Gallo found a substantial basis for probable cause to search for child pornography where an affiant with 26 years of experience, having “participated in numerous child pornography investigations,” swore that “approximately 262 apparent child pornography photographs were found on [Gallo’s] work computer” and “that several of the photographs . . . matched imported photographs seized in other Customs’ cases.” 55 M.J. at 420-22. The Gallo majority did not object to the fact that the “affidavit provided no description of the images” and “merely set out [the agent’s] conclusions” that the images were ‘“child pornography,’ ‘adult pornography,’ and ‘apparent child pornography.”’ Id. at 424 (Gierke and Effron, JJ., dissenting). Thus, this first argument fails. The appellant next contends the thumbnail images cannot provide a substantial basis for probable cause because their computer location indicates they were “automatically cached from internet sites onto [the appellant’s] work computer” rather than actively downloaded, meaning there was “no evidence [that the appellant] viewed or knowingly possessed” the thumbnails.19 We also reject this argument. Appellate courts have affirmed that the presence of child pornography thumbnail images in the internet cache can be a basis for possession of child pornography convictions.20 As thumbnail images, in some circumstances, can satisfy the beyond a reasonable doubt standard, we hold that they provide substantial basis for the CO here to find probable cause to suspect that the appellant possessed child pornography. The appellant suggests that the thumbnails may have been cached without the appellant having “scrolled down to their position on the page”—i.e., without the appellant having viewed them.21 The CO did not have to make this assumption favorable to the appellant, where the evidence was equally consistent with the appellant 19 Appellant’s Reply Brief of 9 Mar 2017 at 2. The appellant did not claim at trial that SA R’s failure to state that the thumbnail images were “not [intentionally] downloaded images” was a material omission from the affidavit, as he does now. Appellant’s Brief at 12; Reply Brief at 3. But regardless of the proper standard of review, again we find that the appellant has failed to demonstrate prejudice. Since as discussed in the next paragraph, thumbnail images provide direct or circumstantial evidence of the offenses, a “hypothetical inclusion” of this information would still not have prevented the CO from finding probable cause. Mason, 59 M.J. at 422. 20 See, e.g., United States v. Tucker, 305 F.3d 1193, 1197, 1205 (10th Cir. 2002) (upholding Tucker’s conviction for possessing “thumbnail” and “larger images” of child pornography in his “[w]eb browsers’ cache files,” despite his argument that since “he did not voluntarily cache the files,” he did not possess child pornography). 21 Appellant’s Reply Brief at 2. 7 United States v. Lancina, No. 201600242 having viewed the images.22 We note that child pornography thumbnail images are created in the cache when one “use[s a] webpage”23 that contains child pornography, or a when a user executes an internet search engine “image search” which returns child pornography.24 Thus, the thumbnail images’ presence in the appellant’s cache allowed the CO to draw a reasonable inference that the appellant had accessed webpages with child pornography, or entered search terms yielding such images, providing a fair probability for probable cause that the appellant had committed child pornography offenses. b. The “pedo bear icon” (“icon”) Facts in an affidavit “are properly viewed in context, through the professional lens in which they were presented to the magistrate.” Leedy, 65 M.J. at 215-16 (finding the filename “14 year old Filipino girl,” located alongside other filename “titles . . . identify[ing] sex acts” which an experienced investigator stated were “indicative of . . . child pornography,” provided probable cause to search Leedy’s computer). “A possible innocent explanation or lawful alternative may add a level of ambiguity to a fact’s probative value in a probable cause determination, but it does not destroy the fact’s usefulness outright and require it to be disregarded.” People v. Zuniga, 372 P.3d 1052, 1058 (Colo. 2016). The affidavit here informed the CO that SA R, an experienced criminal investigator, found an icon on the appellant’s government computer that SA R deemed a “visual code that indicates the presence of child pornography.”25 The military judge issued findings of fact which supported this conclusion and separately rejected the appellant’s contention that SA R’s statement “that this image indicates child pornography is wholly misleading.”26 We do not find these findings clearly erroneous. At the suppression motion hearing, SA R testified that “Pedobear is kind of like a trail sign on the Internet, or basically it’s a calling card. It kind of tends to indicate to people that know what to look for, that there is child pornography here. . . . [I]t helps kind of guide them to particular sites and files that contain child pornography,” 22 See United States v. Martin, 426 F.3d 68, 77 (2nd Cir. 2005) (noting that merely because “an innocent explanation may be consistent with the facts alleged” in a warrant application “does not negate probable cause” to issue a search warrant) (citation and internal quotation marks omitted). 23 Appellant’s Reply Brief at 2. 24 Record at 85. 25 AE V, Encl. (3) at ¶ 6e. 26 AE V at 11. See AE XVII at 17. 8 United States v. Lancina, No. 201600242 though he also agreed with the trial defense counsel’s statement that the filename of the icon “was not named ‘Pedo,’ it wasn’t named Pedobear.”27 Even though, as argued at the suppression motion hearing, most internet pictures of teddy bears may be wholly innocent—which possibly reduces the “probative value” of the icon as circumstantial evidence of child pornography possession—that does not “destroy the fact’s usefulness outright and require it to be disregarded.” Zuniga, 372 P.3d at 1058. Like the filename in Leedy, the context in which the icon was found,28 and SA R’s experience-based assessment of what it might mean in that context, provided a substantial basis for the CO to consider the icon as circumstantial evidence of child pornography in his probable cause determination. c. The appellant’s membership in the website and child pornography In United States v. Clayton, our superior court considered whether there was a substantial basis for probable cause to search Clayton’s “laptop, in [his] quarters” based on Clayton’s e-mail address appearing on a membership list for an “internet group” named “Preteen-Bestiality-and-Anything-Taboo,” where one member had “confessed” to “upload[ing] . . . child pornography” to the group” and at whose website the affiant found child pornography. 68 M.J. 419, 422-23 (C.A.A.F. 2010). Clayton had “requested a Digest for the [g]roup, in which he would receive daily e-mails that would contain 25 of the postings to the [g]roup sent as a single e-mail to his account.” Id. at 422 (alterations in original, internal quotation marks omitted). However, there was neither evidence in the affidavit as to what was in the e-mail digests, nor as to whether Clayton had “accessed the website, or . . . received the digests he requested,” as the affiant had not “review[ed] his e-mail accounts[.]” Id. at 425. The Court of Appeals for the Armed Forces (CAAF) nevertheless upheld the magistrate’s search authorization due to a “practical, commonsense understanding of the relationship between the active steps that a person might take in obtaining child pornography from a website and retaining it for an extended period of time on that person’s computer.” Id. at 424. See also United States v. Gourde, 440 F.3d 1065, 1072-73 (9th Cir. 2006); United 27 Record at 68, 90. 28 The appellant alleged at trial that the icon was “in the thumb[nail ]cache on the computer.” AE V at 11 (internal quotation marks omitted). The appellant now suggests it was in the ‘“unallocated clusters” area of the computer,”’ where “files are stored after having been permanently deleted.” Appellant’s Reply Brief at 7 n.24. In either case, per our discussion of the thumbnail images supra, the location of the icon does not negate its value in finding a substantial basis for probable cause, as its presence in either place demonstrates the appellant accessed a page with the icon at some point. 9 United States v. Lancina, No. 201600242 States v. Martin, 426 F.3d 68 (2nd Cir. 2005); United States v. Froman, 355 F.3d 882 (5th Cir. 2004). It did so even without proof that Clayton possessed any child pornography images, from any source, on any computer. Clayton, 68 M.J. at 425 (noting “no evidence showed that he posted messages to the Google site, participated in discussions, or uploaded or downloaded child pornography”). In Gourde, membership in “lolitagurls.com” provided a substantial basis for probable cause to search Gourde’s computer, even though there was no evidence that he downloaded child pornography from the website. 440 F.3d at 1067 (noting the “triad of solid facts—the site had illegal images, Gourde intended to have and wanted access to these images, and these images were almost certainly retrievable from his computer if he had ever received or downloaded them”). In Froman, membership in “Candyman,” a web group from which an agent received “hundreds of images of child pornography,” provided a sufficient basis for probable cause to search Froman’s computer, even though there was no evidence he had downloaded images from the group, or automatically received e-mail updates. 355 F.3d at 890-91 (noting “it is common sense that a person who voluntarily joins a group” whose “predominant purpose” is “to engage in collection and distribution of child pornography” and “uses screen names that reflect his interest in child pornography, would download such pornography from the website and have it in his possession”). In Martin, membership in the web group “girls12-16,” to which an investigator subscribed and received e-mails with child pornography and “child erotica,” was sufficient to search Martin’s computer even though the “affidavit d[id] not explicitly state that Martin accessed child pornography.” 426 F.3d at 75-76 (finding a “fair probability” that “evidence of a crime would be found at Martin’s home because membership in the e-group reasonably implied use of the website” and child pornography was “distributed to some of the group’s members”). Here, contrary to the appellant’s assertion that only “weak and circumstantial” evidence suggested he was a member of the website,29 the CO could reasonably infer from the facts in the affidavit that the appellant was a member. SA R found one member in Japan, LANCE ALOT; “Lancina” is similar to LANCE ALOT; and LANCE ALOT’s listed birthday was the same as the appellant’s. The appellant tries to distinguish his membership in this website from the websites or groups mentioned in the authorities supra, on the grounds that there was inadequate support in the affidavit for SA R’s claim that “[the 29 Appellant’s Brief at 23 n.86. 10 United States v. Lancina, No. 201600242 website] is a known child pornography website.”30 At trial, the appellant duly alleged that this claim was a “false statement” by SA R.31 SA R’s actual claim in the affidavit was that the security manager “stated [the website] was a known incest/child pornography (CP) website.”32 The military judge disagreed, finding that SA R’s “statements and conclusions about the web site in the affidavit were simply not shown to be false.”33 In the hearing on the suppression motion, SA R conceded that the security manager “did not tell [him] that there was child pornography on that website”34—only that the security manager had provided him with an article about the website, from which SA R concluded the website “did, in fact, appear to be an incest, child pornography, even a child rape website, that teaches its patrons, or encourages their patrons to basically have sex with children.”35 SA R added that when he accessed the website, he “observed the chatroom where people were [advising] other people about how to have sex with their children.”36 SA R conceded that he could not tell whether the thumbnail images or icon on the appellant’s computer had been downloaded from the website, or from any other internet location.37 The critical distinction highlighted by the appellant is that in Clayton and the federal circuit court cases it cites, a website membership was sufficient to provide probable cause to suspect downloading of child pornography because the affidavits confirmed that actual child pornography was on the web groups or websites. The only evidence SA R cited at the suppression hearing to prove the website was a “known” child pornography website was a newspaper article discussing the arrest of another Marine for attempting to arrange “an incestuous four-way with another man and his two preteen children” with an undercover agent who was a member of the website.38 The article has a 30 Reply Brief at 4. See also Appellant’s Brief at 12, 15, 23 (noting that the affidavit did not mention finding any “images of child pornography from the [the] website,” any proof that the thumbnail images on the appellant’s computer were “downloaded images,” or any “evidence of [the appellant] soliciting contraband from the website” or “actively s[eeking] out updates from the website”). 31 AE IV at 9-10. 32 AE V, Encl. (3) at ¶ 6a. 33 AE XVII at 18. 34 Record at 78. 35 Id. at 64. AE VI, enclosure (1) (the newspaper article). 36 Record at 64 (emphasis added). 37 Id. at 100. 38 AE VI, Encl. (1) at 1. 11 United States v. Lancina, No. 201600242 screenshot of the website, where the only sexual content is a banner advertisement with an obscene cartoon soliciting users to “watch live sex shows from 18yo teens for free.”39 The article (citing a media outlet) says the website “specializes in the promotion of incest and other taboo behaviors,” 40 but nowhere states the website was known for child pornography or published actual child pornography. While incest is illegal in many instances, it does not inherently imply sex with an underage person, let alone the presence of child pornography. In Hoffman, after the appellant was “taken into custody” for soliciting “young boys for sex,” a search authorization was granted based in part upon an affidavit in which the affiant asserted ‘“that she knew through her “training and experience that there is an intuitive relationship between acts such as enticement or child molestation and the possession of child pornography.”’ Hoffmann, 75 M.J. at 123, 127 (citation omitted). The CAAF held that, absent extreme circumstances, even the “enticement” of an actual child for sex is “simply not sufficient to provide a substantial basis for concluding that there was probable cause to believe [someone] possessed child pornography.” Id. at 127 (citation omitted) (emphasis added). In light of Hoffman, we find that most of SA R’s observations in the affidavit—including that others on the website advised how to have sex with children, that the appellant messaged users of the website whose birthdates suggested they were under 18, and that he told one she was “incredibly beautiful with a sexy and stunning body”41– even assuming arguendo they were enticement, do not support the conclusion that the website contained child pornography. SA R’s statement that on the website profile of Ms. C—a user with whom the appellant communicated—he found nude photos, and the age listed on Ms. C’s website user profile suggested she was 17 years old,42 is also insufficient to support SA R’s characterization of the website. SA R did not describe these nude photos as child pornography in the affidavit—a description he readily applied to the thumbnail images discussed supra. 39 Id., Encl. (1) at 2 (emphasis added). 40 Id., Encl. (1) at 1. 41 AE V, Encl. (3) at ¶ 6f. 42 Though the appellant notes that he “could have made a request for and had sexual relations with his girl and it would not have been illegal,” Appellant’s Reply Brief at 6 n.19, the investigation was for violations of “Title 18 U.S.C. § 2252 and 2252A, relating to material involving the sexual exploitation of minors.” AE V, Encl. (3) at 1. Under federal law, “‘minor’ means any person under the age of eighteen years.” 18 U.S.C. § 2256(1). 12 United States v. Lancina, No. 201600242 Thus, we conclude that the military judge’s findings of fact—that SA R’s “statements and conclusions about the web site in the affidavit were simply not shown to be false,” and that “[t]he defense has failed to meet its burden on . . . showing that SA R made false statements knowingly and intentionally or with reckless disregard for the truth”43—was clearly erroneous as to SA R’s claim that the security manager “stated [the website] was a . . . known . . . []child pornography website.”44 This statement was misleading at a minimum, under Mason, 59 M.J. at 422, given that the article never said the website actually hosted child pornography. Moreover, SA R displayed a reckless disregard for the truth in making this assertion to the CO, given that, despite his investigative efforts, he identified no actual or apparent child pornography on the website.45 d. Child erotica on the website The most significant facts about the website remaining in the affidavit, after removal of the misleading statement, are that on the profile of Ms. C—a minor user with whom the appellant communicated—SA R found “nude photos,”46 and Ms. C’s user profile on the website suggested that she was 17 43 AE XVII at 17-18. 44 AE V, Encl. (3) at ¶ 6a. The portion of the finding of fact about the website being a “known incest[] . . . site,” is not clearly erroneous in light of the article and affidavit. 45 We also reject as clearly erroneous the military judge’s finding of fact that the website “appeared to be one dedicated to child pornography,” AE XVII at 4. The only evidence in the record that the military judge could have used as support for this conclusion are the newspaper article and SA R’s testimony. The conclusion that the website “appeared to be one dedicated to . . . incest, child rape, and generally encourages and explains grooming methods of having sex with children,” is not clearly erroneous in light of the article and affidavit. 46 Trial defense counsel argued in her motion at trial that “neither [Ms. C], nor any other of the profiles reviewed, were minors,” and the “assertion that [the appellant] commented on naked photographs of [Ms. C] is . . . a complete misstatement of fact[.]” AE IV at 9-10. However, the military judge held under “Discussion and Conclusions of Law” that “[a] number of the users . . . . Lanc[e ALOT] communicated with appeared to be and were thought to be minors based on their listed birth dates, and at least one had at least one nude photo of herself on the web page.” AE XVII at 14, 19. “‘Where a finding of fact is included under the heading of conclusions of law it will be treated as a factual finding.’” United States v. Betancourt, No. 201500400, 2017 CCA LEXIS 386, at *16 n.16, unpublished op. (N- M. Ct. Crim. App. 6 Jun 2017) (quoting Utzinger v. United States, 432 F.2d 485, 489 (6th Cir. 1970)). As the appellant’s brief “does not now challenge th[is] ruling” as clearly erroneous, “we find it to be the law of the case[.]” United States v. Trotter, No. 201500332, 2016 CCA LEXIS 668, at *15 n.30, unpublished op. (N-M. Ct. Crim. App. 17 Nov 2016) (citing United States v. Savala, 70 M.J. 70, 77 (C.A.A.F. 2011)) 13 United States v. Lancina, No. 201600242 years old.47 Nude photos can include “child erotica,” which is defined by our court as “material that depicts young girls [or boys] as sexual objects or in a sexually suggestive way, but is not sufficiently lascivious to meet the legal definition of sexually explicit conduct[.]” United States v. Rapp, No. 201200303, 2013 CCA LEXIS 355, at *24 n.15, unpublished op. (N-M. Ct. Crim. App. 30 Apr. 2013) (citations and internal quotation marks omitted). Civilian courts are split as to whether the presence of child erotica provides a substantial basis for probable cause to suspect the presence of child pornography. Compare United States v. Ranke, 2010 U.S. Dist. LEXIS 115352, at *16-17 (E.D. Mich. Oct. 29, 2010), aff’d on other grounds, 480 Fed. App’x. 798 (6th Cir. 2012) (“The government contends persuasively that ‘child erotica,’ including nude photographs of minors or computer-generated images of children engaged in sexual conduct, is some evidence that may properly be considered in establishing probable cause to search for child pornography), with United States v. Edwards, 813 F.3d 953, 961-62, 969 (10th Cir. 2015) (holding that “[n]either [Edwards’] posting of child erotica nor his comments suggesting a sexual attraction to the child in the posted images established” a substantial basis for “probable cause that [he] possessed child pornography in his home,” where “the search-warrant affidavit here provided evidence only that [Edwards] possessed legal child erotica”). The Eighth Circuit Court of Appeals explained that while the presence of child erotica may not in and of itself provide sufficient probable cause to suspect the presence of child pornography, such facts “combined with the other facts included in the affidavit,” may support a probable cause determination under “the totality of the circumstances.” United States v. (additional citation omitted). Even absent waiver, we would not deem this finding of fact clearly erroneous. See AE VI at 6 of 8 (printed copy of Ms. C’s profile where Lance ALOT “commented on [Ms. C]’s album[:] “Incredibly Beautiful and Sexy with a Stunning Body,” and the handwritten notation “= 17 y/o”); Record at 263-64 (“[SA R: T]here were certainly nude images of minors on that website. . . . [a]pparently having viewed [Ms. C’s] photo album, which featured numerous photographs of herself, completely naked. He made the comment, ‘You have a beautiful and stunning body.’”). 47 The appellant argues “[t]here is no independent verification of the age of any [of] the girls in these profiles.” Appellant’s Reply Brief at 5 n.18. Even assuming arguendo that the ages were inaccurate, this is not relevant to how these “girls” would have appeared to users like the appellant. See United States v. Roeseler, 55 M.J. 286, 291 (C.A.A.F. 2001) (“Our general rule is that an accused should be treated in accordance with the facts as he or she supposed them to be.”) (citations omitted). Nor does it prevent the CO from drawing reasonable inferences about the nature of the website, based on the fact that it features people claiming to be minors, posting nude photographs. 14 United States v. Lancina, No. 201600242 Hansel, 524 F.3d 841, 844-46 (8th Cir. 2008) (concluding that photographs of nude girls and other girls in swimsuits described by the investigating officer as “child erotica, not child pornography” could be considered along with allegations of sexual assault and camera and computer equipment, in finding probable cause to search for child pornography). Even though the affidavit in Hansel “misleading[ly]” stated that the child erotica photographs themselves “indicate[d] receipt of child pornography by means of a computer,” the Court held that after removal of the misleading statement, a magistrate still would have found probable cause to search for child pornography based in part on the presence of child erotica. Id. at 844-46. We agree that the presence of child erotica can be, at minimum, a factor in finding a substantial basis for probable cause to suspect the appellant committed a child pornography offense under the totality of the circumstances. Even wholly “innocent behavior frequently will provide the basis for a showing of probable cause.” United States v. Sparks, 291 F.3d 683, 685, 688 (10th Cir. 2002) (reversing the lower court’s suppression of methamphetamine seized during searches authorized in part based upon Sparks’ arrest for picking up a bag of white powder from the side of a road) (citation and internal quotation marks omitted). Moreover, child erotica is admissible in a prosecution for possession of child pornography as evidence “to show intent to commit the charged offense.” United States v. Griffing, No. 38443, 2015 CCA LEXIS 101, at *34, unpublished op. (A.F. Ct. Crim. App. 23 Mar 2015) (citing United States v. Warner, 73 M.J. 1, 3 (C.A.A.F. 2013) and United States v. Vosburgh, 602 F.3d 512, 538 (3d Cir. 2010)). Finally, while legally protected in other jurisdictions,48 military courts have upheld convictions for the possession of child erotica under Article 134, UCMJ.49 Here, in addition to the “nude photo” on Ms. C’s account that SA R referenced in the affidavit, SA R detailed: the appellant’s website message to her that she was “incredibly beautiful with a sexy and stunning body;” that the appellant used an image of an erect penis as his avatar photo on the website; and, that his website profile stated he “loves to tease and please young horny wet girls to multiple orgasms.”50 Such contextual evidence allowed the CO to infer that the appellant had an interest in child erotica, 48 See Vosburgh, 602 F.3d at 538 (approving district court’s instruction to jurors that child erotica is “not illegal” to possess). 49 See, e.g., United States v. Davenport, No. 20150322, unpublished op., 2016 CCA LEXIS 729, at *1, *8 (A. Ct. Crim. App. 19 Dec. 2016) (affirming the appellant’s conviction, “contrary to his pleas, of . . . two specifications of possession of child erotica in violation of Article 134, Uniform Code of Military Justice”). 50 AE V, Encl. (3) at ¶ 6f (emphasis added). 15 United States v. Lancina, No. 201600242 and that he would therefore download the nude photo content present on the website that SA R described in the affidavit.51 See Froman, 355 F.3d at 890- 91 (finding Froman’s use of “Littlebuttsue and Littletitgirly” as “screen names” on America Online, “reflected his interest in child pornography,” and therefore supported the inference that he “would download such pornography from the website and have it in his possession”); United States v. Shields, 458 F.3d 269 (3rd Cir. 2006) (noting that Shields’ “use of the name ‘LittleLolitaLove’ [in] registering for multiple e-groups where” child pornography images were “available and disseminated bolster[ed] a practical, commonsense decision that Shields likely downloaded such images”) (citation and internal quotation marks omitted).52 The thumbnail images and icon on the appellant’s computer discussed supra also suggest that the appellant has an interest in nude photographs of minors, and therefore support an inference that the appellant would download nude photos of minors from the website. Thus, even after removing the misleading language in the affidavit that the security manager “stated [the website] was a . . . known . . . []child pornography website,”53 we find that the remaining facts establishing that the website hosted nude photographs of minors, and that the appellant had a demonstrable interest in nude photographs of minors, allowed the CO to consider the appellant’s membership with, and participation in, that website, as probable cause to suspect that the appellant had committed child pornography offenses. 2. The nexus between the alleged crime and the appellant’s home Probable cause to suspect that the appellant wrongfully viewed or possessed child pornography on his workplace computer does not necessarily 51 The appellant argues that “there is no indication or evidence that the photo in the profile existed when [he] had accessed the profile months earlier.” Appellant’s Reply Brief at 6. This is irrelevant given that the question is if the website is a child erotica website, not whether the appellant viewed or downloaded any particular website item. See Clayton, 68 M.J. at 424-25 (finding “the activities of a voluntary member of the . . . web group w[ere] sufficient to support a search of his quarters,” even though there was “no evidence . . . that [Clayton] posted messages to the Google site, participated in discussions, or uploaded or downloaded child pornography” from the site). 52We reject the appellant’s critique that “membership on” the website “means that member wrongfully possesses or views child pornography” is a “false assumption[].” Appellant’s Brief at 16. To use the appellant’s phrasing, membership on the website means that the appellant wrongfully possesses or views child erotica, and possession or viewing of child erotica under these circumstances provides probable cause to suspect the appellant committed a child pornography offense. 53 AE V, Encl. (3) at ¶ 6a. 16 United States v. Lancina, No. 201600242 provide probable cause to search his home and electronic devices there. Our superior court has advised: [I]n order for there to be probable cause, a sufficient nexus must be shown to exist between the alleged crime and the specific item to be seized. . . . The question of nexus focuses on whether there was a fair probability that contraband or evidence of a crime will be found in a particular place. . . . A nexus may be inferred from the facts and circumstances of a particular case, including the type of crime, the nature of the items sought, and reasonable inferences about where evidence is likely to be kept. Nieto, 76 M.J. at 106 (citations and internal quotation marks omitted). In Nieto, the most recent guidance from our superior court on this issue, multiple soldiers at a forward operating base suspected Nieto used his cell phone to record them using the latrine. After seizing Nieto’s phone and a laptop computer, Army Criminal Investigation Command sought a search authorization for the computer. The search request contained one agent’s statement that when “[s]oldiers us[e] their cell phones to photograph things,” those “phones are normally downloaded, the photos they take . . . they’ll back those up to their laptops so that when they get to . . . a place where they can get Internet, they can post those or send those home to family[.]” Id. at 104. It also recounted another agent’s “experience” that: [P]ersons who would use a portable digital media recorder would also transfer the media from a portable device to a computer station or storage device. Persons who view and record sexual acts often times store and catalog their images and videos on larger storage devices such as a computer or hard drive. Id. at 105. The military judge, citing Clayton, denied the motion to suppress on the theory that “[i]t is . . . a normal inference to be drawn . . . that data is transferred from one digital device to another.” Id. The CAAF held that the military judge abused his discretion in failing to suppress the search authorization. Noting that “the affidavits” and the oral briefing “accompanying the search authorization did not reference” any actual “data transfers” from Nieto’s cell phone, presented no “direct evidence that images were on the laptop,” and presented no evidence that “anyone had ever seen” Nieto “download material from his cell phone to a laptop,” the CAAF rejected the notion that “law enforcement” has “broad authority to search and seize all of an accused’s electronic devices and electronic media merely because the accused used a cell phone in furtherance of a crime.” Id. at 107-08, 108 n.5 (emphasis in original) (internal quotation marks omitted). 17 United States v. Lancina, No. 201600242 Before Nieto, the CAAF found sufficient nexus for probable cause to search homes for child pornography in other cases where child pornography had been discovered in the workplace. There was probable cause in Clayton to search the appellant’s quarters in Kuwait where his e-mail address was found in the records of a “website group” containing child pornography, evidence showed he had accessed his e-mail account through a computer server in Kuwait, and he lived in base housing with “wireless Internet service capability.” 68 M.J. at 423. In Gallo, the probable cause affidavit stated that, in addition to finding child pornography on his work computer an “analysis of [Gallo]’s work computer indicated that computer files of unknown content had been downloaded or uploaded from the hard drive to a diskette, relating to files received over the internet . . . mak[ing] the files extremely portable in nature.” 55 M.J. at 421. The affidavit in Gallo also provided an experienced agent’s “pedophile profile,” that “[p]edophiles collect sexually explicit or suggestive materials involving children such as . . . computer disks” and “maintain and possess their materials . . . within the privacy and security of their own homes.” Id. at 420. In United States v. Allen, the affidavit stated that a government computer to which the appellant had access connected to an “on-line service” and downloaded child pornography; that Allen admitted “ha[ving] access to [that on-line] service at his residence,” and that he admitted having “erotica at his residence.” 53 M.J. 402, 407 (C.A.A.F. 2000). In light of Nieto, we find that the thumbnail images and icon found on the appellant’s government computer and his access of the website from work, alone, are insufficient to provide the nexus required to search his home. But SA R’s affidavit offered more for the CO’s consideration: i. He had “observed activity on [the appellant’s] account” on the website on “six dates which included weekend days.”54 ii. In response to a phone call to the appellant by a Japanese investigator pretending to be “a telemarketer who was taking a survey about internet service,” the appellant admitted: that he had “internet service at his residence;” that he “has had it for the last 18 months;” that he owns a wireless router, desktop computer, laptop computer, and two cell phones that “he connects to the internet;” and that he “use[d] the internet for web browsing and watching movies.”55 iii. The seven paragraphs on “computers and child pornography” noted “[t]he computer’s ability to store images in digital form makes the computer itself an ideal repository for child pornography,” that the 54 AE V, Encl. (3) at ¶ 6f. 55 Id. at ¶ 6h. 18 United States v. Lancina, No. 201600242 internet “afford[s] individuals several different venues for obtaining, viewing and trading child pornography,” and that such “computer communications can be saved or stored” both intentionally and “unintentionally, e.g., traces of the path of an electronic communication may be automatically stored in many places”—such as “temporary files or ISP client software . . . the web cache and history files,”—where “[s]uch information is often maintained for very long periods of time until overwritten by other data,” even “long after . . . attempts at deleting it.”56 Thus, SA R surmised that “[a] thorough search of this media could uncover evidence of receipt, distribution and possession of child pornography.”57 iv. The 21 paragraphs of “[o]ffender [t]ypology” regarding those who “buy, produce, trade, or sell child pornography; who molest children and/or who are involved with the use of children in sexual acts,” opined that “[a]s a result of [his] training and experience, [he] learned that certain characteristics are generally found to exist in” these people, such as: they generally “collect sexually explicit material consisting of photographs,” they “rarely, if ever, dispose of their sexually explicit material,” they “use such photos as described above as a means of reliving fantasies or actual encounters with the depicted children,” and they “engage in activity or gravitate to programs which will be of interest to the type of victims they desire to attract and will provide them with easy access to these children.”58 v. A paragraph connecting these concepts claimed that “offenders usually maintain illegal images using their computers and that evidence could remain on computers even after a viewer deletes the images,” as such deleted “files have been recovered by forensic analysts”—and, that “it is normal for offenders to save . . . child pornography media . . . on assorted pieces of digital electronic media storage devices to include . . . desktop [and] laptop computers . . . smart telephones, [and] external hard drives[.]”59 a. Offender typology [A] law enforcement officer’s generalized profile about how people normally act in certain circumstances does not, standing alone, provide a substantial basis to find probable cause to 56 Id. at § IV. 57 Id. at § IV(g). 58 Id. at § I. 59 Id. at ¶ 6j. 19 United States v. Lancina, No. 201600242 search and seize an item in a particular case; there must be some additional showing that the accused fit that profile or that the accused engaged in such conduct. Nieto, 76 M.J. at 106. We find that the “offender typology” SA R’s affidavit provided was inadequate to provide the CO with a substantial basis to determine that there was probable cause to search the appellant’s home. As in Nieto, there was no evidence that the appellant “fit” most of this profile at all. There was no evidence, for instance, that the appellant would “buy, produce, trade, or sell child pornography,” or that he was “involved with the use of children in sexual acts.” Most of the profile’s descriptions were “rambling boilerplate recitations designed to meet all law enforcement needs.” United States v. Weber, 923 F.2d 1338, 1345 (9th Cir. 1990) (“[I]f the government presents expert opinion about the behavior of a particular class of persons, for the opinion to have any relevance, the affidavit must lay a foundation which shows that the person subject to the search is a member of the class.”). As such, they provided no nexus between the appellant’s activities at work and at his home. b. Information on computers and child pornography Based on the two thumbnail images on the appellant’s government computer, the affiant demonstrated, as required by Nieto, that the appellant “fit” part of this profile—the appellant was linked to child pornography “images in digital form.”60 Indeed, much of the information in these paragraphs (e.g., that “[s]uch information is often maintained for very long periods of time until overwritten by other data”) could provide a substantial basis for probable cause to search a device for which there was proof that “images in digital form” had already been accessed. However, standing alone, this information still does not establish a nexus between the thumbnail images and the appellant’s home.61 60 AE V, Encl. (3) at § IV(d). 61 SA R asserted at the suppression hearing that he “felt that, if somebody was so bold as to use their government computer to look for child pornography, possibly, or even view, on their government computer, that if that same person has got a home computer and access to the Internet, certainly that same type of behavior is going on where they are basically unimpeded by any other governmental controls; and that they would most certainly view, access, download, and keep that child pornography, or child exploitation images for long periods of time.” Record at 106. However, even assuming arguendo that SA R’s “fe[eling]” provides a substantial basis for probable cause, we do not consider this information because it is not in the affidavit presented to the CO. Cf. United States v. Macomber, 67 M.J. 214, 217 (C.A.A.F. 2009) (“The affidavit stated: child pornographers and persons with a sexual attraction to children almost always maintain and possess child pornography materials such 20 United States v. Lancina, No. 201600242 The closest this portion of the affidavit gets to that connection is the statement that “it is normal for offenders to save . . . child pornography media . . . on assorted pieces of digital electronic media storage devices to include . . . desktop computers, laptop computers . . . smart telephones, [and] external hard drives[.]”62 In Gallo, the copying of files to removable storage provided a nexus between downloading of child pornography on his work computer and the search of Gallo’s home. 55 M.J. at 421-22. However, in Nieto, an affiant’s assertion that “[p]ersons who view and record sexual acts often times store and catalog their images and videos on larger storage devices such as a computer or hard drive,” was not enough to establish a nexus between the appellant’s cell phone and other digital devices. 76 M.J. at 105. The CAAF cautioned: [Reliance on a] generalized observation about the ease with which [digital] media may be replicated on a multitude and array of electronic devices, would run counter to the principle that law enforcement officials must provide specific and particular information in order for a magistrate to determine that there is a fair probability that contraband or evidence of a crime will be found in a particular place. Id. at 108 n.5 (citations and internal quotation marks omitted) (second alteration in original). There being no evidence that the appellant actually engaged in copying files to computer media which he could have transferred to his home, unlike in Gallo, we conclude that this portion of the affidavit here was too “generalized” to provide a substantial basis for probable cause to search the appellant’s home for child pornography.63 c. Use of the website We find a sufficient nexus between the appellant’s home and child erotica, which provides probable cause to suspect the presence of child pornography, based on statements in the affidavit that he had internet access at home, that he accessed the website on weekends, and reasonable inferences therefrom. as: . . . . graphic image files . . . . These materials are stored in a secure but accessible location within their immediate control, such as in the privacy and security of their own homes, most often in their personal bedrooms.”). 62 AE V, Encl. (3) at ¶ 6j (emphasis added). 63 We also note that paragraph J, unlike the other information on child pornography and computers in the affidavit, uses the term “offender[],” linking it to the “offender typology” which we determined supra was irrelevant due to the fact that the affiant offered no proof the appellant ever did “buy, produce, trade, or sell child pornography” or “molest children.” 21 United States v. Lancina, No. 201600242 In Clayton, the CAAF found a sufficient nexus between the appellant’s membership in a child pornography web group which was linked to his e-mail address, and a search of his “laptop, in [his] quarters, and . . . workspace,” based on a “practical, commonsense understanding of the relationship between the active steps that a person might take in obtaining child pornography from a website and retaining it for an extended period of time on that person’s computer.” 68 M.J. at 424. It did so even though the affidavit provided no specific proof that the appellant had made any downloads, or that he had accessed his e-mail account from his quarters rather than his workspace. Id. at 427, 427 n.1 (Ryan and Erdmann, JJ., dissenting) (noting that Clayton “could have checked his personal email at work, or at other locations,” because “the Government only knew that the account had been accessed by way of a U.S. Army server in Kuwait. It had no information regarding which computer had accessed the account”). In Allen, the affidavit stated that a computer to which Allen had access connected to an “on-line service” and downloaded suspected child pornography; Allen admitted he “had access to the on-line service from his residence;” and, that he had “erotica at his residence.” 53 M.J. at 407. The CAAF held that: This information reasonably shows that [Allen] accessed child pornography through his on-line server while on duty, had access to the same service at his residence, had erotica at his residence, and was evasive about possessing child pornography at home. Thus, [his home] computer equipment and associated materials, such as discs or printed graphics, would be or would contain evidence of this contraband material. Id. (emphasis added). The Allen Court found “substantial evidence” to search the appellant’s home, without direct proof of child pornography there. Id. As in Clayton and Allen, the appellant had access to the website not only from his workplace, but also from home, as evidenced by his reported “survey” responses detailed in the affidavit. Going beyond mere access, SA R had “observed activity on [the appellant’s] account” on the website on “six dates which included weekend days.”64 There is no evidence that the appellant was in any peculiar circumstance, such as being underway on a ship, in which his government computer would have been his exclusive means to access the website during the weekend. The CO did not have to rule 64 Affidavit at ¶ 6f. 22 United States v. Lancina, No. 201600242 out every other location from which the appellant could have accessed the website, in order to find probable cause to search his home.65 Thus, based on the appellant’s reported survey responses and the timing of his website use, we find that the CO could reasonably infer the appellant accessed the website from his home.66 We need not determine whether the military judge’s finding that the appellant “was active on the site on weekends when he was not at work[,]”67 was clearly erroneous, as our focus is on the CO’s determination of probable cause from the affidavit, and the CO could infer that the appellant had accessed the website while not at work from the information provided. The appellant argues that because SA R had neither an “[I]nternet [P]rotocol (IP) address of a computer tied to downloading images of child pornography,” nor “any website conversation tying [the appellant’s] home to wrongful possession of child pornography,”68 we cannot find a nexus. We disagree. The Sixth Circuit Court of Appeals has held that even where an “affidavit did not contain direct evidence the child pornography was accessed at home,” the lack of “an IP address connecting the subscriber to a particular location is not dispositive” regarding “probable cause to search [the] home[.]” United States v. Kinison, 710 F.3d 678, 684 (6th Cir. 2013) (citing United States v. Terry, 522 F.3d 645, 648 (6th Cir. 2008) (“While any IP or other information that could have more specifically tied Terry’s home computer to the e-mail messages would certainly have been welcome, we are satisfied that the use of Terry’s personal e-mail account in the wee hours of the morning, combined with information that Terry used his home computer to access that account, established at least a ‘fair probability’ that the computer used to send the messages was . . . in Terry’s home”)). 65 See United States v. Wagers, 452 F.3d 534, 539 (6th Cir. 2006) (noting that where investigators learned Wagers used a particular internet service provider to purchase memberships at a child pornography site, there would have been “sufficient evidence to support probable cause” to search his home for child pornography even if the “home w[as] . . . one of two locations—home and office—served” by the provider which Wagers could have used). 66 See United States v. Lapsins, 570 F.3d 758, 766-67 (6th Cir. 2009) (finding probable cause to search Lapsins’ home, where the affidavit documented internet account activity involving child pornography which was conducted through “a residential cable modem in the city where Lapsins lived” at a time when he was likely to have been at home, even though “there was no direct evidence” he had ever “used a home computer to access” the internet accounts). 67 AE XVII at 5. 68 Appellant’s Brief at 17. 23 United States v. Lancina, No. 201600242 In Nieto, there was no evidence linking Nieto’s phone to the laptop besides the affiant’s intuition and some general assumptions about what people do with their smartphones. Here, by contrast, there was evidence in this affidavit specifically demonstrating the appellant used the website on weekends, when the CO could reasonably infer that he was at home. Under the totality of the circumstances—such as the use of the website containing child erotica at home, combined with the thumbnail images and icon on the government computer, and the information in the affidavit about how digital images once accessed on a computer are likely to be retained—we find that the CO could infer that the appellant accessed child pornography at home, and that it would be maintained on digital devices there. Thus, we find that the CO had a substantial basis to find probable cause, with a nexus sufficient to search the appellant’s home and digital devices for child pornography. B. Consent by Ms. O to the PASS In his ruling on the motion to suppress, the military judge also held that: the “defense failed to establish” the appellant’s “standing to challenge the lawful consent by Ms. [O] to permit access to the apartment under the [United States-Japan Status of Forces Agreement (“SOFA)] or Japanese law;”69 Ms. O “knowingly and voluntarily permitted . . . access to the apartment for the purpose of executing the [CASS];”70 and, the seized evidence was admissible under both the good faith exception of MIL. R. EVID. 311(c)(3) and the inevitable discovery exception of MIL. R. EVID. 311(c)(2).71 The appellant argues that the military judge erred in ruling that the appellant “did not have standing to challenge [Ms. O]’s consent,”72 and, “that Ms. O knowingly and voluntarily permitted NCIS Agents access to the apartment for the purpose of executing the command authorized search.”73 In abuse of discretion review, we “consider the evidence in the light most favorable to the prevailing party.” United States v. Rodriguez, 60 M.J. 239, 246 (C.A.A.F. 2004) (citation and internal quotation marks omitted). We review the military judge’s “factfinding under the clearly-erroneous standard and [his] conclusions of law under the de novo standard.” United States v. Ayala, 43 M.J. 296, 298 (C.A.A.F. 1995). We will find an abuse of discretion only if findings of fact are clearly erroneous or conclusions of law are incorrect. Id. 69 AE XVII at 19 n.3. 70 Id. at 21. 71 Id. at 22-25. 72 Appellant’s Brief at 24. 73 Id. at 25. 24 United States v. Lancina, No. 201600242 1. The appellant’s standing to challenge an alleged SOFA violation We note that because the CASS was supported by probable cause, Ms. O’s consent had no impact on the search’s validity under the Fourth Amendment, regardless of any potential SOFA and Japanese law implications of entering the apartment without her consent. Any constitutional requirement for Ms. O’s consent (or a Japanese court’s authorization) to search the apartment would thus have to derive from “treaties” being “the supreme law of the land.” U.S. CONST. ART. VI. Under “Agreed View” 17(b) of the United States-Japan SOFA, “when the United States authorities deem it necessary to make searches or seizures outside facilities or areas in use by the United States Armed Forces with respect to crimes allegedly committed by United States . . . personnel, they should request Japanese law enforcement agencies to make such dispositions[.]”74 However, “United States . . . law enforcement personnel may make searches and seizures of places occupied exclusively by” U.S. personnel and/or dependents.75 “Although treaties are the supreme law of the land . . . this is not to say that individuals always may enforce this country’s treaty rights by a private law action or by invoking an exclusionary rule.” United States v. Whiting, 12 M.J. 253, 254-55 (C.M.A. 1982) (citation omitted) (declining to apply the exclusionary rule to evidence obtained where “German authorities had not been notified of the off-base search, as was required by international agreements to which the United States and Germany were parties”). The appellant cites no law or facts to support his claim that the military judge’s ruling that the appellant lacked standing to challenge whether Ms. O’s consented to the search is “incorrect.”76 The fact that Article 17(b) of the SOFA expressly allows searches and seizures of U.S. personnel based solely on a decision of U.S. authorities, unless non-U.S. personnel live there, strongly suggests that the exception the appellant seeks to enforce was crafted for the benefit of the Japanese state—by preserving its control, absent exigent circumstances, over when U.S. law enforcement can search personnel subject to Japanese jurisdiction. As in Whiting, the appellant cannot assert this right. 12 M.J. at 255 (noting that “the performance of [treaty] obligations is exclusively within the province of the Executive and Legislative Branches”). 74 AE V, Joint Committee Agreements, No. 17. 75 Id. (emphasis added). 76 Appellant’s Brief at 24. 25 United States v. Lancina, No. 201600242 Even if we assume arguendo that this provision of the United States- Japan SOFA confers a legal right upon Ms. O, were she on trial, we would decline to find that the appellant may assert a right belonging to Ms. O at his court-martial. Cf. United States v. Padilla, 508 U.S. 77, 81-82 (1993) (noting an “established principle is that suppression of the product of a Fourth Amendment violation can be successfully urged only by those whose rights were violated by the search itself, not by those who are aggrieved solely by the introduction of damaging evidence”) (citation and internal quotation marks omitted). 2. Inevitable discovery Even if the appellant had standing to assert noncompliance with the SOFA and benefit from the exclusionary rule, the inevitable discovery doctrine nevertheless “allow[s] admission of evidence that, although obtained improperly, would have been obtained by another lawful means.” United States v. Wallace, 66 M.J. 5, 10 (C.A.A.F. 2008) (citing Nix v. Williams, 467 U.S. 431, 444 (1984)); see also MIL. R. EVID. 311(c)(2). In Wallace, the CAAF held that even “had [Williams] not ultimately consented to the seizure of the computer . . . investigators would have sought and obtained a search authorization based on probable cause” for investigation of an enticement crime which would have required “sift[ing] through” computer data, and thereby would have discovered child pornography on Wallace’s computer. 66 M.J. at 10. The CAAF so decided even though “the government present[ed] no evidence” it “would have obtained a warrant” had Williams refused to grant consent to search his computer.” Id. at 11 (Baker, J., concurring in the result). Here, the military judge found that: i. “[The legal advisor] opined that if [Ms. O] refused entry, they would coordinate with Japanese authorities to execute the search.”77 ii. “[I]f [Ms. O] would not provide access, then [NCIS] would have proceeded to obtain permission to enter to conduct the command authorized search from Japanese authorities.”78 iii. “Had [Ms. O] not granted the agents access to the apartment, the agents were prepared to liaise with Japanese authorities to secure a Japanese magistrate or judicial authorization to enter the apartment 77 AE XVII at 10. 78 Id. at 11. 26 United States v. Lancina, No. 201600242 to conduct the command authorized search of the accused’s apartment and belongings.”79 The appellant has not argued how any of these facts are erroneous, and we find no clear error. In light of Wallace, we agree with the military judge that these NCIS investigators, with probable cause to suspect that evidence of an alleged computer crime existed at the appellant’s residence—and who, unlike the investigators in Wallace, were ready and willing to obtain a search authorization from the Japanese authorities if Ms. O refused consent—would have done so, thereby obtaining the incriminating evidence on the appellant’s external hard drive and laptop. III. CONCLUSION The findings and the sentence are affirmed. Judge FULTON and Judge HUTCHISON concur. For the Court R.H. TROIDL Clerk of Court 79 Id. at 14. 27