United States v. Specialist MICHAEL S. SPIESS , 71 M.J. 636 ( 2012 )


Menu:
  • UNITED STATES ARMY COURT OF CRIMINAL APPEALS
    Before
    KERN, ALDYKIEWICZ, and MARTIN
    Appellate Military Judges
    UNITED STATES, Appellee
    v.
    Specialist MICHAEL S. SPIESS
    United States Army, Appellant
    ARMY 20100229
    Headquarters, U.S. Army Alaska
    Mark A. Bridges, Military Judge
    Lieutenant Colonel Randall J. Bagwell, Staff Judge Advocate
    For Appellant: Lieutenant Colonel Imogene M. Jamison, JA; Captain Jennifer A.
    Parker, JA; Colonel Edye U. Moran, JA (on brief).
    For Appellee: Major Amber J. Williams, JA; Major Katherine S. Gowel, JA; Captain
    Christopher S. Glascott, JA (on brief).
    28 September 2012
    ----------------------------------
    OPINION OF THE COURT
    ----------------------------------
    ALDYKIEWICZ, Judge:
    A military judge, sitting as a general court-martial, convicted appellant,
    contrary to his pleas, of violating a lawful general order and knowingly possessing
    child pornography in violation of Articles 92 and 134, Uniform Code of Military
    Justice, 
    10 U.S.C. §§ 892
    , 934 (2006) [hereinafter UCMJ]. The convening authority
    approved the sentence to a bad-conduct discharge, confinement for fourteen months,
    and reduction to the grade of E-1.
    The case is now before this court for review pursuant to Article 66, UCMJ.
    Appellant alleges a single assignment of error: that the military judge abused his
    discretion by admitting evidence at trial that was obtained or derived from an illegal
    search of appellant’s external hard drive. We agree that the military judge erred
    when he concluded that the search in this case was private in nature. However, we
    conclude that appellant was not prejudiced by this error because (1) the evidence
    from appellant’s external hard drive would have been inevitably discovered, and (2)
    SPIESS—ARMY 20100229
    appellant’s allegedly derivative confession is sufficiently attenuated from the illegal
    search so as to be admissible in its own right.
    A. BACKGROUND
    Appellant was deployed to Iraq in support of Operation Iraqi Freedom and
    resided on Forward Operating Base (FOB) Warhorse in a two-person containerized
    housing unit (CHU). Appellant shared his CHU with a fellow soldier, Specialist
    (SPC) JC. Appellant’s CHU was divided into two halves with each half separated by
    a wall locker that acted as a make-shift wall down the middle. The CHU was
    secured by lock and key.
    1. The Initial Discovery of Child Pornography
    On 22 February 2009, while appellant was on rest and recuperation (R&R)
    leave in the United States, appellant’s roommate, SPC JC, was securing all the
    personal belongings in their CHU as part of corrective training requiring him to
    “live out of his rucksack.” This training was directed by the soldiers’ platoon
    sergeant, Sergeant First Class (SFC) DH, in response to the poor living conditions
    SFC DH previously observed in the CHU. Specialist JC decided to watch a movie
    while he secured the belongings in the CHU. Consistent with his clean-up plan, SPC
    JC took his laptop computer to appellant’s side of the CHU and connected it to
    appellant’s external hard drive to search for a movie to download and view.
    Specialist JC knew appellant had movies on the hard drive because on several prior
    occasions appellant transferred movies to SPC JC’s laptop when SPC JC asked him
    to do so. On all prior occasions, however, appellant connected the hard drive to SPC
    JC’s computer and appellant himself executed both the search for movies and the file
    exchange. Appellant never provided SPC JC the actual hard drive to execute either
    the search or file transfer himself, nor did appellant give SPC JC unfettered or carte
    blanche access to use appellant’s hard drive whenever he so desired. Furthermore,
    while appellant and SPC JC occasionally shared military gear, they never shared
    personal items.
    As SPC JC searched appellant’s external hard drive files for a movie, he came
    upon a file name that caused him concern, specifically, a file named “15 year old on
    21 year old” or words to that effect. Specialist JC suspected the video file contained
    child pornography. Not wanting to wrongly accuse his roommate of misconduct,
    SPC JC decided to view the file and confirm his suspicions. When the movie
    played, SPC JC saw “a little girl about 12 years of age and a male late twenties early
    thirties” who was talking to the girl and then “[the little girl] takes her top off.”
    2
    SPIESS—ARMY 20100229
    2. The Search and Seizure of Appellant’s External Hard Drive
    The following day, 23 February 2009, SPC JC approached SFC DH in the
    motor pool. Specialist JC told SFC DH that he found what he thought was child
    pornography on appellant’s external hard drive. Sergeant First Class DH told SPC
    JC that it was obviously against the law and that SPC JC had to give him the hard
    drive. Visibly bothered by what he found and the situation of accusing a “battle
    buddy,” SPC JC asked SFC DH to come by his CHU and “confirm” his suspicions.
    When SFC DH arrived at the CHU later that evening, SPC JC initially started
    to give SFC DH the hard drive and then changed his mind, asking SFC DH to view
    the video at issue and confirm his suspicions. Specialist JC then proceeded, as he
    had done the night before, to appellant’s side of the CHU and connected his laptop
    to appellant’s external hard drive. Specialist JC checked the recent files on his
    laptop computer in an attempt to find the video he saw the day before. When the
    recent files search proved unsuccessful, SPC JC started searching various file
    folders on appellant’s external hard drive for the video. That also proved
    unsuccessful. After numerous failed attempts to locate the video from the day
    before, SFC DH showed appellant how to search for computer files by
    simultaneously holding down the “Control” key and letter “F.” Sergeant First
    Class DH physically held down both keys that launched the search function.
    Specialist JC then used the computer’s “Control-F” search function and attempted to
    locate the movie he saw the day before, but was unsuccessful. At this point,
    SFC DH suggested various search terms for SPC JC to use. Sergeant First Class DH
    told appellant to try using numbers to locate the movie. This technique resulted in
    the discovery of another video containing child pornography, albeit a video separate
    and distinct from the video seen by SPC JC the day before. Specialist JC minimized
    this video and continued, while in SFC DH’s presence, to search appellant’s hard
    drive for the video he discovered the day before. A short time later, after continued
    efforts to locate that specific video failed, SPC JC and SFC DH decided to
    “maximize” the video which was earlier minimized. Once maximized, SPC JC and
    SFC DH viewed several seconds of this video which showed a child, age ten to
    twelve years old, masturbating an adult male.
    After observing obvious child pornography, SFC DH seized appellant’s hard
    drive and immediately delivered it to the company First Sergeant (1SG), 1SG AD,
    who in turn gave it to the unit commander, Captain (CPT) AW. 1 First Sergeant AD
    told CPT AW that the hard drive contained suspected child pornography. Captain
    AW immediately sought legal guidance and was told by “JAG” to contact U.S. Army
    1
    Captain AW appears in various documents in the record as CPT AG, as her last
    name changed between the initial seizure of appellant’s hard drive and time of trial.
    3
    SPIESS—ARMY 20100229
    Criminal Investigation Command (CID), which she did. She advised CID that she
    was in possession of a hard drive with suspected child pornography and was told to
    secure the hard drive until CID agents arrived. Neither CPT AW nor 1SG AD
    searched the hard drive or viewed any of its contents.
    On 24 February 2009, CID Special Agents (SA) CH and KB arrived at FOB
    Warhorse to investigate the child pornography allegations against appellant. After
    securing appellant’s hard drive from CPT AW, the agents conducted a search of
    appellant’s CHU. Appellant’s roommate, SPC JC, consented to a search of his side
    of the CHU and all of his property. The commander, CPT AW, authorized a search
    of appellant’s side and all of appellant’s property. The search discovered nothing of
    any evidentiary value. Special Agent CH also took sworn statements from SPC JC
    and SFC DH detailing the facts and circumstances surrounding their search of
    appellant’s external hard drive. Specialist JC had previously provided a sworn
    statement to his commander.
    3. CID’s Interview of Appellant and his Subsequent Confession
    On 12 March 2009, appellant arrived at Balad Air Base, returning to Iraq from
    his R&R leave. When he arrived in Balad, appellant was advised that he would
    remain there and not travel. The next day, appellant was transported to the CID
    offices on Balad.
    When appellant arrived at CID on 13 March 2009, SA KB advised appellant of
    his Article 31, UCMJ, rights and that appellant was suspected of possessing child
    pornography. Appellant waived his rights and agreed to talk to SA KB. Special
    Agent KB did not apprise appellant of any of the evidence obtained against him.
    According to SA KB, the only thing he told appellant, beyond reading him his rights,
    was that appellant should be truthful with him. Appellant then confessed in a two-
    page, typewritten statement to possessing and viewing child pornography.
    4. The Suppression Hearing
    Appellant’s external hard drive was not forensically examined by CID until
    several months after appellant confessed. Upon examination of the external hard
    drive, experts found numerous files of child pornography.
    At his court-martial, appellant moved to suppress the evidence found on his
    external hard drive, arguing the evidence was obtained as a result of an illegal
    search and seizure. Appellant further moved to suppress his confession as derivative
    of the illegal search. This motion was litigated at an Article 39(a), UCMJ, hearing.
    Special Agent KB testified at this hearing about his interview of appellant.
    Although appellant’s external hard drive was already in CID’s possession, SA KB
    stated that he did not inform appellant that appellant’s external hard drive had
    4
    SPIESS—ARMY 20100229
    already been searched by SPC JC and SFC DH and that child pornography was
    found. Appellant disputed SA KB’s testimony. In support of his motion to
    suppress, appellant testified that SA KB said, “We’ve got your hard drive. We’ve
    got computer experts that are paid to look into this and they’re going to find
    anything that’s on there.” Appellant also testified he would not have confessed but
    for CID’s possession of his external hard drive and knowledge of its contents.
    In addition to the above, the suppression hearing established that SFC DH
    would have pursued action to seize the hard drive had he not already seized it. The
    following colloquy occurred between the military judge and SFC DH regarding the
    handling of the hard drive in the event that SPC JC had refused to turn it over:
    Q: What would you have done if SPC [JC] said, “I’m not going to
    bring the hard drive to you”?
    A: Well, actually, Your Honor, he told me what he thought it was.
    And then I would have pressed the command. I mean, it’s
    already-- if he told me, “Hey, there’s drugs here and they’re not
    mine,” I would still go after the drugs, so----
    Q: So you would have notified your Command?
    A: Yes, I would have . . . .
    Similarly, the suppression hearing established that CPT AW would have
    pursued a search of appellant’s CHU for child pornography had she only been
    confronted with SPC JC’s 22 February 2009 observation of child pornography on
    appellant’s hard drive as opposed to having been brought the hard drive by 1SG AD.
    In response to questioning by the military judge the commander testified, in part, as
    follows:
    A: Given the fact that I was told by Specialist--well, the First
    Sergeant that there was child pornography or some type of
    pornography that was on the hard drive of this soldier’s
    computer--or this hard drive--it gave me probable cause, as a
    Commander, because pornography is illegal in theater. That--
    now, before the [sic] action needs to be taken, we need to make
    sure that we sanitize the area and make sure that we sanitize--
    anything that’s--that’s incorrect, we need to correct it. So
    whatever measure needs to be taken, i.e., following the track that I
    was issued--or given--that--from recommendations--from a Legal
    Office or CID, that’s the track I took.
    ....
    5
    SPIESS—ARMY 20100229
    Q: Had they not brought the hard drive to you, but just came to
    you with the information that they had seen child pornography on
    the hard drive, in the CHU, would you have authorized a search,
    based upon that information?
    A: Of the CHU?
    Q: Of the CHU.
    A: Roger, sir. And the reason I base it [sic] is just like a soldier
    that comes through this main gate, if they got--if there’s drugs in
    the car, there’s probably drugs somewhere else. And if they live
    on--and reside on post, I would--I, as a Commander, would say,
    “Well, you caught him for that at the gate, why don’t you check
    his room, also?” And I have probable cause, because if he has it
    there, to me, it may, you know be passed and possessed through--
    through the entire barracks area. So the two, to me, are linked.
    That is your area, where stuff is stored. And that hard drive was
    stored there. So I have probable cause.
    When asked about the trustworthiness of SPC JC and SFC DH, the commander
    testified:
    They are trustworthy. They’ve never given me a reason not to
    trust them. Sergeant [First Class DH] has been a very, very
    faithful Platoon Sergeant, who has dealt with soldier issues very
    well. And he rarely has soldier issues. And when he does, he’s
    very, very meticulous in handling it. So I understood that if he
    came to me, it had to be serious.
    Finally, SA CH testified that if the Company Commander did not already have
    possession of appellant’s external hard drive suspected to contain child pornography,
    CID would have “searched for and seized that hard drive.”
    After considering the defense motion along with its enclosures, the
    government response, and the testimony on the motion, the military judge denied the
    suppression motion, noting he would later issue written findings to be appended to
    the record.
    On 17 April 2010, the military judge entered written “Findings and
    Conclusions,” specifically finding that while appellant had an expectation of privacy
    in his external hard drive, both the 22 February 2009 and 23 February 2009 searches
    were private in nature and thus did not implicate appellant’s rights under the Fourth
    Amendment as there was no governmental intrusion. Alternatively, the military
    judge found the evidence at issue would have been inevitably discovered. Having
    6
    SPIESS—ARMY 20100229
    found both searches to be private in nature, the military judge’s findings and
    conclusions did not specifically address the admissibility of appellant’s 13 March
    2009 confession. Furthermore, the military judge’s findings are silent with regard to
    any credibility determination between the diametrically opposed testimony of SA KB
    and appellant on whether appellant was confronted by the fact that his hard drive
    had already been searched and seized.
    B. LAW
    The Fourth Amendment prohibits “unreasonable searches and seizures,”
    United States v. Daniels (Daniels II), 
    60 M.J. 69
    , 70 (C.A.A.F. 2004). U.S. Const.
    amend IV. In the military justice system, “[a] search or seizure is ‘unlawful’ if it
    was conducted, instigated, or participated in by . . . [m]ilitary personnel or their
    agents and was in violation of the Constitution of the United States as applied to
    members of the armed forces.” Military Rules of Evidence [hereinafter Mil. R.
    Evid.] 311(c)(1). See Daniels II, 
    60 M.J. at 71
    . A search is not unlawful if it is
    authorized by competent military or civilian authority based upon probable cause,
    Mil. R. Evid. 315, or if it falls within certain exceptions, to include the limited
    circumstances found in Mil. R. Evid. 312, 313, 314, and 317. “Evidence obtained as
    a result of an unlawful search or seizure made by a person acting in a governmental
    capacity” is inadmissible at a court-martial. Mil. R. Evid. 311(a). Thus, a necessary
    trigger for any search implicating Fourth Amendment protections is “government
    intrusion into an individual’s reasonable expectation of privacy.” Daniels II, 
    60 M.J. at 71
    .
    However, “[t]he Fourth Amendment and Mil. R. Evid. 311 are not violated
    when a military member acts in a purely private capacity.” United States v.
    Sullivan, 
    42 M.J. 360
    , 363–64 (C.A.A.F. 1995). Whether a military member acts in
    a private capacity or in an official capacity depends not on the actor’s motivation
    but on whether the individual acted as “an instrument or agent of the Government.”
    Skinner v. Railway Labor Executives’ Ass’n, 
    489 U.S. 602
    , 614 (1989).
    Government intrusion in violation of Fourth Amendment rights, in and of
    itself, does not automatically result in exclusion of the uncovered evidence at court-
    martial, nor does it necessarily require exclusion of derivative evidence. If the
    evidence would have been inevitably discovered through proper means, then that
    evidence is admissible against an accused. Mil. R. Evid. 311(b)(2). “The doctrine
    of inevitable discovery creates an exception to the exclusionary rule allowing
    admission of evidence that, although obtained improperly, would have been obtained
    by another lawful means.” United States v. Wallace, 
    66 M.J. 5
    , 10 (C.A.A.F. 2008)
    (citing Nix v. Williams, 
    467 U.S. 431
     (1984)).
    “[A]fter an accused challenges the legality of a search, the
    prosecution must, by a preponderance of the evidence, establish to
    7
    SPIESS—ARMY 20100229
    the satisfaction of the military judge that when the illegality
    occurred, the government agents possessed, or were actively
    pursuing, evidence or leads that would have inevitably led to the
    discovery of the evidence and that the evidence would inevitably
    have been discovered in a lawful manner had not the illegality
    occurred.”
    United States v. Dease, 
    71 M.J. 116
    , 122 (C.A.A.F. 2012) (quoting United States v.
    Kozak, 
    12 M.J. 389
    , 394 (C.M.A. 1982)).
    Confessions derivative of an illegal search or seizure in violation of the
    Fourth Amendment are generally inadmissible, notwithstanding a proper rights
    advisement pursuant to Miranda v. Arizona, 
    384 U.S. 436
     (1966), or Article 31,
    UCMJ. However, if the government can establish the prior violation is sufficiently
    distinguishable from the later confession, so as to purge any taint from the illegality,
    then the confession is still admissible against an accused. Brown v. Illinois, 
    422 U.S. 590
     (1975). 2 In Brown, the Supreme Court identified three factors “to
    determine if Miranda warnings were sufficient to remove the taint of an unlawful
    search and allow a subsequent confession,” United States v. Conklin, 
    63 M.J. 333
    ,
    338 (C.A.A.F. 2006) (citing Brown, 
    422 U.S. at
    603–04). The three factors are:
    “temporal proximity of the unlawful police activity and the subsequent confession,
    the presence of intervening circumstances, and, the purpose and flagrancy of the
    official misconduct.” 
    Id.
    C. DISCUSSION
    At issue in this case is the military judge’s denial of a defense motion to
    suppress evidence of child pornography found on appellant’s external hard drive
    following two allegedly unlawful searches of appellant’s computer, the first on 22
    February 2009 by SPC JC and the next on 23 February 2009 by SPC JC and SFC DH.
    Also at issue is the military judge’s denial of the defense motion to suppress
    appellant’s later confession as derivative of the alleged unlawful searches.
    A military judge’s ruling on a suppression motion is reviewed for an abuse of
    discretion. Dease, 71 M.J. at 120. Findings of fact and conclusions of law are
    2
    See Kaupp v. Texas, 
    538 U.S. 626
     (2003); Taylor v. Alabama, 
    457 U.S. 687
     (1982);
    Dunaway v. New York, 
    442 U.S. 200
     (1979); United States v. Conklin, 
    63 M.J. 333
    (C.A.A.F. 2006). But see New York v. Harris, 
    495 U.S. 14
     (1990) (finding
    admission of evidence constitutionally permissible and declining application of
    Brown’s attenuation analysis where the defendant was illegally arrested but later
    confessed while in lawful custody).
    8
    SPIESS—ARMY 20100229
    reviewed under a clearly erroneous standard and de novo standard, respectively.
    United States v. Rodriguez, 
    60 M.J. 239
    , 246 (C.A.A.F. 2004). When considering a
    military judge’s ruling on a suppression motion, the court considers the evidence “in
    the light most favorable to the prevailing party.” United States v. Reister, 
    44 M.J. 409
    , 413 (C.A.A.F. 1996). “In order to find an abuse of discretion, we must find
    that the military judge committed a clear error in his conclusions.” Dease, 71 M.J.
    at 121.
    1. Reasonable Expectation of Privacy
    The military judge’s findings correctly reflect that appellant had a reasonable
    expectation of privacy in his external hard drive. The hard drive was stored in a
    secured CHU. The CHU was divided into two halves by a wall locker and the hard
    drive was kept on appellant’s side. While appellant and SPC JC occasionally shared
    military “gear,” they did not share personal belongings. Finally, appellant never
    gave SPC JC permission to use his hard drive nor did SPC JC believe that he had
    unfettered or carte blanche access to the drive. On all prior occasions where movies
    were transferred from appellant’s hard drive to SPC JC’s computer, appellant
    searched for and executed the file transfers. Accordingly, the military judge
    correctly concluded that appellant had a reasonable expectation of privacy in his
    external hard drive. See Conklin, 63 M.J. at 337.
    2. Private Action or Governmental Intrusion
    SPC JC’s Initial Discovery of Child Pornography
    Specialist JC’s search of appellant’s external hard drive on 22 February 2009
    did not amount to a government intrusion into appellant’s reasonable expectation of
    privacy. Specialist JC’s actions in searching appellant’s external hard drive for
    movies, resulting in the discovery of child pornography, was a private, non-
    governmental search. At the time of the search, SPC JC and appellant were the same
    rank and neither soldier held a position of authority over the other. The purpose of
    SPC JC’s search was to simply find a movie to watch as he cleaned their CHU. At
    the time of the search, SPC JC did not suspect his roommate of any criminal activity,
    did not suspect that the hard drive contained any items of a contraband nature, and
    was not engaged in any law enforcement or command directed activity focused on
    appellant or his hard drive. Nothing regarding SPC JC’s actions in connecting
    appellant’s hard drive to his personal laptop computer and subsequently searching
    the drive for a movie to watch has any indicia of official, governmental action. See
    Daniels II, 60 M.J. at 71 (citing Skinner, 
    489 U.S. at
    615–16 (1989)). Accordingly,
    9
    SPIESS—ARMY 20100229
    the military judge correctly concluded SPC JC’s actions did not violate appellant’s
    Fourth Amendment rights. 3
    SPC JC’s and SFC DH’s Subsequent Search
    of Appellant’s External Hard Drive
    Although the initial discovery of appellant’s child pornography was not in
    violation of the Fourth Amendment, we conclude that the subsequent, unauthorized
    search of appellant’s external hard drive was unlawful. See Mil. R. Evid. 313–315.
    Sergeant First Class DH’s direction and participation in SPC JC’s subsequent search
    of appellant’s external hard drive amounted to a government intrusion into
    appellant’s reasonable expectation of privacy. The military judge’s findings of fact
    with regard to the 23 February 2009 search engaged in by SPC JC and SFC DH are
    supported by the record and as such are not clearly erroneous. However, in applying
    the law to these facts, the military judge erroneously concluded that SFC DH’s
    involvement did not transform what was previously a private search by SPC JC into
    a governmental intrusion. In this respect, the military judge’s application of the law
    to the facts was clearly erroneous.
    On appeal, the government urges us to consider United States v. Daniels
    (Daniels II), 
    60 M.J. 69
     (C.A.A.F. 2004), in support of the military judge’s finding
    of a private, non-governmental intrusion. The Daniels case turned on whether a
    government official encouraged, endorsed, or participated in a third party’s search
    such that the third party became an agent for the government official. The
    government correctly notes the applicability of Daniels to the instant case, but a
    review of Daniels reveals that it does not support the government’s argument of
    private action.
    In Daniels, the appellant, Seaman Apprentice (Seaman) Daniels, placed a vial
    in his nightstand drawer and told his roommate, Seaman V, that the vial contained
    cocaine. Daniels II, 60 M.J. at 70. The following day Seaman V told their
    supervising instructor, Chief W, about the appellant’s possession of the illegal
    substance. Chief W told Seaman V to retrieve the vial and bring it back to him.
    Notwithstanding his belief that Seaman Daniels was merely joking with his
    3
    Regarding the 22 February 2009 search, the military judge made one finding of
    fact unsupported by the record. The military judge found that the video observed by
    SPC JC depicted an adult man lying “down on the bed with the girl.” This finding
    of an adult male in bed with the child is unsupported by the record. All other
    findings regarding the 22 February 2009 are supported by the record. More
    importantly, the military judge’s application of the law to the supported factual
    findings, without consideration of the erroneous finding, is correct.
    10
    SPIESS—ARMY 20100229
    roommate, Chief W nonetheless submitted the vial for testing, testing that
    subsequently revealed the presence of cocaine and formed the basis of the
    appellant’s conviction. Id. at 69–70. Prior to trial, the appellant moved to suppress
    this evidence, arguing that the retrieval of the vial from his nightstand violated the
    Fourth Amendment. Id. at 69. The military judge concluded the search was non-
    governmental in nature and denied the motion.
    Seaman Daniels raised this same issue on appeal, and the Navy-Marine Corps
    Court of Criminal Appeals held that the retrieval of the vial from his nightstand was
    neither a search nor governmental action. The Navy Court based its decisions on the
    facts that Chief W did not actually suspect that the appellant had drugs in his room
    and that Seaman V’s motivation in seizing the alleged drugs was privately motivated
    to protect his own personal interests. United States v. Daniels (Daniels I), 
    58 M.J. 599
    , 604–06 (N.M. Ct. Crim. App. 2003).
    The Court of Appeals for the Armed Forces (CAAF) disagreed, holding the
    Navy Court “erred on both accounts.” Daniels II, 60 M.J. at 71. In arriving at its
    decision, CAAF noted:
    [T]he question of whether a private actor performed as a
    government agent does not hinge on motivation, but rather “on the
    degree of the Government’s participation in the private party’s
    activities, a question that can only be resolved ‘in light of all
    circumstances.’” Skinner[, 
    489 U.S. at
    614–15]. To implicate the
    Fourth Amendment in this respect, there must be “clear indices of
    the Government’s encouragement, endorsement, and participation”
    in the challenged search. 
    Id.
     at 615–16.
    Daniels II, 60 M.J. at 71. CAAF concluded that Seaman V’s actions amounted to
    governmental intrusion, as opposed to private action, because Seaman V did not, of
    his own accord, bring the suspected vial of cocaine to Chief W for consultation.
    Instead, Seaman V consulted with Chief W first and was then directed by Chief W to
    retrieve the vial. The court found “Chief [W’s] specific order as a government
    official triggered [Seaman V’s] actual seizure of the vial.” Id. Therefore, “Chief
    [W] clearly encouraged, endorsed, and participated in [Seaman] V’s seizure of the
    vial and, accordingly, [Seaman V] acted as Chief [W’s] agent when he seized the
    vial.” Id.
    As in Daniels, the issue before this court is the degree of participation by a
    government official in a private party’s search. Stated another way, the issue is to
    what extent, if any, did SFC DH encourage, endorse, and participate in the search of
    11
    SPIESS—ARMY 20100229
    appellant’s computer on 23 February 2009. 4 In this respect, the military judge made
    an error similar to that made by the Navy Court in Daniels—he focused on the
    private party’s motivation for conducting the search instead of the government
    official’s encouragement, endorsement, and participation in that search.
    In his written findings, the military judge noted that “[a]lthough SFC [DH]
    did suggest terms and methods for searching for files on the computer, those actions
    did not influence SPC [JC] in his own desire to find the video file and show it to
    SFC [DH].” The military judge then concluded that SFC DH did not encourage,
    endorse, or participate in the search. In our view, the facts do not support this
    conclusion. Like Chief W in Daniels, SFC DH directed SPC JC to give him the hard
    drive and when SFC DH arrived at appellant’s CHU, SPC JC initially provided SFC
    DH with the hard drive. However, SPC JC changed his mind and asked SFC DH to
    confirm his suspicions regarding the child pornography that he observed the day
    before. Sergeant First Class DH then proceeded to involve himself in SPC JC’s
    ensuing search of appellant’s hard drive. Had SPC JC immediately retrieved the file
    in question and simply displayed it to SFC DH or given SFC DH the hard drive,
    without any action by SFC DH, the military judge’s conclusion would be correct in
    that SFC DH would have had nothing more than a passive role, if any, in the search.
    The mere delivery, or in this case, display of contraband by one private party to a
    government official or law enforcement official does not convert an otherwise
    private act into governmental intrusion triggering Fourth Amendment protections.
    Daniels II, 60 M.J. at 71. 5
    4
    Neither CAAF in Daniels nor the Supreme Court in Skinner, the case upon which
    Daniels relies, define “encourage, endorse, and participate”; however, the plain
    meaning of those words are adequate for resolution of the instant case. Black’s Law
    Dictionary 607, 1229 (9th ed. 2009), defines “encourage” as, “To instigate; to incite
    to action,” and it defines “participation” as, “The act of taking part in something,
    such as a partnership, a crime, or a trial.” Webster’s II New Riverside Dictionary
    (rev. ed. 1996), defines “encourage” as, “To support [or] foster”; “endorse” as, “To
    approve of publicly [or] support”; and “participate” as, “To join with others in
    something [or] take part.”
    5
    See, e.g., United States v. Gregory, 
    611 F.Supp. 1033
    , 1044 & n.35 (S.D.N.Y.
    1985) (finding no Fourth Amendment violation where evidence was inspected by law
    enforcement officials when delivered by a private citizen) (citing Walter v. United
    States, 
    447 U.S. 649
     (1980), Burdeau v. McDowell, 
    256 U.S. 465
     (1921), and United
    States v. McGuire, 
    381 F.2d 306
    , 313 n.5 (2d Cir. 1967)); State v. Buswell, 
    460 N.W.2d 614
     (Minn. 1990) (finding no Fourth Amendment violation where evidence
    was seized following the search of a motor vehicle delivered to law enforcement
    personnel); State v. Lamb, 
    224 S.E.2d 51
     (Ga. Ct. App. 1976) (finding no Fourth
    (continued . . .)
    12
    SPIESS—ARMY 20100229
    Specialist JC, however, did not simply retrieve the suspect file and show it to
    a passive, noncommissioned officer who was in the CHU pursuant to the invitation
    of one of its two lawful occupants. Sergeant First Class DH specifically went to the
    CHU to retrieve suspected evidence of child pornography, and when he arrived, SPC
    JC began a confirmatory search of appellant’s external hard drive. When SPC JC
    could not find the suspected child pornography that he had observed the day prior,
    SPC JC engaged in a detailed search of appellant’s hard drive, a search conducted in
    the presence of SFC DH. Furthermore, SFC DH did more than sit idly by; SFC DH
    himself, not SPC JC, manipulated the keyboard of the laptop to launch the search
    engine. When SPC JC was still unable to locate the suspected child pornography,
    SFC DH suggested search terms to use, terms that eventually discovered a separate
    and distinct file containing child pornography. Contrary to the military judge’s
    written findings, SFC DH’s actions in launching the search tool necessary to search
    appellant’s computer, and then suggesting search terms, amounted to more than a
    passive role in the search of appellant’s computer. The fact that SPC JC typed the
    search terms suggested to him by SFC DH is less than compelling in evaluating SFC
    DH’s actions.
    On the facts of this case, we find that SFC DH encouraged, endorsed, and
    participated in the search of appellant’s external hard drive. Therefore, SPC JC’s
    and SFC DH’s search was a government intrusion into appellant’s reasonable
    expectation of privacy, and the military judge’s conclusion to the contrary is clearly
    erroneous.
    3. Inevitable Discovery Exception to the Exclusionary Rule
    Although SPC JC’s and SFC DH’s unauthorized search violated the Fourth
    Amendment, we nonetheless conclude appellant was not prejudiced by the military
    judge’s ruling to the contrary. We hold that the child pornography found on
    appellant’s external hard drive pursuant to the unlawful search would have been
    inevitably discovered and was therefore admissible against appellant at his court-
    martial.
    As previously noted, SPC JC’s actions on 22 February 2009 were private in
    nature and thus did not trigger Fourth Amendment protections for any of the
    information discovered during that search. Thus, the evidence discovered by SPC
    JC in his private capacity could have been lawfully used to support a search
    (. . . continued)
    Amendment violation where marijuana was delivered to law enforcement personnel
    by a dormitory supervisor).
    13
    SPIESS—ARMY 20100229
    authorization—assuming it established probable cause—which, in turn, could have
    led to the lawful search and seizure of appellant’s hard drive. However, absent
    probable cause to believe appellant’s computer contained child pornography, “there
    could be no application of the doctrine of inevitable discovery in this case.” Dease,
    71 M.J. at 121–22 (citations omitted).
    Probable cause is “a fair probability that contraband or evidence of a crime
    will be found in a particular place.” United States v. Williamson, 
    65 M.J. 706
    , 712
    (Army Ct. Crim. App. 2007) (quoting Illinois v. Gates, 
    462 U.S. 213
    , 238 (1983)).
    In the context of military search authorizations, probable cause is defined as “a
    reasonable belief that the person, property, or evidence sought is located in the place
    or on the person to be searched.” Mil. R. Evid. 315(f)(2). The Military Rules of
    Evidence further note that “[a] search authorization may be based upon hearsay
    evidence in whole or in part.” 
    Id.
     A file name alone may be sufficient to establish
    probable cause. See United States v. Yammine, 
    69 M.J. 70
    , 75 (C.A.A.F. 2010)
    (citing United States v. Leedy, 
    65 M.J. 208
    , 215–18 (C.A.A.F. 2007)).
    The information conveyed by SPC JC to his platoon sergeant, SFC DH, went
    well beyond a single file name that might be indicative of child pornography. On 22
    February 2009, SPC JC, acting in a purely private capacity, observed suspected child
    pornography on the external hard drive of appellant’s computer. The military judge
    found the video “was of a man and little girl entering a bedroom.” The little girl,
    estimated by SPC JC to be “eleven to twelve” years of age, was wearing a swimsuit
    and being followed from behind by an adult male. Specialist JC observed the girl
    “take her top off.” He also saw the adult male start to “lay down.” At that point,
    SPC JC stopped watching the video. Specialist JC recalled the file name of the
    video to be “15 on 21 or something like that.” Specialist JC’s observations establish
    probable cause to believe that appellant’s external hard drive contained child
    pornography.
    The record further establishes that had the external hard drive not been seized,
    appellant’s commander, CPT AW, would have authorized a search of his CHU, and
    the external hard drive would have been seized and eventually processed by
    appropriate law enforcement officials. In United States v. Wallace, 
    66 M.J. 5
    (C.A.A.F. 2008), our superior court applied the doctrine of inevitable discovery in
    an analogous situation. In Wallace, the appellant’s computer was initially seized
    pursuant to invalidly obtained consent; however, CAAF held that the evidence found
    on that computer would have been inevitably discovered: “[H]ad Appellant not
    ultimately consented to the seizure of the computer, the [Air Force Office of Special
    Investigations] would have sought and obtained a search authorization based upon
    probable cause. . . . [T]he files containing child pornography would have been
    inevitably discovered through this valid search.” 
    Id. at 10
    . Cf. Dease, 
    71 M.J. 116
    .
    14
    SPIESS—ARMY 20100229
    In the instant case, SFC DH already “possessed” evidence that established
    probable cause to suspect appellant’s external hard drive contained child
    pornography and he, along with the appellant’s commander, CPT AW, articulated
    unequivocally, along with SA CH, what would have occurred—the external hard
    drive would have been seized and eventually searched for child pornography by law
    enforcement personnel. Accordingly, we hold the evidence at issue would have been
    inevitably discovered and was therefore properly admitted against appellant at his
    court-martial.
    4. Derivative Evidence and the Presumption of Prejudice
    Although the evidence ultimately discovered on appellant’s hard drive was
    properly admitted into evidence, there remains a question as to whether appellant’s
    confession was also properly admitted. In this case, appellant claims that his
    confession was derivative of the underlying unlawful search by SFC DH on 23
    February 2009 and should have been excluded as “fruit of the poisonous tree.” We
    disagree. Applying the Brown factors to appellant’s case, we conclude that
    appellant’s confession was sufficiently attenuated from the unlawful search so as to
    make appellant’s properly warned confession independently admissible.
    A causal connection alone between an unlawful search and the alleged
    derivative evidence, in this case appellant’s confession, does not make the derivative
    evidence per se inadmissible. United States v. Murphy, 
    39 M.J. 486
    , 487 (C.M.A.
    1994) (citing Nardone v. United States, 
    308 U.S. 338
     (1939)). “As a matter of good
    sense . . . such connection may have become so attenuated as to dissipate the taint.”
    Nardone, 
    308 U.S. at 341
    . In Wong Sun v. United States, 
    371 U.S. 471
     (1963), the
    Supreme Court noted:
    We need not hold that all evidence is “fruit of the poisonous tree”
    simply because it would not have come to light but for the illegal
    actions of the police. Rather, the more apt question in such a case is
    whether, granting establishment of the primary illegality, the evidence
    to which the instant objection is made has been come at by exploitation
    of that illegality or instead by means sufficiently distinguishable to be
    purged of the primary taint.
    Wong Sun, 
    371 U.S. at
    487–88 (internal citations and quotation marks omitted). To
    make this determination, we consider three factors: “temporal proximity of the
    [constitutional violation] and the confession, the presence of intervening
    circumstances, and, particularly, the purpose and flagrancy of the official
    misconduct.” Brown, 
    422 U.S. at
    603–04 (emphasis added). See United States v.
    Conklin, 
    63 M.J. 333
    , 338 (C.A.A.F. 2006).
    15
    SPIESS—ARMY 20100229
    The first Brown factor, temporal proximity, favors the government. The
    unlawful search in this case occurred, as previously noted, on 23 February 2009
    when SFC DH and SPC JC searched appellant’s external hard drive in an effort to
    find and review the child pornography seen the day prior by SPC JC. On 23
    February 2009 appellant was out of the theater of operations on R&R leave.
    Between 10 and 11 March 2009, appellant returned to theater, and on 13 March
    2009, appellant met with CID. After being properly advised of and waiving his
    Article 31, UCMJ, rights, appellant admitted to possessing child pornography. At
    the time of appellant’s meeting with CID he “didn’t think anything of it, because I
    had previously talked to CID. They had questions about something in the past; and I
    told them.” 6 Excluding both the day of the illegal search as well as appellant’s
    confession, seventeen days elapsed between the constitutional violation in
    appellant’s case and his confession. 7
    The second Brown factor, the existence of intervening circumstances, favors
    the government as well. The 23 February 2009 search was executed by a platoon
    sergeant and subordinate. Law enforcement personnel were not involved, either
    directly or indirectly in the illegal search. When Balad CID agents, SA CH and SA
    KB, became involved on 24 February 2009, they sought and obtained a valid search
    authorization from appellant’s commander. 8 The second intervening circumstance is
    6
    Although the facts and circumstances surrounding appellant’s prior contact with
    CID are not developed in the record, it is clear that appellant’s prior contact with
    CID was unrelated to the charges at issue.
    7
    Compare United States v. Taylor, 
    2 M.J. 863
     (A.C.M.R. 1976) (appellant’s
    confession was not tainted by an illegal search conducted two days earlier), and
    United States v. Patino, 
    862 F.2d 128
     (7th Cir. 1988) (appellant’s second confession
    was not tainted by an illegal search conducted six days earlier), with Kaupp v. Texas,
    
    538 U.S. 626
     (2003) (no substantial time between illegal arrest and confession
    favors defendant), Taylor v. Alabama, 
    457 U.S. 687
     (1982) (six hours between
    “investigatory arrest without probable cause” and confession favors defendant),
    Brown v. Illinois, 
    422 U.S. 590
     (1975) (less than two hours between illegality and
    confession favors defendant), and United States v. Conklin, 
    63 M.J. 333
     (C.A.A.F.
    2006) (less than three hours between illegal search of appellant’s computer and
    subsequent consent favors appellant).
    8
    Of note, on 26 May 2009, SA CH also sought and obtained a magistrate’s
    authorization to search appellant’s external hard drive seized from his CHU for
    “Text, graphics, electronic mail messages, which are read, unread or unopened, and
    other data including deleted files and folders pertaining to the online solicitation of
    minor(s), and/or material related to the sexual exploitation of minors; and/or
    (continued . . .)
    16
    SPIESS—ARMY 20100229
    that appellant was interviewed following a proper Article 31, UCMJ rights
    advisement, which he waived. More importantly, he was not confronted by the fact
    that his computer had been searched and seized. Contrary to appellant’s testimony
    on the suppression motion, SA KB, the CID agent who interviewed appellant, noted
    appellant was only told to tell the truth. The following colloquy between the
    military judge and SA KB focused specifically on what appellant was told vis-à-vis
    any evidence the government might have on appellant establishing his guilt for
    possession of child pornography:
    Q. When you advised the accused about why he was there, what
    did you tell him?
    A. I explained to him that there’s allegations of--that he’s in
    possession of child pornography, sir.
    Q. Did you make any reference to any evidence which had been
    seized in the case?
    A. No, sir, I did not.
    Q. Were you aware that a hard drive had been seized from the
    accused’s room?
    A. Correct, sir. I--I was there, when we--we seized it, sir.
    Q. But you did not mention that to the accused, when you talked
    to him?
    A. No, sir. No.
    Q. You just told him that there [are] allegations----
    A. That’s correct.
    Q. ----that he possessed child pornography?
    A. Yeah. And he needed to be truthful about it. And which he
    was, sir.
    (. . . continued)
    material depicting apparent or purported minors engaged in sexually explicit
    conduct; and data and/or information used to facilitate access to, production,
    distribution, and/or production of such material.”
    17
    SPIESS—ARMY 20100229
    Q. So you never went into any of the evidence, whatsoever, that
    you already had against the accused?
    A. That’s right, sir. No, sir.
    In the case at bar, SPC JC’s observations provided law enforcement personnel
    a legitimate basis to interrogate appellant. When interviewed by SA KB, appellant
    was not confronted by any illegally obtained evidence nor was he aware that CID
    already had his computer. After a proper rights advisement and waiver thereof,
    appellant provided a written statement confessing to possession of child
    pornography.
    The third Brown factor, “the purpose and flagrancy of the official
    misconduct,” also favors the government. On 23 February 2009, SFC DH already
    had probable cause to believe appellant’s external hard drive contained child
    pornography; SPC JC was very clear on what he observed the day before. Sergeant
    First Class DH went to appellant’s CHU in response to a request from SPC JC, and
    only after SPC JC decided not to turn over the hard drive but instead show SFC DH
    the pornographic file did a search begin. At first, SFC DH sat as a passive observer
    waiting for SPC JC to retrieve the file that SPC JC observed the day before. Only
    after SPC JC’s efforts to search the external hard drive proved futile did SFC DH
    encourage, endorse, and participate in the search. The evidence fails to establish
    that either SFC DH knew he was violating appellant’s constitutional rights or that,
    armed with this knowledge, he chose to engage in an unconstitutional search
    anyway. See United States v. Khamsouk, 
    57 M.J. 282
    , 293 (C.A.A.F. 2002). Unlike
    the actions of the officers in Brown, the “impropriety” of the constitutional violation
    was not obvious. Brown, 
    422 U.S. at 605
    .
    Similarly, unlike the Brown officers, SFC DH did not “embark upon this
    expedition for evidence in the hope that something might turn up.” 
    Id.
     SFC DH
    went to appellant’s CHU to retrieve a hard drive containing child pornography.
    When he arrived, appellant’s roommate refused to turn over the hard drive and
    instead asked SFC DH to confirm what he, SPC JC, had seen the day before. When
    the video file in question could not be located, SFC DH participated in a search for
    that file and when he and SPC JC found a suspected file containing child
    pornography, the computer was immediately turned off, seized and provided to the
    chain of command.
    There is no evidence to conclude that SFC DH or any member of appellant’s
    chain of command acted in bad faith on 23 February 2009. In fact, when asked by
    the military judge what he, SFC DH, would have done had SPC JC not turned over
    the hard drive, rather than seize the hard drive immediately, SFC DH indicated he
    would have used the chain of command and pursued legal action to obtain the hard
    drive. Regarding the actions of the CID agents, SA CH and SA KB, there is no
    evidence that they acted in bad faith or with any intention to circumvent the
    18
    SPIESS—ARMY 20100229
    mandates of the Fourth Amendment. Quite the contrary, everything they did was in
    accordance with the mandates of both the Fourth Amendment and the Military Rules
    of Evidence. On 24 February 2009, CID agents sought authorization to search
    appellant’s CHU and a magistrate’s authorization was sought prior to conducting any
    forensic analysis of appellant’s external hard drive. Before interviewing appellant,
    nearly three weeks after the discovery of child pornography, CID agents informed
    appellant of his Article 31, UCMJ, rights. Finally, there is no evidence either CID
    agent was even aware of the constitutional violation.
    Applying all three Brown factors to the facts and circumstances of appellant’s
    case, we find any taint from the 23 February 2009 illegal search of appellant’s
    external hard drive sufficiently attenuated. We further find no deterrent value in
    application of the exclusionary rule to the facts and circumstances of this case. As
    our superior court noted in Khamsouk:
    “The primary justification for the exclusionary rule . . . is the
    deterrence of police conduct that violates Fourth Amendment
    rights.” Stone v. Powell, 
    428 U.S. 465
    , 486[ ](1976) . . . .
    However, despite its broad purpose, “the rule does not ‘proscribe
    the introduction of illegally seized evidence in all proceedings or
    against all persons,’ . . . but applies only in contexts ‘where its
    remedial objectives are thought most efficaciously served.’”
    Penn. Board of Probation and Parole v. Scott, 
    524 U.S. 357
    ,
    363[ ](1998) (quoting Stone v. Powell, 
    428 U.S. at 486
    [ ]). . . .
    ....
    Thus, in determining whether invocation of the rule is warranted,
    the Court insists that lower courts strike a balance between “the
    public interest in determination of the truth at trial” and the
    “incremental contribution that might [be] made to the protection
    of Fourth Amendment values . . . .” Stone, 
    428 U.S. at 488
    [ ].
    Khamsouk, 57 M.J. at 291–92. Accordingly, the military judge did not abuse his
    discretion in admitting appellant’s confession.
    D. CONCLUSION
    In sum, SPC JC’s 22 February 2009 search of appellant’s external hard drive
    was non-governmental in nature, making any evidence discovered during this search
    independently admissible against appellant. Additionally, the evidence discovered
    established probable cause to believe appellant possessed child pornography.
    Contrary to the military judge’s conclusion, the subsequent, 23 February 2009,
    search of appellant’s external hard drive by SPC JC and SFC DH was governmental
    in nature and as such, illegal. Notwithstanding the military judge’s erroneous
    19
    SPIESS—ARMY 20100229
    characterization of the 23 February 2009 search as private in nature, the evidence
    found on appellant’s external hard drive was admissible against appellant as the
    evidence would have been, as the military judge correctly found, inevitably
    discovered. Finally, appellant’s 13 March 2009 confession was sufficiently
    attenuated from the illegal search making appellant’s confession independently
    admissible from the evidence found on appellant’s external hard drive.
    On consideration of the entire record, we hold the findings of guilty and
    sentence as approved by the convening authority correct in law and fact.
    Accordingly, the findings of guilty and the sentence are AFFIRMED.
    Senior Judge KERN and Judge MARTIN concur.
    FOR  THE COURT:
    FOR THE COURT:
    MALCOLM H. SQUIRES, JR.
    MALCOLM         H. SQUIRES JR.
    Clerk of Court
    Clerk  of Court
    20