United States v. Lancina ( 2017 )


Menu:
  •          U NITED S TATES N AVY –M ARINE C ORPS
    C OURT OF C RIMINAL A PPEALS
    _________________________
    No. 201600242
    _________________________
    UNITED STATES OF AMERICA
    Appellee
    v.
    JOSEPH A. LANCINA
    Information Systems Technician First Class (E-6), U.S. Navy
    Appellant
    _________________________
    Appeal from the United States Navy-Marine Corps Trial Judiciary
    Military Judge: Captain David M. Harrison, JAGC, USN.
    Convening Authority: Commander, U.S. Naval Forces Japan,
    Yokosuka, Japan.
    Staff Judge Advocate’s Recommendation: Commander Timothy D.
    Stone, JAGC, USN.
    For Appellant: Captain Daniel Douglass, USMC.
    For Appellee: Major Cory A. Carver, USMC; Lieutenant James
    M. Belforti, JAGC, USN.
    _________________________
    Decided 30 June 2017
    _________________________
    Before C AMPBELL , F ULTON , and H UTCHISON , Appellate Military
    Judges
    _________________________
    This opinion does not serve as binding precedent, but may be cited
    as persuasive authority under NMCCA Rule of Practice and
    Procedure 18.2.
    _________________________
    CAMPBELL, Senior Judge:
    A military judge sitting as a general court-martial convicted the
    appellant, pursuant to his conditional guilty pleas, of wrongfully possessing
    child pornography in violation of Article 134, Uniform Code of Military
    Justice (UCMJ), 
    10 U.S.C. § 934
     (2012). The military judge sentenced the
    United States v. Lancina, No. 201600242
    appellant to eight years’ confinement, reduction to pay grade E-1, forfeiture
    of all pay and allowances, and a dishonorable discharge. The convening
    authority approved the sentence as adjudged.1
    The appellant’s sole assignment of error avers that criminal investigators
    presented false information that mislead the military commander who
    granted authorization to search for and seize evidence related to this case,
    and the military judge erred in denying a motion to suppress that evidence.
    We find no prejudicial error and affirm.
    I. BACKGROUND
    In June 2014, the Information Systems Security Manager (“security
    manager”) for the “ONENET” Navy computer network in Japan notified
    Naval Criminal Investigative Service (NCIS) that the appellant’s assigned
    government computer had accessed a suspicious website, (“the website”). As
    part of the investigation initiated by NCIS Special Agent (SA) R, the security
    manager covertly cloned the hard drive of the appellant’s government
    computer, placed the cloned copy into that computer, and provided the
    original hard drive to NCIS. SA R later requested that the Commander, Fleet
    Activities Yokosuka (“CO”) sign a command authorization for search and
    seizure (CASS) to search the appellant and his home—including “[t]he
    premises and all parts therein and any other area which may be feasible to
    contain evidence of items that may contain child pornography, and child
    sexual exploitation images”2—and seize for further searches “[a]ny
    [e]lectronic [m]edia [s]torage [d]evices” including “desktop computers, laptop
    computers, cellular/mobile telephones, [and] tablets[.]”3
    In January 2015, about a week after the CO signed the CASS, NCIS
    executed the search, in coordination with Japanese police officers. At the
    appellant’s residence, a Filipino national, Ms. O, answered the door and
    explained she was the appellant’s live-in fiancée. Because Ms. O was a third
    party residing in the home, and a Japanese permanent resident, the NCIS
    agents received legal advice to seek her permission for the search in order to
    comply with the U.S.-Japan Status of Forces Agreement.
    In Tagalog, Japanese, and English, the NCIS agents explained to Ms. O
    that they were there to execute the command authorized search and seizure
    in a child pornography investigation. They read a permissive authorization
    for search and seizure (PASS) form to Ms. O in all three languages. She
    1 Pursuant to a pretrial agreement, the convening authority also suspended the
    execution of all confinement in excess of 60 months.
    2   Appellate Exhibit (AE) V, Encl. (3) at 2 (CASS at Attachment A).
    3   
    Id. at 3
     (CASS at Attachment B).
    2
    United States v. Lancina, No. 201600242
    confirmed that she understood the PASS, that she was not required to
    consent to or sign the PASS, and why the investigators were there before she
    provided verbal and written consent to execute the search. At the NCIS
    agents’ request, Ms. O identified the appellant’s personal belongings.
    Investigators conducted a cursory search of the appellant’s laptop computer
    and desktop computer, which had an external hard drive. Before leaving,
    they explained to Ms. O what media devices they were seizing. The
    investigation later revealed thousands of child pornography images and
    videos in password-protected folders on the home laptop and hard drive. The
    military judge denied a pretrial motion to suppress this evidence.
    II. DISCUSSION
    A. Probable cause for the CASS
    The Fourth Amendment provides, “[t]he right of the people to be secure in
    their persons, houses, papers, and effects, against unreasonable searches and
    seizures, shall not be violated . . . .” U.S. CONST. amend. IV. Searches
    conducted pursuant to a warrant or authorization based on probable cause
    are presumptively reasonable. United States v. Hoffmann, 
    75 M.J. 120
    , 123
    (C.A.A.F. 2016). “While he issues no warrants, the commanding officer is
    bound by the same rules in authorizing a search as [a Federal magistrate];
    that is, probable cause to believe that the things to be seized are on or within
    the premises to be searched.” United States v. Stuckey, 
    10 M.J. 347
    , 357
    (C.M.A. 1981). Evidence obtained in violation of the Fourth Amendment is
    generally inadmissible against an accused. MILITARY RULE OF EVIDENCE
    (MIL. R. EVID.) 311, MANUAL FOR COURTS-MARTIAL, UNITED STATES (2016
    ed.).
    “We review a military judge’s denial of a motion to suppress evidence for
    an abuse of discretion.” United States v. Nieto, 
    76 M.J. 101
    , 105 (C.A.A.F.
    2017) (citation omitted). When “a military magistrate has a substantial basis
    to find probable cause, a military judge [does] not abuse his discretion in
    denying a motion to suppress.” 
    Id.
     (citation and internal quotation marks
    omitted) (alteration in original). “A substantial basis” for probable cause to
    search an area exists where “based on the totality of the circumstances, a
    common-sense judgment would lead to the conclusion that there is a fair
    probability that evidence of a crime will be found[.]” 
    Id.
     (citations and
    internal quotation marks omitted).
    In determining whether an affidavit provides a substantial basis to find
    probable cause, “we rely alone on information that we know was presented to
    the magistrate at the time of his determination, as reflected in the affidavit,
    the military judge’s findings and conclusions of law, and testimony in the
    record of trial addressed to the suppression motion that is consistent with the
    military judge’s findings.” United States v. Leedy, 
    65 M.J. 208
    , 214 n.5
    3
    United States v. Lancina, No. 201600242
    (C.A.A.F. 2007) (emphasis added). With no evidence that SA R orally briefed
    the CO beyond the contents of the affidavit, our analysis focuses on those
    contents. 
    Id.
    Before any allegedly false information that may have misled a magistrate
    is “set aside” from an affidavit, an accused must make ‘“a substantial
    preliminary showing that a government agent included a false statement
    knowingly and intentionally or with reckless disregard for the truth in the
    information presented to the authorizing officer”’—and then prove this ‘“by a
    preponderance of the evidence”’ in a hearing. United States v. Cravens, 
    56 M.J. 370
    , 375 (C.A.A.F. 2002) (emphasis added) (quoting MIL. R. EVID.
    311(g)(2)). Similarly, to receive a hearing on alleged material omissions from
    affidavits, the defense must demonstrate that the omissions were “both
    intentional or reckless, and that their hypothetical inclusion would have
    prevented a finding of probable cause.” United States v. Mason, 
    59 M.J. 416
    ,
    422 (C.A.A.F. 2004) (emphasis in original) (citation omitted). A military
    judge’s finding of fact that the defense did not meet its burden of showing
    knowing and intentional falsity or reckless disregard for the truth is binding
    unless clearly erroneous. United States v. Allen, 
    53 M.J. 402
    , 408 (C.A.A.F.
    2000).
    Here, the military judge found generally that “[t]he defense . . . failed to
    meet its burden on both” making “a preliminary showing that [SA R] made
    false statements knowingly and intentionally or with reckless disregard for
    the truth, and then . . . establish[ing] by a preponderance of the evidence the
    statements’ knowing and intentional falsity or reckless disregard for the
    truth.”4 Thus, we review the suppression motion record only to ascertain
    whether the military judge clearly erred in his determination that the
    statements in the affidavit were not “false” or “mislead[ing],” or that any such
    statements by SA R was not made “knowingly and intentionally or with
    reckless disregard for the truth.” Cravens, 56 M.J. at 375. “[W]hen there are
    misstatements or improperly obtained information” in an affidavit, “we sever
    those from the affidavit and examine the remainder to determine if probable
    cause still exists.” United States v. Gallo, 
    55 M.J. 418
    , 421 (C.A.A.F. 2001)
    (citation omitted).
    We find the totality of the facts in the affidavit, and the reasonable
    inferences the CO could draw from them, provided a substantial basis for the
    CO to conclude there was a fair probability that 1) the appellant committed
    the offenses alleged in the command authorization—violations of “Title 
    18 U.S.C. § 2252
     and 2252A, relating to material involving the sexual
    4   AE XVII at 17 (emphasis added) (citation omitted).
    4
    United States v. Lancina, No. 201600242
    exploitation of minors”5—and 2) given the nexus to the appellant’s home,
    NCIS would find evidence of those offenses in his digital devices there.
    1. Probable cause to believe the alleged crimes occurred and the appellant
    committed them
    SA R’s affidavit, attached to the authorization request, stated:
    i. His 11 years of experience as an NCIS agent included his
    “participat[ion] in child pornography investigations which have
    resulted [sic] convictions” and “120 hours of advanced sex crimes
    investigation training[.]”6
    ii. On the appellant’s government computer hard drive, he found “two
    thumbnail images7 which [each] depict an apparent female child’s
    buttocks being spread open by an adult male hand exposing the child’s
    anus and vagina,” where “[i]n one of the two photos the child’s genitals
    are covered with apparent semen”—and, a “pedo bear icon . . . a type
    of visual code that indicates the presence of child pornography.”8
    iii. The security manager had told SA R that the website the appellant
    accessed is a “known incest/child pornography (CP) website.”9
    iv. After creating an undercover, online profile on the website, SA R
    “located only one profile” for website members in Japan—“LANCE
    ALOT,” whose listed birthday exactly matched the appellant’s.10
    v. The “LANCE ALOT” profile’s “avatar photo” showed “a white male’s
    erect penis” (the appellant is white), and “LANCE ALOT” posted that
    he “loves to tease and please young horny wet girls to multiple
    orgasms.”11
    vi.         Evidence on the appellant’s government computer hard drive showed
    that, before 21 August 2014, the appellant “had viewed 13 separate
    member profiles” on the website.12 Using his own undercover, online
    5   AE V, Encl. (3) (Affidavit for Search Authorization of 13 Jan 2015 at 1).
    6   
    Id. at ¶ 2
    .
    7 The appellant incorrectly states SA R “omitted [from the affidavit] that the two
    images of suspected child pornography were . . . thumbnails.” Appellant’s Brief of 15
    Nov 2016 at 5.
    8   AE V, Encl. (3) at ¶ 6e.
    9   
    Id.
     at ¶ 6a.
    10   
    Id.
     at ¶ 6f.
    11   
    Id.
    12   
    Id.
     at ¶¶ 6c, 6e.
    5
    United States v. Lancina, No. 201600242
    profile, SA R found 10 of the 13 profiles that the appellant had viewed
    on the website. One of them, Ms. A,13 listed a birthdate indicating she
    was “under 18 years of age” as of 20 October 2014.14 SA R determined
    that the appellant had friended two other users of the website, Ms. B
    and Ms. C, while, according to their listed birthdays, they were
    younger than 18 years old. LANCE ALOT had messaged Ms. C that
    she was “incredibly beautiful with a sexy and stunning body.” Ms. C’s
    profile had nude photos. SA R found “three other profiles which
    LANCE ALOT had communicated with where the [sic] two of the
    females were 17 years old and one was 16 years old.”15
    a. The thumbnail images
    Thumbnail images of child pornography can provide probable cause for a
    search authorization.16 But the appellant first suggests that the affidavit’s
    details of the child pornography thumbnail images cannot provide a
    substantial basis for probable cause because “[t]hose two images were not
    associated with known child pornography in the NCMEC [National Center
    for Missing and Exploited Children] database, nor were the images looked at
    by a medical professional to determine the age of the people depicted in the
    pictures[,]” or by the Defense Computer Forensics Laboratory.17 Moreover, he
    claims these facts were “omitted” from the affidavit.18
    13   The profile names are pseudonyms.
    14   AE V, Encl. (3) at ¶ 6f.
    15   
    Id.
    16 See, e.g., United States v. Howe, 545 F. App’x. 64, 65 (2d Cir. 2013) (finding
    that the “district court did not err in concluding that probable cause existed to seize
    Howe’s laptop” where a police officer had “viewed . . . at least one thumbnail image
    that the magistrate judge determined was lascivious” in the “Sample Pictures folder
    on that computer”) (citation and internal quotation marks omitted).
    17   Appellant’s Brief at 3, 12.
    18  
    Id. at 5
    . Although the appellant did not expressly raise this issue at trial, we
    find that under either a plain error or abuse of discretion standard of review, he has
    failed to demonstrate any prejudice by showing how the “hypothetical inclusion” of
    this information “would have prevented a finding of probable cause.” Mason, 
    59 M.J. at 422
    . NCMEC databases do not contain the entire universe of child pornography
    images, and non-medical professionals—particularly an investigator for previous
    child pornography cases like SA R—are capable of recognizing child pornography for
    purposes of addressing probable cause. See Record at 67; 102-03 (“[Trial Counsel:
    [W]hy, based on your training and experience . . . was [it] apparent to you that these
    were children? [SA R:] . . . . The labia were not very distinct, not very developed.
    There was no pubic hair, and the pubic hair was not shaved. It appeared to be
    naturally not pubic hair.”).
    6
    United States v. Lancina, No. 201600242
    Our superior court in Gallo found a substantial basis for probable cause to
    search for child pornography where an affiant with 26 years of experience,
    having “participated in numerous child pornography investigations,” swore
    that “approximately 262 apparent child pornography photographs were found
    on [Gallo’s] work computer” and “that several of the photographs . . . matched
    imported photographs seized in other Customs’ cases.” 55 M.J. at 420-22. The
    Gallo majority did not object to the fact that the “affidavit provided no
    description of the images” and “merely set out [the agent’s] conclusions” that
    the images were ‘“child pornography,’ ‘adult pornography,’ and ‘apparent
    child pornography.”’ Id. at 424 (Gierke and Effron, JJ., dissenting). Thus, this
    first argument fails.
    The appellant next contends the thumbnail images cannot provide a
    substantial basis for probable cause because their computer location indicates
    they were “automatically cached from internet sites onto [the appellant’s]
    work computer” rather than actively downloaded, meaning there was “no
    evidence [that the appellant] viewed or knowingly possessed” the
    thumbnails.19 We also reject this argument.
    Appellate courts have affirmed that the presence of child pornography
    thumbnail images in the internet cache can be a basis for possession of child
    pornography convictions.20 As thumbnail images, in some circumstances, can
    satisfy the beyond a reasonable doubt standard, we hold that they provide
    substantial basis for the CO here to find probable cause to suspect that the
    appellant possessed child pornography. The appellant suggests that the
    thumbnails may have been cached without the appellant having “scrolled
    down to their position on the page”—i.e., without the appellant having viewed
    them.21 The CO did not have to make this assumption favorable to the
    appellant, where the evidence was equally consistent with the appellant
    19 Appellant’s Reply Brief of 9 Mar 2017 at 2. The appellant did not claim at trial
    that SA R’s failure to state that the thumbnail images were “not [intentionally]
    downloaded images” was a material omission from the affidavit, as he does now.
    Appellant’s Brief at 12; Reply Brief at 3. But regardless of the proper standard of
    review, again we find that the appellant has failed to demonstrate prejudice. Since as
    discussed in the next paragraph, thumbnail images provide direct or circumstantial
    evidence of the offenses, a “hypothetical inclusion” of this information would still not
    have prevented the CO from finding probable cause. Mason, 
    59 M.J. at 422
    .
    20  See, e.g., United States v. Tucker, 
    305 F.3d 1193
    , 1197, 1205 (10th Cir. 2002)
    (upholding Tucker’s conviction for possessing “thumbnail” and “larger images” of
    child pornography in his “[w]eb browsers’ cache files,” despite his argument that
    since “he did not voluntarily cache the files,” he did not possess child pornography).
    21   Appellant’s Reply Brief at 2.
    7
    United States v. Lancina, No. 201600242
    having viewed the images.22 We note that child pornography thumbnail
    images are created in the cache when one “use[s a] webpage”23 that contains
    child pornography, or a when a user executes an internet search engine
    “image search” which returns child pornography.24 Thus, the thumbnail
    images’ presence in the appellant’s cache allowed the CO to draw a
    reasonable inference that the appellant had accessed webpages with child
    pornography, or entered search terms yielding such images, providing a fair
    probability for probable cause that the appellant had committed child
    pornography offenses.
    b. The “pedo bear icon” (“icon”)
    Facts in an affidavit “are properly viewed in context, through the
    professional lens in which they were presented to the magistrate.” Leedy, 65
    M.J. at 215-16 (finding the filename “14 year old Filipino girl,” located
    alongside other filename “titles . . . identify[ing] sex acts” which an
    experienced investigator stated were “indicative of . . . child pornography,”
    provided probable cause to search Leedy’s computer). “A possible innocent
    explanation or lawful alternative may add a level of ambiguity to a fact’s
    probative value in a probable cause determination, but it does not destroy the
    fact’s usefulness outright and require it to be disregarded.” People v. Zuniga,
    
    372 P.3d 1052
    , 1058 (Colo. 2016).
    The affidavit here informed the CO that SA R, an experienced criminal
    investigator, found an icon on the appellant’s government computer that SA
    R deemed a “visual code that indicates the presence of child pornography.”25
    The military judge issued findings of fact which supported this conclusion
    and separately rejected the appellant’s contention that SA R’s statement
    “that this image indicates child pornography is wholly misleading.”26 We do
    not find these findings clearly erroneous. At the suppression motion hearing,
    SA R testified that “Pedobear is kind of like a trail sign on the Internet, or
    basically it’s a calling card. It kind of tends to indicate to people that know
    what to look for, that there is child pornography here. . . . [I]t helps kind of
    guide them to particular sites and files that contain child pornography,”
    22   See United States v. Martin, 
    426 F.3d 68
    , 77 (2nd Cir. 2005) (noting that
    merely because “an innocent explanation may be consistent with the facts alleged” in
    a warrant application “does not negate probable cause” to issue a search warrant)
    (citation and internal quotation marks omitted).
    23   Appellant’s Reply Brief at 2.
    24   Record at 85.
    25   AE V, Encl. (3) at ¶ 6e.
    26   AE V at 11. See AE XVII at 17.
    8
    United States v. Lancina, No. 201600242
    though he also agreed with the trial defense counsel’s statement that the
    filename of the icon “was not named ‘Pedo,’ it wasn’t named Pedobear.”27
    Even though, as argued at the suppression motion hearing, most internet
    pictures of teddy bears may be wholly innocent—which possibly reduces the
    “probative value” of the icon as circumstantial evidence of child pornography
    possession—that does not “destroy the fact’s usefulness outright and require
    it to be disregarded.” Zuniga, 372 P.3d at 1058. Like the filename in Leedy,
    the context in which the icon was found,28 and SA R’s experience-based
    assessment of what it might mean in that context, provided a substantial
    basis for the CO to consider the icon as circumstantial evidence of child
    pornography in his probable cause determination.
    c. The appellant’s membership in the website and child pornography
    In United States v. Clayton, our superior court considered whether there
    was a substantial basis for probable cause to search Clayton’s “laptop, in [his]
    quarters” based on Clayton’s e-mail address appearing on a membership list
    for an “internet group” named “Preteen-Bestiality-and-Anything-Taboo,”
    where one member had “confessed” to “upload[ing] . . . child pornography” to
    the group” and at whose website the affiant found child pornography. 
    68 M.J. 419
    , 422-23 (C.A.A.F. 2010). Clayton had “requested a Digest for the [g]roup,
    in which he would receive daily e-mails that would contain 25 of the postings
    to the [g]roup sent as a single e-mail to his account.” 
    Id. at 422
     (alterations in
    original, internal quotation marks omitted). However, there was neither
    evidence in the affidavit as to what was in the e-mail digests, nor as to
    whether Clayton had “accessed the website, or . . . received the digests he
    requested,” as the affiant had not “review[ed] his e-mail accounts[.]” 
    Id. at 425
    .
    The Court of Appeals for the Armed Forces (CAAF) nevertheless upheld
    the magistrate’s search authorization due to a “practical, commonsense
    understanding of the relationship between the active steps that a person
    might take in obtaining child pornography from a website and retaining it for
    an extended period of time on that person’s computer.” 
    Id. at 424
    . See also
    United States v. Gourde, 
    440 F.3d 1065
    , 1072-73 (9th Cir. 2006); United
    27   Record at 68, 90.
    28  The appellant alleged at trial that the icon was “in the thumb[nail ]cache on
    the computer.” AE V at 11 (internal quotation marks omitted). The appellant now
    suggests it was in the ‘“unallocated clusters” area of the computer,”’ where “files are
    stored after having been permanently deleted.” Appellant’s Reply Brief at 7 n.24. In
    either case, per our discussion of the thumbnail images supra, the location of the icon
    does not negate its value in finding a substantial basis for probable cause, as its
    presence in either place demonstrates the appellant accessed a page with the icon at
    some point.
    9
    United States v. Lancina, No. 201600242
    States v. Martin, 
    426 F.3d 68
     (2nd Cir. 2005); United States v. Froman, 
    355 F.3d 882
     (5th Cir. 2004). It did so even without proof that Clayton possessed
    any child pornography images, from any source, on any computer. Clayton, 68
    M.J. at 425 (noting “no evidence showed that he posted messages to the
    Google site, participated in discussions, or uploaded or downloaded child
    pornography”).
    In Gourde, membership in “lolitagurls.com” provided a substantial basis
    for probable cause to search Gourde’s computer, even though there was no
    evidence that he downloaded child pornography from the website. 
    440 F.3d at 1067
     (noting the “triad of solid facts—the site had illegal images, Gourde
    intended to have and wanted access to these images, and these images were
    almost certainly retrievable from his computer if he had ever received or
    downloaded them”). In Froman, membership in “Candyman,” a web group
    from which an agent received “hundreds of images of child pornography,”
    provided a sufficient basis for probable cause to search Froman’s computer,
    even though there was no evidence he had downloaded images from the
    group, or automatically received e-mail updates. 
    355 F.3d at 890-91
     (noting
    “it is common sense that a person who voluntarily joins a group” whose
    “predominant purpose” is “to engage in collection and distribution of child
    pornography” and “uses screen names that reflect his interest in child
    pornography, would download such pornography from the website and have it
    in his possession”). In Martin, membership in the web group “girls12-16,” to
    which an investigator subscribed and received e-mails with child
    pornography and “child erotica,” was sufficient to search Martin’s computer
    even though the “affidavit d[id] not explicitly state that Martin accessed child
    pornography.” 
    426 F.3d at 75-76
     (finding a “fair probability” that “evidence of
    a crime would be found at Martin’s home because membership in the e-group
    reasonably implied use of the website” and child pornography was
    “distributed to some of the group’s members”).
    Here, contrary to the appellant’s assertion that only “weak and
    circumstantial” evidence suggested he was a member of the website,29 the CO
    could reasonably infer from the facts in the affidavit that the appellant was a
    member. SA R found one member in Japan, LANCE ALOT; “Lancina” is
    similar to LANCE ALOT; and LANCE ALOT’s listed birthday was the same
    as the appellant’s.
    The appellant tries to distinguish his membership in this website from
    the websites or groups mentioned in the authorities supra, on the grounds
    that there was inadequate support in the affidavit for SA R’s claim that “[the
    29   Appellant’s Brief at 23 n.86.
    10
    United States v. Lancina, No. 201600242
    website] is a known child pornography website.”30 At trial, the appellant duly
    alleged that this claim was a “false statement” by SA R.31 SA R’s actual claim
    in the affidavit was that the security manager “stated [the website] was a
    known incest/child pornography (CP) website.”32 The military judge
    disagreed, finding that SA R’s “statements and conclusions about the web site
    in the affidavit were simply not shown to be false.”33
    In the hearing on the suppression motion, SA R conceded that the
    security manager “did not tell [him] that there was child pornography on that
    website”34—only that the security manager had provided him with an article
    about the website, from which SA R concluded the website “did, in fact,
    appear to be an incest, child pornography, even a child rape website, that
    teaches its patrons, or encourages their patrons to basically have sex with
    children.”35 SA R added that when he accessed the website, he “observed the
    chatroom where people were [advising] other people about how to have sex
    with their children.”36 SA R conceded that he could not tell whether the
    thumbnail images or icon on the appellant’s computer had been downloaded
    from the website, or from any other internet location.37
    The critical distinction highlighted by the appellant is that in Clayton and
    the federal circuit court cases it cites, a website membership was sufficient to
    provide probable cause to suspect downloading of child pornography because
    the affidavits confirmed that actual child pornography was on the web groups
    or websites. The only evidence SA R cited at the suppression hearing to prove
    the website was a “known” child pornography website was a newspaper
    article discussing the arrest of another Marine for attempting to arrange “an
    incestuous four-way with another man and his two preteen children” with an
    undercover agent who was a member of the website.38 The article has a
    30  Reply Brief at 4. See also Appellant’s Brief at 12, 15, 23 (noting that the
    affidavit did not mention finding any “images of child pornography from the [the]
    website,” any proof that the thumbnail images on the appellant’s computer were
    “downloaded images,” or any “evidence of [the appellant] soliciting contraband from
    the website” or “actively s[eeking] out updates from the website”).
    31   AE IV at 9-10.
    32   AE V, Encl. (3) at ¶ 6a.
    33   AE XVII at 18.
    34   Record at 78.
    35   Id. at 64. AE VI, enclosure (1) (the newspaper article).
    36   Record at 64 (emphasis added).
    37   Id. at 100.
    38   AE VI, Encl. (1) at 1.
    11
    United States v. Lancina, No. 201600242
    screenshot of the website, where the only sexual content is a banner
    advertisement with an obscene cartoon soliciting users to “watch live sex
    shows from 18yo teens for free.”39 The article (citing a media outlet) says the
    website “specializes in the promotion of incest and other taboo behaviors,” 40
    but nowhere states the website was known for child pornography or
    published actual child pornography.
    While incest is illegal in many instances, it does not inherently imply sex
    with an underage person, let alone the presence of child pornography. In
    Hoffman, after the appellant was “taken into custody” for soliciting “young
    boys for sex,” a search authorization was granted based in part upon an
    affidavit in which the affiant asserted ‘“that she knew through her “training
    and experience that there is an intuitive relationship between acts such as
    enticement or child molestation and the possession of child pornography.”’
    Hoffmann, 75 M.J. at 123, 127 (citation omitted). The CAAF held that, absent
    extreme circumstances, even the “enticement” of an actual child for sex is
    “simply not sufficient to provide a substantial basis for concluding that there
    was probable cause to believe [someone] possessed child pornography.” Id. at
    127 (citation omitted) (emphasis added). In light of Hoffman, we find that
    most of SA R’s observations in the affidavit—including that others on the
    website advised how to have sex with children, that the appellant messaged
    users of the website whose birthdates suggested they were under 18, and that
    he told one she was “incredibly beautiful with a sexy and stunning body”41–
    even assuming arguendo they were enticement, do not support the conclusion
    that the website contained child pornography.
    SA R’s statement that on the website profile of Ms. C—a user with whom
    the appellant communicated—he found nude photos, and the age listed on
    Ms. C’s website user profile suggested she was 17 years old,42 is also
    insufficient to support SA R’s characterization of the website. SA R did not
    describe these nude photos as child pornography in the affidavit—a
    description he readily applied to the thumbnail images discussed supra.
    39   Id., Encl. (1) at 2 (emphasis added).
    40   Id., Encl. (1) at 1.
    41   AE V, Encl. (3) at ¶ 6f.
    42 Though the appellant notes that he “could have made a request for and had
    sexual relations with his girl and it would not have been illegal,” Appellant’s Reply
    Brief at 6 n.19, the investigation was for violations of “Title 
    18 U.S.C. § 2252
     and
    2252A, relating to material involving the sexual exploitation of minors.” AE V, Encl.
    (3) at 1. Under federal law, “‘minor’ means any person under the age of eighteen
    years.” 
    18 U.S.C. § 2256
    (1).
    12
    United States v. Lancina, No. 201600242
    Thus, we conclude that the military judge’s findings of fact—that SA R’s
    “statements and conclusions about the web site in the affidavit were simply
    not shown to be false,” and that “[t]he defense has failed to meet its burden
    on . . . showing that SA R made false statements knowingly and intentionally
    or with reckless disregard for the truth”43—was clearly erroneous as to SA R’s
    claim that the security manager “stated [the website] was
    a . . . known . . . []child pornography website.”44 This statement was
    misleading at a minimum, under Mason, 
    59 M.J. at 422
    , given that the
    article never said the website actually hosted child pornography. Moreover,
    SA R displayed a reckless disregard for the truth in making this assertion to
    the CO, given that, despite his investigative efforts, he identified no actual or
    apparent child pornography on the website.45
    d. Child erotica on the website
    The most significant facts about the website remaining in the affidavit,
    after removal of the misleading statement, are that on the profile of Ms. C—a
    minor user with whom the appellant communicated—SA R found “nude
    photos,”46 and Ms. C’s user profile on the website suggested that she was 17
    43   AE XVII at 17-18.
    44 AE V, Encl. (3) at ¶ 6a. The portion of the finding of fact about the website
    being a “known incest[] . . . site,” is not clearly erroneous in light of the article and
    affidavit.
    45 We also reject as clearly erroneous the military judge’s finding of fact that the
    website “appeared to be one dedicated to child pornography,” AE XVII at 4. The only
    evidence in the record that the military judge could have used as support for this
    conclusion are the newspaper article and SA R’s testimony. The conclusion that the
    website “appeared to be one dedicated to . . . incest, child rape, and generally
    encourages and explains grooming methods of having sex with children,” is not
    clearly erroneous in light of the article and affidavit.
    46 Trial defense counsel argued in her motion at trial that “neither [Ms. C], nor
    any other of the profiles reviewed, were minors,” and the “assertion that [the
    appellant] commented on naked photographs of [Ms. C] is . . . a complete
    misstatement of fact[.]” AE IV at 9-10. However, the military judge held under
    “Discussion and Conclusions of Law” that “[a] number of the users . . . . Lanc[e
    ALOT] communicated with appeared to be and were thought to be minors based on
    their listed birth dates, and at least one had at least one nude photo of herself on the
    web page.” AE XVII at 14, 19. “‘Where a finding of fact is included under the heading
    of conclusions of law it will be treated as a factual finding.’” United States v.
    Betancourt, No. 201500400, 
    2017 CCA LEXIS 386
    , at *16 n.16, unpublished op. (N-
    M. Ct. Crim. App. 6 Jun 2017) (quoting Utzinger v. United States, 
    432 F.2d 485
    , 489
    (6th Cir. 1970)). As the appellant’s brief “does not now challenge th[is] ruling” as
    clearly erroneous, “we find it to be the law of the case[.]” United States v. Trotter, No.
    201500332, 
    2016 CCA LEXIS 668
    , at *15 n.30, unpublished op. (N-M. Ct. Crim. App.
    17 Nov 2016) (citing United States v. Savala, 
    70 M.J. 70
    , 77 (C.A.A.F. 2011))
    13
    United States v. Lancina, No. 201600242
    years old.47 Nude photos can include “child erotica,” which is defined by our
    court as “material that depicts young girls [or boys] as sexual objects or in a
    sexually suggestive way, but is not sufficiently lascivious to meet the legal
    definition of sexually explicit conduct[.]” United States v. Rapp, No.
    201200303, 
    2013 CCA LEXIS 355
    , at *24 n.15, unpublished op. (N-M. Ct.
    Crim. App. 30 Apr. 2013) (citations and internal quotation marks omitted).
    Civilian courts are split as to whether the presence of child erotica
    provides a substantial basis for probable cause to suspect the presence of
    child pornography. Compare United States v. Ranke, 
    2010 U.S. Dist. LEXIS 115352
    , at *16-17 (E.D. Mich. Oct. 29, 2010), aff’d on other grounds, 480 Fed.
    App’x. 798 (6th Cir. 2012) (“The government contends persuasively that ‘child
    erotica,’ including nude photographs of minors or computer-generated images
    of children engaged in sexual conduct, is some evidence that may properly be
    considered in establishing probable cause to search for child pornography),
    with United States v. Edwards, 
    813 F.3d 953
    , 961-62, 969 (10th Cir. 2015)
    (holding that “[n]either [Edwards’] posting of child erotica nor his comments
    suggesting a sexual attraction to the child in the posted images established” a
    substantial basis for “probable cause that [he] possessed child pornography in
    his home,” where “the search-warrant affidavit here provided evidence only
    that [Edwards] possessed legal child erotica”).
    The Eighth Circuit Court of Appeals explained that while the presence of
    child erotica may not in and of itself provide sufficient probable cause to
    suspect the presence of child pornography, such facts “combined with the
    other facts included in the affidavit,” may support a probable cause
    determination under “the totality of the circumstances.” United States v.
    (additional citation omitted). Even absent waiver, we would not deem this finding of
    fact clearly erroneous. See AE VI at 6 of 8 (printed copy of Ms. C’s profile where
    Lance ALOT “commented on [Ms. C]’s album[:] “Incredibly Beautiful and Sexy with a
    Stunning Body,” and the handwritten notation “= 17 y/o”); Record at 263-64 (“[SA R:
    T]here were certainly nude images of minors on that website. . . . [a]pparently having
    viewed [Ms. C’s] photo album, which featured numerous photographs of herself,
    completely naked. He made the comment, ‘You have a beautiful and stunning
    body.’”).
    47  The appellant argues “[t]here is no independent verification of the age of any
    [of] the girls in these profiles.” Appellant’s Reply Brief at 5 n.18. Even assuming
    arguendo that the ages were inaccurate, this is not relevant to how these “girls”
    would have appeared to users like the appellant. See United States v. Roeseler, 
    55 M.J. 286
    , 291 (C.A.A.F. 2001) (“Our general rule is that an accused should be treated
    in accordance with the facts as he or she supposed them to be.”) (citations omitted).
    Nor does it prevent the CO from drawing reasonable inferences about the nature of
    the website, based on the fact that it features people claiming to be minors, posting
    nude photographs.
    14
    United States v. Lancina, No. 201600242
    Hansel, 
    524 F.3d 841
    , 844-46 (8th Cir. 2008) (concluding that photographs of
    nude girls and other girls in swimsuits described by the investigating officer
    as “child erotica, not child pornography” could be considered along with
    allegations of sexual assault and camera and computer equipment, in finding
    probable cause to search for child pornography). Even though the affidavit in
    Hansel “misleading[ly]” stated that the child erotica photographs themselves
    “indicate[d] receipt of child pornography by means of a computer,” the Court
    held that after removal of the misleading statement, a magistrate still would
    have found probable cause to search for child pornography based in part on
    the presence of child erotica. 
    Id. at 844-46
    .
    We agree that the presence of child erotica can be, at minimum, a factor
    in finding a substantial basis for probable cause to suspect the appellant
    committed a child pornography offense under the totality of the
    circumstances. Even wholly “innocent behavior frequently will provide the
    basis for a showing of probable cause.” United States v. Sparks, 
    291 F.3d 683
    ,
    685, 688 (10th Cir. 2002) (reversing the lower court’s suppression of
    methamphetamine seized during searches authorized in part based upon
    Sparks’ arrest for picking up a bag of white powder from the side of a road)
    (citation and internal quotation marks omitted). Moreover, child erotica is
    admissible in a prosecution for possession of child pornography as evidence
    “to show intent to commit the charged offense.” United States v. Griffing, No.
    38443, 
    2015 CCA LEXIS 101
    , at *34, unpublished op. (A.F. Ct. Crim. App. 23
    Mar 2015) (citing United States v. Warner, 
    73 M.J. 1
    , 3 (C.A.A.F. 2013) and
    United States v. Vosburgh, 
    602 F.3d 512
    , 538 (3d Cir. 2010)). Finally, while
    legally protected in other jurisdictions,48 military courts have upheld
    convictions for the possession of child erotica under Article 134, UCMJ.49
    Here, in addition to the “nude photo” on Ms. C’s account that SA R
    referenced in the affidavit, SA R detailed: the appellant’s website message to
    her that she was “incredibly beautiful with a sexy and stunning body;” that
    the appellant used an image of an erect penis as his avatar photo on the
    website; and, that his website profile stated he “loves to tease and please
    young horny wet girls to multiple orgasms.”50 Such contextual evidence
    allowed the CO to infer that the appellant had an interest in child erotica,
    48 See Vosburgh, 
    602 F.3d at 538
     (approving district court’s instruction to jurors
    that child erotica is “not illegal” to possess).
    49 See, e.g., United States v. Davenport, No. 20150322, unpublished op., 
    2016 CCA LEXIS 729
    , at *1, *8 (A. Ct. Crim. App. 19 Dec. 2016) (affirming the appellant’s
    conviction, “contrary to his pleas, of . . . two specifications of possession of child
    erotica in violation of Article 134, Uniform Code of Military Justice”).
    50   AE V, Encl. (3) at ¶ 6f (emphasis added).
    15
    United States v. Lancina, No. 201600242
    and that he would therefore download the nude photo content present on the
    website that SA R described in the affidavit.51 See Froman, 
    355 F.3d at
    890-
    91 (finding Froman’s use of “Littlebuttsue and Littletitgirly” as “screen
    names” on America Online, “reflected his interest in child pornography,” and
    therefore supported the inference that he “would download such pornography
    from the website and have it in his possession”); United States v. Shields, 
    458 F.3d 269
     (3rd Cir. 2006) (noting that Shields’ “use of the name
    ‘LittleLolitaLove’ [in] registering for multiple e-groups where” child
    pornography images were “available and disseminated bolster[ed] a practical,
    commonsense decision that Shields likely downloaded such images”) (citation
    and internal quotation marks omitted).52
    The thumbnail images and icon on the appellant’s computer discussed
    supra also suggest that the appellant has an interest in nude photographs of
    minors, and therefore support an inference that the appellant would
    download nude photos of minors from the website. Thus, even after removing
    the misleading language in the affidavit that the security manager “stated
    [the website] was a . . . known . . . []child pornography website,”53 we find that
    the remaining facts establishing that the website hosted nude photographs of
    minors, and that the appellant had a demonstrable interest in nude
    photographs of minors, allowed the CO to consider the appellant’s
    membership with, and participation in, that website, as probable cause to
    suspect that the appellant had committed child pornography offenses.
    2. The nexus between the alleged crime and the appellant’s home
    Probable cause to suspect that the appellant wrongfully viewed or
    possessed child pornography on his workplace computer does not necessarily
    51 The appellant argues that “there is no indication or evidence that the photo in
    the profile existed when [he] had accessed the profile months earlier.” Appellant’s
    Reply Brief at 6. This is irrelevant given that the question is if the website is a child
    erotica website, not whether the appellant viewed or downloaded any particular
    website item. See Clayton, 68 M.J. at 424-25 (finding “the activities of a voluntary
    member of the . . . web group w[ere] sufficient to support a search of his quarters,”
    even though there was “no evidence . . . that [Clayton] posted messages to the Google
    site, participated in discussions, or uploaded or downloaded child pornography” from
    the site).
    52We reject the appellant’s critique that “membership on” the website “means
    that member wrongfully possesses or views child pornography” is a “false
    assumption[].” Appellant’s Brief at 16. To use the appellant’s phrasing, membership
    on the website means that the appellant wrongfully possesses or views child erotica,
    and possession or viewing of child erotica under these circumstances provides
    probable cause to suspect the appellant committed a child pornography offense.
    53   AE V, Encl. (3) at ¶ 6a.
    16
    United States v. Lancina, No. 201600242
    provide probable cause to search his home and electronic devices there. Our
    superior court has advised:
    [I]n order for there to be probable cause, a sufficient nexus
    must be shown to exist between the alleged crime and the
    specific item to be seized. . . . The question of nexus focuses on
    whether there was a fair probability that contraband or
    evidence of a crime will be found in a particular place. . . . A
    nexus may be inferred from the facts and circumstances of a
    particular case, including the type of crime, the nature of the
    items sought, and reasonable inferences about where evidence
    is likely to be kept.
    Nieto, 76 M.J. at 106 (citations and internal quotation marks omitted). In
    Nieto, the most recent guidance from our superior court on this issue,
    multiple soldiers at a forward operating base suspected Nieto used his cell
    phone to record them using the latrine. After seizing Nieto’s phone and a
    laptop computer, Army Criminal Investigation Command sought a search
    authorization for the computer. The search request contained one agent’s
    statement that when “[s]oldiers us[e] their cell phones to photograph things,”
    those “phones are normally downloaded, the photos they take . . . they’ll back
    those up to their laptops so that when they get to . . . a place where they can
    get Internet, they can post those or send those home to family[.]” Id. at 104. It
    also recounted another agent’s “experience” that:
    [P]ersons who would use a portable digital media recorder
    would also transfer the media from a portable device to a
    computer station or storage device. Persons who view and
    record sexual acts often times store and catalog their images
    and videos on larger storage devices such as a computer or
    hard drive.
    Id. at 105. The military judge, citing Clayton, denied the motion to suppress
    on the theory that “[i]t is . . . a normal inference to be drawn . . . that data is
    transferred from one digital device to another.” Id.
    The CAAF held that the military judge abused his discretion in failing to
    suppress the search authorization. Noting that “the affidavits” and the oral
    briefing “accompanying the search authorization did not reference” any
    actual “data transfers” from Nieto’s cell phone, presented no “direct evidence
    that images were on the laptop,” and presented no evidence that “anyone had
    ever seen” Nieto “download material from his cell phone to a laptop,” the
    CAAF rejected the notion that “law enforcement” has “broad authority to
    search and seize all of an accused’s electronic devices and electronic media
    merely because the accused used a cell phone in furtherance of a crime.” Id.
    at 107-08, 108 n.5 (emphasis in original) (internal quotation marks omitted).
    17
    United States v. Lancina, No. 201600242
    Before Nieto, the CAAF found sufficient nexus for probable cause to
    search homes for child pornography in other cases where child pornography
    had been discovered in the workplace. There was probable cause in Clayton
    to search the appellant’s quarters in Kuwait where his e-mail address was
    found in the records of a “website group” containing child pornography,
    evidence showed he had accessed his e-mail account through a computer
    server in Kuwait, and he lived in base housing with “wireless Internet service
    capability.” 68 M.J. at 423. In Gallo, the probable cause affidavit stated that,
    in addition to finding child pornography on his work computer an “analysis of
    [Gallo]’s work computer indicated that computer files of unknown content
    had been downloaded or uploaded from the hard drive to a diskette, relating
    to files received over the internet . . . mak[ing] the files extremely portable in
    nature.” 55 M.J. at 421. The affidavit in Gallo also provided an experienced
    agent’s “pedophile profile,” that “[p]edophiles collect sexually explicit or
    suggestive materials involving children such as . . . computer disks” and
    “maintain and possess their materials . . . within the privacy and security of
    their own homes.” Id. at 420. In United States v. Allen, the affidavit stated
    that a government computer to which the appellant had access connected to
    an “on-line service” and downloaded child pornography; that Allen admitted
    “ha[ving] access to [that on-line] service at his residence,” and that he
    admitted having “erotica at his residence.” 
    53 M.J. 402
    , 407 (C.A.A.F. 2000).
    In light of Nieto, we find that the thumbnail images and icon found on the
    appellant’s government computer and his access of the website from work,
    alone, are insufficient to provide the nexus required to search his home. But
    SA R’s affidavit offered more for the CO’s consideration:
    i.     He had “observed activity on [the appellant’s] account” on the website
    on “six dates which included weekend days.”54
    ii.     In response to a phone call to the appellant by a Japanese investigator
    pretending to be “a telemarketer who was taking a survey about
    internet service,” the appellant admitted: that he had “internet service
    at his residence;” that he “has had it for the last 18 months;” that he
    owns a wireless router, desktop computer, laptop computer, and two
    cell phones that “he connects to the internet;” and that he “use[d] the
    internet for web browsing and watching movies.”55
    iii.     The seven paragraphs on “computers and child pornography” noted
    “[t]he computer’s ability to store images in digital form makes the
    computer itself an ideal repository for child pornography,” that the
    54   AE V, Encl. (3) at ¶ 6f.
    55   
    Id.
     at ¶ 6h.
    18
    United States v. Lancina, No. 201600242
    internet “afford[s] individuals several different venues for obtaining,
    viewing and trading child pornography,” and that such “computer
    communications can be saved or stored” both intentionally and
    “unintentionally, e.g., traces of the path of an electronic
    communication may be automatically stored in many places”—such as
    “temporary files or ISP client software . . . the web cache and history
    files,”—where “[s]uch information is often maintained for very long
    periods of time until overwritten by other data,” even “long
    after . . . attempts at deleting it.”56 Thus, SA R surmised that “[a]
    thorough search of this media could uncover evidence of receipt,
    distribution and possession of child pornography.”57
    iv. The 21 paragraphs of “[o]ffender [t]ypology” regarding those who “buy,
    produce, trade, or sell child pornography; who molest children and/or
    who are involved with the use of children in sexual acts,” opined that
    “[a]s a result of [his] training and experience, [he] learned that certain
    characteristics are generally found to exist in” these people, such as:
    they generally “collect sexually explicit material consisting of
    photographs,” they “rarely, if ever, dispose of their sexually explicit
    material,” they “use such photos as described above as a means of
    reliving fantasies or actual encounters with the depicted children,”
    and they “engage in activity or gravitate to programs which will be of
    interest to the type of victims they desire to attract and will provide
    them with easy access to these children.”58
    v. A paragraph connecting these concepts claimed that “offenders
    usually maintain illegal images using their computers and that
    evidence could remain on computers even after a viewer deletes the
    images,” as such deleted “files have been recovered by forensic
    analysts”—and, that “it is normal for offenders to save . . . child
    pornography media . . . on assorted pieces of digital electronic media
    storage     devices      to    include . . . desktop   [and]       laptop
    computers . . . smart telephones, [and] external hard drives[.]”59
    a. Offender typology
    [A] law enforcement officer’s generalized profile about how
    people normally act in certain circumstances does not, standing
    alone, provide a substantial basis to find probable cause to
    56   
    Id.
     at § IV.
    57   Id. at § IV(g).
    58   Id. at § I.
    59   Id. at ¶ 6j.
    19
    United States v. Lancina, No. 201600242
    search and seize an item in a particular case; there must be
    some additional showing that the accused fit that profile or
    that the accused engaged in such conduct.
    Nieto, 76 M.J. at 106. We find that the “offender typology” SA R’s affidavit
    provided was inadequate to provide the CO with a substantial basis to
    determine that there was probable cause to search the appellant’s home. As
    in Nieto, there was no evidence that the appellant “fit” most of this profile at
    all. There was no evidence, for instance, that the appellant would “buy,
    produce, trade, or sell child pornography,” or that he was “involved with the
    use of children in sexual acts.” Most of the profile’s descriptions were
    “rambling boilerplate recitations designed to meet all law enforcement
    needs.” United States v. Weber, 
    923 F.2d 1338
    , 1345 (9th Cir. 1990) (“[I]f the
    government presents expert opinion about the behavior of a particular class
    of persons, for the opinion to have any relevance, the affidavit must lay a
    foundation which shows that the person subject to the search is a member of
    the class.”). As such, they provided no nexus between the appellant’s
    activities at work and at his home.
    b. Information on computers and child pornography
    Based on the two thumbnail images on the appellant’s government
    computer, the affiant demonstrated, as required by Nieto, that the appellant
    “fit” part of this profile—the appellant was linked to child pornography
    “images in digital form.”60 Indeed, much of the information in these
    paragraphs (e.g., that “[s]uch information is often maintained for very long
    periods of time until overwritten by other data”) could provide a substantial
    basis for probable cause to search a device for which there was proof that
    “images in digital form” had already been accessed. However, standing alone,
    this information still does not establish a nexus between the thumbnail
    images and the appellant’s home.61
    60   AE V, Encl. (3) at § IV(d).
    61 SA R asserted at the suppression hearing that he “felt that, if somebody was so
    bold as to use their government computer to look for child pornography, possibly, or
    even view, on their government computer, that if that same person has got a home
    computer and access to the Internet, certainly that same type of behavior is going on
    where they are basically unimpeded by any other governmental controls; and that
    they would most certainly view, access, download, and keep that child pornography,
    or child exploitation images for long periods of time.” Record at 106. However, even
    assuming arguendo that SA R’s “fe[eling]” provides a substantial basis for probable
    cause, we do not consider this information because it is not in the affidavit presented
    to the CO. Cf. United States v. Macomber, 
    67 M.J. 214
    , 217 (C.A.A.F. 2009) (“The
    affidavit stated: child pornographers and persons with a sexual attraction to children
    almost always maintain and possess child pornography materials such
    20
    United States v. Lancina, No. 201600242
    The closest this portion of the affidavit gets to that connection is the
    statement that “it is normal for offenders to save . . . child pornography
    media . . . on assorted pieces of digital electronic media storage devices to
    include . . . desktop computers, laptop computers . . . smart telephones, [and]
    external hard drives[.]”62 In Gallo, the copying of files to removable storage
    provided a nexus between downloading of child pornography on his work
    computer and the search of Gallo’s home. 55 M.J. at 421-22.
    However, in Nieto, an affiant’s assertion that “[p]ersons who view and
    record sexual acts often times store and catalog their images and videos on
    larger storage devices such as a computer or hard drive,” was not enough to
    establish a nexus between the appellant’s cell phone and other digital
    devices. 76 M.J. at 105. The CAAF cautioned:
    [Reliance on a] generalized observation about the ease with
    which [digital] media may be replicated on a multitude and
    array of electronic devices, would run counter to the principle
    that law enforcement officials must provide specific and
    particular information in order for a magistrate to determine
    that there is a fair probability that contraband or evidence of a
    crime will be found in a particular place.
    Id. at 108 n.5 (citations and internal quotation marks omitted) (second
    alteration in original). There being no evidence that the appellant actually
    engaged in copying files to computer media which he could have transferred
    to his home, unlike in Gallo, we conclude that this portion of the affidavit
    here was too “generalized” to provide a substantial basis for probable cause to
    search the appellant’s home for child pornography.63
    c. Use of the website
    We find a sufficient nexus between the appellant’s home and child erotica,
    which provides probable cause to suspect the presence of child pornography,
    based on statements in the affidavit that he had internet access at home, that
    he accessed the website on weekends, and reasonable inferences therefrom.
    as: . . . . graphic image files . . . . These materials are stored in a secure but accessible
    location within their immediate control, such as in the privacy and security of their
    own homes, most often in their personal bedrooms.”).
    62   AE V, Encl. (3) at ¶ 6j (emphasis added).
    63 We also note that paragraph J, unlike the other information on child
    pornography and computers in the affidavit, uses the term “offender[],” linking it to
    the “offender typology” which we determined supra was irrelevant due to the fact
    that the affiant offered no proof the appellant ever did “buy, produce, trade, or sell
    child pornography” or “molest children.”
    21
    United States v. Lancina, No. 201600242
    In Clayton, the CAAF found a sufficient nexus between the appellant’s
    membership in a child pornography web group which was linked to his e-mail
    address, and a search of his “laptop, in [his] quarters, and . . . workspace,”
    based on a “practical, commonsense understanding of the relationship
    between the active steps that a person might take in obtaining child
    pornography from a website and retaining it for an extended period of time
    on that person’s computer.” 68 M.J. at 424. It did so even though the affidavit
    provided no specific proof that the appellant had made any downloads, or
    that he had accessed his e-mail account from his quarters rather than his
    workspace. Id. at 427, 427 n.1 (Ryan and Erdmann, JJ., dissenting) (noting
    that Clayton “could have checked his personal email at work, or at other
    locations,” because “the Government only knew that the account had been
    accessed by way of a U.S. Army server in Kuwait. It had no information
    regarding which computer had accessed the account”).
    In Allen, the affidavit stated that a computer to which Allen had access
    connected to an “on-line service” and downloaded suspected child
    pornography; Allen admitted he “had access to the on-line service from his
    residence;” and, that he had “erotica at his residence.” 53 M.J. at 407. The
    CAAF held that:
    This information reasonably shows that [Allen] accessed child
    pornography through his on-line server while on duty, had
    access to the same service at his residence, had erotica at his
    residence, and was evasive about possessing child pornography
    at home. Thus, [his home] computer equipment and associated
    materials, such as discs or printed graphics, would be or would
    contain evidence of this contraband material.
    Id. (emphasis added). The Allen Court found “substantial evidence” to search
    the appellant’s home, without direct proof of child pornography there. Id.
    As in Clayton and Allen, the appellant had access to the website not only
    from his workplace, but also from home, as evidenced by his reported
    “survey” responses detailed in the affidavit. Going beyond mere access, SA R
    had “observed activity on [the appellant’s] account” on the website on “six
    dates which included weekend days.”64 There is no evidence that the
    appellant was in any peculiar circumstance, such as being underway on a
    ship, in which his government computer would have been his exclusive
    means to access the website during the weekend. The CO did not have to rule
    64   Affidavit at ¶ 6f.
    22
    United States v. Lancina, No. 201600242
    out every other location from which the appellant could have accessed the
    website, in order to find probable cause to search his home.65
    Thus, based on the appellant’s reported survey responses and the timing
    of his website use, we find that the CO could reasonably infer the appellant
    accessed the website from his home.66 We need not determine whether the
    military judge’s finding that the appellant “was active on the site on
    weekends when he was not at work[,]”67 was clearly erroneous, as our focus is
    on the CO’s determination of probable cause from the affidavit, and the CO
    could infer that the appellant had accessed the website while not at work
    from the information provided.
    The appellant argues that because SA R had neither an “[I]nternet
    [P]rotocol (IP) address of a computer tied to downloading images of child
    pornography,” nor “any website conversation tying [the appellant’s] home to
    wrongful possession of child pornography,”68 we cannot find a nexus. We
    disagree. The Sixth Circuit Court of Appeals has held that even where an
    “affidavit did not contain direct evidence the child pornography was accessed
    at home,” the lack of “an IP address connecting the subscriber to a particular
    location is not dispositive” regarding “probable cause to search [the] home[.]”
    United States v. Kinison, 
    710 F.3d 678
    , 684 (6th Cir. 2013) (citing United
    States v. Terry, 
    522 F.3d 645
    , 648 (6th Cir. 2008) (“While any IP or other
    information that could have more specifically tied Terry’s home computer to
    the e-mail messages would certainly have been welcome, we are satisfied that
    the use of Terry’s personal e-mail account in the wee hours of the morning,
    combined with information that Terry used his home computer to access that
    account, established at least a ‘fair probability’ that the computer used to
    send the messages was . . . in Terry’s home”)).
    65 See United States v. Wagers, 
    452 F.3d 534
    , 539 (6th Cir. 2006) (noting that
    where investigators learned Wagers used a particular internet service provider to
    purchase memberships at a child pornography site, there would have been “sufficient
    evidence to support probable cause” to search his home for child pornography even if
    the “home w[as] . . . one of two locations—home and office—served” by the provider
    which Wagers could have used).
    66  See United States v. Lapsins, 
    570 F.3d 758
    , 766-67 (6th Cir. 2009) (finding
    probable cause to search Lapsins’ home, where the affidavit documented internet
    account activity involving child pornography which was conducted through “a
    residential cable modem in the city where Lapsins lived” at a time when he was
    likely to have been at home, even though “there was no direct evidence” he had ever
    “used a home computer to access” the internet accounts).
    67   AE XVII at 5.
    68   Appellant’s Brief at 17.
    23
    United States v. Lancina, No. 201600242
    In Nieto, there was no evidence linking Nieto’s phone to the laptop besides
    the affiant’s intuition and some general assumptions about what people do
    with their smartphones. Here, by contrast, there was evidence in this
    affidavit specifically demonstrating the appellant used the website on
    weekends, when the CO could reasonably infer that he was at home. Under
    the totality of the circumstances—such as the use of the website containing
    child erotica at home, combined with the thumbnail images and icon on the
    government computer, and the information in the affidavit about how digital
    images once accessed on a computer are likely to be retained—we find that
    the CO could infer that the appellant accessed child pornography at home,
    and that it would be maintained on digital devices there. Thus, we find that
    the CO had a substantial basis to find probable cause, with a nexus sufficient
    to search the appellant’s home and digital devices for child pornography.
    B. Consent by Ms. O to the PASS
    In his ruling on the motion to suppress, the military judge also held that:
    the “defense failed to establish” the appellant’s “standing to challenge the
    lawful consent by Ms. [O] to permit access to the apartment under the
    [United States-Japan Status of Forces Agreement (“SOFA)] or Japanese
    law;”69 Ms. O “knowingly and voluntarily permitted . . . access to the
    apartment for the purpose of executing the [CASS];”70 and, the seized
    evidence was admissible under both the good faith exception of MIL. R. EVID.
    311(c)(3) and the inevitable discovery exception of MIL. R. EVID. 311(c)(2).71
    The appellant argues that the military judge erred in ruling that the
    appellant “did not have standing to challenge [Ms. O]’s consent,”72 and, “that
    Ms. O knowingly and voluntarily permitted NCIS Agents access to the
    apartment for the purpose of executing the command authorized search.”73
    In abuse of discretion review, we “consider the evidence in the light most
    favorable to the prevailing party.” United States v. Rodriguez, 
    60 M.J. 239
    ,
    246 (C.A.A.F. 2004) (citation and internal quotation marks omitted). We
    review the military judge’s “factfinding under the clearly-erroneous standard
    and [his] conclusions of law under the de novo standard.” United States v.
    Ayala, 
    43 M.J. 296
    , 298 (C.A.A.F. 1995). We will find an abuse of discretion
    only if findings of fact are clearly erroneous or conclusions of law are
    incorrect. 
    Id.
    69   AE XVII at 19 n.3.
    70   
    Id. at 21
    .
    71   
    Id. at 22-25
    .
    72   Appellant’s Brief at 24.
    73   
    Id. at 25
    .
    24
    United States v. Lancina, No. 201600242
    1. The appellant’s standing to challenge an alleged SOFA violation
    We note that because the CASS was supported by probable cause, Ms. O’s
    consent had no impact on the search’s validity under the Fourth Amendment,
    regardless of any potential SOFA and Japanese law implications of entering
    the apartment without her consent.
    Any constitutional requirement for Ms. O’s consent (or a Japanese court’s
    authorization) to search the apartment would thus have to derive from
    “treaties” being “the supreme law of the land.” U.S. CONST. ART. VI. Under
    “Agreed View” 17(b) of the United States-Japan SOFA, “when the United
    States authorities deem it necessary to make searches or seizures outside
    facilities or areas in use by the United States Armed Forces with respect to
    crimes allegedly committed by United States . . . personnel, they should
    request Japanese law enforcement agencies to make such dispositions[.]”74
    However, “United States . . . law enforcement personnel may make searches
    and seizures of places occupied exclusively by” U.S. personnel and/or
    dependents.75
    “Although treaties are the supreme law of the land . . . this is not to say
    that individuals always may enforce this country’s treaty rights by a private
    law action or by invoking an exclusionary rule.” United States v. Whiting, 
    12 M.J. 253
    , 254-55 (C.M.A. 1982) (citation omitted) (declining to apply the
    exclusionary rule to evidence obtained where “German authorities had not
    been notified of the off-base search, as was required by international
    agreements to which the United States and Germany were parties”).
    The appellant cites no law or facts to support his claim that the military
    judge’s ruling that the appellant lacked standing to challenge whether Ms.
    O’s consented to the search is “incorrect.”76 The fact that Article 17(b) of the
    SOFA expressly allows searches and seizures of U.S. personnel based solely
    on a decision of U.S. authorities, unless non-U.S. personnel live there,
    strongly suggests that the exception the appellant seeks to enforce was
    crafted for the benefit of the Japanese state—by preserving its control, absent
    exigent circumstances, over when U.S. law enforcement can search personnel
    subject to Japanese jurisdiction. As in Whiting, the appellant cannot assert
    this right. 12 M.J. at 255 (noting that “the performance of [treaty] obligations
    is exclusively within the province of the Executive and Legislative
    Branches”).
    74   AE V, Joint Committee Agreements, No. 17.
    75   Id. (emphasis added).
    76   Appellant’s Brief at 24.
    25
    United States v. Lancina, No. 201600242
    Even if we assume arguendo that this provision of the United States-
    Japan SOFA confers a legal right upon Ms. O, were she on trial, we would
    decline to find that the appellant may assert a right belonging to Ms. O at his
    court-martial. Cf. United States v. Padilla, 
    508 U.S. 77
    , 81-82 (1993) (noting
    an “established principle is that suppression of the product of a Fourth
    Amendment violation can be successfully urged only by those whose rights
    were violated by the search itself, not by those who are aggrieved solely by
    the introduction of damaging evidence”) (citation and internal quotation
    marks omitted).
    2. Inevitable discovery
    Even if the appellant had standing to assert noncompliance with the
    SOFA and benefit from the exclusionary rule, the inevitable discovery
    doctrine nevertheless “allow[s] admission of evidence that, although obtained
    improperly, would have been obtained by another lawful means.” United
    States v. Wallace, 
    66 M.J. 5
    , 10 (C.A.A.F. 2008) (citing Nix v. Williams, 
    467 U.S. 431
    , 444 (1984)); see also MIL. R. EVID. 311(c)(2). In Wallace, the CAAF
    held that even “had [Williams] not ultimately consented to the seizure of the
    computer . . . investigators would have sought and obtained a search
    authorization based on probable cause” for investigation of an enticement
    crime which would have required “sift[ing] through” computer data, and
    thereby would have discovered child pornography on Wallace’s computer. 66
    M.J. at 10. The CAAF so decided even though “the government present[ed] no
    evidence” it “would have obtained a warrant” had Williams refused to grant
    consent to search his computer.” Id. at 11 (Baker, J., concurring in the
    result).
    Here, the military judge found that:
    i.      “[The legal advisor] opined that if [Ms. O] refused entry, they would
    coordinate with Japanese authorities to execute the search.”77
    ii.     “[I]f [Ms. O] would not provide access, then [NCIS] would have
    proceeded to obtain permission to enter to conduct the command
    authorized search from Japanese authorities.”78
    iii.     “Had [Ms. O] not granted the agents access to the apartment, the
    agents were prepared to liaise with Japanese authorities to secure a
    Japanese magistrate or judicial authorization to enter the apartment
    77   AE XVII at 10.
    78   Id. at 11.
    26
    United States v. Lancina, No. 201600242
    to conduct the command authorized search of the accused’s apartment
    and belongings.”79
    The appellant has not argued how any of these facts are erroneous, and
    we find no clear error. In light of Wallace, we agree with the military judge
    that these NCIS investigators, with probable cause to suspect that evidence
    of an alleged computer crime existed at the appellant’s residence—and who,
    unlike the investigators in Wallace, were ready and willing to obtain a search
    authorization from the Japanese authorities if Ms. O refused consent—would
    have done so, thereby obtaining the incriminating evidence on the appellant’s
    external hard drive and laptop.
    III. CONCLUSION
    The findings and the sentence are affirmed.
    Judge FULTON and Judge HUTCHISON concur.
    For the Court
    R.H. TROIDL
    Clerk of Court
    79   Id. at 14.
    27