Fort Drum is in northern New York, about thirty miles south of the Canadian border. It occupies a vast stretch of the state’s North Country, surrounded by low mountains, hardwood forests. The installation supports the 10th Mountain Division, one of the Army’s most deployed and combat-proven units. Soldiers here are trained to operate in rugged terrain, under harsh weather, and with minimal support. Readiness is not a slogan at Fort Drum; it is the daily environment.
The post covers more than 100,000 acres. Its training ranges, maneuver areas, and live-fire zones remain active year-round. Aviation units conduct cold-weather flight operations, infantry companies drill in snowshoes, and maintenance crews keep vehicles running through months of icy temperatures.
Nearby Watertown functions as the civilian backdrop for the installation. It houses military families, veterans, and businesses tied to the post’s daily operations. The connection between the city and the installation is unusually close: soldiers shop in the same stores, attend the same schools, and participate in the same civic life as their neighbors.
Fort Drum and the Global War on Terror
After the attacks of September 11, 2001, the 10th Mountain Division became one of the first conventional units deployed in response. Soldiers from Fort Drum secured key facilities in the United States and the Middle East before moving into Afghanistan to reinforce Special Operations forces already on the ground. In March 2002, the Division led coalition troops during Operation Anaconda in the Shahi-Kot Valley, directing more than 1,700 U.S. and 1,000 Afghan soldiers in one of the first major battles of the war.
Through the following years, the Division maintained an unbroken rotation between Afghanistan and Iraq. Its brigades commanded regional task forces, trained local security forces, and conducted combat operations from Kandahar to Baghdad. The 10th Combat Aviation Brigade and 10th Sustainment Brigade provided theater-wide aviation, transport, and logistics support, while Division headquarters repeatedly took command of joint task forces across both theaters.
Those deployments came at a cost. Nearly every brigade from Fort Drum deployed multiple times, and the strain on soldiers and families was constant. Many of the AWOL and desertion cases we handled during that period involved Fort Drum service members who had already served one or more tours and were facing another before they had recovered from the last.
The Division’s legacy from that era is endurance. Its soldiers carried the operational weight of the Global War on Terror and later turned to humanitarian and disaster relief missions worldwide. Fort Drum’s identity remains tied to those years: readiness, rough weather, and a culture built on survival under fire.
Our firm has represented 10th Mountain Division soldiers since 2006, using our Hartford office as a base for military cases across the Northeast, including Fort Drum and West Point. That location allows close coordination with clients without the delays and costs of constant travel, and our work has covered everything from AWOL and Article 120 cases to administrative boards and post-deployment misconduct tied to combat stress.
Soldiers stationed at Fort Drum have faced serious criminal charges in recent years, including cases that drew coordinated action from Army CID and local law enforcement:
- Three soldiers arrested in child sex sting operation – all charged with attempted sexual assault of a child, two also charged with pandering
- Army specialist charged with premeditated murder of fellow Fort Drum soldier
- Multiple soldiers arrested for sexual contact with underage girls in off-post hotels in Rome, New York
- Soldier arrested on rape and criminal sexual act charges involving a minor
These cases are consistent with what we’ve seen out of Fort Drum during our career: child sexual exploitation, sexual assault, CSAM, soldiers targeting minors in off-post locations, and violence against other service members. These offenses fall under OSTC jurisdiction.
Office of Special Trial Counsel (OSTC)
The Army’s Office of Special Trial Counsel was created to ensure independence and consistency across serious criminal prosecutions. Its stated mission is “to seek justice by independently and equitably evaluating criminal allegations and effectively prosecuting cases warranted by the evidence in the best interests of the Army community, while maintaining honest, clear communication with victims, the Army, and the public in order to promote trust in the military justice system.”
We hold the OSTC to that standard. Its own vision promises “a military prosecution unit worthy of America’s trust; committed to wise, informed judgment; skilled case management; and superior advocacy by professional, ethical, and engaged legal teams that continuously improve and actively pursue justice in accordance with Constitutional due process.”
The OSTC has an office at Drum that prosecutes “covered offenses,” including Articles 117a, 118, 119, 119a, 120, 120a, 120b, 120c, 125, 128b, 130, 132, and 134 of the Uniform Code of Military Justice. These statutes address offenses such as murder, manslaughter, domestic violence, sexual assault, stalking, and the wrongful distribution of intimate images.
Our job is to make sure that those principles are applied to every case, without bias or shortcut, and that the promise of due process remains real for the accused as well as the institution.
While many in the defense community were dismayed when the military justice system adopted a structure closer to the federal criminal system, including judge-alone sentencing and the creation of the OSTC to raise conviction rates, we saw it differently. In our experience, the OSTC model has been an asset to the defense. It creates a direct line of communication with decision makers who speak our language. These are prosecutors who are not swayed by optics or command politics. They are focused on winning the cases they take to trial, not on taking every case to trial. That means they are often receptive when we bring favorable evidence to their attention early, whether during the investigation or at the preliminary hearing.
Our twenty-five years in military justice give us the perspective to recognize these openings. It is rare for the stated goals of a prosecutor’s office to produce advantages for the defense, but that is what has happened here. The key is knowing how to see and use those opportunities before they disappear.
Our Firm Was Born in Wartime
Our Army defense practice took shape during the height of the Global War on Terror. We represented soldiers returning from Iraq and Afghanistan whose lives had been altered by combat and its aftermath. Those same pressures still exist. Commands continue to wrestle with morale, mental health, and accountability after long operational cycles. We’ve seen courage in combat turned into “proof” of culpability, and records of valor used to argue that a soldier “knew better.” The system has a way of turning on its own heroes, and our job is to keep that from happening.
We served as Air Force JAGs from 2001 to 2005, entering active duty right after the attacks on the Pentagon and World Trade Center. When we opened this firm in 2006, our docket filled quickly with Soldiers’ cases: AWOL, desertion, combat-related offenses, and post-deployment fallout, including those from Fort Drum under Articles 120, 134, and others. That background gave us the practical understanding and language needed to defend soldiers in a period of crisis, without sentiment and without illusion.
Most uniformed defense lawyers today joined after the wars ended. They’ve never seen a system running at wartime intensity, or a command consumed by operational pressure. If war returns, they’ll be learning in real time, and the Army will once again depend on experienced civilian counsel to keep the process grounded in fairness.
Where CSAM Cases Begin
Common origins include:
- CyberTipline reports: Major providers such as Facebook, Google, Instagram, Snapchat, and Microsoft are required by federal law to report suspected material to the National Center for Missing and Exploited Children (NCMEC).
- NCMEC review: Analysts assign a priority and send the report to the appropriate law enforcement office. Each referral usually includes file descriptions, cryptographic hash values, and the IP address linked to the account.
- Service or repair discovery: Technicians who encounter suspected material during computer or phone repairs must report it.
- Witness reports: Friends, relatives, or coworkers who see images on a device sometimes alert police directly.
- Collateral findings: Files are often found during other investigations, such as child sexual assault cases or digital searches for unrelated crimes.
Demand is a Root Cause (No Such Thing as “Mere” Possession)
- Every file depicts a real child. Each image or video documents an actual act of abuse, which is why possession is not treated as a victimless offense.
- Demand sustains production. Viewing and sharing drive continued exploitation by rewarding those who create and trade the material.
- Distribution networks mirror social media. Encrypted channels and forums on the dark web function like private social networks, using money or cryptocurrency for access or influence over new content.
- Repeated harm. Every download or view repeats the original violation, forcing victims to relive their exploitation through ongoing exposure.
Devices Investigators Look For
Investigators usually collect every storage or network-capable device, including:
- Desktop and laptop computers
- External drives, flash drives, and SD cards
- Phones and tablets (primary sources for camera and messaging data)
- Game systems such as PlayStation, Xbox, and Nintendo Switch
- Digital cameras, GoPros, and camcorders
- Routers, network-attached storage, and smart devices with cached or shared data
Each item can be imaged and analyzed until investigators determine whether it holds contraband or related communications.
Possession Requires Intent
Finding illegal images on a device is not enough to convict. The government must show that the accused knowingly possessed the material. That requires proof of both control and awareness.
Investigators typically:
- Identify who used or had access to each device.
- Review search histories, browser activity, and peer-to-peer software.
- Examine cloud storage accounts, messaging platforms, and file-sharing services.
- Look for emails, documents, or photos that connect the accused to the hardware.
- Compare timestamps, login data, and network activity to establish a pattern of use.
Each step is aimed at linking the person, not just the device, to the material and showing familiarity with what was stored or viewed.
How to Defend a Possession Case
Defense strategy focuses on knowledge, access, and reliability of evidence.
Typical lines of defense include:
- Control and access: Determine who used each device, when, and how. Shared computers, family networks, and workplace systems often complicate proof of exclusive control.
- Intent/knowledge: Evaluate whether files were downloaded intentionally, cached automatically, or opened accidentally. Review deletion activity and reporting efforts.
- Hash verification: Confirm that digital hash values were correctly generated and that files were not corrupted, mislabeled, or altered before comparison.
- Forensic integrity: Check imaging methods, chain of custody, and analysis software for procedural errors.
- Search scope: Review whether the warrant covered all devices examined and whether investigators relied solely on NCMEC summaries instead of verifying content independently.
- File context: Examine file paths, folder names, and metadata to determine whether the accused knew what the material depicted.
Role of Forensic Experts
- Digital specialists analyze system data to identify intentional access, remote intrusion, creation and access dates, and malware activity.
- Forensic psychologists assess trauma history, impulse control, and mental health for mitigation and treatment planning.
Restricting Victim-Related Evidence
- NCMEC reports often attach police records, interviews, or victim statements from the original abuse cases.
- These materials are hearsay and unrelated to the accused’s alleged conduct.
- The government cannot use third-party narratives to prove knowledge, intent, or motive.
- Defense might have to concede that these files can be used during the sentencing proceeding if there is a plea deal.
Medical Testimony on Age Identification
How “Tanner Staging” Is Used
- Tanner staging classifies physical development during puberty into five levels based on secondary sex characteristics.
- Prosecutors ask medical experts to compare visible features in images or video stills to these stages to argue that the person depicted is under 18.
- Stages 1–3 are interpreted as pre- or early-pubescent; stages 4–5 as mid- to late-adolescent.
Limitations of the Method
- The scale was designed for live clinical exams, not for reviewing photos or videos.
- Lighting, posture, angle, and ethnic variation can distort appearance.
- Puberty timing varies widely by genetics, diet, and environment, reducing reliability.
- Courts increasingly treat Tanner-based assessments as estimates, not definitive proof of age.
Defense Use
- Cross-examine experts on methodology, lack of direct examination, and other factors.
- Emphasize that without clinical context, Tanner analysis offers only a broad approximation.
- Underscore that such testimony cannot prove age beyond a reasonable doubt.
Homicide Under the UCMJ: Questions and Answers
What separates murder from manslaughter under military law?
Murder involves intent to kill or actions so reckless they show total disregard for human life. Manslaughter covers unlawful killings without that degree of malice.
- Voluntary manslaughter occurs in the heat of passion after “adequate” provocation.
- Involuntary manslaughter results from reckless or negligent acts, such as careless weapon handling or dangerous horseplay.
What is premeditated murder under Article 118?
Any killing done with intent after reflection, which is momentary. Proof might include planning, ambushing, or the selection of weapon. Maximum punishment: death or life without parole.
Can someone be convicted of murder without planning to kill?
Yes. Killing through conduct inherently dangerous to others (such as firing into an occupied tent) can meet the standard. Maximum punishment: life with parole eligibility.
What is felony murder?
If a death occurs during another serious offense like robbery, rape, or arson, the act becomes felony murder. When the underlying crime is capital, the maximum punishment includes death.
How does medical evidence influence these cases?
Autopsies, toxicology, and time-of-injury analysis often drive the verdict. Experts might disagree on the cause of death or whether later medical care contributed to it.
Can negligent medical care be a defense?
Yes. When the death results from poor or delayed care rather than the original act, courts may find an “intervening cause.”
How do voluntary and involuntary manslaughter differ?
- Voluntary: a killing in sudden passion before cooling off; maximum 15 years.
- Involuntary: an unintentional death from reckless or negligent behavior; maximum 10 years.
Does self-defense apply to homicide cases?
Yes. The accused must have a reasonable belief of imminent death or serious harm, and the response must be proportional. The court will closely examine whether deadly force was truly necessary.
Can PTSD or mental health issues reduce a murder charge?
Conditions such as PTSD, brain injury, or intoxication can be relevant to intent or premeditation. They rarely excuse the act entirely but can lower the degree of the offense or serve as mitigation at sentencing.
AWOL and Desertion From Fort Drum: What Soldiers Need to Know
Fort Drum and the 10th Mountain Division have long carried a reputation for deployment intensity. During the height of the Global War on Terror, soldiers from Drum rotated through Iraq and Afghanistan again and again. Our firm began handling AWOL and desertion cases from Fort Drum in 2006 and saw a high volume for years.
If you’re thinking about leaving, don’t. Please read our UCMJ Lawyers AWOL Survival Guide: The Hard Truth About Unauthorized Absence.
If you’re already gone, call a UCMJ lawyer immediately. You can reach us at 800-319-3134 for a confidential case evaluation.
How These Cases Work
- After 30 days, the Army lists you as a deserter in federal databases and issues a warrant.
- Arrests often happen during traffic stops. Local police hold the soldier until military transport arrives. But they also actively look for those in desertion status, by surveilling relatives’ homes, your former hangouts, and anywhere else they might think you’ll be.
- Once back under Army control, the case is routed for either nonjudicial punishment (Article 15) with an Other Than Honorable (OTH) discharge or court-martial.
- Those who left after deployment orders are far more likely to be prosecuted. Some were even sent forward to complete a deployment before being tried or discharged.
During wartime, commands handled thousands of these cases. Most ended with OTH discharges rather than trials. There were too many for the military to take them all to court-martial, so they created a standard administrative process to deal with the volume.
That pattern might repeat if another conflict erupts, but don’t assume your case won’t be a court-martial.
Common Questions
What is AWOL?
Failing to be where you were ordered, when you were ordered. The government doesn’t have to prove intent to stay away permanently.
What is desertion?
Leaving with intent to stay away forever or to avoid hazardous duty. That intent must be proven: burned uniforms, farewell notes, or resettling abroad would qualify.
Can I defend the charge?
Not by arguing you had a good reason. The only legal defense is that you weren’t actually absent. Personal hardship goes to punishment, not guilt.
Can an OTH discharge be upgraded?
There’s no automatic or realistic chance at an upgrade. You can petition for it and the petition will be denied. An OTH ends most veterans’ benefits permanently and will significantly limit job opportunities.
Why You Need a Lawyer
You won’t have appointed counsel until you’re back in military control, and maybe not even then. A civilian military lawyer can contact your command, coordinate your surrender, and start advocating before you return. Voluntary surrender, handled correctly, can make the difference between prosecution and discharge. What an attorney can’t do is negotiate a separation that leaves you where you are; you’ll need to return.
Talk to a UCMJ Attorney Serving Fort Drum, Watertown, and West Point
Our firm has represented soldiers from Fort Drum and cadets from West Point for two decades. We handle UCMJ and administrative cases across the Northeast through our Hartford office, which allows us to travel easily to New York.
If you’re stationed at Fort Drum, live in Watertown, or are connected to West Point, you can reach us directly for confidential legal advice. We’ve guided hundreds of soldiers through AWOL, desertion, and other cases and understand what’s at risk when the Army takes action against you.
Call 800-319-3134 or send a message through our secure contact form. You’ll reach an attorney, not a call center, who can explain your options and help you plan your next move.