Justia White Collar Crime Opinion Summaries

Articles Posted in Communications Law
by
Former Georgia police sergeant Van Buren used his credentials on a patrol-car computer to access a law enforcement database to retrieve license plate information in exchange for money. His conduct violated a department policy against obtaining database information for non-law-enforcement purposes. The Eleventh Circuit upheld Van Buren's conviction for a felony violation of the Computer Fraud and Abuse Act of 1986 (CFAA), which covers anyone who “intentionally accesses a computer without authorization or exceeds authorized access,” 18 U.S.C. 1030(a)(2), defined to mean “to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter.”The Supreme Court reversed. An individual “exceeds authorized access” when he accesses a computer with authorization but then obtains information located in particular areas of the computer (files, folders, databases) that are off-limits to him. Van Buren “access[ed] a computer with authorization” and “obtain[ed] . . . information in the computer.” The phrase “is not entitled so to obtain” refers to information one is not allowed to obtain by using a computer that he is authorized to access.“Without authorization” protects computers themselves from outside hackers; the “exceeds authorized access” clause protects certain information within computers from "inside hackers." One either can or cannot access a computer system, and one either can or cannot access certain areas within the system. The Act’s precursor to the “exceeds authorized access” language covered any person who, “having accessed a computer with authorization, uses the opportunity such access provides for purposes to which such authorization does not extend.” Congress removed any reference to “purpose” in the CFAA. On the government’s reading, an employee who sends a personal e-mail or reads the news using a work computer may have violated the CFAA. View "Van Buren v. United States" on Justia Law

by
In 2012, Rad and others were charged with acquiring penny stocks, “pumping” the prices of those stocks by bombarding investors with misleading spam emails, and then “dumping” their shares at a profit. Rad was convicted of conspiring to commit false header spamming and false domain name spamming under the Controlling the Assault of Non-Solicited Pornography And Marketing Act (CAN-SPAM), 15 U.S.C. 7701(a)(2), which addresses unsolicited commercial email. The PSR recommended raising Rad’s offense level to reflect the losses inflicted on investors, estimating that Rad realized about $2.9 million in “illicit gains” while acknowledging that because “countless victims” purchased stocks, the losses stemming from Rad’s conduct could not “reasonabl[y] be determined.” Rad emphasized the absence of evidence that any person lost anything. Rad was sentenced to 71 months’ imprisonment. The record is silent as to how the court analyzed the victim loss issue. The Third Circuit affirmed. DHS initiated removal proceedings under 8 U.S.C. 1227(a)(2)(A)(iii), which renders an alien removable for any crime that “involves fraud or deceit” “in which the loss to the victim or victims exceeds $10,000.” The IJ and the BIA found Rad removable.The Third Circuit remanded. Rad’s convictions for CAN-SPAM conspiracy necessarily entail deceit under 8 U.S.C. 1101(a)(43)(M)(i). The second element, requiring victim losses over $10,000, however, was not adequately addressed. The court noted that intended losses, not just actual ones, may meet the requirement. View "Rad v. Attorney General United States" on Justia Law

by
Apple introduced the iPad in 2010. To send and receive data over cellular networks (3G), customers had to purchase a data contract from AT&T and register on an AT&T website. AT&T prepopulated the user ID field on the login screen with customers’ email addresses by programming servers to search for the user’s Integrated Circuit Card Identifier to reduce the time to log into an account. Spitler discovered this “shortcut” and wrote a program, the “account slurper,” to repeatedly access the AT&T website, each time changing the ICC-ID by one digit. If an email address appeared in the login box, the program would save that address. Spitler shared this discovery with Auernheimer, who helped him to refine the account slurper, which collected 114,000 email addresses. Auernheimer emailed the media to publicize their exploits. AT&T fixed the breach. Auernheimer shared the list of email addresses with Tate, who published a story that mentioned some names of those whose email addresses were obtained, but published only redacted email addresses and ICC-IDs. Spitler was in California. Auernheimer was in Arkansas. The servers t were physically located in Texas and Georgia. Despite the absence of any connection to New Jersey, a Newark grand jury indicted Auernheimer for conspiracy to violate the Computer Fraud and Abuse Act, 18 U.S.C. 1030(a)(2)(C) and (c)(2)(B)(ii), and identity fraud under 18 U.S.C. 1028(a)(7). The Third Circuit vacated his conviction. Venue in criminal cases is more than a technicality; it involves “matters that touch closely the fair administration of criminal justice and public confidence in it.”View "United States v. Auernheimer" on Justia Law

by
Federal officers applied for a warrant to search the offices of Fair Finance in Akron, as part of an investigation into its owner, Durham, who was suspected of employing the company to engage in a Ponzi scheme. A Magistrate granted a warrant and, at the government’s request, sealed the file. Officers executed the search. The warrant and inventory of seized items were placed in the sealed file. Newspapers requested an order unsealing the files, arguing that they had a right of access under common law and the First Amendment. The district court denied the motion. After an indictment issued, the court granted the government’s motion to unseal the face sheet of the warrant, the form application (excluding the affidavit in support of the application), the inventory, two attachments to the warrant and application, the motion to seal the documents, and the order granting that motion. The affidavit filed in support of the warrant application and the docket sheet remained sealed. The newspapers are no longer contesting the sealing of the affidavit. The Sixth Circuit affirmed. The First Amendment right of access does not permit the newspapers to obtain the documents filed in connection with these warrant proceedings.View "In re: Search of Fair Finance " on Justia Law

by
Defendant hacked the email account of then-Alaska governor and Vice Presidential candidate Sarah Palin. After forensic examinations revealed that he took action to remove information from his computer relating to the incident, he was indicted on several counts, including identity theft, but only convicted of obstruction of justice, 18 U.S.C. 1519. Section 1519, part of the Sarbanes-Oxley Act of 2002, prohibits knowing destruction or alteration of any record with intent to impede, obstruct, or influence investigation of any matter within the jurisdiction of any federal department or agency or in relation to or in contemplation of any such matter or case. The Sixth Circuit affirmed, rejecting an argument that the law was unconstitutionally vague and that there was not sufficient evidence to support his conviction. Defendant's posts indicated "contemplation" of a federal investigation.View "United States v. Kernell" on Justia Law

by
In 2003, the Securities and Exchange Commission (SEC) sought a preliminary injunction against ClearOne Communications, Inc. based on suspicions of irregular accounting practices and securities law violations. During a hearing on the preliminary injunction, Defendant and former CEO Susie Strohm was asked if she was involved in a particular sale by ClearOne that was the focus of the SEC’s case. She said she was not and approximated that she learned of the sale either before or after the end of ClearOne’s fiscal year. Based on this testimony, Defendant was later convicted of one count of perjury. She argued on appeal to the Tenth Circuit that her conviction should be reversed because (1) the questioning at issue was ambiguous, (2) her testimony was literally true, and (3) even if false, her testimony was not material to the court’s decision to grant the preliminary injunction. The Tenth Circuit disagreed on all three points. The Court found the questions were not ambiguous and there was sufficient evidence to demonstrate Defendant knowingly made false statements. Also, Defendant's testimony was material to the preliminary injunction hearing because it related to a transaction the SEC believed demonstrated ClearOne’s accounting irregularities. The Court therefore affirmed Defendant's conviction. View "United States v. Strohm" on Justia Law