UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF COLUMBIA
MARK THOMAS ROSSINI,
Petitioner,
v. Magistrate Case No. 08-692 (JMF)
UNITED STATES OF AMERICA,
Respondent.
MEMORANDUM OPINION
Currently pending and ready for resolution is the petitioner’s Petition in Support
of a Writ of Error Coram Nobis [#17]. For the reasons stated below, the petition will be
denied.
BACKGROUND
On December 1, 2008, the government filed an information, claiming that on five
occasions between January 19, 2007 and July 5, 2007, the petitioner “intentionally and
knowingly exceeded his authorized access to a protected computer belonging to the
Federal Bureau of Investigation, an agency of the United States headquartered in the
District of Columbia, and by such act obtained information from the Federal Bureau of
Investigation that he was not permitted to receive,” in violation of Title 18 of the United
States Code, Section 1030(a)(2)(B), the Computer Fraud and Abuse Act (“CFAA”). See
Information [#1]. On December 8, 2008, the petitioner entered a guilty plea as to all
charges in the information. See Plea Agreement (November 24, 2008 Letter from Tejpal
S. Chawla, Assistant United States Attorney, to Adam Hoffinger, petitioner’s counsel)
[#3].
Pursuant to the plea agreement, the petitioner conceded that the following facts
were true:
Between January 3, 2007 and July 30, 2007, the
defendant made over 40 searches of the ACS for FBI
information that were for purely personal purposes, and not
connected to FBI business. Each of these searches
exceeded the defendant’s authorized use of the ACS
system, and were [sic] not part of any of his assigned work.
As part of these searches, the defendant obtained
information to which he was not entitled.
Statement of the Offense [#4] at 3.
On May 14, 2009, the petitioner was sentenced to 1) twelve months of probation
for each of the five counts, to run concurrently; 2) a special assessment fee of $125; 3) a
fine of $5,000 to be paid at a monthly rate of $250; and 4) 250 hours of community
service. Judgment in a Criminal Case [#11] at 1, 3. Since judgment was imposed, the
petitioner completed payment on the Court-imposed fines, 1 his supervised release was
terminated, 2 and he completed his community service. 3
DISCUSSION
I. Legal Standard
“The writ of coram nobis is an ancient common-law remedy designed ‘to correct
errors of fact.’” U.S. v. Denedo, 556 U.S. 904, 910 (2009) (quoting U.S. v. Morgan, 346
U.S. 502, 507 (1954)). Originally, the writ was intended as a means of correcting
“technical errors.” Denedo, 556 U.S. at 911. Today it is used to correct “fundamental
errors,” when no other remedy is available. Id. Thus, “coram nobis . . . may collaterally
1
See [#17-5] at 2
2
See [#17-4] at 2.
3
See [#17] at 8.
2
attack only constitutional or jurisdictional errors or serious defects in the trial either not
correctible on direct appeal or where exceptional circumstances justify the failure to
appeal on those grounds.” U.S. v. McCord, 509 F.2d 334, 341 (D.C. Cir. 1974), cert.
denied, 421 U.S. 930 (1975).
Writing in 2009, Judge Hogan indicated that “the D.C. Circuit’s precedent in this
area is thin.” U.S. v. Williams, 630 F. Supp. 2d 28, 32 (D.D.C. 2009). He pointed to the
leading case, United States v. Hansen, 906 F. Supp. 688 (D.D.C. 1990), in which Judge
Joyce Hens Green of this Court, in the absence of D.C. Circuit authority for analyzing a
petition for a writ of error coram nobis, looked to the practice of the Third, Fourth, Ninth
and Tenth Circuits. Id. at 692. Under their precedents, relief by writ of coram nobis was
only available when: “(1) a more usual remedy is not available; (2) valid reasons exist for
not attacking the conviction earlier; (3) adverse consequences exist from the conviction
sufficient to satisfy the case or controversy requirement of Article III; and (4) the error is
of the most fundamental character.” Id. at 692-93. Accord U.S. v. Akinsade, 686 F.3d
248, 252 (4th Cir. 2012); Klein v. U.S., 880 F.2d 250, 254 (10th Cir. 1989); Hirabayashi
v. U.S., 828 F.2d 591, 604 (9th Cir. 1987).
I will follow Judge Hogan’s and Judge Green’s lead and apply those factors.
II. Analysis
A. A More Usual Remedy is Not Available
Both the petitioner and the government agree that because the petitioner waived
his right to an appeal when he accepted the plea agreement, and because he has now
completed the various elements of his sentence, the more usual remedies of either a direct
appeal or a motion for habeas corpus relief pursuant to 28 U.S.C. § 2255, respectively,
3
are not available. See [#17] at 13; United States[’] Opposition to Defendant’s Petition for
Writ of Error Coram Nobis [#22] at 5. Thus, the petitioner has satisfied the first of the
coram nobis requirements.
B. No Valid Reasons Exist for Not Attacking the Conviction Earlier
The petitioner argues that there was a valid reason why he did not attack his
conviction earlier—because there was a change in the law governing his conviction.
[#17] at 13-14. Specifically, the petitioner claims that it was not until this Court issued
its decision in Lewis-Burke Assocs., LLC v. Widder, 725 F. Supp. 2d 187 (D.D.C. 2010)
and the Ninth Circuit issued its decision in United States v. Nosal, 642 F.3d 781 (9th Cir.
2011), that he became aware that he had grounds to file a petition for a writ of coram
nobis. [#17] at 17-18.
The government counters that the petitioner’s argument is flawed because both
the Widder and Nosal decisions adopted the Ninth Circuit’s reasoning in LVRC Holdings
LLC v. Brekka, 581 F.3d 1127 (9th Cir. 2009), a decision issued in 2009, well before the
petitioner’s current filing, which occurred five years later on June 6, 2014. [#22] at 5-7.
The government also argues that the petitioner could have based his argument on the
reasoning in Shamrock Foods Co. v. Gast, 535 F. Supp. 2d 962 (D. Ariz. 2008), a 2008
decision in which the court ruled on the application of the CFAA to conduct similar to
that at issue in this case. Id. at 6-7. The government’s arguments are persuasive because
there was authority in existence well before the petitioner filed his current petition,
authority which could have supported the argument he makes now.
4
First, even if this Court’s decision in Widder had been deemed to apply
retroactively, 4 which it was not, the petitioner still lacked a valid reason for not attacking
his conviction earlier because the argument he now advances has in fact previously been
successfully asserted, albeit not in this circuit. On February 20, 2008, the District Court
for the District of Arizona issued its decision in Shamrock. In that case, a civil action, 5
the court unequivocally held that “[t]he general purpose of the CFAA ‘was to create a
cause of action against computer hackers (e.g., electronic trespassers).’” Id. To that end,
the court concluded the following with respect to sections 1030(a)(2) 6 and section (4) 7 of
the CFAA:
Given the plain language, legislative history, and principles
of statutory construction, the restrictive view of
authorization is adopted. [A] violation for accessing
without authorization occurs only where initial access is not
permitted. And a violation for exceeding authorized access
occurs where initial access is permitted but the access of
certain information is not permitted.
Id. at 967 (internal citations and quotations omitted).
Less than two years later, on September 15, 2009, the Ninth Circuit issued its
decision in Brekka. In that case, a company sued a former employee for violating
sections 1030(a)(2) and (4) of the CFAA by accessing its computer without authorization
and in excess of authorizations. Brekka, 581 F.3d at 1132. First, the court noted that “an
4
See U.S. v. Walgren, 885 F.2d 1417, 1421 (9th Cir. 1989) (holding that a decision deemed to have
retroactive application generally also has such retroactive application in a coram nobis proceeding).
5
Although the CFAA is a criminal statute, it also provides for a civil cause of action between private
parties. See 18 U.S.C. § 1030(g).
6
Section 1030(a)(2) states in pertinent part that a violation of the CFAA occurs when an individual
“intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains
. . . information contained in a financial record . . . from any department or agency of the United States; or .
. . from any protected computer.”
7
Section 1030(a)(4) states in pertinent part that a violation of the CFAA occurs when an individual
“knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds
authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value,
unless the object of the fraud and the thing obtained consists only of the use of the computer and the value
of such use is not more than $5,000 in any 1-year period.”
5
employer gives an employee ‘authorization’ to access a company computer when the
employer gives the employee permission to use it.” Id. at 1133. Thus, the court
concluded that because the company gave the employee permission to access its
computer, he did not act “without authorization” when he acted for purposes contrary to
the company’s interest, both while employed by the company and then after he left the
company. Id. at 1135. For the same reason, the court also concluded that the employee
did not “exceed authorization.” Id. In a footnote, the court further noted that “nothing in
the CFAA suggests that a defendant’s authorization to obtain information stored in a
company computer is ‘exceeded’ [even] if the defendant breaches a state law duty of
loyalty to an employer.” Id. at 1135 n.7. The court clearly stated therefore that an
individual violates the above two sections of the CFAA by accessing data for which he
lacks authorization, not for using data that he is authorized to access for purposes
contrary to the company’s interest.
Finally, on July 28, 2010, this Court issued its decision in Widder. In that case,
the issue before this Court was whether an employee violated the CFAA by taking
confidential and proprietary computer data with him when he left the company where he
used to work, in violation of section 1030(a)(2). As stated by the court in Shamrock, this
Court also noted that the primary purpose of the CFAA was to deter computer hacking.
Id. at 194. Then, following the Brekka line of cases, this Court noted that when an
employer gives an employee permission to use its computer system, it is giving that
employee authorization to access the data contained therein. Id. at 192. Ultimately, this
Court concluded that “[w]hether [an employee] had permission to copy documents onto
6
his thumb drive or to subsequently use the data from a non-[work] computer, after he had
left its employ, is not a question that relates to his liability under the CFAA.” Id. at 194.
As noted above, in this case, the information against the petitioner was filed on
December 1, 2008, almost ten months after the February 20, 2008 Shamrock decision
was issued. Understandably, even if the petitioner had been aware of the Shamrock
opinion, he may not have felt compelled to base his motion for a writ of coram nobis
upon the authority of a case from the District Court for the District of Arizona. However,
when the Ninth Circuit issued its September 15, 2009 opinion in Brekka, 8 the petitioner
should have been compelled to file the current motion. In other words, as of the issuance
of the Brekka decision, which was issued four months after the petitioner was sentenced,
he should have been aware that there was circuit authority for the proposition that he was
not guilty of a misdemeanor violation of the CFAA when he accessed FBI information
for personal reasons. 9 Nothing whatsoever justifies his delay.
C. The Petitioner Did Not Suffer Sufficient Adverse Consequences
First, the petitioner notes that “[t]he Supreme Court has recognized a presumption
of collateral consequences that applies to a criminal conviction.” [#17] at 14 (citing
Spencer v. Kemna, 523 U.S. 1, 9 (1998)). Then, the petitioner claims that, as a former
FBI counterterrorism specialist who has been convicted of violating the CFAA, he has
not been able to obtain work in his field of expertise. [#17] at 15.
8
Although the petitioner claims, inter alia, that it was not until the Ninth Circuit issued its decision in
Nosal, that he became aware that he had grounds to file a petition for a writ of coram nobis, according to
the court in Nosal, its conclusion “that an employer’s use restrictions define whether an employee ‘exceeds
authorized access’ [was] simply an application of Brekka’s reasoning,” (Nosal, 642 F.3d at 787), and not a
novel interpretation of the CFAA.
9
When new theories are advanced with respect to a law’s interpretation, even if those theories are not
successful, the burden still lies with the petitioner to advance those theories in support of his case. See
Durrani v. U.S., 294 F. Supp. 2d 204, 213 (D. Conn. 2003) (“The ‘availability of prior relief is determined
by whether or not petitioner could attempt to secure such relief; it is irrelevant whether or not the petitioner
would actually be successful in securing it.”) (internal quotation omitted) aff’d 115 Fed. Appx. 500 (2004).
7
The government concedes that while it is true that adverse consequences flow
from a criminal conviction, it argues that not every person who has been convicted of a
crime is entitled to a writ of coram nobis. [#22] at 7. The government also notes the
following: “His admitted behavior in conducting personal searches of the FBI database,
obtaining information from that database, and sharing it with a third party would be an
obvious impediment to any effort on his part to obtain future permanent employment in
the counterterrorism field, quite separate and apart from the conviction to which that
conduct lead.” Id. at 9.
Again, the government’s argument is persuasive. In order to satisfy the case or
controversy requirement of Article III, the petitioner must show 1) that he suffered some
actual or threatened injury as a result of the respondent’s conduct; 2) that the injury
resulted from the petitioner’s conduct; and 3) that the injury is likely to be redressed by a
favorable action. Valley Forge Christian Coll. v. Ams. United for Separation of Church
and State, Inc., 454 U.S. 464, 472 (1982). In this case, even if the petitioner’s writ of
coram nobis was granted and his conviction was vacated, the injury he claims he
suffered—that he can no longer obtain employment in the field of counterterrorism—
would not necessarily be redressed. In other words, the petitioner, of his own accord,
admitted to having accessed information on the FBI database, over forty times, and used
it for personal purposes. This behavior is hardly likely to make him an attractive
candidate for future work in the field of counterterrorism, where the need to maintain
secrecy is of paramount importance. In other words, had the petitioner not admitted to
the conduct at issue, vacating his judgment would have favorably redressed his injury.
Thus, the petitioner cannot be heard to argue that the adverse consequences he suffered
8
were either solely the result of his conviction or that they are sufficient to satisfy Article
III’s case or controversy requirement.
D. The Error is Not of the Most Fundamental Character
It is hard to understand what error of a fundamental character haunts the
defendant’s conviction. The defendant, represented by obviously competent counsel,
chose to plead guilty and gain the benefits of doing so when he could have demanded a
trial and asserted what might have been the successful argument that his behavior did not
violate the statute. Instead, he chose to limit his sentencing exposure by pleading guilty.
Now that the law is more favorable to his position, he wants to undo the bargain he made
and get the result he chose not to try to get in the first place. A writ of coram nobis is
designed to cure a fundamental error, not a bad case of buyer’s remorse.
Alternatively, the defendant might argue that because the information did not
charge a crime, this Court lacked jurisdiction over the subject matter and its exercising
that jurisdiction to convict him was a fundamental error. See, e.g., U.S. v. Peters, 310
F.3d 709 (11th Cir. 2002). But, in this Circuit, it is clear that a claim that the indictment
fails to state an offense does not deprive the court of jurisdiction over the subject matter.
See U.S. v. Delgado-Garcia, 374 F.3d 1337, 1342 (D.C. Cir 2004). This is because the
substantive sufficiency of the indictment is a matter that goes to the merits of the case,
rather than to the district court’s subject matter jurisdiction. Id. Accord U.S. v. George,
676 F.3d 249, 259-60 (1st Cir. 2012) (defendant pled guilty; so long as information
charges a violation of a crime set out in Title 18 of the United States Code, that is the end
of the inquiry as to subject matter jurisdiction). Thus, the only possible avenue of relief
defendant could pursue is not available.
9
CONCLUSION
The defendant has failed to meet the criteria for coram nobis relief, other than the
showing that the more usual remedies were not available to him. Thus, his motion will
be denied.
An order accompanies this memorandum opinion.
Digitally signed by John M. Facciola
DN: c=US, st=DC, l=Washington,
email=John_M._Facciola@dcd.uscourts.gov,
o=United States District Court, cn=John M.
Facciola
Date: 2014.10.14 17:00:13 -04'00'
JOHN M. FACCIOLA
UNITED STATES MAGISTRATE JUDGE
10