People of Michigan v. Gregory Lamont Glenn Jr

STATE OF MICHIGAN COURT OF APPEALS PEOPLE OF THE STATE OF MICHIGAN, UNPUBLISHED May 10, 2016 Plaintiff-Appellee, v No. 325640 Wayne Circuit Court GREGORY LAMONT GLENN, JR., LC No. 14-006694-FH Defendant-Appellant. Before: BOONSTRA, P.J., and METER and BECKERING, JJ. PER CURIAM. Defendant appeals by right his conviction, following a jury trial, of unauthorized access of a computer, MCL 752.795(a). Defendant was sentenced to two years’ probation. We affirm. I. PERTINENT FACTS AND PROCEDURAL HISTORY Defendant, an officer with the United States Customs and Border Patrol (CBP), worked at the Canada-United States border in Detroit, Michigan, during the relevant year of 2013. On January 11, 2013, Amanda Shovlin, with whom defendant had a personal relationship, crossed the border from Canada into the United States, but was detained for secondary inspection1 prior to entry. Defendant was not at work that day, but returned to work on January 14, 2013. Video surveillance of the office, in addition to computer monitoring, revealed that defendant searched his TECS computer for Shovlin’s name contrary to CBP’s TECS use policy, which prohibited officers from searching for information regarding family members and close associates. The policy states in pertinent part: 1 Secondary inspection is a more detailed inspection process for people whose names have been flagged in the Treasury Enforcement Communication System (TECS) law enforcement database. The TECS database contains detailed financial, biographical, and criminal history information. -1- Field Operations employees shall not engage in official business involving a family member or a close associate except in the limited circumstances described in 6.2.3 of this section. * * * Should circumstances arise in which no disinterested field operation employee is on duty and no supervisor on duty[,] a CBP employee is authorized to conduct business with close family or associates as provided under [sic] and list the management directive number. Further, when an employee accesses the TECS system, a warning banner is displayed on the screen. The banner states the following: You are accessing a [US] off [sic] government information system which includes this computer, the computer network, all computers connected to this network and all devices and storage media attached to this network or to a computer on this network. This information system is provided for US government authorized use only. Unauthorized or improper use or access of this system may result in disciplinary action, as well as civil and criminal penalties. By using this information system . . ., you understand and consent to the following: You have no reasonable expectation of privacy when you use this information system. This includes any communications or data transiting stored on, originated from or directed to this information system. At any time, and for any lawful government purpose[,] [t]he government may monitor, intercept, search and seize any communication or data transiting, stored on, originated from or directed to or from this information system. The government may disclose or use any communication or data transiting stored on[,] originated from or directed to or from this information system for any lawful government purpose. You are not authorized to process classified information on this information system. Defendant was convicted of unauthorized access of a computer contrary to MCL 752.795(a). This appeal followed. II. BINDOVER Defendant argues that he should not have been bound over for trial because the prosecution failed to present evidence establishing probable cause that he had violated -2- MCL 752.795(a), and also that the statute does not even apply to the conduct of which defendant was found guilty—violation of an internal computer “use” policy. We disagree. A. STANDARD OF REVIEW We review “for an abuse of discretion a district court’s decision to bind over a defendant.” People v Hudson, 241 Mich App 268, 276; 615 NW2d 784 (2000). “A circuit court’s decision with respect to a motion to quash a bindover order is not entitled to deference because this Court applies the same standard of review to this issue as the circuit court.” Id. “An abuse of discretion occurs when the court chooses an outcome that falls outside the range of reasonable and principled outcomes.” People v Unger, 278 Mich App 210, 217; 749 NW2d 272 (2008). Furthermore, “[a] trial court necessarily abuses its discretion when it makes an error of law.” People v Waterstone, 296 Mich App 121, 132; 818 NW2d 432 (2012). However, “[t]he decision whether alleged conduct falls within the statutory scope of a criminal law involves a question of law, which this Court reviews de novo.” People v Noble, 238 Mich App 647, 658; 608 NW2d 123 (1999). B. BINDOVER GENERALLY To bind a defendant over to circuit court, the magistrate at a preliminary examination must “determine whether a felony was committed and whether there is probable cause to believe the defendant committed it.” People v Yost, 468 Mich 122, 125-126; 659 NW2d 604 (2003). Probable cause exists where the evidence is “sufficient to cause a person of ordinary prudence and caution to conscientiously entertain a reasonable belief of the accused’s guilt.” Id. at 126 (citation and quotation marks omitted). “In order to establish that a crime has been committed, the prosecution need not prove each element beyond a reasonable doubt, but must present some evidence of each element.” People v Redden, 290 Mich App 65, 84; 799 NW2d 184 (2010). Additionally, “[i]f the evidence conflicts or raises a reasonable doubt concerning the defendant’s guilt, the defendant should nevertheless be bound over for trial, at which the trier of fact can resolve the questions.” Id. C. APPLICATION OF MCL 752.795(a) Turning to the statute in question, MCL 752.795(a) provides the following: A person shall not intentionally and without authorization or by exceeding valid authorization do any of the following: (a) Access or cause access to be made to a computer program, computer, computer system, or computer network to acquire, alter, damage, delete, or destroy property or otherwise use the service of a computer program, computer, computer system, or computer network. MCL 752.792 further provides the following relevant definitions: (1) “Access” means to instruct, communicate with, store data in, retrieve or intercept data from, or otherwise use the resources of a computer program, computer, computer system, or computer network. -3- * * * (3) “Computer” means any connected, directly interoperable or interactive device, equipment, or facility that uses a computer program or other instructions to perform specific operations including logical, arithmetic, or memory functions with or on computer data or a computer program and that can store, retrieve, alter, or communicate the results of the operations to a person, computer program, computer, computer system, or computer network. (4) “Computer network” means the interconnection of hardwire or wireless communication lines with a computer through remote terminals, or a complex consisting of 2 or more interconnected computers. (5) “Computer program” means a series of internal or external instructions communicated in a form acceptable to a computer that directs the functioning of a computer, computer system, or computer network in a manner designed to provide or produce products or results from the computer, computer system, or computer network. (6) “Computer system” means a set of related, connected or unconnected, computer equipment, devices, software, or hardware. (7) “Device” includes, but is not limited to, an electronic, magnetic, electrochemical, biochemical, hydraulic, optical, or organic object that performs input, output, or storage functions by the manipulation of electronic, magnetic, or other impulses. The unambiguous language of the statute makes clear that a violation has occurred when a defendant has: (1) intentionally and (2) without authorization or by exceeding valid authorization (3) accessed or caused access to be made to a computer program, computer, computer system, or computer network (4) to acquire, alter, damage, delete, or destroy property or otherwise use the services of a computer program, computer, computer system, or computer network. The only published case from this Court substantially discussing MCL 752.795 is People v Golba, 273 Mich App 603; 729 NW2d 916 (2007). There, the main issue was whether the 64- year-old defendant’s conviction under MCL 752.795(a) for using school computers to send pornography and emails of a sexual nature to a 16-year-old student was a “sexual offense” and thus a “listed offense” under the sex offenders registration act (SORA), MCL 28.721 et seq. Id. at 605, 611-612. In addressing that issue, this Court at least tacitly concluded that the violation of “internal use” policies satisfied the “without authorization” and “exceeds authorized access” elements of MCL 752.795(a): In the present case, the evidence introduced at trial supported the trial court’s findings that defendant violated the school’s computer acceptable use policy by downloading pornography on his school computer and that he viewed the pornography on the computer in the presence of a 16-year-old female student. The evidence also supported the trial court’s finding that defendant used the -4- computer to solicit sex from the student. . . . The policy expressly prohibits users from accessing pornographic materials or inappropriate text files and prohibited users from sending or receiving e-mails that contained “pornographic material” or “inappropriate information.” Defendant’s conduct was sufficient to support a finding that he intentionally and without authorization, or by exceeding valid authorization, accessed or caused access to be made to the computer in violation of MCL 752.795. [Id. at 611-612.] Golba therefore permits “internal use” policies to define the contours of “without authorization” and “exceeds authorized access” in the context of MCL 752.795(a). In so applying Golba, we acknowledge the lengths to which this interpretation could be stretched in other circumstances, and that it could be employed to reach even innocuous types of conduct. Certain justices of the Michigan Supreme Court have similarly expressed concern about the potential overreach of MCL 752.795. See People v Walker, 491 Mich 931; 813 NW2d 750 (2012) (MARKMAN, J., concurring).2 We reiterate Justice MARKMAN’s suggestion of legislative consideration of the scope of MCL 752.795, and note that Justice MARKMAN’s concerns have been echoed by federal courts tasked with interpreting provisions of the federal Computer Fraud and Abuse Act (CFAA), 18 USC 1030 et seq. In United States v Nosal, 676 F3d 854 (CA 9, 2012), for example, the United States Court of Appeals for the Ninth Circuit, in interpreting a provision of the CFAA with similar language, and applying the rule of lenity, concluded that the phrase “exceeds authorized access” does not extend to violations of employer computer use restrictions, but rather only to individuals whose initial access to a computer is authorized but who accesses information and files that they are not authorized to access. The Second Circuit reached a similar conclusion in United States v Valle, 807 F3d 508, 523-528 (2015), in interpreting a different portion of the CFAA that also used the phrase “exceeds authorized access.” Other circuits have reached contrary conclusions. See, e.g., United States v John, 597 F3d 263, 272 (CA 5, 2010) (holding that employee exceeded authorized access when she accessed information from her employer’s database in violation of her employer’s use policy); EF Cultural Travel BV v Explorica, Inc, 274 F3d 577, 583-584 (CA 1, 2001) (holding that violation of an employer’s confidentiality agreement was possibly “exceeding authorized access”); United States v Rodriguez, 628 F3d 1258, 1260-1263 (CA 11, 2010) (holding that the defendant exceeded authorized access when he accessed his employer’s (Social Security Administration) customer data against office policy to find women to whom to send flowers). 2 Justice MARKMAN wrote, in agreement with Justice KELLY ’s dissent to the order denying leave to appeal in that case, “I share the dissenting justice’s concern that MCL 752.795 encompasses an extremely broad range of conduct, and further believe that it potentially extends well beyond even its application in the instant case. Therefore, I write separately to urge the Legislature to consider whether it intends to criminalize the full range of conduct to which the statute potentially extends.” -5- These decisions of federal courts, interpreting a federal statute, are of course not binding on this Court in its interpretation of state law, although they may be persuasive. See Abela v General Motors Corp, 469 Mich 603, 606-607; 677 NW2d 325 (2004). And, in the instant case, we see no need to determine the full range of conduct to which MCL 752.795 applies. It is undisputed that, while defendant was authorized to access the TECS database generally as part of his job, he was explicitly prohibited from accessing any information relating to family members or close associates. The information he accessed regarding Shovlin was thus information he was not authorized to access. Defendant in fact was aware that he was not permitted to access information regarding persons with whom he had a current or previous dating relationship, as he had on one previous occasion informed his supervisor that he had been in a dating relationship with a woman who had been selected for secondary inspection and did not query the TECS database regarding her; although the supervisor testified that he and defendant did not specifically discuss whether defendant was authorized to query this particular person, he testified as to the general policy prohibiting querying known associates. Further, the trial court heard testimony that defendant had inquired about this policy in 2010, that he spoke with Special Agent Koshorek of the Department of Homeland Security, and that she informed him that he was not supposed to query “known associates or family members” in TECS and emailed him a copy of the relevant portions of the TECS use policy. Thus, even if we were to adopt a narrow construction of the phrase “exceeding valid authorization” under the rationale of the Ninth and Second Circuits, defendant’s conduct would fall within the conduct prohibited by the statute. Therefore we conclude that MCL 752.795 applies to defendant’s conduct in accessing the TECS system to search for information regarding a close associate. Golba, 273 Mich App at 611-612. The computer use policy and banner made it clear to defendant that his use was unauthorized and that he could be subjected to criminal penalties. Further, the statute is not unconstitutional on its face or as applied to defendant, as discussed below. D. PROOF OF ELEMENTS Because MCL 752.795 applies to defendant’s conduct, we must assess whether the prosecution presented sufficient evidence at defendant’s preliminary examination. We conclude that it did; accordingly, defendant was properly bound over for trial. With respect to the first element of the offense—that defendant acted intentionally—CBP Integrity Officer David Mansell testified that video surveillance showed defendant using his TECS terminal to search for information regarding Shovlin. CBP Internal Affairs Officer Richard Wynns also testified that screenshots of defendant’s TECS terminal screen showed him searching for information regarding Shovlin. Defendant’s intent may be inferred from circumstantial evidence, including the act itself. See People v Hawkins, 245 Mich App 439, 458; 628 NW2d 105 (2001) (“A factfinder can infer a defendant’s intent from his words or from the act, means, or the manner employed to commit the offense.”). The second element—that defendant acted without authorization or exceeded valid authorization—was supported by the testimony of CBP Officer Lavarah Miller, who testified about CBP’s internal rules, regulations, and policies regarding searching for information regarding close associates and family members. Moreover, Officer Mansell testified that CBP personnel were trained and certified annually regarding TECS and its corresponding use policies. The third element—that defendant accessed a computer system— was easily supported again by Officer Mansell’s and Officer Wynns’s testimony that defendant accessed TECS. The fourth element—that defendant acquired property or otherwise used the -6- computer system—was also proven by the referenced testimony from Officers Mansell and Wynns, who both testified that defendant used the TECS computer terminal to search for information regarding Shovlin. In sum, sufficient evidence was presented to show that a “felony was committed” and that there was “probable cause to believe that defendant committed it.” Yost, 468 Mich at 125-126. As noted, the prosecution was not required to prove all the elements beyond a reasonable doubt at preliminary examination. Redden, 290 Mich App at 84. Moreover, “the presentation of sufficient evidence to convict at trial renders any erroneous bindover decision harmless.” People v Bennett, 290 Mich App 465, 481; 802 NW2d 627 (2010). Here, the prosecution presented sufficient evidence of each element at trial to enable a reasonable juror to convict defendant beyond a reasonable doubt. See People v Johnson, 460 Mich. 720, 722-723, 597 NW2d 73 (1999). III. CONSTITUTIONALITY OF MCL 752.795 Defendant argues that MCL 752.795 is unconstitutionally vague because it does not provide adequate notice to a person of ordinary intelligence regarding what conduct is prohibited, and because it lends itself to arbitrary enforcement. We disagree. A. PRESERVATION AND STANDARD OF REVIEW To preserve the issue of the constitutionality of a statute, the defendant must raise the issue below. People v Vandenberg, 307 Mich App 57, 61; 859 NW2d 229 (2014). Defendant did not object to the constitutionality of MCL 752.759 below. Accordingly, this issue is unpreserved for appellate review. While constitutional issues are generally reviewed de novo on appeal, unpreserved constitutional errors are reviewed for plain error. People v Carines, 460 Mich 750, 764; 597 NW2d 130 (1999). Plain error analysis requires three findings: (1) error, (2) that is plain, and (3) that affects substantial rights. Id. at 763. A plain error will generally affect substantial rights when there is a showing of prejudice—“that the error affected the outcome of the lower court proceedings.” Id. Once the three findings for plain error are met, “reversal is warranted only when the plain . . . error resulted in the conviction of an actually innocent defendant or when an error seriously affected the fairness, integrity or public reputation of judicial proceedings independent of the defendant’s innocence.” Id. at 763-764 (citation and quotation marks omitted). B. CONSTITUTIONALITY OF A STATUTE GENERALLY “When considering the constitutionality of a statute, we begin with the presumption that statutes are constitutional and we construe statutes consistent with this presumption unless their unconstitutionality is readily apparent.” Vandenberg, 307 Mich App at 62. Statutes are presumed to be constitutional, and the party challenging the statute has the burden of showing the contrary. People v Sands, 261 Mich App 158, 160, 680 N.W2d 500 (2004). When a party asserts a facial challenge to the constitutionality of a statute, the party must demonstrate that no circumstances exist under which the statute would be valid. Id. at 160–161. -7- “The fact that a statute may appear undesirable, unfair, unjust, or inhumane does not of itself render a statute unconstitutional and empower a court to override the Legislature. People v Boomer, 250 Mich App 534, 538; 655 NW2d 255 (2002). A penal statute may be unconstitutionally vague on its face “[if] it fails to provide fair notice of the conduct proscribed, or . . . it is so indefinite that it confers unlimited and unstructured discretion on the trier of fact to determine whether an offense has occurred.” People v Dillon, 296 Mich App 506, 511; 822 NW2d 611 (2012) (citations and quotation marks omitted). A penal statute may be vague as applied to a particular defendant if it fails to provide notice that his conduct was prohibited. See People v Lino, 447 Mich 567, 576; 527 NW2d 434, 438 (1994). “Fair or proper notice exists if the statute gives a person of ordinary intelligence a reasonable opportunity to know what is prohibited.” Id. “For a statute to be sufficiently definite, its meaning must be fairly ascertainable by reference to judicial interpretations, the common law, dictionaries, treatises, or the commonly accepted meanings of words.” Id. (citations and quotations omitted). However, “this Court cannot determine that a statute impermissibly confers unstructured and unlimited discretion unless it first concludes that the wording of the statute itself is vague.” People v Douglas, 295 Mich App 129, 138; 813 NW2d 337 (2011). C. APPLICATION MCL 752.795(a) is not unconstitutionally vague, either on its face or as applied to defendant. As an initial matter, although defendant claims to take issue with the phrase “access . . . a computer system . . . to use the service,” defendant’s argument principally relates to the phrases “without authorization” and “exceeding valid authorization.” Defendant contends that ordinary people are unable to determine what activities might be criminal under the statute, which is a function of how “without authorization” and “exceeding valid authorization” are defined. However, we do not agree that the phrases “without authorization” and “exceeding valid authorization” fail to provide proper notice to a person of ordinary intelligence of the conduct proscribed. As noted, this Court at least tacitly concluded that internal use policies can establish the contours of “authorization” in the context of MCL 752.795(a). Golba, 273 Mich App at 611-612. A person of ordinary intelligence could therefore conclude that the violation of an internal use policy could subject an individual to liability under MCL 752.795(a), thus providing fair notice of at least one type of conduct that is proscribed under the statute. See Dillon, 296 Mich App at 511 (holding that judicial interpretations may be relied upon to determine the meaning of a statute). Defendant’s claim that the statute is vague because it fails to inform ordinary people of its potentially wide reach accordingly fails. Moreover, defendant’s claim that the statute is unconstitutionally vague because it gives unfettered discretion to the trier of fact fails because defendant cannot show that the wording of the statute—particularly “without authorization” and “exceeding valid authorization”—is vague. See Douglas, 295 Mich App at 138 (“[T]his Court cannot determine that a statute impermissibly confers unstructured and unlimited discretion unless it first concludes that the wording of the statute itself is vague.”). Based on this Court’s previous decision in Golba, internal use policies can properly establish the boundaries of “without authorization” and “exceeding valid authorization,” and accordingly, the two phrases cannot be considered vague. Not only can “without authorization” and “exceeding valid authorization” curtail traditional types of “hacking,” as might be expected, it can also prohibit internal use policy violations. Golba, 273 Mich App at 611-612. The phrases at issue are not vague simply because they prohibit a broad -8- spectrum of conduct. Further, as discussed above, defendant could not reasonably have believed that his conduct in accessing the TECs system to investigate someone he knew personally was authorized. We therefore find defendant’s constitutional challenge to MCL 752.795(a) to be without merit. IV. FAILURE TO ADMINISTER JURY OATH Defendant also argues that the trial court failed to administer the jury oath before trial began, thus resulting in structural plain error requiring reversal. We disagree. A. PRESERVATION AND STANDARD OF REVIEW To preserve a claim that the trial court failed to administer the jury oath, the defendant must object on this ground below. People v Cain, 498 Mich 108, 114; 869 NW2d 829 (2015). Defendant did not object regarding the oath below, and accordingly, this issue is unpreserved for appellate review. Unpreserved issues are reviewed for plain error. Carines, 460 Mich at 764. Again, plain error analysis requires three findings: (1) error, (2) that is plain, and (3) that affects substantial rights. Id. at 763. A plain error will generally affect substantial rights when there is a showing of prejudice, i.e., “that the error affected the outcome of the lower court proceedings.” Id. Even if plain error is found, “reversal is warranted only when the plain . . . error resulted in the conviction of an actually innocent defendant or when an error seriously affected the fairness, integrity or public reputation of judicial proceedings independent of the defendant’s innocence.” Id. at 763-764 (citation and quotation marks omitted). B. ANALYSIS MCR 6.412(A) and (F) require the oath contained in MCR 2.511(H)(1) to be given to the jury after it is chosen but before trial begins. MCR 2.511(H)(1) requires the jury to be sworn with the following oath: Each of you do solemnly swear (or affirm) that, in this action now before the court, you will justly decide the questions submitted to you, that, unless you are discharged by the court from further deliberation, you will render a true verdict, and that you will render your verdict only on the evidence introduced and in accordance with the instructions of the court, so help you God. [Quotation marks omitted.] Also, MCL 768.14 requires the following oath: You shall well and truly try, and true deliverance make, between the people of this state and the prisoner at bar, whom you shall have in charge, according to the evidence and the laws of this state; so help you God. [Quotation marks omitted.] Our Supreme Court has held that, where a trial court has failed to properly administer an oath in accordance with statute, courts should engage in a “fact-intensive and case-specific inquiry under the fourth Carines prong to assess whether, in light of any countervailing factors -9- on the record . . . leaving the error unremedied would constitute a miscarriage of justice, i.e., whether the fairness, integrity, or public reputation of the proceedings was seriously affected.” Cain, 498 Mich at 128 (citation and quotation marks omitted). In Cain, the Supreme Court confronted a case where the court clerk had mistakenly administered the voir dire oath3 to the selected jury instead of the referenced oath contained in MCR 2.511(H)(1). Id. at 113-114. The Supreme Court concluded that this error did not warrant reversal because the substantive purpose of the jury oath was served: One of the primary purposes of the oath—to impart to the members of the jury their duties as jurors—was alternatively fulfilled in large part by the trial court’s instructions prescribing the particulars of the juror’s duties. Immediately before the swearing of the oath, the trial court instructed the jurors, “I will now ask you to stand and swear to perform your duty to try the case justly and to reach a true verdict.” Following the oath, the court instructed the jurors that it was their responsibility to decide the facts of the case solely on the basis of the evidence presented and the law as the court gave it to them, that they should not consider any other information regarding the trial that was not presented in the courtroom, that they should not discuss the case among themselves until deliberations begin, and that they should keep an open mind about the case, setting aside any bias and prejudice. The trial court also explained the concepts of the presumption of innocence and reasonable doubt, instructing the jurors to return a verdict of not guilty unless they unanimously decided that the prosecutor had proved each element of the offenses beyond a reasonable doubt. In addition, before giving the final instructions, the trial court told the jurors, “Remember that you have taken an oath to return a true and just verdict based only on the evidence and my instructions on the law.” And during the final instructions, the judge reiterated the previously described instructions, including that the jury was to decide the case on the basis of the evidence presented during the trial and the law as the court gave it to them, setting aside all bias and prejudice. These instructions encompassed, in even greater detail, duties equivalent to those prescribed in the oath. [Cain, 498 Mich at 122-123.] At the outset, we note that defendant is in error in arguing that the record definitively establishes that the trial court failed to administer the jury oath before trial. Although the record does not evidence the words of the oath as given, the November 5, 2014 trial transcript reflects the following: “(Jurors sworn at 10:05 am [sic] to hear the facts of the case)[.]” Thus, as the prosecution contends, it is likely that the court reporter simply failed to transcribe the jury oath. Moreover, as in Cain, the trial court gave the jurors detailed instructions regarding their duties. On October 30, 2014, after the jury was selected (but before trial started on November 5, 2014), the trial court instructed the jurors, in relevant part, that they could not discuss the case with 3 The voir dire oath is as follows: “You do solemnly swear or affirm that you will true answers make to such questions as may be put to you touching upon your qualifications to serve as jurors in the cause now pending before the Court [sic]?” Cain, 498 Mich at 113. -10- anyone, that they should “pay close attention to what is said . . . so that [they] can fairly perform [their] sworn duties as jurors,” that the function of the jury is to determine the facts, weigh credibility, and render a verdict, that the jurors keep an open mind until the entire case is submitted, and that the jurors should not form definite or fixed opinions until all the evidence and arguments were presented. The trial court’s instructions to the jury span five transcript pages. Also, the trial court, during final instructions, reminded the jury, “Remember that you have taken an oath to return a true and just verdict based only on the evidence and my instructions on the law.” Additionally, the trial court instructed the jury at length about its deliberation duties, the concept of reasonable doubt, the importance of eschewing bias, and the requirement of only considering the evidence presented. Thus, we conclude, as did the Supreme Court in Cain, that reversal is not required. Affirmed. /s/ Mark T. Boonstra /s/ Patrick M. Meter /s/ Jane M. Beckering -11-