Taylor Amil Wallace v. Commonwealth of Virginia

VIRGINIA: In the Court of Appeals of Virginia on Tuesday the 28th day of March, 2023. PUBLISHED Taylor Amil Wallace, Appellant, against Record No. 1040-21-1 Circuit Court Nos. CR19-1147-00 through CR19-1147-15 and CR20-649-00 Commonwealth of Virginia, Appellee. Upon a Petition for Rehearing En Banc Before Chief Judge Decker, Judges Humphreys, Beales, Huff, O’Brien, AtLee, Malveaux, Athey, Fulton, Ortiz, Causey, Friedman, Chaney, Raphael, Lorish, Callins and White On March 14, 2023 came the appellee, by the Attorney General of Virginia, and filed a petition requesting that the Court set aside the judgment rendered herein on February 28, 2023, and grant a rehearing en banc on the issue(s) raised in the petition. On consideration whereof and pursuant to Rule 5A:35 of the Rules of the Supreme Court of Virginia, the petition for rehearing en banc is granted and the appeal of those issues is reinstated on the docket of this Court. The mandate previously entered herein is stayed pending the decision of the Court en banc. The parties shall file briefs in compliance with the schedule set forth in Rule 5A:35(b). The appellant shall attach as an addendum to the opening brief upon rehearing en banc a copy of the opinion previously rendered by the Court in this matter. An electronic version of each brief shall be filed with the Court and served on opposing counsel. 1 A Copy, Teste: A. John Vollino, Clerk original order signed by a deputy clerk of the By: Court of Appeals of Virginia at the direction of the Court Deputy Clerk 1 The guidelines for filing electronic briefs and appendices can be found at www.courts.state.va.us/online/vaces/resources/guidelines.pdf. COURT OF APPEALS OF VIRGINIA Present: Judges Athey, Ortiz and Lorish PUBLISHED Argued at Norfolk, Virginia TAYLOR AMIL WALLACE OPINION BY v. Record No. 1040-21-1 JUDGE DANIEL E. ORTIZ FEBRUARY 28, 2023 COMMONWEALTH OF VIRGINIA FROM THE CIRCUIT COURT OF THE CITY OF CHESAPEAKE John W. Brown, Judge Samantha Offutt Thames, Senior Assistant Public Defender (Virginia Indigent Defense Commission, on briefs), for appellant. Stephen J. Sovinsky, Assistant Attorney General (Jason S. Miyares, Attorney General, on brief), for appellee. A person who uses a computer for a fraudulent purpose does not automatically use it “without authority” under the computer fraud statute. Following a bench trial, Taylor Amil Wallace was convicted of computer fraud, obtaining money by false pretenses, uttering forged checks, and failing to appear in court, after she deposited forged checks in an ATM. Wallace challenges the sufficiency of the evidence for each conviction. She argues that the Commonwealth failed to prove that: the ATM is a “computer,” she used the ATM “without authority,” she knew that the checks were forged, and she “willfully” failed to appear in court. We find the evidence insufficient to prove that Wallace used the ATM “without authority” but sufficient to prove the remaining convictions. We affirm in part and reverse in part. BACKGROUND In December 2018, Wallace deposited four checks, in the amounts of $440, $324, $450, and $300, into her bank accounts at BB&T, using a drive-through ATM. These checks were deposited on four separate days and were made out from Gregory Starling’s Southern Bank account to “Taylor A. Wallace.” The first two checks had the word “work” in their memo fields, and the third and fourth checks had the words “cleaning” and “remaining balance,” respectively. All four checks were endorsed by “Taylor Wallace.” Photos from security cameras show Wallace driving to the ATM, sometimes with an unidentified male in the front passenger seat, and depositing the checks. Two of the checks were returned to BB&T as forged. The other two were returned because the Southern Bank account was closed. After using the funds in Wallace’s accounts to make up for the loss, BB&T lost $937.82 in total. On January 28, 2019, Wallace accepted an interview by Detective Ronald Ward at her mother’s residence. Wallace admitted that she was the person depositing the checks and that she did not know Gregory Starling, but she refused to tell Detective Ward where she got the checks. After being arrested and granted bail, Wallace signed a continuance order requiring her to appear before the trial court on January 30, 2020. However, she did not appear on January 30. Wallace was charged with four counts of forging a check, four counts of uttering a forged check, four counts of obtaining money by false pretenses, four counts of computer fraud, one count of using false identification to obtain money, and one count of felony failure to appear, in violation of Code §§ 18.2-152.3, 18.2-172, 18.2-178, 18.2-186.3(A)(2), and 19.2-128(B). At the bench trial, Wallace testified that she did not steal the checks but received them from her stepfather, Miguel Sumner, who had no bank account and told Wallace that the checks were his paychecks for his demolition and cleaning work. She testified that the unidentified male in the passenger seat was Sumner and that Sumner did not give her the checks until they were at the ATM. She denied having endorsed the checks, claiming that she never actually looked at the checks because she trusted Sumner. Wallace also stated that she had been represented by several attorneys and that, although she signed the continuance order, the advice -2- from one of her attorneys caused her failure to appear. Wallace was not allowed to testify as to what the attorney told her,1 and the attorney did not testify at trial. Finally, Wallace stated that she was 18 years old in December 2018 and admitted that she had had one misdemeanor conviction involving lying, cheating, or stealing, as well as three or four felony convictions as a juvenile. Wallace’s mother corroborated Wallace’s story, testifying that she dated Sumner during the time Wallace deposited the checks and that Sumner worked in construction. Starling testified that he did not write the four checks and that they were probably taken from his work truck around December 7, 2018. He stated that, at the time, he worked at a job site and had hired a man, James Watson, and an all-male team for demolition and cleaning work. BB&T investigator Kevin Wolfe testified that the ATM was a “very sophisticated machine” and had “a number of different functions,” including depositing checks, withdrawing cash, and making balance inquiries. Wolfe opined that an ATM “would be considered a computer.” After hearing all evidence, the trial court found Wallace guilty of uttering forged checks, obtaining money by false pretenses, computer fraud, and failure to appear. It did not find Wallace guilty of forgery or identity fraud. The trial court sentenced Wallace to 17 years and 96 months of incarceration, with 13 years and 128 months suspended. Wallace appeals, challenging the sufficiency of the evidence for each conviction. First, Wallace argues that the evidence does not support the computer fraud convictions because an ATM is not a computer and Wallace did not use the ATM “without authority.” Second, Wallace argues that the evidence does not establish that she possessed the requisite intent for uttering forged checks, obtaining money by 1 The trial court prohibited Wallace from testifying as to the attorney’s advice, finding that such testimony would be inadmissible hearsay. -3- false pretenses, or computer fraud. Finally, Wallace argues that the evidence did not establish that she “willfully” failed to appear in court. ANALYSIS A. Standards of Review In reviewing the sufficiency of the evidence, we consider the evidence “in the light most favorable to the Commonwealth, the prevailing party below.” Vay v. Commonwealth, 67 Va. App. 236, 242 (2017) (quoting Smallwood v. Commonwealth, 278 Va. 625, 629 (2009)). In doing so, we “discard the evidence of the accused in conflict with that of the Commonwealth, and regard as true all the credible evidence favorable to the Commonwealth and the inferences to be drawn therefrom.” Bowman v. Commonwealth, 290 Va. 492, 494 (2015) (quoting Kelley v. Commonwealth, 289 Va. 463, 467-68 (2015)). We defer “to the trial court’s findings of fact unless they are plainly wrong or without evidence to support them.” Brewer v. Commonwealth, 71 Va. App. 585, 591 (2020) (citing Ramsey v. Commonwealth, 65 Va. App. 694, 697 (2015)). “The fact finder, who has the opportunity to see and hear the witnesses, has the sole responsibility to determine their credibility, the weight to be given their testimony, and the inferences to be drawn from proven facts.” Commonwealth v. Taylor, 256 Va. 514, 518 (1998). Furthermore, “[t]he judgment of a trial court sitting without a jury is entitled to the same weight as a jury verdict” when reviewed on appeal. Martin v. Commonwealth, 4 Va. App. 438, 433 (1987) (citing Code § 8.01-680). However, “to the extent that the issue on appeal requires the Court to determine the meaning of a statute and its terms, it reviews that issue de novo.” Brewer, 71 Va. App. at 591. B. The evidence is insufficient to establish that Wallace used the ATM “without authority.” Wallace challenges her computer fraud convictions under Code § 18.2-152.3. She argues that, first, the ATM she used was not a “computer” under the statute, and second, she did not use -4- the ATM “without authority.” Assuming, without deciding, that the ATM was a computer,2 we find that the trial court misinterpreted Code § 18.2-152.3 in finding that Wallace used it “without authority.” Under the Virginia Computer Crimes Act (“VCCA”), “[a]ny person who uses a computer or computer network, without authority” and “[o]btains property or services by false pretenses,” “[e]mbezzles or commits larceny,” or “[c]onverts the property of another” is guilty of computer fraud. Code § 18.2-152.3. Under the VCCA, “[a] person is ‘without authority’ when he knows or reasonably should know that he has no right, agreement, or permission or acts in a manner knowingly exceeding such right, agreement, or permission.” Code § 18.2-152.2. Wallace argues that as a BB&T customer, she had the authority to use the ATM to deposit checks and withdraw cash. The Commonwealth responds that Wallace exceeded her authority by depositing forged checks. The question here is whether a person who uses a computer to obtain money by false pretenses is per se “without authority.” “When construing a statute, our primary objective is ‘to ascertain and give effect to legislative intent,’ as expressed by the language used in the statute.” Cuccinelli v. Rector, Visitors of the Univ. of Va., 283 Va. 420, 425 (2012) (quoting Commonwealth v. Amerson, 281 2 We agree with the dissent that the ATM was a “device that accept[ed] information in digital or similar form and manipulate[d] it for a result based on a sequence of instructions.” Code § 18.2-152.2. However, we decline to find that the ATM fell outside the exception of “specialized computing devices that are preprogrammed to perform a narrow range of functions with minimal end-user or operator intervention and are dedicated to a specific task.” Id. The dissent finds that the ATM’s “level of sophistication” was high and that in using the ATM to deposit checks, Wallace was not subject to the “same oversight” of a live-teller transaction. Because Code § 18.2-152.2 does not base the distinction on a machine’s “level of sophistication,” and because the record does not establish how ATM transactions and live-teller transactions are subject to different oversight, we are not ready to reach the same conclusion. Furthermore, we must “decide cases ‘on the best and narrowest grounds available’” under the doctrine of judicial restraint. Commonwealth v. White, 293 Va. 411, 419 (2017) (quoting Commonwealth v. Swann, 290 Va. 194, 196 (2015)); see also Spruill v. Garcia, 298 Va. 120, 127 (2019). Therefore, we decline to reach a finding regarding whether an ATM is a computer under Code § 18.2-152.3. -5- Va. 414, 418 (2011)). We “presume that the legislature chose, with care, the words it used when it enacted the relevant statute.” Zinone v. Lee’s Crossing Homeowners Ass’n, 282 Va. 330, 337 (2011). In addition, “when the General Assembly has used specific language in one instance, but omits that language or uses different language when addressing a similar subject elsewhere in the Code, we must presume that the difference in the choice of language was intentional.” Id. Such omission shows “that the General Assembly knows how to include such language in a statute to achieve an intended objective” and unambiguously expressed “a contrary intention.” Morgan v. Commonwealth, __ Va. __, __ (Dec. 29, 2022). Finally, when a statute is ambiguous, “the rule of lenity [directs] us to adopt a narrow construction, thus reducing exposure to criminal liability.” Fitzgerald v. Loudoun Cnty. Sheriff’s Off., 289 Va. 499, 508 (2015); see also Morgan, __ Va. at __ (applying the rule of lenity when a narrow interpretation of a penal statute did not conflict with legislative intent and was not overly restrictive). Preventing unauthorized access to computers is a primary purpose of computer crime laws. The federal government and all fifty states have “enacted computer crime laws that prohibit ‘unauthorized access’ to computers.” Orin S. Kerr, Cybercrime’s Scope: Interpreting “Access” and “Authorization” in Computer Misuse Statutes, 78 N.Y.U.L. Rev. 1596, 1596 (2003); see also Susan W. Brenner, State Cybercrime Legislation in the United States of America: A Survey, 7 Rich. J.L. & Tech. 28, p15 n.37 (2001) (listing state computer crime statutes). In Virginia, the plain language of the VCCA manifests this legislative intent. The VCCA expressly defines “without authority,” and it is an element of several offenses within the VCCA, including computer fraud. Code §§ 18.2-152.2 and -152.3. The language makes it clear that the computer fraud statute applies only to the unauthorized use of computers and computer networks. -6- Moreover, the words “without authority” clearly modify “use[] [of] a computer or computer network” in Code § 18.2-152.3, rather than the purposes of such use—that is, obtaining property or services by false pretenses, embezzlement, larceny, and conversion. Thus, combining Code §§ 18.2-152.2 and -152.3, a computer fraud conviction requires that the defendant either “has no right, agreement, or permission” to use the computer or computer network or uses it “in a manner knowingly exceeding such right, agreement, or permission.” To prove that a defendant knowingly exceeded their authorization, the Commonwealth must first establish the scope of the right, agreement, or permission. The manner, rather than purpose, of the use must be unauthorized. The dissent argues that our analysis distinguishing the manner and purpose of computer use is “unnecessarily complicated,” but the plain text of the statutes compels such a distinction. The definition of “without authority” explicitly includes “in a manner knowingly exceeding” authorization. Code § 18.2-152.2 (emphasis added). At the same time, the words “without authority” in the computer fraud statute do not modify the enumerated purposes of obtaining property by false pretenses, embezzlement, larceny, and conversion. A comparison of Code § 18.2-152.3 to Code § 18.2-152.5 further supports this conclusion. Under Code § 18.2-152.5, “[a] person is guilty of the crime of computer invasion of privacy when he uses a computer or computer network and intentionally examines without authority any employment, salary, credit or any other financial or identifying information . . . relating to any other person.” (Emphasis added). Unlike in the computer fraud statute, here the words “without authority” modify the examination of information, rather than the use of a computer or computer network. For example, in Ramsey v. Commonwealth, a state trooper ran inquiries using the Virginia Criminal Information Network (VCIN) for personal purposes, knowing that she was only authorized to do so for criminal justice purposes. 65 Va. App. at 695-96. Although she had authority to use the VCIN, this Court upheld her conviction under -7- Code § 18.2-152.5 because she “was without authority to examine the information on VCIN for non-criminal justice purposes.” Id. at 701. The words “without authority” modify different actions in the computer fraud and computer invasion of privacy statutes. Because both sections of the VCCA address the “similar subject” of computer crimes, “we must presume that the difference in the choice of language was intentional.” Zinone, 282 Va. at 337. We reject the Commonwealth’s argument that if a defendant uses a computer to deposit forged checks—or for unlawful purposes more generally—her use is per se without authority under the computer fraud statute. This interpretation would render the words “without authority” in Code § 18.2-152.3 surplusage. In fact, the General Assembly specifically rejected proposals to remove the words from the statute. See, e.g., Va. St. Crime Comm’n, Computer Crimes Act, Rep. Doc. No. 77, at 10 (2005) (recommending eliminating “without authority” from Code § 18.2-152.3 because when “a criminal uses a computer to . . . commit a fraud on another . . . it should not be a possible defense that he had the permission of the owner of the computer to engage in illegal activities”); Senate Bill No. 1163 (Jan. 12, 2005) (amending “[a]ny person who uses a computer or computer network without authority and with intent to” to “[a]ny person who, through the use of a computer”). Moreover, unlike computer fraud, other computer crimes under the VCCA do not include the “without authority” element. See, e.g., Code § 18.2-152.7:1 (harassment by computer); Code § 18.2-152.5:1 (using a computer to gather identifying information). We must presume that the difference in language was intentional. The unambiguous language of Code § 18.2-152.3 demonstrates that “without authority” modifies the use of the computer itself, rather than the purpose of the use. But even if the language were ambiguous, the rule of lenity would nevertheless compel the same interpretation. If the General Assembly found our traditional fraud statutes insufficient and intended to enhance the punishment for all defendants who use computers or computer networks as a tool in -8- committing false pretenses, embezzlement, larceny, or conversion, it could have made it clear by eliminating the words “without authority” in the computer fraud statute. Absent such an express legislative intent, we refuse to adopt this broad interpretation. The Commonwealth argues that a person authorized to use a computer can exceed their authorization, citing Brewer, 71 Va. App. at 592, DiMaio v. Commonwealth, 272 Va. 504, 507-08 (2006), and Barnes v. Commonwealth, No. 2693-98-1, 2000 WL 291436 (Va. Ct. App. Mar. 21, 2000). While the proposition is correct, none of these cases explore the meaning of “without authority.” In Brewer, we focused on whether a smartphone constituted a “computer.” 71 Va. App. at 591. In DiMaio, the appellant only challenged the sufficiency of the evidence regarding the value of data that he removed from a computer. 272 Va. at 506. Finally, Barnes is an unpublished case that does not interpret “without authority.” As such, these cases are of little value in determining the meaning of “without authority.” See Jones v. Commonwealth, 293 Va. 29, 50 (2017) (“[S]tare decisis does not ‘foreclose inquiry’ into an issue not previously ‘raised, discussed, or decided.’” (quoting Chesapeake Hosp. Auth. v. Commonwealth, 262 Va. 551, 560 (2001))). While not binding on this Court, well-reasoned opinions from other jurisdictions interpreting similar statutes support our conclusion that “without authority” modifies the use of computers and computer networks, rather than the purpose of the use. For example, in Commonwealth v. Shirley, 653 S.W.3d 571 (Ky. 2022), the Supreme Court of Kentucky reversed a conviction for unlawful access to a computer when the defendant fraudulently placed barcodes from cheap items onto expensive items and then scanned those barcodes at a Walmart self-checkout register. The court reasoned that the Kentucky statute “[did] not refer to whether the individual is accessing a computer to commit fraud but [did] refer to whether the individual [was] accessing a computer in the way consented to by the owner.” Id. at 579. Similarly, in -9- People v. Golb, 15 N.E.3d 805 (N.Y. 2014), the Court of Appeals of New York vacated a conviction for unauthorized use of a computer when the defendant used a university computer to send emails criminally impersonating others. The court rejected the prosecution’s argument that “using the computer to commit a crime cannot be an authorized use” and found that New York’s computer crime statute was “intended to reach a person who accesses a computer system without permission (i.e., a hacker).” Id. at 814. Finally, in State v. Nascimento, 379 P.3d 484 (Or. 2016), the Supreme Court of Oregon reversed a defendant’s conviction for computer crimes when she used a lottery terminal to print lottery tickets for herself without paying. The court rejected the “extremely broad definition” that “any time a person uses or accesses a computer for a purpose not permitted by the computer’s owner, the person does so ‘without authorization’ and commits computer crime.” Id. at 490. It found that her “use of the lottery terminal to print [lottery] tickets—as she was trained and permitted by her employer to do—was ‘authorized’ use,” despite its ultimately criminal purpose. Id. at 491. The purpose of computer crime laws in general, as reflected in these cases, is consistent with our analysis of the VCCA’s language. Under Code § 18.2-152.3, “without authority” is an element of the crime, for which the Commonwealth has the burden of proof.3 In this case, the Commonwealth presented no evidence to establish the scope of Wallace’s authority to use the ATM or her knowledge that she exceeded such authority. As a bank customer, she had authority to use the ATM to deposit checks and withdraw cash. By depositing a forged check, she used the ATM for an unlawful purpose, but not in an unauthorized manner. The dissent cites as evidence the facts that BB&T 3 The dissent argues that “[f]or Wallace’s use of the ATM to have been authorized, the evidence would have needed to show that Wallace had BB&T’s permission to use its ATM to perpetrate the fraud that led to her multiple convictions and BB&T’s loss of funds.” This proposition is inconsistent with the general principle that “[t]he Commonwealth has the burden to prove every essential element of the charged crime beyond a reasonable doubt.” Hubbard v. Commonwealth, 276 Va. 292, 295 (2008). - 10 - investigated the incident, had its representative testify at trial, and was awarded restitution. However, none of these facts establish that Wallace used the ATM in a manner knowingly exceeding her authority, and the restitution was based on her fraudulent behavior, not her use of the ATM. Furthermore, the Commonwealth does not cite these facts to show that Wallace used the ATM without authority. Rather, it simply relies on the assumption that any use of a computer or computer network for a fraudulent purpose is per se “without authority.” Because the assumption conflicts with the plain language of Code § 18.2-152.3, we reject it and find the evidence insufficient to establish that Wallace used the ATM “without authority.” Our interpretation of Code § 18.2-152.3 does not prevent the Commonwealth from obtaining felony uttering convictions in this and similar cases, whereas computer fraud in this case was a Class 1 misdemeanor. Neither does it prevent the Commonwealth from prosecuting, under Code § 18.2-152.3, persons who use their own computers to hack into other computers or computer networks and commit false pretenses, embezzlement, larceny, or conversion. Rather, it simply conforms the scope of Code § 18.2-152.3 to its legislative intent by giving meaning to the words “without authority.” C. The evidence is sufficient to establish Wallace’s intent to defraud. Wallace further argues that the evidence is insufficient to establish that she knew the falsity of the checks and that the trial court erred in convicting her of uttering forged checks, obtaining money by false pretenses, and committing computer fraud. To be convicted of uttering forged checks, a defendant must “know it to be forged.” Code § 18.2-172. To be convicted of obtaining money by false pretenses, a defendant must “inten[d] to defraud.” Code § 18.2-178. Finally, a defendant is guilty of computer fraud only when she obtains “property or services by false pretenses,” “[e]mbezzles or commits larceny,” or “[c]onverts the property of another.” - 11 - Code § 18.2-152.3. Thus, each conviction required Wallace to know that the checks were forged when she deposited them. Here, considering all evidence, the trial court was entitled to conclude that Wallace knew the falsity of the checks. Despite Wallace’s argument that she was “not a sophisticated banker,” the trial court found that Wallace “knew when she got the check that something was wrong.” Wallace did not know the payer and was not entitled to be paid, the memo fields reflected work that she did not do, and the checks were already endorsed by someone else in her name. Furthermore, the trial court, as the fact finder, was entitled to find her testimony incredible. Despite Wallace’s argument that it was “obvious” that Sumner stole the checks, the trial court refused to “presume” that Sumner was “the thief or that he [was] putting her up to anything, because there is no evidence of that.” The trial court concluded that Wallace had “the intent for this scam to succeed” and “did her part.” Given the circumstances, the trial court’s factual findings were not plainly wrong and should not be disturbed on appeal. D. The evidence is sufficient to establish that Wallace “willfully” failed to appear in court. Wallace argues that the evidence is insufficient to establish that she “willfully” failed to appear in court under Code § 19.2-128(B). “Any failure to appear after notice of the appearance date [is] prima facie evidence that such failure to appear [was] willful.” Hunter v. Commonwealth, 15 Va. App. 717, 721 (1993). “When the government proves that an accused received timely notice of when and where to appear for trial and thereafter does not appear on the date or place specified, the fact finder may infer that the failure to appear was willful.” Id. at 721. Here, uncontested evidence shows that Wallace signed the continuance order requiring her to appear in court on January 30, 2020, but that she failed to appear on that day. Thus, there is prima facie evidence that her failure to appear was willful. While Wallace testified that an - 12 - attorney’s advice affected her failure to appear, she could not establish what the attorney told her, and the trial court was entitled to determine her credibility as a witness. The trial court “recognize[d] [the] flip-flop in attorneys” but noted that Wallace already had a pending charge of failure to appear and thus “would be on more alert.” As such, the trial court’s finding that the changes in trial counsel did not overcome the prima facie evidence of willful failure to appear was not plainly wrong. CONCLUSION The evidence is insufficient to establish that Wallace used the ATM “without authority” under the computer fraud statute, but sufficient to support the remaining charges. Therefore, we reverse her convictions of computer fraud, affirm her convictions of uttering forged checks, obtaining money by false pretenses, and failure to appear in court, and remand the case for entry of a sentencing order consistent with the rulings of this Court. Affirmed in part, reversed in part, and remanded. - 13 - Athey, J., concurring in part and dissenting in part. I agree with the majority that the evidence was sufficient to support Wallace’s convictions for obtaining money by false pretenses, uttering forged checks, and failing to appear in court. However, I disagree that the evidence was insufficient to establish that Wallace used the ATM without authority. I therefore respectfully dissent from the majority’s decision to reverse Wallace’s convictions for computer fraud. Since, in my judgment, the evidence sufficiently established that BB&T did not authorize Wallace to use its ATM to obtain money by false pretenses or to utter a forged check, I would have also affirmed Wallace’s convictions for computer fraud in violation of Code § 18.2-152.3. First, the majority “assumes without deciding” that the ATM is a computer. I must therefore briefly explain why I would have decided that this particular ATM meets the definition of a computer pursuant to Code § 18.2-152.2. Initially, Code § 18.2-152.2 broadly defines a “computer” as including “all ‘device[s]’ not specifically excluded ‘that accept[ ] information in digital or similar form and manipulate[ ] it for a result based on a sequence of instructions.’” Brewer v. Commonwealth, 71 Va. App. 585, 593 (2020) (quoting Code § 18.2-152.2). The computer fraud statute specifically excludes several very basic devices “dedicated to a specific task” requiring “minimal end-user or operator intervention.” Code § 18.2-152.2. The limited exceptions include simple calculators, automated typewriters, and fax machines. Id. Finally, a “‘[c]omputer network’ means two or more computers connected by a network.” Id. Here, the ATM used by Wallace was owned and operated by her local banking institution, BB&T. Wallace was authorized to use the ATM to conduct inquiries as to the balance of her account and to deposit nonfraudulent checks therein. In addition, BB&T account holders, like Wallace, and even clients from other banks were authorized to utilize this ATM to conduct other transactions such as withdrawals. The ATM was also hard-wired to communicate - 14 - data transmissions to and from other banks. Moreover, Wallace’s authorization to use this “computer” enabled her to utter forged checks more easily since she did not have the same oversight she would have had during a transaction with a live teller.4 I would not hold that every ATM should be included within the Code § 18.2-152.2 definition of a computer. For example, some stand-alone ATMs that are solely equipped to dispense cash funds may be more akin to a calculator or fax machine and therefore fall within the statutory exception. However, I would have decided that this particular ATM was clearly a “device that accept[ed] information in digital or similar form and manipulate[d] it for a result based on a sequence of instructions.” Code § 18.2-152.2. Since the level of sophistication of this ATM was closer to a computer, I would have rejected Wallace’s contention that the ATM was not a computer under Code §§ 18.2-152.2 and 18.2-152.3. Second, I agree with the majority that “any person who uses a computer or computer network, without authority and . . . [o]btains property or services by false pretenses . . . is guilty of the crime of computer fraud.” Code § 18.2-152.3. The majority also correctly states that Code § 18.2-152.3 applies only to the unauthorized use of computers or computer networks. I also agree that “unauthorized” modifies the “use[] [of] a computer or computer network” and that “unauthorized use” means the Commonwealth must prove Wallace either “ha[d] no right, agreement, or permission” to use the computer or computer network or used it “in a manner knowingly exceeding such right, agreement, or permission.” However, I simply disagree with the majority’s conclusion that since Wallace was authorized to use the ATM for some purpose, 4 The majority assumes without deciding that this ATM is a computer but, in a footnote, seemingly disagrees with the dissent’s conclusion that this ATM meets the definition of a computer pursuant to Code § 18.2-152.2. If the majority contends that this ATM in fact falls within the exception of “specialized computing devices” that are not computers, it should decide the case accordingly since that is a fact-specific inquiry and would indeed be the “narrowest grounds available” on which to decide this case. - 15 - she could not exceed that authorization by knowingly using the ATM for an illegal purpose— namely, to utter fraudulent checks and thereby obtain money by false pretenses. By its own definition, the majority contends that “use” becomes unauthorized when someone knowingly exceeds their authority or permission. The majority then engages in an unnecessarily complicated analysis distinguishing the “manner” and “purpose” of such use. In my judgment, the inquiry here is quite simple: Did the Commonwealth prove that Wallace used the ATM in a manner not authorized by BB&T? If the answer is “yes,” the use was unauthorized. If “no,” the use was authorized. Accordingly, I agree with the Commonwealth’s contention that the computer fraud statute focuses on a defendant’s use of a computer when the owner does not allow for that kind of use. In DiMaio v. Commonwealth, 46 Va. App. 755, 760 (2005), aff’d, 272 Va. 504 (2006),5 both this Court and the Supreme Court affirmed an appellant’s computer fraud conviction under Code § 18.2-152.3 when he transferred hundreds of files from his work computer to his personal computer and then deleted the files on his work computer. Admittedly, there, the appellant primarily challenged the sufficiency of the evidence regarding the value of the files he removed from the computer owned by his employer. But nothing in either opinion suggests that because 5 I primarily cite DiMaio to help illustrate that, under the majority’s theory, situations in which a defendant has permission to use a work computer, friend’s computer, etc. for legitimate purposes (and then exceeds the given authority by engaging in illegal activity) would no longer be subject to prosecution under Code § 18.2-152.3. Essentially, the majority seemingly limits the statute’s application to situations in which a defendant steals a computer or uses one without any kind of permission. Since one of the purposes of The Virginia Computer Crimes Act is to enhance penalties for crimes that are less risky to commit, I do not think Code § 18.2-152.3 was meant to be interpreted so narrowly. See Va. St. Crime Comm’n, Computer Crimes Act, Rep. Doc. No. 11, at 18 (2005) (noting that “[i]n comparing the risk of computer crimes to that [of] robbery” fewer people will risk committing robbery because “it has a high penalty and is socially unacceptable,” compared to computer crimes where “there are low penalties and in many cases, it is socially tolerable, if not acceptable”). - 16 - the appellant had permission to use his work computer, the computer fraud conviction was erroneous because it was not “unauthorized use” under Code § 18.2-152.3. 6 Simply put, unless Wallace had BB&T’s permission to use the ATM to cash a forged check, keep half of the money, and deposit the other half into her checking account, she used BB&T’s ATM “without authority” pursuant to Code § 18.2-152.3. And although I agree with the majority that Wallace had permission to use the ATM, I disagree that the evidence was insufficient to prove that Wallace “knowingly exceeded” that authority by using the ATM in a manner that BB&T did not and would never authorize. Instead, I would have determined that the evidence sufficiently established that Wallace knowingly exceeded her authority to use BB&T’s ATM. In support thereof, the record reflects that after the checks were flagged, BB&T’s fraud management team investigated the incident and later provided the checks and security camera images of Wallace at the ATM as evidence at trial. In addition, a representative from BB&T assisted the Commonwealth in securing Wallace’s various convictions by testifying on the Commonwealth’s behalf at trial. BB&T was also awarded $937.82 in restitution. By “regard[ing] as true all the credible evidence favorable to the Commonwealth” and drawing all “fair inferences . . . therefrom,” it seems clear BB&T did not authorize Wallace to use the ATM for fraud. Vay v. Commonwealth, 67 Va. App. 236, 242 (2017) (quoting Parks v. Commonwealth, 221 Va. 492, 498 (1980)). 6 Frequently, when an appellant fails to argue an issue the Supreme Court prefers not to address sua sponte, the Court accepts the concession, but makes clear it is accepting the position because it was conceded, not necessarily because it was legally correct. See e.g., Daily Press, LLC v. Commonwealth, ___ Va. ___, ___ (Oct. 20, 2022) (stating that the Supreme Court was not dispositively deciding the conceded issue and “offer[ed] no opinion on” the legitimacy of the conceded standard); Butcher v. Commonwealth, 298 Va. 392, 395 (2020) (flagging that although the Supreme Court accepted appellant’s concession that a statute was conjunctive, it “offer[ed] no opinion on the competing conjunctive/disjunctive interpretations of the statute”). In DiMaio, neither this Court nor the Supreme Court issued such a disclaimer. - 17 - For Wallace’s use of the ATM to have been authorized, the evidence would have needed to show that Wallace had BB&T’s permission to use its ATM to perpetrate the fraud that led to her multiple convictions and BB&T’s loss of funds. I agree with the majority that any fraudulent act committed using another’s computer is not per se “without authority.” 7 But I disagree that, based on the unique facts of this particular case, the Commonwealth failed to prove Wallace acted “without authority.” Wallace used BB&T’s ATM to utter fraudulent checks, and in response to Wallace’s use of the ATM, BB&T aided in the fraud investigation, testified at trial with respect to her crimes, produced the fraudulent checks and security camera images used at trial, and is now required to be paid restitution as a result of the fraud. Since I would have affirmed Wallace’s convictions for computer fraud pursuant to Code § 18.2-152.3, I respectfully dissent. 7 The majority incorrectly frames the issue as, “whether a person who uses a computer to obtain money by false pretenses is per se ‘without authority.’” The answer to that inquiry is clearly “no.” Under that interpretation, Code § 18.2-152.3 would criminalize a defendant’s use of a co-conspirator’s computer. Such a stance would indeed be a misinterpretation of Code § 18.2-152.3. Instead, the issue here is whether there was sufficient evidence to prove that Wallace exceeded her authority to use the ATM when she used it to utter fraudulent checks for payment by BB&T and deposited a portion of the funds from the fraudulent checks in her personal checking account. Considering all the evidence in the light most favorable to the Commonwealth, I simply think there was clearly sufficient evidence to support Wallace’s convictions. - 18 -