COURT OF APPEALS OF VIRGINIA
Present: Judge Haley, Senior Judges Bumgardner and Fitzpatrick∗
Argued at Alexandria, Virginia
JEREMY JAYNES
OPINION BY
v. Record No. 1054-05-4 JUDGE JAMES W. HALEY, JR.
SEPTEMBER 5, 2006
COMMONWEALTH OF VIRGINIA
FROM THE CIRCUIT COURT OF LOUDOUN COUNTY
Thomas D. Horne, Judge
Thomas M. Wolf (John H. Craddock, Jr.; Joseph M. Rainsbury;
David A. Oblon; LeClair Ryan PC; Albo & Oblon L.L.P., on briefs),
for appellant.
William E. Thro, State Solicitor General (Judith Williams Jagdmann,
Attorney General; Eric A. Gregory, Associate State Solicitor
General; Courtney M. Malveaux, Associate State Solicitor General;
D. Mathias Roussy, Associate State Solicitor General; William R.
Sievers, Associate State Solicitor General; Richard B. Campbell,
Deputy Attorney General; Lisa M. Hicks-Thomas, Senior Assistant
Attorney General; Samuel E. Fishel, IV, Assistant Attorney
General, on brief), for appellee.
Amicus Curiae: The Rutherford Institute (John W. Whitehead; L.
Ilaine Upton, on brief), for appellant.
Amicus Curiae: American Civil Liberties Union of Virginia, Inc.
(Rebecca K. Glenberg, on brief), for appellant.
Amicus Curiae: United States Internet Service Provider
Association (Jennifer C. Archie; Richard P. Bress; Courtney S.
Schorr; Alexander Maltas; Latham & Watkins, on brief), for
appellee.
∗
Judge Fitzpatrick participated in the hearing and decision of this case prior to the
effective date of her retirement on March 31, 2006, and thereafter by designation pursuant to
Code § 17.1-400(D).
Jeremy Jaynes (appellant) appeals his conviction by jury of three counts of violating
Code § 18.2-152.3:1, the unsolicited bulk electronic mail provisions of the Virginia Computer
Crimes Act (“VCCA”). He maintains that (1) the trial court lacked subject matter jurisdiction
over this case; (2) the statute violates the First Amendment; (3) the statute violates the Dormant
Commerce Clause; and (4) the statute is unconstitutionally vague. We find no merit to these
claims and affirm.
I.
THE STATUTE AND PROCEDURAL BACKGROUND
The VCCA, Code §§ 18.2-152.1 to 18.2-152.13, notably, is part of Chapter 5 of the
Virginia Criminal Code, entitled “Crimes Against Property.”
The sections of the VCCA here relevant read as follows:
§ 18.2-152.3:1.
A. Any person who:
1. Uses a computer or computer network with the intent to falsify
or forge electronic mail transmission information or other routing
information in any manner in connection with the transmission of
unsolicited bulk electronic mail through or into the computer
network of an electronic mail service provider of its subscribers;
* * * * * * *
B. A person is guilty of a Class 6 felony if he commits a violation
of subsection A and:
1. The volume of UBE transmitted exceeded 10,000 attempted
recipients in any 24-hour period, 100,000 attempted recipients in
any 30-day time period, or one million attempted recipients in any
one-year time period . . . .
In a motion to dismiss before the trial; in a motion to strike after the prosecution rested;
and in a renewed motion to strike after appellant rested his case, appellant objected that the court
lacked jurisdiction and that the law was unconstitutional under the First Amendment; was
-2-
unconstitutionally vague; and violates the Dormant Commerce Clause of the Constitution. The
trial court denied each motion.1 Following conviction and in accordance with the decision of the
jury, the trial court sentenced appellant to nine years in prison. This appeal followed.
II.
THE OPERATION OF ELECTRONIC-MAIL
The sending of e-mail is governed by Simple Mail Transfer Protocol (“SMTP”), a set of
standards to facilitate the transfer of e-mail. SMTP specifies that a computer sending an e-mail
must contain information identifying the sender, generally referred to as “hello domain”
information, as well as certain recipient information. The hello domain, in turn, contains the
internet protocol (“IP”) address and domain name of the sending party. IP addresses are unique
strings of numbers; each computer accessing the Internet is generally assigned one. For
convenience and efficiency, IP addresses of many computers are given textual equivalents
known as “domain names.” For example, a search known as a “whois” search reveals that the
domain name “www.aol.com” is owned by America Online, Inc. (“AOL”), which is located in
Dulles, Virginia. Additional contact information is provided as well. The IP addresses of four
servers associated with aol.com are also available because “www.aol.com” is the domain name
associated with those IP numbers.
When e-mail is sent, the hello domain and sender information exist as part of the
transmission information of the e-mail. E-mail servers and routers starting with the sender’s
Internet Service Provider (“ISP”)2 relay the message forward until it reaches the e-mail servers of
the recipient’s ISP, which then direct the e-mail to the intended recipient. These server
1
While appellant presented other challenges at trial as to proof of venue and the
sufficiency of the evidence, those issues are not before this Court.
2
Internet users can obtain e-mail service from a different entity than their ISP. For
simplicity here, however, we use the term ISP to refer to e-mail service providers as well.
-3-
interactions include the presentation of the sending e-mail’s hello domain. Essentially, the
sending computer identifies itself and presents the hello domain of the e-mail.
Each time the message passes through a different server, a record of that transaction is
added to the routing information. Thus, using the e-mail’s routing information, one can retrace
the exact servers it went through to reach its destination, as if each post office or mail sorting
facility added its own postmark to a letter. Furthermore, a server along this chain could choose
to block the message from going further. The sender, however, has no way to control or predict
the pathway his message will take to arrive at its destination. In fact, the message can be broken
up and sent in pieces through multiple unique pathways. Despite this inherent unpredictability,
the last server through which the message passes before reaching the recipient is his ISP’s server,
in this case, AOL’s e-mail servers.
One major complaint of e-mail users is the volume of unsolicited bulk e-mail (often
called “spam”) they receive on a daily basis. To increase subscriber satisfaction and to protect
their networks from computer viruses and other problems, ISPs employ a number of tactics to
block spam from reaching users. One major tactic is to identify domain names or IP addresses
that have sent unwanted e-mail in the past and to automatically prevent the delivery of any
messages coming from those senders. Another related tactic is to identify senders of large
numbers of messages to verify their legitimacy. Thus, an ISP can learn which companies
sending high volumes of e-mail are potentially fraudulent or unwanted.
People sending spam (“spammers”), then, respond by masking their true identities to
evade the protective measures. They create false routing information or transmission
information, making messages appear as if they come from hundreds or thousands of different
domain names and IP addresses. Thus, spammers can ensure that the ISP cannot detect and
-4-
block every e-mail they send and can evade detection because the thousands of messages appear
to come from hundreds of different sources.
III.
FACTS
The facts in this case are generally undisputed.
Appellant used computers in his home in North Carolina to send over ten thousand
e-mails, on each of three different days, to subscribers of AOL, an ISP that provides e-mail
accounts as part of its service. That AOL’s servers are located in Loudoun County, Virginia, is
not challenged.
On July 16, 2003, appellant sent 12,197 pieces of unsolicted bulk e-mail with falsified
routing and transmission information onto AOL’s proprietary network. On July 19, he sent
another 24,172 similarly falsified e-mails, and he followed on July 26 with an additional
19,104. Each message targeted an AOL subscriber. That the sender knew each proposed
recipient was an AOL subscriber was clear because the e-mail addresses of all recipients ended
in “@aol.com.” The messages advertised one of three products: either a FedEx claims product,
a stock picker, or a “history eraser.” To purchase one of these products, potential buyers would
“click” on a hyperlink within the e-mail which redirected them to a website. Notably, this
redirection led to thousands of different websites, rather than a single one, to consummate the
purchase.
Among those items seized during a search of appellant’s home were compact discs
(CDs) containing both user names and full e-mail addresses.3 The CDs contained at least 176
million full e-mail addresses and over 1.3 billion user names. Appellant also possessed a DVD
3
The user name is generally that portion of an e-mail address appearing before the “@”
symbol.
-5-
containing not only AOL e-mail addresses, but also other personal and private account
information for millions of AOL users. Finally, police collected multiple “zip discs” (another
type of data storage device) containing 107 million AOL e-mail addresses. All of the AOL user
names, e-mail addresses, and account information were stolen and illegally in appellant’s
possession.
In this case, appellant employed exactly those spammer tactics outlined in Part II, supra,
of this opinion. He used thousands of different IP addresses and hello domains to send tens of
thousands of e-mails and avoid detection by AOL’s network. Each e-mail advertised a
commercial product; none contained any content that was personal, political, religious, or
otherwise non-commercial. To aid his deception, appellant registered numerous different
domain names using false contact information through Network Solutions, whose offices are
located in Virginia. The contracts between appellant and Network Solutions require that
appellant provide accurate contact information, update contact information when it changes, and
submit to jurisdiction in Virginia for resolution of any contract disputes between appellant and
Network Solutions.
IV.
JURISIDICTION
Appellant contends that the trial court lacked jurisdiction because he could not control the
pathways his messages took. Numerous servers and routers handled his messages before
arriving at the recipient’s mailbox. Since any one of these intervening servers could have
blocked his e-mails or since he could not specify which servers his messages went through,
appellant argues, charging him with a crime in the jurisdiction of one of those servers is
inappropriate. We disagree.
-6-
Circuit courts in Virginia have exclusive original jurisdiction over all felony indictments
“for offenses committed within their respective circuits.” Code § 19.2-239; see also Code
§ 17.1-513. The Supreme Court of Virginia has said “a person may be charged in the place
where the evil results, though he is beyond the jurisdiction when he starts the train of events of
which the evil is the fruit.” Travelers Health Ass’n v. Commonwealth, 188 Va. 877, 892, 51
S.E.2d 263, 269 (1949), aff’d, 339 U.S. 643 (1950). Furthermore, “[j]urisdiction may exist
where the immediate harm occurs, even if the criminal act does not physically occur there.”
Foster-Zahid v. Commonwealth, 23 Va. App. 430, 441, 477 S.E.2d 759, 764 (1996).
In Travelers Health, the Virginia State Corporation Commission ordered the defendant to
stop its solicitations of business by mail until it complied with the Blue Sky Law. The Court
held that selling securities by mail in the Commonwealth while not in compliance with the
statute was sufficient to give the corporation commission jurisdiction. 188 Va. at 892, 51 S.E.2d
at 269. Thus, criminal jurisdiction could lie in the state where the mail was received. Similarly,
here, criminal jurisdiction may lie where AOL’s servers are located because it is the trespass
upon those servers that constitutes the offense.
We also find that appellant’s actions in sending the e-mails to AOL subscribers are
sufficiently direct that Moreno v. Baskerville, 249 Va. 16, 452 S.E.2d 653 (1995), on which
appellant relies, does not apply. In Moreno, the defendant sold drugs in Arizona knowing that
the buyer intended to take them to Virginia for resale but was not himself involved in that resale.
In ruling that the trial court lacked jurisdiction, the Supreme Court noted that the buyer could
have chosen to resell the drugs in another state besides Virginia and that the defendant would
have had no control over that decision. Id. at 19, 452 S.E.2d at 655. Thus, the actions of the
buyer served to intervene and end any criminal liability Moreno might have had for the
distribution of the drugs in Virginia.
-7-
Appellant argues this situation is akin to Moreno because intervening acts of the servers
and routers were what caused the e-mails to pass through Virginia. That is, the arrival of the
e-mails at AOL’s servers in Loudoun County was the result of any number of computer
processes, over which appellant had no control, similar to the lack of control Moreno had over
the drugs once he sold them in Arizona. We find no merit to this comparison.
All e-mails in question in this case were addressed to AOL users, meaning that to arrive
at the destination intended by appellant, the messages necessarily had to pass through AOL’s
e-mail servers, all of which are in the jurisdiction of the trial court. As one federal court noted,
“e-mail transmitted to an ISP subscriber is processed and stored on the ISP’s e-mail computer
servers. The e-mail server is located in a discrete geographic location.” Verizon Online Servs.,
Inc. v. Ralsky, 203 F. Supp. 2d 601, 606 (E.D. Va. 2002). And, “once the e-mail is transmitted,
it must first pass through the ISP’s computer server to reach its ultimate destination - the
subscriber’s computer.” Id. Thus, while the e-mails could have taken any number of pathways
to reach the intended recipients, each pathway ended at AOL’s servers.
Furthermore, the mere fact that delivery could have failed is insufficient to eliminate
liability when delivery did not fail. Analogously, a person can be charged with a criminal act
committed by mail even though a number of people might handle that mail during the course of
its delivery. An appellant cannot claim that a court lacks jurisdiction simply because any number
of intervening actions could have disrupted the criminal enterprise, but did not.
In Moreno, the buyer could have taken the drugs from the seller in Arizona, and sold the
drugs anywhere, without input from or change in position by the defendant seller. Here,
appellant’s e-mail solicitations would have been successful only if his messages arrived at their
intended destinations, which required that they pass through AOL’s servers in Virginia.
-8-
Finally, we note that, with respect to intent, appellant cannot challenge that he purposely
intended his e-mails to pass through AOL’s servers because the address of every intended
recipient in this case ends in “@aol.com.” Necessarily, if the e-mail is transmitted to the
intended recipient, it must pass through AOL’s servers.
Accordingly, we hold that the circuit court of Loudoun County, Virginia, properly had
criminal jurisdiction to try appellant.
V.
THE FIRST AMENDMENT
Appellant argues that the trial court erred in ruling that the VCCA does not violate the
First Amendment. Specifically, he contends that the law is overbroad because its language
prohibits anonymous speech of a non-commercial nature and that the First Amendment protects
such speech. We hold that the law does not violate the First Amendment and affirm the trial
court’s ruling on this point.
A.
Standard of Review
We review arguments regarding the constitutionality of a statute de novo. Shivaee v.
Commonwealth, 270 Va. 112, 119, 613 S.E.2d 570, 574 (citing Wilby v. Gostel, 265 Va. 437, 440,
578 S.E.2d 796, 798 (2003); Eure v. Norfolk Shipbuilding & Drydock Corp., 263 Va. 624, 631,
561 S.E.2d 663, 667 (2002)), cert. denied, 126 S. Ct. 626 (2005). Furthermore,
We are guided by the established principle that all acts of the
General Assembly are presumed to be constitutional. In applying
this principle, we are required to resolve any reasonable doubt
regarding the constitutionality of a statute in favor of its validity.
. . . [W]e will declare a statute null and void only when it is plainly
repugnant to a state or federal constitutional provision.
In re Phillips, 265 Va. 81, 85-86, 574 S.E.2d 270, 272 (2003) (internal citations omitted).
-9-
Appellant seeks to challenge the validity of the VCCA on its face. In normal contexts,
one may challenge the constitutionality of a statute only as applied to him. See, e.g., County
Court of Ulster County v. Allen, 442 U.S. 140, 154-55 (1979). However, facial challenges are
sometimes allowed when an appellant claims First Amendment protections.
As the Supreme Court recently said, “The First Amendment doctrine of overbreadth is an
exception to our normal rule regarding the standards for facial challenges.” Virginia v. Hicks,
539 U.S. 113, 118 (2003).
The Supreme Court in Hicks described the overbreadth doctrine in depth.
The showing that a law punishes a “substantial” amount of
protected free speech, “judged in relation to the statute’s plainly
legitimate sweep,” Broadrick v. Oklahoma, 413 U.S. 601, 615
(1973), suffices to invalidate all enforcement of that law . . . .
[The Supreme Court has] provided this expansive remedy out of
concern that the threat of enforcement of an overbroad law may
deter or “chill” constitutionally protected speech—especially when
the overbroad statute imposes criminal sanctions. . . .
[H]owever, there comes a point at which the chilling effect of an
overbroad law, significant though it may be, cannot justify
prohibiting all enforcement of that law—particularly a law that
reflects “legitimate state interests in maintaining comprehensive
controls over harmful, constitutionally unprotected conduct.”
[Broadrick], 413 U.S. at 615. For there are substantial social costs
created by the overbreadth doctrine when it blocks application of a
law to constitutionally unprotected speech, or especially to
constitutionally unprotected conduct. To ensure that these costs do
not swallow the social benefits of declaring a law overbroad, we
have insisted that a law’s application to protected speech be
substantial, not only in an absolute sense, but also relative to the
scope of the law’s plainly legitimate applications before applying
the strong medicine of overbreadth invalidation.
Id. at 118-20 (emphasis in original) (internal quotations and citations omitted except when
appearing within quotation).4
4
In Hicks, the Court further held that state law governs whether a party has standing to
assert in state court a facial challenge under the First Amendment. “Whether Virginia’s courts
- 10 -
Thus, a law is unconstitutionally overbroad under the First Amendment when it prohibits
a substantial amount of protected speech, either absolutely or as compared to the unprotected
conduct also encompassed by the statute.
B.
The Relationship of Protected Speech and Code § 18.2-152.3:1
For a law to be unconstitutionally overbroad, it must proscribe a substantial amount of
protected speech. Appellant contends that the sending of anonymous e-mails is protected by the
First Amendment and that the VCCA proscribes the sending of anonymous e-mails. We take no
position on the former contention because we disagree with the latter.
The right to speak anonymously has a long and respected history in First Amendment
jurisprudence. In both Talley v. California, 362 U.S. 60 (1960), and McIntyre v. Ohio Election
Comm’s, 514 U.S. 334 (1995), the Supreme Court struck down requirements that an author’s
name and address appear on handbills. Both decisions cite the history and power of anonymous
or pseudonymous speech in America, noting the Federalist Papers as early examples.
In contrast to requiring that an author’s name and address appear on a handbill, the
VCCA requires only that the sender not intend “to falsify or forge electronic mail transmission
information or other routing information” in connection with sending spam through an e-mail
service provider’s network. Code § 18.2-152.3:1(A)(1). That is, the statute criminalizes the
intentional falsification of a sender’s identity so as to gain access to a service provider’s network.
should have entertained this overbreadth challenge is entirely a matter of state law.” Id. at 120.
Since Hicks, no Virginia appellate court has addressed whether Virginia (as opposed to federal)
law authorizes facial claims asserting overbreadth. See Muhammad v. Commonwealth, 269 Va.
451, 497, 619 S.E.2d 16, 42 (2005) (quoting Hicks but not addressing, in any detail, the
appellant’s facial overbreadth challenge to Virginia’s anti-terrorism statutes because the
appellant had “confin[ed] his argument to vagueness”), cert. denied, 126 S. Ct. 2035 (2006). We
need not resolve the issue in this case, however, because of our holding that the claim fails on the
merits in any event.
- 11 -
Thus, the statute does not prevent anonymous speech, as appellant argues, but prohibits
trespassing on private computer networks through intentional misrepresentation, an activity that
merits no First Amendment protection.
Courts have consistently held that an e-mail service provider’s computer network is
private property and can be subject to trespassing. See, e.g., Ralsky, 203 F. Supp. 2d at 617 (“the
sending of spam to and through an ISP’s e-mail servers constitutes the tort of trespass to chattel
in the state of Virginia”); United States v. Gray, 78 F. Supp. 2d 524, 532 (E.D. Va. 1999)
(“[u]nauthorized access into a . . . computer is analogous to breaking and entering in the physical
world”); America Online v. LCGM, 46 F. Supp. 2d 444, 452 (E.D. Va. 1998) (“transmission of
electrical signals through a computer network is sufficiently ‘physical’ contact to constitute a
trespass to property”); America Online v. IMS, 24 F. Supp. 2d 548, 550 (E.D. Va. 1998)
(sending unauthorized spam constitutes trespass to chattels); CompuServe Inc. v. Cyber
Promotions, 962 F. Supp. 1015, 1021 (S.D. Ohio 1997) (sending of electronic signals with a
computer can support a trespass action).
Unauthorized spam can be a particularly harmful type of trespass to a computer network.
Spam has been described as “one of the most popular forms of advertising over the Internet” and
“the twenty first century version of junkmail.” Ralsky, 203 F. Supp. 2d at 606. In 2003 in an
attempt to address the harm caused by spamming, the United States Congress passed 15 USC
§§ 7701 to 7713, commonly known as the “CAN-SPAM Act.” Spam now constitutes over half
of all e-mail traffic, 15 USC § 7701(a)(2) (2003), and the Senate has found that spam will cost
corporations over $113 billion by 2007. S. Rep. No. 108-102 (2003).
Courts have recognized the damage caused by spammers who trespass upon the private
property of ISPs. In CompuServe, the court noted:
High volumes of junk e-mail devour computer processing and
storage capacity, slow down data transfer between computers over
- 12 -
the Internet by congesting the electronic paths though which the
messages travel, and cause recipients to spend time and money
wading through messages that they do not want. It is ironic that if
defendants were to prevail on their First Amendment arguments,
the viability of electronic mail as an effective means of
communication for the rest of society would be put at risk.
962 F. Supp. at 1028.
In State v. Heckel, 24 P.3d 404 (Wash. 2001), the Supreme Court of Washington wrote
that:
To handle the increased e-mail traffic attributable to deceptive
spam, ISPs must invest in more computer equipment. Operational
costs likewise increase as ISPs hire more customer service
representatives to field spam complaints and more system
administrators to detect accounts being used to send spam.
* * * * * * *
The cost-shifting--from deceptive spammers to businesses and
e-mail users--has been likened to sending junk mail with postage
due or making telemarketing calls to someone’s pay-per-minute
cellular phone.
Id. at 409-10 (citations omitted).
The record in this case demonstrates the damage caused to AOL by spammers such as
appellant. AOL employs 30 people on its spam response team and receives 7 to 10 million
complaints each day regarding spam. Over 1 billion pieces of spam attempt to enter AOL’s
private network daily. Subscribers often cite spam as their reason for declining to continue using
AOL as their ISP. AOL typically blocks 70-80% of the e-mail traffic that attempts to pass into
its network because it comes from IP addresses that have a history of sending spam. Of the
e-mails that enter the system, another 20-30% are filtered into subscribers’ dedicated spam
folders. As noted above, appellant purposely falsified his transmission data to evade AOL’s
attempts to protect its property interest in its servers and better serve its customers.
- 13 -
The protection of private property and the right to keep others off that property have long
been recognized as a fundamental sphere of state regulation. Blackstone wrote,
There is nothing which so generally strikes the imagination, and
engages the affections of mankind, as the right of property; or that
sole and despotic dominion which one man claims and exercises
over the external things of the world, in total exclusion of the right
of any other individual in the universe.
William Blackstone, 2 Commentaries *2.
The common law is not without principle or precedent to protect private property - as
here codified in the VCCA - applicable to a technological world.
The Supreme Court has consistently recognized the constitutionality of laws prohibiting
trespass. In Martin v. Struthers, 319 U.S. 141, 147 (1943), the Court said that “[t]raditionally the
American law punishes persons who enter onto the property of another after having been warned
by the owner to keep off.” The Court considered free speech rights in public shopping malls in
Lloyd Corp. v. Tanner, 407 U.S. 551, 568 (1972), and said, “this Court has never held that a
trespasser or an uninvited guest may exercise general rights of free speech on property privately
owned and used nondiscriminatorily for private purposes only.”
Rowan v. United States Post Office Dep’t, 397 U.S. 728 (1970), upheld the
constitutionality of a law authorizing individuals to have their names removed from mass
mailing lists and imposing penalties on organizations that failed to comply. The Court noted that
to allow mailings to continue after a property owner has given notice that they must stop would
be “to license a form of trespass.” Id. at 737. The opinion “reject[ed] the argument that a vendor
has a right under the Constitution or otherwise to send unwanted material into the home of
another” and recognized that “the asserted right of a mailer . . . stops at the outer boundary of
every person’s domain.” Id. at 738.
- 14 -
The Supreme Court of Virginia addressed an analogous conflict between property rights
and free speech in Hall v. Commonwealth, 188 Va. 72, 49 S.E.2d 369 (1948). In Hall, the
defendant was convicted of trespassing for distributing religious materials in an apartment
building after the building management forbade him from doing so. The Court upheld his
conviction after a lengthy discussion of the precedents, concluding that the rule prohibiting
visitors within the building unless a tenant allows their entry “is valid and reasonable and does
not infringe upon any right or privilege guaranteed the accused by the Constitution . . . .” Id. at
90, 49 S.E.2d at 378.
Appellant has conceded that he has no constitutional right to use AOL’s servers to
transmit his spam. Instead, he maintains that the statute prohibits anonymous or pseudonymous
speech while not regulating other speech, meaning the VCCA is a content based restriction on
speech and is thus subject to strict scrutiny. His reading of the statute ignores the requirement
that the forgery be connected to “the transmission of unsolicited bulk e-mail through or into the
computer network of an electronic mail service provider or its subscribers.” Code
§ 18.2-152.3:1(A)(1). The statute prohibits the falsification of the sender’s routing and
transmission information to gain access to a computer network that would otherwise be
inaccessible. In short, the statute prohibits lying to commit a trespass.
As Rowan and Hall clearly establish, the First Amendment does not prohibit a property
owner from protecting his property from a trespass. As the homeowner in Rowan could stop the
flow of unwanted junk mail into his home, now, an ISP can prevent the entry of spam into its
network. While the method of delivery has changed, the underlying rights of the parties remain
the same. The First Amendment gives no one the right to trespass on the property of another.
And if the Commonwealth can criminalize the trespass, then certainly it can criminalize
falsification to facilitate it.
- 15 -
As the statute in question here regards trespassing, not speech, appellant’s reliance on
ACLU v. Miller, 977 F. Supp. 1228 (N.D. Ga. 1997), is misplaced. Miller concerned a Georgia
statute that, in part, prohibited using an “‘individual name . . . to falsely identify the person’” in
connection with sending an e-mail. Id. at 1230 (quoting Ga. Code Ann. § 16-9-93.1 (2006))
(omission in original). Unlike the VCCA provisions at issue here, Georgia’s statute directly
prohibited using a pseudonym in clear violation of established First Amendment jurisprudence,
and the district court enjoined enforcement of the law. Because Virginia’s statute addresses
trespassing rather than the use of a pseudonym, Miller is not relevant to this case.
The First Amendment argument appellant presents is not relevant. The VCCA proscribes
no speech. Rather, the statute proscribes intentional falsity as a machination to make massive,
uncompensated use of the private property of an ISP. Therefore, the statute cannot be overbroad
because no protected speech whatsoever falls within its purview.5
VI.
THE DORMANT COMMERCE CLAUSE
Appellant contends that the VCCA violates the Dormant Commerce Clause of the
Constitution because it regulates transactions that take place outside Virginia’s jurisdiction.6
Generally, “[a] state statute must be upheld if it ‘regulates evenhandedly to effectuate a
legitimate local public interest, and its effects on interstate commerce are only incidental . . .
unless the burden imposed on such commerce is clearly excessive in relation to the putative local
benefits.’” Edgar v. Mite Corp., 457 U.S. 624, 640 (1982) (quoting Pike v. Bruce Church, Inc.,
5
We also note that AOL’s servers, obviously, do not constitute a public forum.
6
Appellant, therefore, does not contend that the law discriminates against interstate
commerce in favor of intrastate commerce, and we do not engage in such an analysis.
- 16 -
397 U.S. 137, 142 (1970)) (omission in original); see also Fredericksburg Auto Auction v. Dep’t
of Motor Vehicles, 242 Va. 42, 50, 406 S.E.2d 23, 28 (1991) (applying Pike balancing test).
While appellant contends that regulations which can have a wholly extraterritorial effect
are per se violations, recent authorities have found such factors to be merely a subset of the Pike
balancing test, which is restated above in the quote from Edgar. See Heckel, 24 P.3d at 411 (“the
extra territoriality analysis [is] appropriately regarded as [a facet] of the Pike balancing test”);
Jack L. Goldsmith & Alan O. Sykes, The Internet and the Dormant Commerce Clause, 110 Yale
L.J. 785, 804-05 (2001) (“the appropriate statement of the extraterritoriality concern is that states
may not impose burdens on out-of-state actors that outweigh the in-state benefits”). Thus, the
issues are whether the VCCA has local benefits and whether the burden imposed on interstate
commerce by the law is clearly excessive in relationship to those benefits.
That anti-spam laws, in general, produce local benefits is unquestionable. The United
States Congress has found that “[t]he convenience and efficiency of electronic mail are
threatened by the extremely rapid growth in the volume of unsolicited commercial electronic
mail.” 15 U.S.C. § 7701. Furthermore, Congress found that spam costs recipients extra money,
may expose recipients to obscene material, costs e-mail providers money, and is frequently
fraudulent or deceptive.7 Id. Numerous courts have found that states have an interest in
protecting residents and service providers from the costs of handling spam and the often
fraudulent content it presents. See Heckel, 24 P.3d at 411; MaryCLE, LLC v. First Choice
Internet, Inc., 890 A.2d 818, 835 (Md. Ct. Spec. App. 2006) (finding state interest in a personal
jurisdiction context); Ralsky, 203 F. Supp. 2d at 621-22 (also in a personal jurisdiction context).
7
In fact, the Senate Report that accompanied the CAN-SPAM act found that two-thirds
of all spam contains fraudulent content. S. Rep. No. 108-102, at 2-3 (2003).
- 17 -
As the trial court noted, “[t]he Commonwealth clearly has an interest in the protection of the
property interests of its citizens.”
As noted in Part V(B), supra, of this opinion, AOL expends significant resources in
efforts to protect its private property from spammers and in so doing offer better service to
millions of its subscribers. We find that Virginia properly has a significant local interest in
protecting the property of its citizens. The VCCA addresses that legitimate interest.
With that finding, then, we next must determine what burden, if any, on commerce that
the VCCA presents. The VCCA requires only that senders of unsolicited bulk e-mail not
intentionally “falsify or forge electronic mail transmission information or other routing
information.” Code § 18.2-152.3:1(A)(1). Thus, as the trial court noted, the only burden on any
sender is to present truthful transmission and routing information.
We agree with one pair of commentators who noted
Even assuming that the antispam laws do not significantly further
the state’s interest, it is hard to see how the antispam laws burden
interstate commerce at all. . . . Far from burdening commerce, the
truthfulness requirement facilitates it by eliminating fraud and
deception. Compliance with the various antispam statutes is easy
compared to noncompliance, which requires the spammer to incur
costs of forging, re-mailing, and the like.
Goldsmith & Sykes, supra, at 819.
Indeed, it is in furtherance of commerce that the VCCA requires truthful transmission
data, enabling the purchasing party to consummate a transaction. As the record shows, the
e-mails in this case appeared to come from thousands of e-mail addresses at multiple “hello”
domains with thousands of different IP addresses, tactics used to disguise spam and avoid
detection by spam filters that ISPs such as AOL employ. Notably, if an e-mail recipient
“clicked” to buy one of appellant’s offers, the recipient was redirected to one of the thousands of
websites appellant established in his effort to evade AOL’s spam filters.
- 18 -
Finally, we note one court’s observation that “Congress, in enacting CAN-SPAM,
expressly accorded the States the right to regulate false and misleading e-mail transmissions. 15
U.S.C. 7707(b)(1). If Congress itself was satisfied that supplementary state legislation would
impose no undue burden on interstate commerce, this Court can hardly presume to tell Congress
it is wrong.” Beyond Sys., Inc. v. Keynetics, Inc., 422 F. Supp. 2d 523, 535 (D. Md. 2006).
The effort required to violate the VCCA, and its requirement of truthful transmission
information, is significant. No effort is required to comply with the law. Applying the balancing
test set forth in Pike, Virginia does have a legitimate local public interest in the VCCA and any
burden to interstate commerce is incidental and clearly not excessive. Thus, the VCCA does not
violate the Dormant Commerce Clause.
VII.
CONSTITUTIONAL VAGUENESS
We reiterate that we consider constitutional questions de novo, pursuant to the standard of
review set forth above in Part V(B), supra, of this opinion.
Appellant maintains that the VCCA is unconstitutionally vague in three instances: 1) that
the words “unsolicited” and “bulk” in the phrase “unsolicited bulk electronic mail” are
undefined, and thus vague; 2) that the phrase “electronic mail transmission information or other
routing information” is undefined, and likewise vague; and 3) that the use of the acronym “UBE”
for the earlier phrase “unsolicited bulk electronic mail” is vague. In arguing these points,
appellant seeks to challenge the validity of the statute on its face, rather than as applied to him.
As discussed above in Part V(A), supra, a litigant generally may only challenge the
validity of a statute as applied to him and may not present the rights of third parties. A party
may present a facial challenge that a statute is overbroad when the statute touches upon First
Amendment rights, and a party may likewise make a facial challenge that a statute is vague when
- 19 -
it potentially chills First Amendment rights. Kolender v. Lawson, 461 U.S. 352, 357-58 (1983);
Broadrick, 413 U.S. at 611-12; United States v. Nat’l Dairy Prods. Corp., 372 U.S. 29, 36
(1963).
In support of his argument that he is entitled to a facial challenge on these grounds,
appellant relies upon Reno v. ACLU, 521 U.S. 844 (1997), and the decision of this Court in
Coleman v. City of Richmond, 5 Va. App. 459, 364 S.E.2d 239 (1988).
The Supreme Court addressed a First Amendment facial challenge to two New York
statutes “enacted to protect minors from ‘indecent’ and ‘patently offensive’ communications on
the Internet” in Reno, 521 U.S. at 849. The core of the Court’s decision turns on the inherent
difficulties of sufficiently defining such terms as “obscene” or “indecent” without intruding on
constitutionally protected speech.
In Coleman, we found unconstitutionally vague a city ordinance which prohibited
loitering with the purpose of finding a prostitute. We noted therein that loitering is a lawful act
entitled to constitutional protection on First Amendment grounds. 5 Va. App. at 464, 364 S.E.2d
at 242 (citing Papachristou v. City of Jacksonville, 405 U.S. 156, 164 (1972)). As a United
States District Court later stated regarding a challenge to a Virginia statute, “Any attempt to
prohibit loitering potentially implicates First Amendment rights.” Lytle v. Doyle, 197
F. Supp. 2d 481, 488 (E.D. Va. 2001). Our denial of a petition for rehearing in Coleman makes
clear that the decision was based on First Amendment grounds: “Coleman raised freedom of
association and first amendment rights. Our decision . . . held the Richmond ordinance
unconstitutional on its face in light of first amendment concerns.” Coleman v. City of
Richmond, 6 Va. App. 296, 298, 368 S.E.2d 298, 300 (1988).
- 20 -
In Part V(B), supra, of this opinion, we hold that the VCCA does not implicate First
Amendment rights. Both Reno and Coleman are premised upon such rights. Thus, appellant’s
reliance on these decisions to establish his right to a facial challenge to the VCCA is misplaced.
We therefore will consider appellant’s arguments based upon the law as applied to his
conduct. “‘[V]agueness challenges to statutes not threatening First Amendment interests are
examined in light of the facts of the case at hand; the statute is judged on an as-applied basis.’”
Motley v. Virginia State Bar, 260 Va. 243, 247, 536 S.E.2d 98, 99 (2000) (quoting Maynard v.
Cartwright, 486 U.S. 356, 361 (1988)); see also Muhammad v. Commonwealth, 269 Va. 451,
501, 619 S.E.2d 16, 44 (2005) (citing Hoffman Estates v. Flipside, Hoffman Estates, Inc., 455
U.S. 489, 494-95 (1982)).
As applied to appellant’s actions, the VCCA “is unconstitutionally vague if it fails to
‘give the person of ordinary intelligence a reasonable opportunity to know what is prohibited
. . . .’” County of Fairfax v. S. Iron Works, Inc., 242 Va. 435, 444-45, 410 S.E.2d 674, 680
(1991) (quoting Grayned v. City of Rockford, 408 U.S. 104, 108 (1972)). A law can also be
vague if it allows for “arbitrary and discriminatory enforcement.” Kolender, 461 U.S. at 357.8
Applying that standard, we analyze each of appellant’s three contentions seriatim.
A.
The word “unsolicited” is not unconstitutionally vague because, among states with laws
relating to spam, “unsolicited” has a practically universal definition.9 An e-mail is unsolicited if
8
Appellant’s only challenge under the “arbitrary and discriminatory enforcement” prong
of the vagueness test is a facial one to the misdemeanor provisions of the statute, under which
appellant was not charged. As appellant is entitled only to an as-applied challenge, we need not
discuss the second prong.
9
See, e.g., Ark. Code Ann. § 4-88-602 (West Supp. 2005) (“‘Unsolicited’ means without
the recipient’s express permission, except that commercial electronic mail is not unsolicited if
the sender has a preexisting business or personal relationship with the recipient”); Mich Comp.
Laws. Ann. § 445.2502 (West Supp. 2006) (“‘Unsolicited’ means without the recipient’s express
- 21 -
the recipient neither requested nor consented to receive such e-mails and if the sender and
recipient have no preexisting business or personal relationship. Generally included within this
definition, although sometimes explicitly stated in statutes, is the notion that an organization may
send e-mails to its members, employees, or contractors and that such e-mails are not
“unsolicited.”
Aside from the consistency with which other states define the term, this seems to be the
only logical meaning. No one would argue that an e-mail is unsolicited if the recipient requested
or consented to its transmission. Furthermore, once two parties have established a relationship,
communications cannot be considered unsolicited for purposes of a criminal statute simply
because one party did not specifically request it of the other. Thus, an e-mail is “unsolicited” if
the parties have no previously existing relationship, either business or personal, and the recipient
did not request or consent to its transmission.
Given the consistency and logical power of this definition as applied to appellant, he
would certainly have known that these e-mails were unsolicited. Appellant sent thousands of
e-mails at random to AOL subscribers whose addresses were among the 107 million stolen AOL
e-mail addresses stored on discs in his possession. Appellant did not compile a mailing list by
allowing people to register their names, nor did he build this list from previous contacts with
people. He obtained a stolen database of AOL e-mail addresses and sent his messages out
blindly.
permission. An e-mail is not unsolicited if the sender has a preexisting business or personal
relationship with the recipient. An e-mail is not unsolicited if it was received as a result of the
recipient opting into a system in order to receive promotional material.”); N.C. Gen. Stat. Ann.
§ 14-453 (West 2000) (“‘Unsolicited’ means not addressed to a recipient with whom the initiator
has an existing business or personal relationship and not sent at the request of, or with the
express consent of, the recipient.”).
- 22 -
Appellant’s contention that “bulk” is a vague term also fails because the law specifically
defines the word. Code § 18.2-152.3:1(B)(1) establishes that transmission “exceed[ing] 10,000
attempted recipients in any 24-hour period” constitutes a felony. Appellant admits that this
section sufficiently defines how many e-mails constitute “bulk” but maintains that for lesser
amounts of spam, the statute is vague. As noted above, the record reveals that appellant sent
12,197 falsified e-mails on July 16, 2003; 24,172 falsified e-mails on July 19, 2003; and 19,104
falsified e-mails on July 26, 2003. Because the statute clearly prohibits his conduct, appellant’s
challenge fails. Hoffman Estates, 455 U.S. at 495 (“A plaintiff who engages in some conduct
that is clearly proscribed cannot complain of the vagueness of the law as applied to the conduct
of others.”).
B.
Appellant next contends that the phrase “electronic mail transmission information or
other routing information” is vague. Initially, we note that the Supreme Court of Virginia has
already defined the word “route” as meaning “a direction of travel from one place to another.”
Virginia Stage Lines, Inc. v. Commonwealth, 186 Va. 1066, 1076, 45 S.E.2d 318, 323 (1947).
Routing information, then, would be the information that directs the message from one place to
another, or the record of that travel.
“We give the words of a statute ‘their common, ordinary and accepted meaning,’ absent
an indication by the legislature to the contrary.” Saunders v. Commonwealth, 48 Va. App. 196,
201, 629 S.E.2d 701, 703 (2006); see also Stein v. Commonwealth, 12 Va. App. 65, 68, 402
S.E.2d 238, 241 (1991) (citing Lovisi v. Commonwealth, 212 Va. 848, 850, 188 S.E.2d 206, 208
(1972)). “[C]ourts are bound by the plain meaning of clear statutory language.” Crawford v.
Haddock, 270 Va. 524, 528, 621 S.E.2d 127, 129 (2005) (citations omitted); see also Last v.
Virginia State Bd. of Med., 14 Va. App. 906, 910, 421 S.E.2d 201, 205 (1992) (“Where a statute
- 23 -
is unambiguous, the plain meaning is to be accepted without resort to the rules of statutory
interpretation.”). Words that have commonly accepted meanings within their statutory context
are not vague. See, e.g., Gray v. Commonwealth, 260 Va. 675, 681, 537 S.E.2d 862, 865 (2000)
(noting contextual meanings of “muffler” and “silencer” in firearms statute).
Appellant maintains that the phrase “transmission information” is vague. Black’s Law
Dictionary defines “transmit” as “[t]o send or transfer from one person or place to another, or to
communicate.” 1505 (7th ed. 1999). Thus, the common, ordinary and accepted meaning of the
term is that it means the data necessary to transmit, or carry, the e-mail from its origin to its
intended recipient.
The VCCA’s requirement that the falsification or forgery of the transmission information
or routing information be intentional further serves to protect that statute from a vagueness
challenge. As the Supreme Court noted in National Dairy Products, “a requirement of intent
[can serve] to ‘relieve the statute of the objection that it punishes without warning an offense of
which the accused was unaware.’” 372 U.S. at 35 (quoting Screws v. United States, 325 U.S. 91,
102 (1945)). This Court has similarly noted that “[b]y requiring specific intent . . . [a] statute
gives a person of ordinary intelligence a reasonable opportunity to know what is proscribed.”
Woolfolk v. Commonwealth, 18 Va. App. 840, 851, 447 S.E.2d 530, 536 (1994) (citations
omitted); see also Hernandez v. Commonwealth, 12 Va. App. 669, 672, 406 S.E.2d 398, 400
(1991) (holding the intent requirement, in part, makes constitutional a statute prohibiting wearing
of mask in public).
In National Dairy Products, the Court also held the challenged statute constitutional
because the statute “listed as elements of the illegal conduct . . . the intent to achieve a result . . .
[and] also the act . . . done in furtherance of that design or purpose.” 372 U.S. at 35. The VCCA
operates similarly. It establishes the illegal conduct (lying to commit a trespass on computer
- 24 -
servers), identifies an act done in furtherance (falsification of routing or transmission
information), and requires the act be done intentionally.
Here, appellant intended to falsify his identity and the origins of his e-mails in order to
avoid detection by AOL’s spam filters. The complicated machinations necessary to achieve this
criminal purpose negate any contention that the phrase “transmission information or other
routing information” is vague. Appellant’s conduct is exactly the conduct the statute seeks to
criminalize, and appellant intentionally undertook those acts.
C.
Code § 18.2-152.3:1(A) of the VCCA contains the phrase “unsolicited bulk electronic
mail.” Subsection B uses the acronym “UBE” for the phrase quoted from subsection A. For
example, a sentence in subsection B begins: “The volume of UBE transmitted exceeded 10,000
attempted recipients in any 24-hour period . . . .” Appellant maintains the use of the acronym
renders the statute impermissibly vague.
Recently, the Supreme Court of Virginia set out principles of statutory interpretation here
applicable:
Generally, the Court “will look to the whole body of [a statute] to
determine the true intention of each part.” McDaniel v.
Commonwealth, 199 Va. 287, 292, 99 S.E.2d 623, 627 (1957);
accord Rockingham Coop. Farm Bureau, Inc. v. City of
Harrisonburg, 171 Va. 339, 344, 198 S.E. 908, 910 (1938). “[A]
statute should be read and considered as a whole, and the language
of a statute should be examined in its entirety to determine the
intent of the General Assembly from the words contained in the
statute.” Dep’t of Med. Assistance Servs. v. Beverly Healthcare of
Fredericksburg, 268 Va. 278, 285, 601 S.E.2d 604, 607-08 (2004).
“In doing so, the various parts of the statute should be harmonized
so that, if practicable, each is given a sensible and intelligent
effect.” Colchester Towne Condo. Council of Co-Owners v.
Wachovia Bank, N.A., 266 Va. 46, 51, 581 S.E.2d 201, 203 (2003)
(citing VEPCO v. Prince William County, 226 Va. 382, 387-88,
309 S.E.2d 308, 311 (1983)).
Oraee v. Breeding, 270 Va. 488, 498, 621 S.E.2d 48, 52-53 (2005).
- 25 -
More specifically, the acronym “UBE” is to be given meaning “in the context in which it
is used.” Dep’t of Taxation v. Orange-Madison Coop. Farm Serv., 220 Va. 655, 658, 261 S.E.2d
532, 534 (1980). “[T]he context may be examined by considering other language used in the
statute.” City of Virginia Beach v. Bd. Of Supervisors of Mecklenburg County, 246 Va. 233,
236-37, 435 S.E.2d 382, 384 (1993).
Applying these principles, the only reasonable interpretation of the acronym within the
statute is that it means “unsolicited bulk electronic mail.” We hold that the acronym “UBE” in
the context used and in relation to the other language in the VCCA is not so vague that a person
of ordinary intelligence could fail to understand its meaning.
For the reasons stated above, the VCCA is sufficiently definite so as to not be
unconstitutionally vague as applied to appellant’s conduct.
VI.
CONCLUSION
Having concluded that the trial court had jurisdiction over this case and that Code
§ 18.2-152.3:1 does not violate the First Amendment, does not violate the Dormant Commerce
Clause, and is not unconstitutionally vague, appellant’s convictions are affirmed.
Affirmed.
- 26 -