United States v. Matthew Keys

                           NOT FOR PUBLICATION

                    UNITED STATES COURT OF APPEALS
                                                                           FILED
                            FOR THE NINTH CIRCUIT
                                                                           JUN 26 2017
                                                                        MOLLY C. DWYER, CLERK
                                                                         U.S. COURT OF APPEALS
UNITED STATES OF AMERICA,                        No.   16-10197

              Plaintiff-Appellee,                D.C. No.
                                                 2:13-cr-00082-KJM-1
 v.

MATTHEW KEYS,                                    MEMORANDUM*

              Defendant-Appellant.


                   Appeal from the United States District Court
                      for the Eastern District of California
                   Kimberly J. Mueller, District Judge, Presiding

                        Argued and Submitted June 13, 2017
                             San Francisco, California

Before: SCHROEDER and N.R. SMITH, Circuit Judges, and BATTAGLIA,**
District Judge.

      Defendant Matthew Keys appeals his conviction and sentence under the

Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030. We affirm.

      1.     Keys was not subjected to a constructive amendment, which occurs

      *
             This disposition is not appropriate for publication and is not precedent
except as provided by Ninth Circuit Rule 36-3.
      **
            The Honorable Anthony J. Battaglia, United States District Judge for
the Southern District of California, sitting by designation.
when (1) the government presents at trial “a complex of facts . . . distinctly

different” from those in the indictment, or (2) the trial proof or jury instructions

alter the crime charged, making it “impossible to know whether the grand jury

would have indicted for the crime actually proved.” United States v. Mancuso, 718

F.3d 780, 792 (9th Cir. 2013) (citation omitted). Neither standard is met here.

      The superceding indictment alleged that, after Keys’s employment ended, he

“kept and used, for malicious purposes, login credentials to the Tribune

Company’s CMS [(content management system)]”; “identified . . . Fox 40 . . . as [a

target] for online intrusion and web vandalism”; “obtain[ed] control of at least one

additional username and password . . . to log in and make changes to Tribune

Company’s CMS”; and intended “to damage computer systems used by Tribune

Company.” These allegations encompassed Keys’s conduct prior to December 8.

Because, after this date, Keys used credentials he created well after his

employment ended, the allegation that he used credentials he kept after his

employment necessarily refers to prior conduct, such as the Fox 40 emails and

creating back-door access. Importantly, the superseding indictment expanded

Count II’s date range. The only practical purpose of this expansion was to add

Keys’s conduct between October 28 and December 8. A common-sense reading of

the indictment as a whole, including facts that were necessarily implied, see United


                                           2
States v. Livingston, 725 F.3d 1141, 1148 (9th Cir. 2013), shows that the

government tried Keys only on facts presented to the grand jury. Therefore, the

government did not prove a complex of facts distinctly different from those in the

indictment. See Mancuso, 718 F.3d at 792.

      The government did not try Keys for unauthorized access, because Keys’s

use of back doors was CFAA “damage.” 18 U.S.C. § 1030(e)(8). Keys’s illicit

conduct for the entire period of Count II stemmed from the facts that he “kept and

used . . . login credentials to the Tribune Company’s CMS,” and “obtain[ed]

control of at least one additional username and password.” Acquiring and creating

passwords that can be used as back-door access points to a computer system in the

future impair the security of that system. See United States v. Middleton, 231 F.3d

1207, 1212 (9th Cir. 2000);1 Multiven, Inc. v. Cisco Sys., Inc., 725 F. Supp. 2d 887,

894–95 (N.D. Cal. 2010). Prior to Keys’s conduct, the CMS existed in a certain

state of security. Keys made the CMS far weaker by taking and creating new user

accounts. This manipulation of user accounts and login credentials (not Keys’s

access) impaired the system.

      2.     The district court did not allow the jury to consider harms not


      1
        Although the provision defining “damage” was amended after Middleton,
“[t]he new [CFAA] version defines ‘damage’ the same way [as the prior version].”
Creative Computing v. Getloaded.com LLC, 386 F.3d 930, 934 (9th Cir. 2004).
                                          3
cognizable as CFAA damage or loss. Keys makes a scattershot of arguments

concerning damage and loss, none of which is persuasive. Keys’s taking and

creating new user accounts (not downloading the email list) was the CFAA

damage. Middleton, 231 F.3d at 1212. His conduct directly resulted in the damage;

therefore, the damage was not “speculative harm,” as argued by Keys.

      The district court did not err in declining to instruct the jury that information

altered by a defendant was not damaged under the CFAA, if the original version

was not permanently lost. We are not persuaded by the out-of-circuit district court

cases Keys cites, none of which involve circumstances analogous to the alteration

of the L.A. Times website. The temporary unavailability of the original article, and

the posting of an altered version, fall within the statutory definition of “damage”:

“impairment to the integrity or availability of data, a program, a system, or

information.” 18 U.S.C. § 1030(e)(8). The website was not able to function as

intended while the customers could not access the article. The district court

properly instructed the jury using the statutory definitions of “damage” and “loss.”

      3.     By re-styling his contentions on the issues above, Keys argues the

district court admitted unfairly prejudicial evidence. We reject these arguments.

      4.     Concerning the attempt charge, the government presented evidence

sufficient for the jury to find that Keys had the required intent and took a


                                           4
substantial step toward the offense. See United States v. Gracidas-Ulibarry, 231

F.3d 1188, 1192 (9th Cir. 2000) (en banc). At the time of Keys’s December 15

chatroom discussion with the hacker, Keys knew the hacker had attacked the L.A.

Times only hours earlier. Thus, when the hacker told Keys he was going to alter

the entire front page, Keys knew the hacker was capable. Possessing this

knowledge, Keys showed the required intent when he made an unsolicited offer to

get the hacker back into the CMS and then actually tried to do so.

      Although Keys argues his efforts to get the hacker back into the system

amount only to unauthorized access, gaining access to the CMS is a substantial

step toward accomplishing the damage. In fact, providing access to more skilled

hackers was as far (toward the initial L.A. Times alteration) as Keys was able to

go, based on his computer skills. Although signing into his VPN to cover his tracks

was mere preparation for Keys, by affirmatively trying to take what he knew would

be his final step toward completing the damage, Keys took a “substantial step.” See

United States v. Still, 850 F.2d 607, 609–10 (9th Cir. 1988). The fact that

something outside his control prevented the offense from going forward does not

save him.

      5.     The district court found the amount of restitution by a preponderance

of the evidence, considering evidence with “sufficient indicia of reliability.” See


                                           5
United States v. Waknine, 543 F.3d 546, 556–57 (9th Cir. 2008) (citation omitted).

Concerning employee response time, the district court did not abuse its discretion

by relying on loss estimates based on employees’ testimonies or on the worksheet

prepared by a Fox 40 executive. In response to Keys’s challenge to inconsistences

in the employee salary evidence, the district court appropriately re-reviewed the

trial testimony and considered the amount in light of national statistics on the value

of non-liquid employee benefits.

      The government presented evidence that nearly all of the 20,000 Fox 40

Rewards Program members cancelled their participation in response to Keys’s

conduct. Starting essentially from square one, the database took three years to

rebuild. The district court did not abuse its discretion in relying on the Fox 40

executive’s representation that this process cost $200,000. It was appropriate for

the district court to order restitution in the amount it cost Fox 40 to replace the

member database, as it would be difficult to determine the fair market value of

such an asset. See United States v. Kaplan, 839 F.3d 795, 801–02 (9th Cir. 2016).

      The restitution was reasonably based on Fox 40’s actual losses and did not

result in a windfall to the victims. See id. at 802. Keys’s arguments to the contrary

are unpersuasive.

      AFFIRMED.


                                            6