United States v. Andrew Auernheimer , 748 F.3d 525 ( 2014 )


Menu:
  •                                          PRECEDENTIAL
    UNITED STATES COURT OF APPEALS
    FOR THE THIRD CIRCUIT
    _____________
    No. 13-1816
    _____________
    UNITED STATES OF AMERICA
    v.
    ANDREW AUERNHEIMER,
    a/k/a Weev
    a/k/a Weelos
    a/k/a Escher
    ANDREW AUERNHEIMER,
    Appellant
    On Appeal from the United States District Court
    for the District of New Jersey
    (No. 2:11-cr-00470-001)
    District Judge: Hon. Susan D. Wigenton
    Argued: March 19, 2014
    Before: CHAGARES, GREENAWAY, JR., and
    VANASKIE, Circuit Judges.
    (Filed: April 11, 2014)
    ____________
    OPINION
    ____________
    Tor B. Ekeland, Esq.
    Mark H. Jaffe, Esq.
    Tor Ekeland, P.C.
    155 Water Street.
    Sixth Floor, Suite Two
    Brooklyn, NY 11201
    Orin S. Kerr, Esq. [ARGUED]
    George Washington University
    2000 H Street, N.W.
    Washington, DC 20052
    Marcia C. Hofmann, Esq.
    25 Taylor Street
    San Francisco, CA 94102
    Hanni M. Fakhoury, Esq.
    Electronic Frontier Foundation
    815 Eddy Street
    San Francisco, CA 94109
    Attorneys for Appellant
    Paul J. Fishman, Esq.
    Glenn J. Moramarco, Esq. [ARGUED]
    Office of United States Attorney
    Camden Federal Building & Courthouse
    401 Market Street
    Camden, NJ 08101
    Mark E. Coyne, Esq.
    Office of United States Attorney
    970 Broad Street
    Newark, NJ 07102
    Attorneys for Appellee
    Christopher C. Walsh, Esq.
    Harvard Law School
    Cyberlaw Clinic
    23 Everett Street
    Second Floor
    Cambridge, MA 02138
    Alexander C. Muentz, Esq.
    Temple University
    Department of Criminal Justice
    1115 Pollett Walk
    Philadelphia, PA 19122
    2
    Jennifer S. Granick, Esq.
    Stanford Law School
    Center for Internet & Society
    559 Nathan Abbott Way
    Stanford, CA 94305
    Steven P. Ragland, Esq.
    Keker & Van Nest
    633 Battery Street
    San Francisco, CA 94111
    Attorneys for Amicus Appellants
    CHAGARES, Circuit Judge.
    This case calls upon us to determine whether venue for
    Andrew Auernheimer’s prosecution for conspiracy to violate
    the Computer Fraud and Abuse Act (“CFAA”), 
    18 U.S.C. § 1030
    , and identity fraud under 
    18 U.S.C. § 1028
    (a)(7) was
    proper in the District of New Jersey. Venue in criminal cases
    is more than a technicality; it involves “matters that touch
    closely the fair administration of criminal justice and public
    confidence in it.” United States v. Johnson, 
    323 U.S. 273
    ,
    276 (1944). This is especially true of computer crimes in the
    era of mass interconnectivity. Because we conclude that
    venue did not lie in New Jersey, we will reverse the District
    Court’s venue determination and vacate Auernheimer’s
    conviction.
    I.
    A.
    The relevant facts are fairly simple and not in dispute.
    Apple, Inc. introduced the first iPad, a tablet computer, in
    2010. Customers who purchased the version that had the
    capability to send and receive data over cellular networks
    (commonly referred to as “3G”) had to purchase a data
    contract from AT&T, Inc. (“AT&T”), which at the time was
    the exclusive provider of data services for this version of the
    iPad. Customers registered their accounts with AT&T over
    the Internet on a website that AT&T controlled. In the
    registration process, customers were assigned a user identifier
    3
    (“user ID”) and created a password — login credentials that
    they would need in order to access their accounts through
    AT&T’s website in the future. The user ID assigned to each
    customer was that customer’s email address.
    AT&T decided to make it easier for customers to log
    into their accounts by prepopulating the user ID field on the
    login screen with their email addresses. To do this, AT&T
    programmed its servers to search for an iPad user’s Integrated
    Circuit Card Identifier (“ICC-ID”) when a user directed her
    browser to AT&T’s general login webpage (AT&T’s
    “URL”1). An ICC-ID is the unique nineteen- or twenty-digit
    number that identifies an iPad’s Subscriber Identity Module,
    commonly known as a SIM Card. The SIM Card is the
    computer chip that allows iPads to connect to cellular data
    networks.
    If AT&T’s servers recognized the ICC-ID as
    associated with a customer who had registered her account
    with AT&T, then AT&T’s servers would automatically
    redirect the customer’s browser away from the general login
    URL to a different, specific URL. That new specific URL
    was unique for every customer and contained the customer’s
    ICC-ID in the URL itself. Redirecting the customer’s
    browser to the new specific URL told AT&T’s servers which
    email address to populate in the user ID field on the login
    page. This shortcut reduced the amount of time it took a
    customer to log into her account because, with her user ID
    already populated, she had to enter only her password.2
    1
    URL is shorthand for uniform resource locator, which is
    defined as “a specific address . . . used by a browser in
    locating the relevant document [on the Internet].” URL,
    Oxford Eng. Dictionary, http://www.oed.com/view/Entry
    /258858?redirectedFrom=URL#eid (last visited Mar. 27,
    2014). It is more commonly known as a “web address.”
    Appendix (“App.”) 255.
    2
    To make this more concrete, when an iPad user wanted to
    log into her account, she would direct her browser to
    “https://dcp2.att.com/OEPNDClient/”. If AT&T’s server
    recognized the ICC-ID of the iPad that made the request as an
    iPad that was already registered with AT&T, its servers
    would       automatically    redirect    the      user     to
    4
    Daniel      Spitler,   Auernheimer’s    co-conspirator,
    discovered this feature of AT&T’s login process. Although
    he did not own an iPad, he purchased an iPad SIM Card,
    hoping to install it on another computing device and then take
    advantage of the unlimited cellular data plan that AT&T
    offered for $30 per month. At first, he did not know how to
    register his SIM Card, so he downloaded the iPad operating
    system onto his computer, decrypted it, and browsed through
    the operating system’s code to try to find a way to register it.
    In the course of doing so, he came across AT&T’s
    registration URL. He noticed that one of the variables in the
    registration URL was a field requiring an ICC-ID.
    Spitler then directed his computer’s web browser to
    the registration URL and inserted his iPad’s ICC-ID in the
    requisite place. AT&T’s servers were programmed only to
    permit browsers that self-identified as iPad browsers to access
    the registration URL. This required him to change his
    browser’s user agent. A user agent tells a website what kind
    of browser and operating system a user is running, so servers
    that someone is attempting to access can format their
    responses appropriately. App. 256.
    After changing his browser’s user agent to appear as
    an iPad, Spitler was able to access the AT&T login page. He
    noticed that his email address was already populated in the
    login field and surmised that AT&T’s servers had tied his
    email address to his ICC-ID. He tested this theory by
    changing the ICC-ID in the URL by one digit and discovered
    that doing so returned a different email address. He changed
    the ICC-ID in the URL manually a few more times, and each
    time the server returned other email addresses in the login
    field.
    Spitler concluded that this was potentially a
    noteworthy security flaw. He began to write a program that
    he called an “account slurper” that would automate this
    process. The account slurper would repeatedly access the
    “https://dcp2.att.com/OEPNDClient/openPage?ICCID=XXX
    XXXXXXXXXXXXXXXX&IMEI=0”, where the string of
    “X”s is the nineteen- or twenty-digit ICC-ID.
    5
    AT&T website, each time changing the ICC-ID in the URL
    by one digit. If an email address appeared in the login box,
    the program would save that email address to a file under
    Spitler’s control.
    Spitler shared this discovery with Auernheimer, whom
    he knew through Internet-based chat rooms but had never met
    in person. Auernheimer helped him to refine his account
    slurper program, and the program ultimately collected
    114,000 email addresses between June 5 and June 8, 2010.
    Its method — guessing at random — is called a “brute force”
    attack, a term of art in the computer industry referring to an
    inefficient method of simply checking all possible numbers.
    While Spitler’s program was still collecting email
    addresses, Auernheimer emailed various members of the
    media in order to publicize the pair’s exploits. Some of those
    media members emailed AT&T, which immediately fixed the
    breach.     One of the media members contacted by
    Auernheimer was Ryan Tate, a reporter at Gawker, a news
    website. Tate expressed interest in publishing Auernheimer’s
    story. To lend credibility to it, Auernheimer shared the list of
    email addresses with him. Tate published a story on June 9,
    2010 describing AT&T’s security flaw, entitled “Apple’s
    Worst Security Breach: 114,000 iPad Owners Exposed.”
    The article mentioned some of the names of those whose
    email addresses were obtained, but published only redacted
    images of a few email addresses and ICC-IDs.
    Evidence at trial showed that at all times relevant to
    this case, Spitler was in San Francisco, California and
    Auernheimer was in Fayetteville, Arkansas. The servers that
    they accessed were physically located in Dallas, Texas and
    Atlanta, Georgia. Although no evidence was presented
    regarding the location of the Gawker reporter, it is undisputed
    that he was not in New Jersey.
    B.
    Despite the absence of any apparent connection to
    New Jersey, a grand jury sitting in Newark returned a two-
    count superseding indictment charging Auernheimer with
    conspiracy to violate the CFAA, 
    18 U.S.C. § 1030
    (a)(2)(C)
    and (c)(2)(B)(ii), in violation of 
    18 U.S.C. § 371
     (count one),
    6
    and fraud in connection with personal information in
    violation of 
    18 U.S.C. § 1028
    (a)(7) (count two, commonly
    referred to as “identity fraud”). To enhance the potential
    punishment from a misdemeanor to a felony, the Government
    alleged that Auernheimer’s CFAA violation occurred in
    furtherance of a violation of New Jersey’s computer crime
    statute, N.J. Stat. Ann. § 2C:20-31(a). See 
    18 U.S.C. § 1030
    (c)(2)(B)(ii).
    Auernheimer moved to dismiss the superseding
    indictment shortly after it was returned by the grand jury. In
    addition to asserting several challenges concerning the CFAA
    violation, he argued that venue was not proper in the District
    of New Jersey. The District Court acknowledged that neither
    he nor Spitler was ever in New Jersey while allegedly
    committing the crime, and that the servers accessed were not
    in New Jersey, but denied his motion nonetheless. It held that
    venue was proper for the CFAA conspiracy charge because
    Auernheimer’s disclosure of the email addresses of about
    4,500 New Jersey residents affected them in New Jersey and
    violated New Jersey law. It further held that because venue
    was proper for the CFAA count, it was also proper for the
    identity fraud count because proving the CFAA violation was
    a necessary predicate to proving the identity fraud violation.
    Auernheimer’s trial lasted five days and resulted in a
    guilty verdict on both counts. Initially, both parties requested
    a jury instruction on venue. App. 575. Venue is a question
    for the jury and the court “must specifically instruct the jury
    on venue” if “(1) the defendant objects to venue prior to or at
    the close of the prosecution’s case-in-chief, (2) there is a
    genuine issue of material fact with regard to proper venue,
    and (3) the defendant timely requests a jury instruction.”
    United States v. Perez, 
    280 F.3d 318
    , 334 (3d Cir. 2002).
    Although Auernheimer objected to venue and requested an
    instruction, the District Court held that there was no genuine
    issue of material fact. It concluded that the Government had
    established that venue was proper in New Jersey as a matter
    of law and declined to instruct the jury on venue. App. 591.
    After denying Auernheimer’s post-trial motions, the
    District Court sentenced him to forty-one months of
    imprisonment. Auernheimer timely appealed.
    7
    II.
    The District Court had jurisdiction pursuant to 
    18 U.S.C. § 3231
    . We have jurisdiction pursuant to 
    28 U.S.C. § 1291
    . Our review of the District Court’s legal decision
    regarding venue is plenary. United States v. Pendleton, 
    658 F.3d 299
    , 302 (3d Cir. 2011).
    III.
    Although this appeal raises a number of complex and
    novel issues that are of great public importance in our
    increasingly interconnected age, we find it necessary to reach
    only one that has been fundamental since our country’s
    founding: venue. The proper place of colonial trials was so
    important to the founding generation that it was listed as a
    grievance in the Declaration of Independence. See The
    Declaration of Independence para. 21 (U.S. 1776) (objecting
    to “transporting us beyond seas to be tried for pretended
    offences”). It was of such concern that the Constitution of the
    United States “twice safeguards the defendant’s venue right.”
    United States v. Cabrales, 
    524 U.S. 1
    , 6 (1998). Article III
    requires that “the Trial of all Crimes . . . shall be held in the
    State where the said Crimes shall have been committed.”
    U.S. Const. art. III, § 2, cl. 3. The Sixth Amendment further
    provides that “[i]n all criminal prosecutions, the accused shall
    enjoy the right to a speedy and public trial, by an impartial
    jury of the State and district wherein the crime shall have
    been committed.” Id. amend VI. This guarantee is codified
    in the Federal Rules of Criminal Procedure, which require
    that “the [G]overnment must prosecute an offense in a district
    where the offense was committed.” Fed. R. Crim. P. 18.
    Congress may prescribe specific venue requirements
    for particular crimes. Pendleton, 
    658 F.3d at 303
    . Where it
    has not, as is the case here, we must determine the crime’s
    locus delicti. Id.; see also Black’s Law Dictionary 1025 (9th
    ed. 2009) (defining locus delicti as the “place where an
    offense was committed”). “[T]he locus delicti must be
    determined from the nature of the crime alleged and the
    location of the act or acts constituting it.” United States v.
    Anderson, 
    328 U.S. 699
    , 703 (1946); accord United States v.
    8
    Rodriguez-Moreno, 
    526 U.S. 275
    , 279 (1999); Cabrales, 
    524 U.S. at 6-7
    . To perform this inquiry, we “must [1] initially
    identify the conduct constituting the offense . . . and then [2]
    discern the location of the commission of the criminal acts.”
    Rodriguez-Moreno, 
    526 U.S. at 279
    . Venue should be
    narrowly construed. Johnson, 
    323 U.S. at 276
    .
    Continuing offenses, such as conspiracy, that are
    “begun in one district and completed in another, or committed
    in more than one district, may be inquired of and prosecuted
    in any district in which such offense was begun, continued, or
    completed.” 
    18 U.S.C. § 3237
    (a). In the context of a
    conspiracy charge, “venue can be established wherever a co-
    conspirator has committed an act in furtherance of the
    conspiracy.” Perez, 
    280 F.3d at 329
    ; accord Hyde v. United
    States, 
    225 U.S. 347
    , 356-67 (1912). The Government must
    prove venue by a preponderance of the evidence. United
    States v. Root, 
    585 F.3d 145
    , 155 (3d Cir. 2009).
    In performing our venue inquiry, we must be careful to
    separate “essential conduct elements” from “circumstance
    element[s].” Rodriguez-Moreno, 
    526 U.S. at
    280 & n.4. For
    example, in Cabrales the Supreme Court considered whether
    venue for money laundering activities was proper in Missouri.
    
    524 U.S. at 4
    . The laundered proceeds were generated by
    illegal narcotics sales in Missouri, but all acts constituting the
    money laundering offense took place in Florida. 
    Id.
     The
    Court held that venue was improper in Missouri. 
    Id. at 10
    .
    The Supreme Court, later reflecting on Cabrales, observed
    that the “existence of criminally generated proceeds” was
    only a “circumstance element” of money laundering.
    Rodriguez-Moreno, 
    526 U.S. at
    280 n.4. Although it was an
    element of the crime that the Government had to prove to the
    jury, it was a “circumstance element” because it was simply a
    fact that existed at the time that the defendant performed her
    laundering acts. Only “essential conduct elements” can
    provide the basis for venue; “circumstance elements” cannot.
    United States v. Bowens, 
    224 F.3d 302
    , 310 (4th Cir. 2000).
    A.
    Count one charged Auernheimer with conspiracy to
    violate CFAA § 1030(a)(2)(C) and (c)(2)(B)(ii). In the
    9
    indictment and at trial, the Government identified the nature
    of the conduct constituting the offense as the agreement to
    commit a violation of the CFAA in furtherance of a violation
    of New Jersey’s computer crime statute, N.J. Stat. Ann. §
    2C:20-31(a). Venue would be proper in any district where
    the CFAA violation occurred, or wherever any of the acts in
    furtherance of the conspiracy took place. See Perez, 
    280 F.3d at 329
    ; see also Rodriguez-Moreno, 
    526 U.S. at
    281-82
    (citing Hyde, 
    225 U.S. at 356-67
    ).
    The charged portion of the CFAA provides that
    “[w]hoever . . . intentionally accesses a computer without
    authorization or exceeds authorized access, and thereby
    obtains . . . information from any protected computer . . . shall
    be punished as provided in subsection (c) of this section.” 
    18 U.S.C. § 1030
    (a)(2)(C). To be found guilty, the Government
    must prove that the defendant (1) intentionally (2) accessed
    without authorization (or exceeded authorized access to) a (3)
    protected computer and (4) thereby obtained information.
    See United States v. Willis, 
    476 F.3d 1121
    , 1125 (10th Cir.
    2007) (delineating the elements in a similar manner). The
    statute’s plain language reveals two essential conduct
    elements: accessing without authorization and obtaining
    information.3
    New Jersey was not the site of either essential conduct
    element. The evidence at trial demonstrated that the accessed
    AT&T servers were located in Dallas, Texas, and Atlanta,
    Georgia. App. 443-44. In addition, during the time that the
    conspiracy began, continued, and ended, Spitler was
    obtaining information in San Francisco, California (App.
    233), and Auernheimer was assisting him from Fayetteville,
    Arkansas (App. 366). No protected computer was accessed
    and no data was obtained in New Jersey.
    3
    The Department of Justice’s own manual on prosecuting
    computer crimes provides in its section devoted to venue that
    “it would seem logical that a crime under section
    1030(a)(2)(C) is committed where the offender initiates
    access and where the information is obtained.” Computer
    Crime & Intellectual Prop. Section, Dep’t of Justice,
    Prosecuting Computer Crimes 118, available at
    http://www.justice.gov/criminal/cybercrime/docs/ccmanual.p
    df (last visited Mar. 26, 2014) (“DOJ Manual”).
    10
    This is not the end of our analysis, however, because
    the Government did not just charge Auernheimer with
    conspiracy to commit an ordinary violation of the CFAA, but
    also with conspiring to violate the CFAA in furtherance of a
    state crime. The Government can increase the statutory
    maximum punishment for a subsection (a)(2) violation from
    one year to five years if it proves one of the enhancements
    contained in § 1030(c)(2)(B). The enhancement relevant here
    provides for such increased punishment if “the offense was
    committed in furtherance of any criminal or tortious act in
    violation of the . . . laws of . . . any State.” Id. §
    1030(c)(2)(B)(ii). “[A]ny ‘facts that increase the prescribed
    range of penalties to which the criminal defendant is exposed’
    are elements of the crime” that must be proven to the jury
    beyond a reasonable doubt.4 Alleyne v. United States, 
    133 S. Ct. 2151
    , 2160 (2013) (quoting Apprendi v. New Jersey, 
    530 U.S. 466
    , 490 (2000)). This is true even if they are explicitly
    termed “sentence enhancement[s]” in the statute. Apprendi,
    
    530 U.S. at
    494 n.19 (quotation marks omitted).
    The New Jersey statute allows for criminal liability “if
    the person purposely or knowingly and without authorization,
    or in excess of authorization, accesses any . . . computer [or]
    computer system and knowingly or recklessly discloses, or
    causes to be disclosed any data . . . or personal identifying
    information.” N.J. Stat. Ann. § 2C:20-31(a). Its essential
    conduct elements are accessing without authorization (or in
    excess of authorization) and disclosing data or personal
    identifying information.
    Here, none of the essential conduct elements of a
    violation of the New Jersey statute occurred in New Jersey.
    As discussed, neither Auernheimer nor Spitler accessed a
    4
    Just because the enhancement is an “element” that the
    Government needed to prove beyond a reasonable doubt does
    not mean that it was an “essential conduct element” of a §
    1030(a)(2)(C) violation within the meaning of Rodriguez-
    Moreno that could establish venue. For the purposes of this
    opinion, however, we will assume (without deciding) that the
    enhancement could contain “essential conduct elements.”
    11
    computer in New Jersey.5 The disclosure did not occur there
    either. The sole disclosure of the data obtained was to the
    Gawker reporter. There was no allegation or evidence that
    the Gawker reporter was in New Jersey. Further, there was
    no evidence that any email addresses of any New Jersey
    residents were ever disclosed publicly in the Gawker article.
    The alleged violation of the New Jersey statute thus cannot
    confer venue for count one.
    Just as none of the conduct constituting the CFAA
    violation or its enhancement occurred in New Jersey, none of
    the overt acts that the Government alleged in the superseding
    indictment occurred in New Jersey either. The indictment
    listed four overt acts: writing the account slurper program,
    deploying the account slurper program against AT&T’s
    servers, emailing victims to inform them of the breach, and
    disclosing the emails addresses obtained to Gawker. The co-
    conspirators collaborated on the account slurper program
    from California and Arkansas and deployed it against servers
    located in Texas and Georgia. The Government offered no
    evidence whatsoever that any of the victims that Auernheimer
    emailed were located in New Jersey, or that the Gawker
    reporter to whom the list of email addresses was disclosed
    was in the Garden State.
    Because neither Auernheimer nor his co-conspirator
    Spitler performed any “essential conduct element” of the
    underlying CFAA violation or any overt act in furtherance of
    the conspiracy in New Jersey, venue was improper on count
    one.
    5
    We also note that in order to be guilty of accessing “without
    authorization, or in excess of authorization” under New
    Jersey law, the Government needed to prove that
    Auernheimer or Spitler circumvented a code- or password-
    based barrier to access. See State v. Riley, 
    988 A.2d 1252
    ,
    1267 (N.J. Super. Ct. Law Div. 2009). Although we need not
    resolve whether Auernheimer’s conduct involved such a
    breach, no evidence was advanced at trial that the account
    slurper ever breached any password gate or other code-based
    barrier. The account slurper simply accessed the publicly
    facing portion of the login screen and scraped information
    that AT&T unintentionally published.
    12
    B.
    We now turn to count two of the indictment because
    venue must be analyzed independently for each count. See
    Root, 
    585 F.3d at 155
    . Count two charged Auernheimer with
    violating 
    18 U.S.C. § 1028
    (a)(7), which punishes anyone who
    “knowingly transfers, possesses, or uses, without lawful
    authority, a means of identification of another person with the
    intent to commit, or to aid or abet, or in connection with, any
    [federal crime, or state or local felony].” The statute’s plain
    language indicates that the statute punishes someone who (1)
    knowingly (2) transfers, possesses, or uses without lawful
    authority (3) a means of identification of another person (4)
    with the intent to commit, or in connection with, any violation
    of federal law or any state felony. See United States v.
    Abdelshafi, 
    592 F.3d 602
    , 607 (4th Cir. 2010) (delineating the
    elements of a violation of aggravated identity fraud in 18
    U.S.C. § 1028A(a)(1), which are virtually identical, in a
    similar fashion); United States v. Stephens, 
    571 F.3d 401
    ,
    404-05 (5th Cir. 2009) (same).
    The two essential conduct elements under § 1028(a)(7)
    are transfer, possession, or use, and doing so in connection
    with a federal crime or state felony. Cf. Rodriguez-Moreno,
    
    526 U.S. at 280
     (noting that “during and in relation to any
    crime of violence” was an essential conduct element of a
    firearms statute). Starting with the latter essential conduct
    element, the Government charged Auernheimer with
    committing identity fraud “in connection with” the ordinary
    violation of CFAA § 1030(a)(2)(C). As should be clear by
    now, no conduct related to the ordinary CFAA violation
    occurred in New Jersey.
    There was also no evidence that Auernheimer’s
    transfer, possession, or use occurred in New Jersey. The
    Government advances two theories of how he could have
    satisfied this essential conduct element. First, it contends that
    he violated § 1028(a)(7) by knowingly using the ICC-IDs of
    other people’s iPads to access AT&T’s servers. See Gov’t
    Br. 64-66. Venue fails under this theory because there was no
    allegation or evidence that he used the ICC-IDs in New
    Jersey. The alleged conspirators used the ICC-IDs in their
    13
    account slurper program, which was programmed from
    California and Arkansas, and did not access any computer or
    obtain any information in New Jersey.
    The Government also argues that Auernheimer
    violated the statute by transferring the list of email addresses
    that he obtained to Gawker with the intent to violate the New
    Jersey computer crime statute. See Gov’t Br. 67-69. But
    there was no allegation in the indictment or evidence at trial
    that the Gawker reporter to whom he transferred the email
    addresses was in New Jersey — and no essential conduct
    element of the alleged violation of New Jersey law occurred
    in New Jersey either.6
    Because Auernheimer did not commit any essential
    conduct of the identity fraud charge in New Jersey, venue was
    also improper on count two.
    IV.
    The Government does not dispute the locations of
    Auernheimer, Spitler, and AT&T’s servers during the period
    of time that Auernheimer was committing the alleged crimes.
    Instead, it advances a series of other reasons why there was
    no defect in venue that warrants vacating his conviction.
    None of them are availing.
    A.
    The Government argues that we need not rely on the
    essential conduct elements test mandated by Cabrales and
    Rodriguez-Moreno because we have “adopted,” Gov’t Br. 71,
    6
    Further, count two of the indictment charged Auernheimer
    with transferring, possessing, and using the means of
    identification of others in connection with only an ordinary
    violation of CFAA § 1030(a)(2)(C). It did not mention the
    violation of New Jersey law or the § 1030(c)(2)(B)(ii)
    enhancement at all. This second theory thus “broaden[s] the
    possible bases for conviction from that which appeared in the
    indictment.” United States v. McKee, 
    506 F.3d 225
    , 229 (3d
    Cir. 2007) (quotation marks omitted). It cannot be a
    permissible basis upon which to find venue for count two.
    14
    a “substantial contacts test.” Under this approach, frequently
    employed by the Court of Appeals for the Second Circuit, a
    number of factors help to determine whether venue was
    proper, including “the site of the defendant’s acts, the
    elements and nature of the crime, the locus of the effect of the
    criminal conduct, and the suitability of each district for
    accurate factfinding.” United States v. Reed, 
    773 F.2d 477
    ,
    481 (2d Cir. 1985). The Government contends that venue is
    proper in New Jersey because about four percent
    (approximately 4,500 of 114,000) of the email addresses
    obtained from AT&T’s website belonged to New Jersey
    residents, thereby satisfying the “locus of the effect[s]”
    consideration. See 
    id.
    It is far from clear that this Court has ever “adopted”
    this test. We have mentioned it only once. See United States
    v. Goldberg, 
    830 F.2d 459
    , 466 (3d Cir. 1987). The test was
    cited in a long block quote to Reed, and then analyzed in a
    single sentence. 
    Id.
     The Goldberg panel did not need to rely
    on the locus of the effects of the defendant’s conduct in that
    case because all of his acts took place in the district in which
    he was tried. 
    Id.
     No panel of this Court has ever cited
    Goldberg, or any other case, for this test since — either
    before, or especially after, the Supreme Court clarified the
    venue inquiry in Cabrales and Rodriguez-Moreno.
    Even if it could be said that we perhaps tacitly
    endorsed this test once almost thirty years ago, the test
    operates to limit venue, not to expand it. Cases from the
    Court of Appeals for the Second Circuit make this clear. The
    test “does not represent a formal constitutional test,” but
    rather is merely “helpful in determining whether a chosen
    venue is unfair or prejudicial to a defendant.” United States
    v. Saavedra, 
    223 F.3d 85
    , 93 (2d Cir. 2000). To satisfy this
    test, there must be “more than ‘some activity in the situs
    district’; instead, there must be ‘substantial contacts.’”
    United States v. Davis, 
    689 F.3d 179
    , 186 (2d Cir. 2012)
    (quoting Reed, 
    773 F.2d at 481
    ). There “must be some sense
    of venue having been freely chosen by the defendant.” 
    Id.
    (alteration and quotation marks omitted). If a defendant
    argues that the chosen venue is constitutionally infirm but that
    it did not result in any hardship to him, the court only
    determines the locus delicti and does not then analyze
    15
    whether there were “substantial contacts.” See United States
    v. Magassouba, 
    619 F.3d 202
    , 205 n.2 (2d Cir. 2010). This
    test thus serves to limit venue in instances where the locus
    delicti constitutionally allows for a given venue, but trying
    the case there is somehow prejudicial or unfair to the
    defendant.
    Even assuming that the substantial contacts test is
    viable within our Circuit, it cannot serve as a sufficient basis
    for conferring venue. The Government argues only that it has
    minimally satisfied one of the four prongs of the test — the
    “locus of the effect of the criminal conduct.” There was no
    evidence at trial that Auernheimer’s actions evinced any
    contact with New Jersey, much less contact that was
    “substantial.” The Government has not cited, and we have
    not found, any case where the locus of the effects, standing by
    itself, was sufficient to confer constitutionally sound venue.
    Undoubtedly there are some instances where the
    location in which a crime’s effects are felt is relevant to
    determining whether venue is proper. See Rodriguez-
    Moreno, 
    526 U.S. at
    279 n.2 (reserving the issue of whether
    venue may also be permissibly based on the location where a
    crime’s effects are felt). But those cases are reserved for
    situations in which “an essential conduct element is itself
    defined in terms of its effects.” Bowens, 
    224 F.3d at 311
    .
    For example, in a prosecution for Hobbs Act robbery, venue
    may be proper in any district where commerce is affected
    because the terms of the act themselves forbid affecting
    commerce. See 
    18 U.S.C. § 1951
    (a); accord United States v.
    Smith, 
    198 F.3d 377
    , 383 (2d Cir. 1999). This is consistent
    with Congress’s prerogative to “provide that the locality of a
    crime shall extend over the whole area through which force
    propelled by an offender operates.” Johnson, 
    323 U.S. at 275
    .
    Sections of the CFAA other than § 1030(a)(2)(C) do
    speak in terms of their effects. For example, § 1030(a)(5)(B)
    criminalizes intentionally accessing a computer without
    authorization and recklessly causing damage. Because that
    16
    crime is defined in terms of its effects — the damage caused
    — venue could be proper wherever that occurred.7
    Congress, however, did not define a violation of §
    1030(a)(2)(C) in terms of its effects. The statute simply
    criminalizes accessing a computer without authorization and
    obtaining information. It punishes only the actions that the
    defendant takes to access and obtain. It does not speak in
    terms of the effects on those whose information is obtained.
    The crime is complete even if the offender never looks at the
    information and immediately destroys it, or the victim has no
    idea that information was ever taken.
    B.
    The Government also argues that venue was proper in
    New Jersey because Auernheimer failed to obtain
    authorization from approximately 4,500 New Jersey residents
    to “use[] their ICC-ID numbers to access the AT&T servers.”
    Gov’t Br. 80. The Government argues that when a statute
    makes it a crime to fail to do some required act, venue can lie
    in the district in which the act should have been done. The
    Government concludes that venue is proper because
    Auernheimer and Spitler failed to obtain authorization from
    about 4,500 people in New Jersey prior to accessing AT&T’s
    servers.
    This rule only applies, however, when a preexisting
    legal duty requires the act that the defendant failed to do. See
    1 Wayne R. LaFave, Substantive Criminal Law § 6.2(a) (2d
    ed. 2003) (noting that crimes of omission are generally
    limited by specific duties such as relationship, statute,
    contract, assumption of care, creation of peril, controlling the
    conduct of others, and landowner); accord United States v.
    Sabhnani, 
    599 F.3d 215
    , 237 (2d Cir. 2010). Failure to
    7
    The Department of Justice manual again tailors its guidance
    to this assessment, noting that a prosecution under §
    1030(a)(5) “may be brought where the effects are felt because
    those charges are defined in terms of ‘loss,’ even if the bulk
    of network crimes may not be prosecuted in a district simply
    because the effects of the crime are felt there.” DOJ Manual
    at 120.
    17
    perform a required act could confer venue where a defendant
    should have performed that act when a statute penalizes
    inaction, such as failure to report to a military draft board
    (see, e.g., Johnston v. United States, 
    351 U.S. 215
    , 219-20
    (1956)), failure to report to prison after being sentenced (see,
    e.g., United States v. Overaker, 
    766 F.2d 1326
    , 1327 (9th Cir.
    1985)), or failure to file income tax returns (see, e.g., United
    States v. Garman, 
    748 F.2d 218
    , 219 (4th Cir. 1984)). Here,
    Auernheimer was under no such preexisting duty — legal or
    otherwise. Like most statutes, the charged portion of the
    CFAA punishes affirmative acts, not inaction. His failure to
    obtain authorization cannot confer venue in every district in
    which a potential victim lived.
    C.
    Finally, the Government argues that even if venue
    were improper, we should apply harmless error analysis and
    disregard the error because it did “not affect substantial
    rights.” Fed. R. Crim. P. 52(a). Although the Government
    makes this argument only in passing — it occupies less than
    one page of its 118-page brief — we feel obliged to address
    it. The Government contends that its choice of forum actually
    benefitted Auernheimer, because locating his trial in Newark,
    New Jersey “enhance[d] his ability to attract and retain
    experienced and capable counsel on a pro bono basis.” Gov’t
    Br. 98; see also 
    id. at 97
     (noting that Newark was a
    “relatively easy commute” for Auernheimer’s attorney from
    his office in Brooklyn, New York).
    At the outset, we are skeptical that venue errors are
    susceptible to harmless error analysis. The Supreme Court
    has divided constitutional errors into two classes: “trial” and
    “structural.” Arizona v. Fulminante, 
    499 U.S. 279
    , 307-10
    (1991). Trial errors occur “during the presentation of the case
    to the jury” and can be “quantitatively assessed in the context
    of other evidence presented” in order to determine whether
    they are “harmless beyond a reasonable doubt.” 
    Id.
     at 307-
    08. These include “most constitutional errors.” 
    Id. at 306
    .
    Structural errors “defy” harmless error analysis because they
    “affect[] the framework within which the trial proceeds,” 
    id. at 309-10
    , “or indeed [] whether it proceeds at all,” United
    States v. Gonzalez-Lopez, 
    548 U.S. 140
    , 150 (2006). These
    18
    include a “limited class of fundamental constitutional errors,”
    Neder v. United States, 
    527 U.S. 1
    , 7 (1999), such as the
    denial of the rights to counsel, self-representation, or a public
    trial. See Gonzales-Lopez, 
    548 U.S. at 149
     (listing examples
    and authority).
    An error regarding venue exhibits many of the
    characteristics of structural error. If the District Court had
    found venue lacking upon Auernheimer’s motion to dismiss,
    there would have been no trial in New Jersey at all. Even if
    venue had been raised only at trial, “if venue is improper no
    constitutionally valid verdict could be reached regardless of
    the [potentially] overwhelming evidence against the
    defendant.” United States v. Miller, 
    111 F.3d 747
    , 757 (10th
    Cir. 1997) (Barrett, J., dissenting). The error thus “def[ies]
    analysis by harmless-error standards by affecting the entire
    adjudicatory framework.” Puckett v. United States, 
    556 U.S. 129
    , 141 (2009) (quotation marks omitted). Holding that
    defective venue could ever be harmless would arguably
    reduce this constitutional protection to a nullity because,
    under the Government’s formulation, the error would be
    harmless as long as the evidence against the accused of the
    substantive crime was overwhelming. It is doubtful that this
    is the way the venue protections in the Constitution were
    meant to operate. See also 4 Wayne R. LaFave et al.,
    Criminal Procedure § 16.1(g) (4th ed. 2007) (“Failure of
    venue will not be treated as harmless error.”).
    The Supreme Court has never held that improper
    venue is subject to harmless error review. The Government
    has pointed to only one case where a court subjected
    defective venue to harmless error review. See United States
    v. Hart-Williams, 
    967 F. Supp. 73
    , 78-81 (E.D.N.Y. 1997).
    In Hart-Williams, the district court found the venue error
    harmless after the defendant was convicted at a courthouse in
    Brooklyn, New York, that was less than a mile from the
    courthouse where venue would have been proper in
    Manhattan, New York. See 
    id. at 80
    . No court has cited
    Hart-Williams for this proposition, and the Court of Appeals
    for the Second Circuit has cast doubt on whether the district
    court’s application of harmless error review remains good
    law. See United States v. Brennan, 
    183 F.3d 139
    , 149 (2d
    Cir. 1999) (holding that trial in Brooklyn, New York, where
    19
    venue was improper, was not harmless when the defendant
    timely objected to venue, even though venue would have
    been proper in Manhattan, New York); see also Saavedra, 
    223 F.3d at
    100 n.5 (Cabranes, J., dissenting) (explicitly noting
    that Brennan forecloses applying harmless error analysis to
    defective venue).
    Nonetheless, even assuming that defective venue could
    be amenable to harmless error review, the venue error here
    clearly affected Auernheimer’s substantial rights. In order for
    an error to be harmless, “the Government must ‘prove beyond
    a reasonable doubt that the error complained of did not
    contribute to the verdict obtained.’” Gov’t of V.I. v. Davis,
    
    561 F.3d 159
    , 165 (3d Cir. 2009) (quoting Chapman v.
    California, 
    386 U.S. 18
    , 24 (1967)). The question “is not
    whether, in a trial that occurred without the error, a guilty
    verdict would surely have been rendered, but whether the
    guilty verdict actually rendered in this trial was surely
    unattributable to the error.” Sullivan v. Louisiana, 
    508 U.S. 275
    , 279 (1993). The venue error in this case is not harmless
    because there was no evidence that any of the essential
    conduct elements occurred in New Jersey. If Auernheimer’s
    jury had been properly instructed on venue, it could not have
    returned a guilty verdict; the verdict rendered in this trial
    would have been different. See United States v. Durades, 
    607 F.2d 818
    , 820 (9th Cir. 1979) (failing to try defendant in
    district where crime was allegedly committed infringed the
    defendant’s substantial rights); see also United States v.
    Glenn, 
    828 F.2d 855
    , 860 (1st Cir. 1987) (same); United
    States v. Stratton, 
    649 F.2d 1066
    , 1076 n.15 (5th Cir. 1981)
    (“A defendant’s interest in being tried only in a district where
    venue properly lay clearly constitutes a substantial right.”
    (quotation marks omitted)).
    The Supreme Court has repeatedly made clear that the
    constitutional limitations on venue are extraordinarily
    important. “[Q]uestions of venue are more than matters of
    mere procedure. They raise deep issues of public policy in
    the light of which legislation must be construed.” Travis v.
    United States, 
    364 U.S. 631
    , 634 (1961) (quotation marks
    omitted). “The provision for trial in the vicinity of the crime
    is a safeguard against the unfairness and hardship involved
    when an accused is prosecuted in a remote place.” United
    20
    States v. Cores, 
    356 U.S. 405
    , 407 (1958); accord United
    States v. Passodelis, 
    615 F.2d 975
    , 977 (3d Cir. 1980). The
    founders were so concerned with the location of a criminal
    trial that they placed the venue requirement, which is
    “principally a protection for the defendant,” Cabrales, 
    524 U.S. at 9
    , in the Constitution in two places. See U.S. Const.
    art. III, § 2, cl. 3 and amend. VI.
    They did so for good reason. A defendant who has
    been convicted “in a distant, remote, or unfriendly forum
    solely at the prosecutor’s whim,” United States v. Salinas,
    
    373 F.3d 161
    , 164 (1st Cir. 2004), has had his substantial
    rights compromised.        Auernheimer was hauled over a
    thousand miles from Fayetteville, Arkansas to New Jersey.
    Certainly if he had directed his criminal activity toward New
    Jersey to the extent that either he or his co-conspirator
    committed an act in furtherance of their conspiracy there, or
    performed one of the essential conduct elements of the
    charged offenses there, he would have no grounds to
    complain about his uprooting. But that was not what was
    alleged or what happened. While we are not prepared today
    to hold that an error of venue never could be harmless,8 we do
    not need to because the improper venue here — far from
    where he performed any of his allegedly criminal acts —
    8
    We note that we are not dealing with a situation where the
    error complained of is that the trial judge failed to instruct the
    jury on venue. That claim may be reviewed for harmless
    error. See United States v. Casch, 
    448 F.3d 1115
    , 1117-18
    (9th Cir. 2006) (noting that when proof of venue is clear,
    failure to instruct the jury can be considered harmless error);
    United States v. Martinez, 
    901 F.2d 374
    , 377 (4th Cir. 1990)
    (same); United States v. Moeckly, 
    769 F.2d 453
    , 461 (8th Cir.
    1985) (same). In that situation, the failure to instruct would
    be harmless if the Government demonstrates under the
    Chapman standard that sufficient evidence of venue existed
    such that the jury would have come to that conclusion too.
    Cf. Neder, 
    527 U.S. at 7-11
     (holding that an erroneous jury
    instruction that omitted an element of the offense is subject to
    harmless error analysis). The question that we address today
    is whether a venue defect could be harmless when there is no
    possibility that the jury could have found venue proper.
    21
    denied Auernheimer’s substantial right to be tried in the place
    where his alleged crime was committed.9
    V.
    Venue issues are animated in part by the “danger of
    allowing the [G]overnment to choose its forum free from any
    external constraints.” Salinas, 
    373 F.3d at
    169-70 (citing
    Travis, 
    364 U.S. at 634
    ). The ever-increasing ubiquity of the
    Internet only amplifies this concern. As we progress
    technologically, we must remain mindful that cybercrimes do
    not happen in some metaphysical location that justifies
    disregarding constitutional limits on venue. People and
    computers still exist in identifiable places in the physical
    world. When people commit crimes, we have the ability and
    obligation to ensure that they do not stand to account for
    those crimes in forums in which they performed no “essential
    conduct element” of the crimes charged. Rodriguez-Moreno,
    
    526 U.S. at 280
    .
    “Though our nation has changed in ways which it is
    difficult to imagine that the Framers of the Constitution could
    have foreseen, the rights of criminal defendants which they
    sought to protect in the venue provisions of the Constitution
    are neither outdated nor outmoded.” Passodelis, 
    615 F.2d at 977
    . Just as this was true when we decided Passodelis in
    1980 — after the advent of railroad, express mail, the
    telegraph, the telephone, the automobile, air travel, and
    satellite communications — it remains true in today’s Internet
    age. For the forgoing reasons, we will reverse the District
    Court’s venue determination and vacate Auernheimer’s
    conviction.
    9
    We in no way imply that venue cannot be waived by the
    defendant by failing to object to it in a timely fashion. See
    Perez, 
    280 F.3d at 328
    . Because Auernheimer explicitly
    moved to dismiss the indictment for lack of venue, there is no
    contention that he waived his venue right here.
    22
    

Document Info

Docket Number: 13-1816

Citation Numbers: 748 F.3d 525, 2014 U.S. App. LEXIS 6671, 2014 WL 1395670

Judges: Chagares, Greenaway, Vanaskie

Filed Date: 4/11/2014

Precedential Status: Precedential

Modified Date: 10/19/2024

Authorities (39)

Hyde v. United States , 32 S. Ct. 793 ( 1912 )

Puckett v. United States , 129 S. Ct. 1423 ( 2009 )

United States v. Anderson , 66 S. Ct. 1213 ( 1946 )

Travis v. United States , 81 S. Ct. 358 ( 1961 )

United States v. Cabrales , 118 S. Ct. 1772 ( 1998 )

United States v. Abdelshafi , 592 F.3d 602 ( 2010 )

United States v. Hart-Williams , 967 F. Supp. 73 ( 1997 )

United States v. Richard Dean Miller , 111 F.3d 747 ( 1997 )

Arizona v. Fulminante , 111 S. Ct. 1246 ( 1991 )

Apprendi v. New Jersey , 120 S. Ct. 2348 ( 2000 )

United States v. Gonzalez-Lopez , 126 S. Ct. 2557 ( 2006 )

United States v. Kent August Moeckly, Joseph Diego Ramirez, ... , 769 F.2d 453 ( 1985 )

Sullivan v. Louisiana , 113 S. Ct. 2078 ( 1993 )

Neder v. United States , 119 S. Ct. 1827 ( 1999 )

United States v. Kenneth Robert Glenn, United States of ... , 828 F.2d 855 ( 1987 )

United States v. Pendleton , 658 F.3d 299 ( 2011 )

United States v. Spencer Bowens, A/K/A Scooter, A/K/A Clyde,... , 224 F.3d 302 ( 2000 )

united-states-v-marcelino-saavedra-also-known-as-king-maas-luis , 223 F.3d 85 ( 2000 )

United States v. Linette Perez, United States of America v. ... , 280 F.3d 318 ( 2002 )

United States v. Carlos Durades , 607 F.2d 818 ( 1979 )

View All Authorities »