All Courts |
Federal Courts |
US Federal District Court Cases |
District Court, District of Columbia |
2014-10 |
-
UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA MARK THOMAS ROSSINI, Petitioner, v. Magistrate Case No. 08-692 (JMF) UNITED STATES OF AMERICA, Respondent. MEMORANDUM OPINION Currently pending and ready for resolution is the petitioner’s Petition in Support of a Writ of Error Coram Nobis [#17]. For the reasons stated below, the petition will be denied. BACKGROUND On December 1, 2008, the government filed an information, claiming that on five occasions between January 19, 2007 and July 5, 2007, the petitioner “intentionally and knowingly exceeded his authorized access to a protected computer belonging to the Federal Bureau of Investigation, an agency of the United States headquartered in the District of Columbia, and by such act obtained information from the Federal Bureau of Investigation that he was not permitted to receive,” in violation of Title 18 of the United States Code, Section 1030(a)(2)(B), the Computer Fraud and Abuse Act (“CFAA”). See Information [#1]. On December 8, 2008, the petitioner entered a guilty plea as to all charges in the information. See Plea Agreement (November 24, 2008 Letter from Tejpal S. Chawla, Assistant United States Attorney, to Adam Hoffinger, petitioner’s counsel) [#3]. Pursuant to the plea agreement, the petitioner conceded that the following facts were true: Between January 3, 2007 and July 30, 2007, the defendant made over 40 searches of the ACS for FBI information that were for purely personal purposes, and not connected to FBI business. Each of these searches exceeded the defendant’s authorized use of the ACS system, and were [sic] not part of any of his assigned work. As part of these searches, the defendant obtained information to which he was not entitled. Statement of the Offense [#4] at 3. On May 14, 2009, the petitioner was sentenced to 1) twelve months of probation for each of the five counts, to run concurrently; 2) a special assessment fee of $125; 3) a fine of $5,000 to be paid at a monthly rate of $250; and 4) 250 hours of community service. Judgment in a Criminal Case [#11] at 1, 3. Since judgment was imposed, the petitioner completed payment on the Court-imposed fines, 1 his supervised release was terminated, 2 and he completed his community service. 3 DISCUSSION I. Legal Standard “The writ of coram nobis is an ancient common-law remedy designed ‘to correct errors of fact.’” U.S. v. Denedo,
556 U.S. 904, 910 (2009) (quoting U.S. v. Morgan,
346 U.S. 502, 507 (1954)). Originally, the writ was intended as a means of correcting “technical errors.”
Denedo, 556 U.S. at 911. Today it is used to correct “fundamental errors,” when no other remedy is available.
Id. Thus, “coramnobis . . . may collaterally 1 See [#17-5] at 2 2 See [#17-4] at 2. 3 See [#17] at 8. 2 attack only constitutional or jurisdictional errors or serious defects in the trial either not correctible on direct appeal or where exceptional circumstances justify the failure to appeal on those grounds.” U.S. v. McCord,
509 F.2d 334, 341 (D.C. Cir. 1974), cert. denied,
421 U.S. 930(1975). Writing in 2009, Judge Hogan indicated that “the D.C. Circuit’s precedent in this area is thin.” U.S. v. Williams,
630 F. Supp. 2d 28, 32 (D.D.C. 2009). He pointed to the leading case, United States v. Hansen,
906 F. Supp. 688(D.D.C. 1990), in which Judge Joyce Hens Green of this Court, in the absence of D.C. Circuit authority for analyzing a petition for a writ of error coram nobis, looked to the practice of the Third, Fourth, Ninth and Tenth Circuits.
Id. at 692.Under their precedents, relief by writ of coram nobis was only available when: “(1) a more usual remedy is not available; (2) valid reasons exist for not attacking the conviction earlier; (3) adverse consequences exist from the conviction sufficient to satisfy the case or controversy requirement of Article III; and (4) the error is of the most fundamental character.”
Id. at 692-93.Accord U.S. v. Akinsade,
686 F.3d 248, 252 (4th Cir. 2012); Klein v. U.S.,
880 F.2d 250, 254 (10th Cir. 1989); Hirabayashi v. U.S.,
828 F.2d 591, 604 (9th Cir. 1987). I will follow Judge Hogan’s and Judge Green’s lead and apply those factors. II. Analysis A. A More Usual Remedy is Not Available Both the petitioner and the government agree that because the petitioner waived his right to an appeal when he accepted the plea agreement, and because he has now completed the various elements of his sentence, the more usual remedies of either a direct appeal or a motion for habeas corpus relief pursuant to 28 U.S.C. § 2255, respectively, 3 are not available. See [#17] at 13; United States[’] Opposition to Defendant’s Petition for Writ of Error Coram Nobis [#22] at 5. Thus, the petitioner has satisfied the first of the coram nobis requirements. B. No Valid Reasons Exist for Not Attacking the Conviction Earlier The petitioner argues that there was a valid reason why he did not attack his conviction earlier—because there was a change in the law governing his conviction. [#17] at 13-14. Specifically, the petitioner claims that it was not until this Court issued its decision in Lewis-Burke Assocs., LLC v. Widder,
725 F. Supp. 2d 187(D.D.C. 2010) and the Ninth Circuit issued its decision in United States v. Nosal,
642 F.3d 781(9th Cir. 2011), that he became aware that he had grounds to file a petition for a writ of coram nobis. [#17] at 17-18. The government counters that the petitioner’s argument is flawed because both the Widder and Nosal decisions adopted the Ninth Circuit’s reasoning in LVRC Holdings LLC v. Brekka,
581 F.3d 1127(9th Cir. 2009), a decision issued in 2009, well before the petitioner’s current filing, which occurred five years later on June 6, 2014. [#22] at 5-7. The government also argues that the petitioner could have based his argument on the reasoning in Shamrock Foods Co. v. Gast,
535 F. Supp. 2d 962(D. Ariz. 2008), a 2008 decision in which the court ruled on the application of the CFAA to conduct similar to that at issue in this case.
Id. at 6-7.The government’s arguments are persuasive because there was authority in existence well before the petitioner filed his current petition, authority which could have supported the argument he makes now. 4 First, even if this Court’s decision in Widder had been deemed to apply retroactively, 4 which it was not, the petitioner still lacked a valid reason for not attacking his conviction earlier because the argument he now advances has in fact previously been successfully asserted, albeit not in this circuit. On February 20, 2008, the District Court for the District of Arizona issued its decision in Shamrock. In that case, a civil action, 5 the court unequivocally held that “[t]he general purpose of the CFAA ‘was to create a cause of action against computer hackers (e.g., electronic trespassers).’”
Id. To thatend, the court concluded the following with respect to sections 1030(a)(2) 6 and section (4) 7 of the CFAA: Given the plain language, legislative history, and principles of statutory construction, the restrictive view of authorization is adopted. [A] violation for accessing without authorization occurs only where initial access is not permitted. And a violation for exceeding authorized access occurs where initial access is permitted but the access of certain information is not permitted.
Id. at 967(internal citations and quotations omitted). Less than two years later, on September 15, 2009, the Ninth Circuit issued its decision in Brekka. In that case, a company sued a former employee for violating sections 1030(a)(2) and (4) of the CFAA by accessing its computer without authorization and in excess of authorizations.
Brekka, 581 F.3d at 1132. First, the court noted that “an 4 See U.S. v. Walgren,
885 F.2d 1417, 1421 (9th Cir. 1989) (holding that a decision deemed to have retroactive application generally also has such retroactive application in a coram nobis proceeding). 5 Although the CFAA is a criminal statute, it also provides for a civil cause of action between private parties. See 18 U.S.C. § 1030(g). 6 Section 1030(a)(2) states in pertinent part that a violation of the CFAA occurs when an individual “intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains . . . information contained in a financial record . . . from any department or agency of the United States; or . . . from any protected computer.” 7 Section 1030(a)(4) states in pertinent part that a violation of the CFAA occurs when an individual “knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value, unless the object of the fraud and the thing obtained consists only of the use of the computer and the value of such use is not more than $5,000 in any 1-year period.” 5 employer gives an employee ‘authorization’ to access a company computer when the employer gives the employee permission to use it.”
Id. at 1133.Thus, the court concluded that because the company gave the employee permission to access its computer, he did not act “without authorization” when he acted for purposes contrary to the company’s interest, both while employed by the company and then after he left the company.
Id. at 1135.For the same reason, the court also concluded that the employee did not “exceed authorization.”
Id. In afootnote, the court further noted that “nothing in the CFAA suggests that a defendant’s authorization to obtain information stored in a company computer is ‘exceeded’ [even] if the defendant breaches a state law duty of loyalty to an employer.”
Id. at 1135n.7. The court clearly stated therefore that an individual violates the above two sections of the CFAA by accessing data for which he lacks authorization, not for using data that he is authorized to access for purposes contrary to the company’s interest. Finally, on July 28, 2010, this Court issued its decision in Widder. In that case, the issue before this Court was whether an employee violated the CFAA by taking confidential and proprietary computer data with him when he left the company where he used to work, in violation of section 1030(a)(2). As stated by the court in Shamrock, this Court also noted that the primary purpose of the CFAA was to deter computer hacking.
Id. at 194.Then, following the Brekka line of cases, this Court noted that when an employer gives an employee permission to use its computer system, it is giving that employee authorization to access the data contained therein.
Id. at 192.Ultimately, this Court concluded that “[w]hether [an employee] had permission to copy documents onto 6 his thumb drive or to subsequently use the data from a non-[work] computer, after he had left its employ, is not a question that relates to his liability under the CFAA.”
Id. at 194.As noted above, in this case, the information against the petitioner was filed on December 1, 2008, almost ten months after the February 20, 2008 Shamrock decision was issued. Understandably, even if the petitioner had been aware of the Shamrock opinion, he may not have felt compelled to base his motion for a writ of coram nobis upon the authority of a case from the District Court for the District of Arizona. However, when the Ninth Circuit issued its September 15, 2009 opinion in Brekka, 8 the petitioner should have been compelled to file the current motion. In other words, as of the issuance of the Brekka decision, which was issued four months after the petitioner was sentenced, he should have been aware that there was circuit authority for the proposition that he was not guilty of a misdemeanor violation of the CFAA when he accessed FBI information for personal reasons. 9 Nothing whatsoever justifies his delay. C. The Petitioner Did Not Suffer Sufficient Adverse Consequences First, the petitioner notes that “[t]he Supreme Court has recognized a presumption of collateral consequences that applies to a criminal conviction.” [#17] at 14 (citing Spencer v. Kemna,
523 U.S. 1, 9 (1998)). Then, the petitioner claims that, as a former FBI counterterrorism specialist who has been convicted of violating the CFAA, he has not been able to obtain work in his field of expertise. [#17] at 15. 8 Although the petitioner claims, inter alia, that it was not until the Ninth Circuit issued its decision in Nosal, that he became aware that he had grounds to file a petition for a writ of coram nobis, according to the court in Nosal, its conclusion “that an employer’s use restrictions define whether an employee ‘exceeds authorized access’ [was] simply an application of Brekka’s reasoning,”
(Nosal, 642 F.3d at 787), and not a novel interpretation of the CFAA. 9 When new theories are advanced with respect to a law’s interpretation, even if those theories are not successful, the burden still lies with the petitioner to advance those theories in support of his case. See Durrani v. U.S.,
294 F. Supp. 2d 204, 213 (D. Conn. 2003) (“The ‘availability of prior relief is determined by whether or not petitioner could attempt to secure such relief; it is irrelevant whether or not the petitioner would actually be successful in securing it.”) (internal quotation omitted) aff’d 115 Fed. Appx. 500 (2004). 7 The government concedes that while it is true that adverse consequences flow from a criminal conviction, it argues that not every person who has been convicted of a crime is entitled to a writ of coram nobis. [#22] at 7. The government also notes the following: “His admitted behavior in conducting personal searches of the FBI database, obtaining information from that database, and sharing it with a third party would be an obvious impediment to any effort on his part to obtain future permanent employment in the counterterrorism field, quite separate and apart from the conviction to which that conduct lead.”
Id. at 9.Again, the government’s argument is persuasive. In order to satisfy the case or controversy requirement of Article III, the petitioner must show 1) that he suffered some actual or threatened injury as a result of the respondent’s conduct; 2) that the injury resulted from the petitioner’s conduct; and 3) that the injury is likely to be redressed by a favorable action. Valley Forge Christian Coll. v. Ams. United for Separation of Church and State, Inc.,
454 U.S. 464, 472 (1982). In this case, even if the petitioner’s writ of coram nobis was granted and his conviction was vacated, the injury he claims he suffered—that he can no longer obtain employment in the field of counterterrorism— would not necessarily be redressed. In other words, the petitioner, of his own accord, admitted to having accessed information on the FBI database, over forty times, and used it for personal purposes. This behavior is hardly likely to make him an attractive candidate for future work in the field of counterterrorism, where the need to maintain secrecy is of paramount importance. In other words, had the petitioner not admitted to the conduct at issue, vacating his judgment would have favorably redressed his injury. Thus, the petitioner cannot be heard to argue that the adverse consequences he suffered 8 were either solely the result of his conviction or that they are sufficient to satisfy Article III’s case or controversy requirement. D. The Error is Not of the Most Fundamental Character It is hard to understand what error of a fundamental character haunts the defendant’s conviction. The defendant, represented by obviously competent counsel, chose to plead guilty and gain the benefits of doing so when he could have demanded a trial and asserted what might have been the successful argument that his behavior did not violate the statute. Instead, he chose to limit his sentencing exposure by pleading guilty. Now that the law is more favorable to his position, he wants to undo the bargain he made and get the result he chose not to try to get in the first place. A writ of coram nobis is designed to cure a fundamental error, not a bad case of buyer’s remorse. Alternatively, the defendant might argue that because the information did not charge a crime, this Court lacked jurisdiction over the subject matter and its exercising that jurisdiction to convict him was a fundamental error. See, e.g., U.S. v. Peters,
310 F.3d 709(11th Cir. 2002). But, in this Circuit, it is clear that a claim that the indictment fails to state an offense does not deprive the court of jurisdiction over the subject matter. See U.S. v. Delgado-Garcia,
374 F.3d 1337, 1342 (D.C. Cir 2004). This is because the substantive sufficiency of the indictment is a matter that goes to the merits of the case, rather than to the district court’s subject matter jurisdiction.
Id. Accord U.S.v. George,
676 F.3d 249, 259-60 (1st Cir. 2012) (defendant pled guilty; so long as information charges a violation of a crime set out in Title 18 of the United States Code, that is the end of the inquiry as to subject matter jurisdiction). Thus, the only possible avenue of relief defendant could pursue is not available. 9 CONCLUSION The defendant has failed to meet the criteria for coram nobis relief, other than the showing that the more usual remedies were not available to him. Thus, his motion will be denied. An order accompanies this memorandum opinion. Digitally signed by John M. Facciola DN: c=US, st=DC, l=Washington, email=John_M._Facciola@dcd.uscourts.gov, o=United States District Court, cn=John M. Facciola Date: 2014.10.14 17:00:13 -04'00' JOHN M. FACCIOLA UNITED STATES MAGISTRATE JUDGE 10
Document Info
Docket Number: Criminal No. 2008-0692
Judges: Magistrate Judge John M. Facciola
Filed Date: 10/15/2014
Precedential Status: Precedential
Modified Date: 10/30/2014