-
ILLINOIS OFFICIAL REPORTS Appellate Court People v. Janisch,
2012 IL App (5th) 100150Appellate Court THE PEOPLE OF THE STATE OF ILLINOIS, Plaintiff-Appellee, v. Caption BARBARA JANISCH, Defendant-Appellant. District & No. Fifth District Docket No. 5-10-0150 Filed March 2, 2012 Held Defendant’s conviction for computer tampering under the Computer (Note: This syllabus Crime Prevention Law based on her entering the victim’s e-mail account constitutes no part of without his authorization was affirmed, notwithstanding her contentions the opinion of the court that the computer involved was not owned by the victim, since the but has been prepared possessory interest required in the context of criminal law is no longer by the Reporter of limited to having a real or personal interest in property; rather, the victim Decisions for the need only have an interest greater than that of defendant, and in convenience of the defendant’s case, the victim held such an interest and did not authorize reader.) defendant’s access to the data. Decision Under Appeal from the Circuit Court of Madison County, No. 07-CM-4865; the Review Hon. Kyle Napp, Judge, presiding. Judgment Affirmed. Counsel on Stephen B. Evans and Katherine B. Schierholz, both of Evans Appeal Partnership, of St. Louis, Missouri, for appellant. Thomas D. Gibbons, State’s Attorney, of Edwardsville (Patrick Delfino, Stephen E. Norris, and Jennifer Camden, all of State’s Attorneys Appellate Prosecutor’s Office, of counsel), for the People. Panel JUSTICE GOLDENHERSH delivered the judgment of the court, with opinion. Justices Chapman and Wexstten concurred in the judgment and opinion. OPINION ¶1 Defendant, Barbara Janisch, was charged in the circuit court of Madison County with computer tampering under the Computer Crime Prevention Law (720 ILCS 5/16D-3(a)(2) (West 2006)). After trial, the jury returned a verdict of guilt and the circuit court entered a judgment on the verdict. On appeal, defendant raises issues as to whether the actions of the defendant as supported by the evidence constituted computer tampering (720 ILCS 5/16D- 3(a)(2) (West 2006)). We affirm. ¶2 FACTS ¶3 In June 2007, defendant and Michael Brumitt were in the midst of an ongoing dispute over child support. They had been divorced for over a decade. ¶4 In June 2007, Brumitt’s wife, Juanita, viewed one of his e-mail accounts and saw a message from a “Misty Reynolds” suggesting a follow-up to a romantic interlude. A similar message from Misty was sent to Brumitt’s MySpace account. Suspecting that defendant had sent the messages under the pseudonym of Misty, Juanita sent a message to the sender, who replied that Brumitt was involved in an extramarital affair. ¶5 Juanita suspected that “Misty” had access to Brumitt’s e-mail account ending with @hotmail.com. The e-mails from Misty referred to information Brumitt had put in other e- mails sent from his account, including his salary and his attendance at a recent company dinner in Texas. In addition to the e-mails from Misty, Juanita testified that she believed someone had accessed Brumitt’s e-mail account and sent a personal e-mail between Brumitt and Juanita to everyone on Brumitt’s contact list. Juanita contended that the e-mails caused personal turmoil for her and Brumitt, both in their marriage and for Brumitt at work. ¶6 Brumitt testified that he had logged into his Hotmail account from various locations, including home, work, and wireless rooms, and that Juanita and his son, the subject of the child support dispute, were the only other people whom he told of his password. According -2- to Brumitt, the e-mails from Misty contained direct quotes of e-mails he had sent to Juanita. Brumitt admitted that defendant never physically touched his home computer. ¶7 Defendant’s mother, Euple Sullivan, had Internet service from Charter and a “Yahoo!” e-mail account in 2007. Sullivan testified that she never e-mailed Brumitt but that anyone who lived at her house was allowed to use her computer. Defendant was staying at Sullivan’s house in June 2007. ¶8 Detective David Vucich of the Madison County sheriff’s department subpoenaed Internet Protocol (IP) logs and subscriber information for Brumitt’s e-mail address ending with @hotmail.com through Microsoft Network (MSN). After reviewing these documents, Detective Vucich subpoenaed records from Charter Communications for an IP address that recurred throughout the logs of entry into Brumitt’s account. The IP address was registered to Euple Sullivan. ¶9 Detective Vucich then subpoenaed Yahoo! for records on the e-mail accounts that had sent the e-mails. The IP address for these accounts was the same one that was registered to Sullivan and had been used for entry into Brumitt’s account. Detective Vucich concluded that the person sending the e-mails was also doing so from Sullivan’s home. ¶ 10 Defendant was charged with computer tampering. 720 ILCS 5/16D-3(a)(2) (West 2006). The charge alleged that “defendant, knowingly and without authorization of Michael Brumitt, accessed computer data from his MSN hotmail email account and thereby obtained data from the MSN hotmail account.” ¶ 11 At trial, the jury was instructed: “To sustain the charge of computer tampering, the State must prove the following propositions: First Proposition: That the defendant knowingly accessed data; and Second Proposition: That the defendant obtained data; and Third Proposition: That the defendant acted without the authorization of the computer’s owner; and Fourth Proposition: That the defendant knew she acted without the authorization of the computer’s owner.” ¶ 12 After trial, a jury returned a verdict of guilt. The court entered a judgment on the verdict and ordered defendant to pay a fine and perform community service. ¶ 13 Defendant appeals. ¶ 14 ANALYSIS ¶ 15 The issues on appeal concern the interpretation of the Computer Crime Prevention Law. 720 ILCS 5/16D-3 (West 2006). Although defendant phrases her issue on appeal in terms of whether the State presented evidence regarding the elements of a crime, the strength of the circumstantial evidence is not in question. Instead, on appeal the issue is whether by entering Brumitt’s e-mail account without his authorization, defendant violated the law regarding computer tampering. -3- ¶ 16 Defendant was charged with computer tampering. 720 ILCS 5/16D-3(a)(2) (West 2006). At the time of the relevant conduct, section 16D-3(a)(2) read: “(a) A person commits the offense of computer tampering when he knowingly and without the authorization of a computer’s owner, as defined in Section 15-2 of this Code, or in excess of the authority granted to him: *** (2) Accesses or causes to be accessed a computer or any part thereof, or a program or data, and obtains data or services[.]” 720 ILCS 5/16D-3(a)(2) (West 2006). ¶ 17 Undoubtedly, the defendant obtained data. The Computer Crime Prevention Law defines “data”: “(c) ‘Data’ means a representation of information, knowledge, facts, concepts or instructions, including program documentation, which is prepared in a formalized manner and is stored or processed in or transmitted by a computer. Data shall be considered property and may be in any form including but not limited to printouts, magnetic or optical storage media, punch cards or data stored internally in the memory of the computer.” 720 ILCS 5/16D-2(c) (West 2006). ¶ 18 Defendant turns to other terms. First, defendant contends that she did not access Brumitt’s “computer.” Defendant argues that a computer is a physical object. The Computer Crime Prevention Law offers this definition: “(a) ‘Computer’ means a device that accepts, processes, stores, retrieves or outputs data, and includes but is not limited to auxiliary storage and telecommunications devices connected to computers.” 720 ILCS 5/16D-2(a) (West 2006). A device, argues defendant, must be a physical object and defendant never accessed the physical object that is Brumitt’s personal computer. ¶ 19 Under the plain language of the statute, what is “accessed” need not be the computer itself. Paragraph (2) does not limit violations to instances where a defendant accesses or causes to be accessed “a computer or any part thereof.” 720 ILCS 5/16D-3(a)(2) (West 2006); see Deng v. Sears, Roebuck & Co.,
552 F.3d 574, 575 (7th Cir. 2009) (disgruntled employee accessed “computer”). The requirements of paragraph (2) may also be met if a defendant “[a]ccesses or causes to be accessed *** data, and obtains data.” 720 ILCS 5/16D- 3(a)(2) (West 2006). ¶ 20 In the case at hand, the “data” is discernable. It is the information in Brumitt’s personal e-mails that defendant accessed by entering into his account by using his password without permission. After defendant was charged, the General Assembly amended the statute to include the accessing of “a computer network.” 720 ILCS 5/16D-3 (West 2008); Pub. Act 95-326, § 5 (eff. Jan. 1, 2008). ¶ 21 Defendant argues that a simple access of data is insufficient as the language in paragraph (a) requires the access to be “without the authorization of a computer’s owner.” 720 ILCS 5/16D-3(a) (West 2006). Defendant argues that the “computer” on which Brumitt’s e-mail account was located was owned not by Brumitt, but most likely by MSN or an affiliated -4- company. Defendant asserts that, in the least, the State would have to present evidence that MSN’s authorization was dependent on Brumitt’s permission, as the account holder. ¶ 22 Even assuming that the “computer” in question is the one that facilitates Web service on the behalf of the Internet provider, MSN, Brumitt qualifies as “a computer’s owner, as defined in Section 15-2 of this Code.” 720 ILCS 5/16D-3(a) (West 2006). Defendant misconstrues ownership under the statute with traditional analysis of property rights. For purposes of computer tampering, ownership of a computer is much broader. Section 15-2 provides the operative definition: “§ 15-2. Owner. As used in this Part C, ‘owner’ means a person, other than the offender, who has possession of or any other interest in the property involved, even though such interest or possession is unlawful, and without whose consent the offender has no authority to exert control over the property.” 720 ILCS 5/15-2 (West 2006). Even in regard to any physical device that facilitated the Web-based service provided by MSN, Brumitt was an owner for purposes of section 15-2. Actual possession is not necessary as “any other interest in the property involved” is sufficient. ¶ 23 The State draws an apt analogy to the law of burglary. People v. Rothermel,
88 Ill. 2d 541, 546,
431 N.E.2d 378, 380 (1982). In Rothermel, the defendant was charged with entering without authority the residence of two individuals named Goldsberry and Isaacs. The defendant argued that he was entitled to a directed verdict because the evidence indicated that Goldsberry and Isaacs did not own the residence, but had merely been given a key in order to watch the residence while the residence’s owner was in the hospital. ¶ 24 Initially, Rothermel noted that the definition of burglary had evolved. Rothermel stated: “An allegation of ownership was at one time indispensable in charging burglary. (People v. Picard (1918),
284 Ill. 588, 591; People v. Walker (1955),
7 Ill. 2d 158, 161; People v. Mosby (1962),
25 Ill. 2d 400.) The court, however, began to recognize that the requirement of ownership had become ‘an empty formality.’ (People v. Stewart (1961),
23 Ill. 2d 161, 168.) Failure to allege ownership no longer bars a conviction as long as the defendant was not harmed in preparing a defense. (People v. Gregory (1974),
59 Ill. 2d111; People v. Bailey (1980),
80 Ill. App. 3d 242; People v. Viar (1971),
131 Ill. App. 2d983; People v. Baker (1975),
33 Ill. App. 3d 898.) Our courts have previously held that, in lieu of proving ownership, the right to possession and occupancy in another must be shown as against the accused. (People v. Foster (1964),
30 Ill. 2d 106; People v. Lymore (1962),
25 Ill. 2d 305, 307; In re G.L. (1979),
73 Ill. App. 3d 467, 470; People v. Apple (1968),
91 Ill. App. 2d 269; People v. Collins (1970),
123 Ill. App. 2d 138.) The requirement of ownership was further modified so that occupancy or possession of the premises had to be alleged in someone other than the accused. (People v. Whittaker (1970),
45 Ill. 2d 491; People v. Griffin (1973),
16 Ill. App. 3d 355.) In In re W.S. (1980),
81 Ill. 2d 252, this court found the requirement of proving the corporate existence of the owner to be unnecessary. Upholding a theft offense, the court said that ‘*** it need only be shown that someone other than the accused possessed or held an interest in the property ***.’
81 Ill. 2d 252, 257.”
Rothermel, 88 Ill. 2d at 545-46, 431 N.E.2d at 380. ¶ 25 Nonetheless, Rothermel proceeded to note the merits of requiring allegations of an -5- ownership interest by an alleged victim. An allegation of ownership allows an accused to prepare for trial, protects against double jeopardy, and ensures that someone other than the defendant has a superior interest in the premises.
Rothermel, 88 Ill. 2d at 546, 431 N.E.2d at 380-81. ¶ 26 Rothermel concluded that a liberally construed concept of ownership provided these protections.
Rothermel, 88 Ill. 2d at 546-47, 431 N.E.2d at 381 (citing People v. Tate,
87 Ill. 2d134, 150,
429 N.E.2d 470, 479 (1981)). The allegation in the complaint that one of the complainants had possession of a key was “sufficient to demonstrate that her interest was greater than that of the defendant.”
Rothermel, 88 Ill. 2d at 547, 431 N.E.2d at 381. Like defendant in the case at hand, Rothermel was not prejudiced in preparing a defense and should not be heard to claim surprise at the charge. ¶ 27 Ownership under the computer-tampering statute is equivalent to the requirements for pleading set forth in Rothermel. Brumitt stood in the same relation to defendant as the key holder did to the defendant in Rothermel. The metaphor of a key holder fits directly with that of an e-mail account holder. In language fitting the case at hand, Rothermel explained: “The defendant is not aided by a rigid insistence on artificial allegations. (People v. Whittaker (1970),
45 Ill. 2d 491; People v. Peck (1963),
29 Ill. 2d 480.) A possessory interest for the purposes of describing a criminal violation is not the same as a possessory interest as defined by traditional property law standards. (4 G. Thompson, Real Property sec. 1770 et seq. (repl. ed. 1979); R. Brown, Personal Property sec. 1.5 (3d ed. 1975).) We have moved away from defining a possessory interest in the criminal law context as having a real or personal interest in property to a definition that requires only that the interest be greater than that of the defendant.”
Rothermel, 88 Ill. 2d at 547, 431 N.E.2d at 381. Brumitt held such an interest in relation to defendant and did not authorize defendant’s access to the data. ¶ 28 The plain language of the statute clearly informed of the elements of the offense and the authorization that would defeat a charge of computer tampering. Defendant would not have been guilty of computer tampering if she had had Brumitt’s authorization to access the data. ¶ 29 Accordingly, the judgment of the circuit court is hereby affirmed. ¶ 30 Affirmed. -6-
Document Info
Docket Number: 5-10-0150
Citation Numbers: 2012 IL App (5th) 100150, 966 N.E.2d 1034
Filed Date: 3/2/2012
Precedential Status: Precedential
Modified Date: 4/17/2021