People v. Janisch , 966 N.E.2d 1034 ( 2012 )


Menu:
  •                            ILLINOIS OFFICIAL REPORTS
    Appellate Court
    People v. Janisch, 
    2012 IL App (5th) 100150
    Appellate Court            THE PEOPLE OF THE STATE OF ILLINOIS, Plaintiff-Appellee, v.
    Caption                    BARBARA JANISCH, Defendant-Appellant.
    District & No.             Fifth District
    Docket No. 5-10-0150
    Filed                      March 2, 2012
    Held                       Defendant’s conviction for computer tampering under the Computer
    (Note: This syllabus       Crime Prevention Law based on her entering the victim’s e-mail account
    constitutes no part of     without his authorization was affirmed, notwithstanding her contentions
    the opinion of the court   that the computer involved was not owned by the victim, since the
    but has been prepared      possessory interest required in the context of criminal law is no longer
    by the Reporter of         limited to having a real or personal interest in property; rather, the victim
    Decisions for the          need only have an interest greater than that of defendant, and in
    convenience of the         defendant’s case, the victim held such an interest and did not authorize
    reader.)
    defendant’s access to the data.
    Decision Under             Appeal from the Circuit Court of Madison County, No. 07-CM-4865; the
    Review                     Hon. Kyle Napp, Judge, presiding.
    Judgment                   Affirmed.
    Counsel on                 Stephen B. Evans and Katherine B. Schierholz, both of Evans
    Appeal                     Partnership, of St. Louis, Missouri, for appellant.
    Thomas D. Gibbons, State’s Attorney, of Edwardsville (Patrick Delfino,
    Stephen E. Norris, and Jennifer Camden, all of State’s Attorneys
    Appellate Prosecutor’s Office, of counsel), for the People.
    Panel                      JUSTICE GOLDENHERSH delivered the judgment of the court, with
    opinion.
    Justices Chapman and Wexstten concurred in the judgment and opinion.
    OPINION
    ¶1          Defendant, Barbara Janisch, was charged in the circuit court of Madison County with
    computer tampering under the Computer Crime Prevention Law (720 ILCS 5/16D-3(a)(2)
    (West 2006)). After trial, the jury returned a verdict of guilt and the circuit court entered a
    judgment on the verdict. On appeal, defendant raises issues as to whether the actions of the
    defendant as supported by the evidence constituted computer tampering (720 ILCS 5/16D-
    3(a)(2) (West 2006)). We affirm.
    ¶2                                            FACTS
    ¶3          In June 2007, defendant and Michael Brumitt were in the midst of an ongoing dispute
    over child support. They had been divorced for over a decade.
    ¶4          In June 2007, Brumitt’s wife, Juanita, viewed one of his e-mail accounts and saw a
    message from a “Misty Reynolds” suggesting a follow-up to a romantic interlude. A similar
    message from Misty was sent to Brumitt’s MySpace account. Suspecting that defendant had
    sent the messages under the pseudonym of Misty, Juanita sent a message to the sender, who
    replied that Brumitt was involved in an extramarital affair.
    ¶5          Juanita suspected that “Misty” had access to Brumitt’s e-mail account ending with
    @hotmail.com. The e-mails from Misty referred to information Brumitt had put in other e-
    mails sent from his account, including his salary and his attendance at a recent company
    dinner in Texas. In addition to the e-mails from Misty, Juanita testified that she believed
    someone had accessed Brumitt’s e-mail account and sent a personal e-mail between Brumitt
    and Juanita to everyone on Brumitt’s contact list. Juanita contended that the e-mails caused
    personal turmoil for her and Brumitt, both in their marriage and for Brumitt at work.
    ¶6          Brumitt testified that he had logged into his Hotmail account from various locations,
    including home, work, and wireless rooms, and that Juanita and his son, the subject of the
    child support dispute, were the only other people whom he told of his password. According
    -2-
    to Brumitt, the e-mails from Misty contained direct quotes of e-mails he had sent to Juanita.
    Brumitt admitted that defendant never physically touched his home computer.
    ¶7         Defendant’s mother, Euple Sullivan, had Internet service from Charter and a “Yahoo!”
    e-mail account in 2007. Sullivan testified that she never e-mailed Brumitt but that anyone
    who lived at her house was allowed to use her computer. Defendant was staying at Sullivan’s
    house in June 2007.
    ¶8         Detective David Vucich of the Madison County sheriff’s department subpoenaed Internet
    Protocol (IP) logs and subscriber information for Brumitt’s e-mail address ending with
    @hotmail.com through Microsoft Network (MSN). After reviewing these documents,
    Detective Vucich subpoenaed records from Charter Communications for an IP address that
    recurred throughout the logs of entry into Brumitt’s account. The IP address was registered
    to Euple Sullivan.
    ¶9         Detective Vucich then subpoenaed Yahoo! for records on the e-mail accounts that had
    sent the e-mails. The IP address for these accounts was the same one that was registered to
    Sullivan and had been used for entry into Brumitt’s account. Detective Vucich concluded that
    the person sending the e-mails was also doing so from Sullivan’s home.
    ¶ 10       Defendant was charged with computer tampering. 720 ILCS 5/16D-3(a)(2) (West 2006).
    The charge alleged that “defendant, knowingly and without authorization of Michael
    Brumitt, accessed computer data from his MSN hotmail email account and thereby obtained
    data from the MSN hotmail account.”
    ¶ 11       At trial, the jury was instructed:
    “To sustain the charge of computer tampering, the State must prove the following
    propositions:
    First Proposition: That the defendant knowingly accessed data; and
    Second Proposition: That the defendant obtained data; and
    Third Proposition: That the defendant acted without the authorization of the
    computer’s owner; and
    Fourth Proposition: That the defendant knew she acted without the authorization of
    the computer’s owner.”
    ¶ 12       After trial, a jury returned a verdict of guilt. The court entered a judgment on the verdict
    and ordered defendant to pay a fine and perform community service.
    ¶ 13       Defendant appeals.
    ¶ 14                                        ANALYSIS
    ¶ 15       The issues on appeal concern the interpretation of the Computer Crime Prevention Law.
    720 ILCS 5/16D-3 (West 2006). Although defendant phrases her issue on appeal in terms of
    whether the State presented evidence regarding the elements of a crime, the strength of the
    circumstantial evidence is not in question. Instead, on appeal the issue is whether by entering
    Brumitt’s e-mail account without his authorization, defendant violated the law regarding
    computer tampering.
    -3-
    ¶ 16       Defendant was charged with computer tampering. 720 ILCS 5/16D-3(a)(2) (West 2006).
    At the time of the relevant conduct, section 16D-3(a)(2) read:
    “(a) A person commits the offense of computer tampering when he knowingly and
    without the authorization of a computer’s owner, as defined in Section 15-2 of this Code,
    or in excess of the authority granted to him:
    ***
    (2) Accesses or causes to be accessed a computer or any part thereof, or a
    program or data, and obtains data or services[.]” 720 ILCS 5/16D-3(a)(2) (West
    2006).
    ¶ 17       Undoubtedly, the defendant obtained data. The Computer Crime Prevention Law defines
    “data”:
    “(c) ‘Data’ means a representation of information, knowledge, facts, concepts or
    instructions, including program documentation, which is prepared in a formalized
    manner and is stored or processed in or transmitted by a computer. Data shall be
    considered property and may be in any form including but not limited to printouts,
    magnetic or optical storage media, punch cards or data stored internally in the memory
    of the computer.” 720 ILCS 5/16D-2(c) (West 2006).
    ¶ 18       Defendant turns to other terms. First, defendant contends that she did not access
    Brumitt’s “computer.” Defendant argues that a computer is a physical object. The Computer
    Crime Prevention Law offers this definition:
    “(a) ‘Computer’ means a device that accepts, processes, stores, retrieves or outputs
    data, and includes but is not limited to auxiliary storage and telecommunications devices
    connected to computers.” 720 ILCS 5/16D-2(a) (West 2006).
    A device, argues defendant, must be a physical object and defendant never accessed the
    physical object that is Brumitt’s personal computer.
    ¶ 19       Under the plain language of the statute, what is “accessed” need not be the computer
    itself. Paragraph (2) does not limit violations to instances where a defendant accesses or
    causes to be accessed “a computer or any part thereof.” 720 ILCS 5/16D-3(a)(2) (West
    2006); see Deng v. Sears, Roebuck & Co., 
    552 F.3d 574
    , 575 (7th Cir. 2009) (disgruntled
    employee accessed “computer”). The requirements of paragraph (2) may also be met if a
    defendant “[a]ccesses or causes to be accessed *** data, and obtains data.” 720 ILCS 5/16D-
    3(a)(2) (West 2006).
    ¶ 20       In the case at hand, the “data” is discernable. It is the information in Brumitt’s personal
    e-mails that defendant accessed by entering into his account by using his password without
    permission. After defendant was charged, the General Assembly amended the statute to
    include the accessing of “a computer network.” 720 ILCS 5/16D-3 (West 2008); Pub. Act
    95-326, § 5 (eff. Jan. 1, 2008).
    ¶ 21       Defendant argues that a simple access of data is insufficient as the language in paragraph
    (a) requires the access to be “without the authorization of a computer’s owner.” 720 ILCS
    5/16D-3(a) (West 2006). Defendant argues that the “computer” on which Brumitt’s e-mail
    account was located was owned not by Brumitt, but most likely by MSN or an affiliated
    -4-
    company. Defendant asserts that, in the least, the State would have to present evidence that
    MSN’s authorization was dependent on Brumitt’s permission, as the account holder.
    ¶ 22       Even assuming that the “computer” in question is the one that facilitates Web service on
    the behalf of the Internet provider, MSN, Brumitt qualifies as “a computer’s owner, as
    defined in Section 15-2 of this Code.” 720 ILCS 5/16D-3(a) (West 2006). Defendant
    misconstrues ownership under the statute with traditional analysis of property rights. For
    purposes of computer tampering, ownership of a computer is much broader. Section 15-2
    provides the operative definition:
    “§ 15-2. Owner. As used in this Part C, ‘owner’ means a person, other than the
    offender, who has possession of or any other interest in the property involved, even
    though such interest or possession is unlawful, and without whose consent the offender
    has no authority to exert control over the property.” 720 ILCS 5/15-2 (West 2006).
    Even in regard to any physical device that facilitated the Web-based service provided by
    MSN, Brumitt was an owner for purposes of section 15-2. Actual possession is not necessary
    as “any other interest in the property involved” is sufficient.
    ¶ 23       The State draws an apt analogy to the law of burglary. People v. Rothermel, 
    88 Ill. 2d 541
    , 546, 
    431 N.E.2d 378
    , 380 (1982). In Rothermel, the defendant was charged with
    entering without authority the residence of two individuals named Goldsberry and Isaacs.
    The defendant argued that he was entitled to a directed verdict because the evidence
    indicated that Goldsberry and Isaacs did not own the residence, but had merely been given
    a key in order to watch the residence while the residence’s owner was in the hospital.
    ¶ 24       Initially, Rothermel noted that the definition of burglary had evolved. Rothermel stated:
    “An allegation of ownership was at one time indispensable in charging burglary.
    (People v. Picard (1918), 
    284 Ill. 588
    , 591; People v. Walker (1955), 
    7 Ill. 2d 158
    , 161;
    People v. Mosby (1962), 
    25 Ill. 2d 400
    .) The court, however, began to recognize that the
    requirement of ownership had become ‘an empty formality.’ (People v. Stewart (1961),
    
    23 Ill. 2d 161
    , 168.) Failure to allege ownership no longer bars a conviction as long as
    the defendant was not harmed in preparing a defense. (People v. Gregory (1974), 
    59 Ill. 2d
    111; People v. Bailey (1980), 
    80 Ill. App. 3d 242
    ; People v. Viar (1971), 
    131 Ill. App. 2d
    983; People v. Baker (1975), 
    33 Ill. App. 3d 898
    .) Our courts have previously held
    that, in lieu of proving ownership, the right to possession and occupancy in another must
    be shown as against the accused. (People v. Foster (1964), 
    30 Ill. 2d 106
    ; People v.
    Lymore (1962), 
    25 Ill. 2d 305
    , 307; In re G.L. (1979), 
    73 Ill. App. 3d 467
    , 470; People
    v. Apple (1968), 
    91 Ill. App. 2d 269
    ; People v. Collins (1970), 
    123 Ill. App. 2d 138
    .) The
    requirement of ownership was further modified so that occupancy or possession of the
    premises had to be alleged in someone other than the accused. (People v. Whittaker
    (1970), 
    45 Ill. 2d 491
    ; People v. Griffin (1973), 
    16 Ill. App. 3d 355
    .) In In re W.S. (1980),
    
    81 Ill. 2d 252
    , this court found the requirement of proving the corporate existence of the
    owner to be unnecessary. Upholding a theft offense, the court said that ‘*** it need only
    be shown that someone other than the accused possessed or held an interest in the
    property ***.’ 
    81 Ill. 2d 252
    , 257.” 
    Rothermel, 88 Ill. 2d at 545-46
    , 431 N.E.2d at 380.
    ¶ 25       Nonetheless, Rothermel proceeded to note the merits of requiring allegations of an
    -5-
    ownership interest by an alleged victim. An allegation of ownership allows an accused to
    prepare for trial, protects against double jeopardy, and ensures that someone other than the
    defendant has a superior interest in the premises. 
    Rothermel, 88 Ill. 2d at 546
    , 431 N.E.2d
    at 380-81.
    ¶ 26       Rothermel concluded that a liberally construed concept of ownership provided these
    protections. 
    Rothermel, 88 Ill. 2d at 546
    -47, 431 N.E.2d at 381 (citing People v. Tate, 
    87 Ill. 2d
    134, 150, 
    429 N.E.2d 470
    , 479 (1981)). The allegation in the complaint that one of the
    complainants had possession of a key was “sufficient to demonstrate that her interest was
    greater than that of the defendant.” 
    Rothermel, 88 Ill. 2d at 547
    , 431 N.E.2d at 381. Like
    defendant in the case at hand, Rothermel was not prejudiced in preparing a defense and
    should not be heard to claim surprise at the charge.
    ¶ 27       Ownership under the computer-tampering statute is equivalent to the requirements for
    pleading set forth in Rothermel. Brumitt stood in the same relation to defendant as the key
    holder did to the defendant in Rothermel. The metaphor of a key holder fits directly with that
    of an e-mail account holder. In language fitting the case at hand, Rothermel explained:
    “The defendant is not aided by a rigid insistence on artificial allegations. (People v.
    Whittaker (1970), 
    45 Ill. 2d 491
    ; People v. Peck (1963), 
    29 Ill. 2d 480
    .) A possessory
    interest for the purposes of describing a criminal violation is not the same as a possessory
    interest as defined by traditional property law standards. (4 G. Thompson, Real Property
    sec. 1770 et seq. (repl. ed. 1979); R. Brown, Personal Property sec. 1.5 (3d ed. 1975).)
    We have moved away from defining a possessory interest in the criminal law context as
    having a real or personal interest in property to a definition that requires only that the
    interest be greater than that of the defendant.” 
    Rothermel, 88 Ill. 2d at 547
    , 431 N.E.2d
    at 381.
    Brumitt held such an interest in relation to defendant and did not authorize defendant’s
    access to the data.
    ¶ 28       The plain language of the statute clearly informed of the elements of the offense and the
    authorization that would defeat a charge of computer tampering. Defendant would not have
    been guilty of computer tampering if she had had Brumitt’s authorization to access the data.
    ¶ 29       Accordingly, the judgment of the circuit court is hereby affirmed.
    ¶ 30      Affirmed.
    -6-
    

Document Info

Docket Number: 5-10-0150

Citation Numbers: 2012 IL App (5th) 100150, 966 N.E.2d 1034

Filed Date: 3/2/2012

Precedential Status: Precedential

Modified Date: 4/17/2021