DocketNumber: 19-197
Filed Date: 7/19/2021
Status: Precedential
Modified Date: 7/19/2021
19-197 (L) United States v. Korchevsky In the United States Court of Appeals For the Second Circuit ________ AUGUST TERM, 2019 ARGUED: FEBRUARY 11, 2020 DECIDED: JULY 19, 2021 Nos. 19-197-cr, 19-780-cr UNITED STATES OF AMERICA, Appellee, v. VLADISLAV KHALUPSKY, VITALY KORCHEVSKY, Defendants-Appellants.* ________ Appeal from the United States District Court for the Eastern District of New York. ________ Before: WALKER, PARKER, and CARNEY, Circuit Judges. ________ *The Clerk of Court is respectfully directed to amend the caption as set forth above. 2 19-197 (L) For years, defendants-appellants Vladislav Khalupsky and Vitaly Korchevsky used information from stolen, pre-publication press releases to execute advantageous securities trades. Their trading was facilitated by intermediaries who paid hackers for the stolen press releases, provided the releases to Khalupsky and Korchevsky, and funded brokerage accounts for them to use in trades. Ultimately, the defendants’ illicit trades netted profits in excess of $18 million. Following a jury trial in the United States District Court for the Eastern District of New York (Raymond J. Dearie, J.), Khalupsky and Korchevsky were convicted of conspiracy to commit wire fraud, conspiracy to commit securities fraud and computer intrusions, securities fraud, and conspiracy to commit money laundering. They now appeal, contending that the evidence was insufficient to support conviction, venue was improper on the securities fraud counts, the government’s proof at trial constructively amended the indictment, the district court erred by instructing the jury on conscious avoidance, and the district court erred in how it responded to a jury note. Finding no merit in these arguments, we AFFIRM the judgments of conviction. ________ JULIA NESTOR (Susan Corkery, Richard M. Tucker, David Gopstein, on the brief), Assistant United States Attorneys, for Jacquelyn M. Kasulis, Acting United States Attorney for the Eastern District of New York, for Appellee. 3 19-197 (L) DARRELL FIELDS, Federal Defenders of New York, New York, NY, for Defendant-Appellant Vladislav Khalupsky. RANDY D. SINGER (Rosalyn Singer, Kevin Hoffman, on the brief), Singer Davis, LLC, Virginia Beach, VA; Steven Gary Brill (on the brief), Sullivan & Brill, LLP, New York, NY; for Defendant- Appellant Vitaly Korchevsky. ________ JOHN M. WALKER, JR., Circuit Judge: For years, defendants-appellants Vladislav Khalupsky and Vitaly Korchevsky used information from stolen, pre-publication press releases to execute advantageous securities trades. Their trading was facilitated by intermediaries who paid hackers for the stolen press releases, provided the releases to Khalupsky and Korchevsky, and funded brokerage accounts for them to use in trades. Ultimately, the defendants’ illicit trades netted profits in excess of $18 million. Following a jury trial in the United States District Court for the Eastern District of New York (Raymond J. Dearie, J.), Khalupsky and Korchevsky were convicted of conspiracy to commit wire fraud, conspiracy to commit securities fraud and computer intrusions, securities fraud, and conspiracy to commit money laundering. They now appeal, contending that the evidence was insufficient to support conviction, venue was improper on the securities fraud counts, the government’s proof at trial constructively amended the indictment, 4 19-197 (L) the district court erred by instructing the jury on conscious avoidance, and the district court erred in how it responded to a jury note. Finding no merit in these arguments, we AFFIRM the judgments of conviction. 1 BACKGROUND In 2010, brothers Arkadiy and Pavel Dubovoy approached Korchevsky, a hedge fund manager and investment advisor, to seek his help implementing a scheme to use nonpublic information to trade on the stock market. The nonpublic information was coming from hackers in Ukraine, who hacked into three newswires (PR Newswire, Marketwired, and Business Wire) that disseminate press releases from publicly traded companies. The hackers obtained the press releases containing crucial financial information before the releases were published. Then, they saved the stolen releases onto a web-based server to which the Dubovoys also had access. The Dubovoys provided Korchevsky with login credentials to review some of the stolen releases in order to convince him of the nascent scheme’s potential. Korchevsky looked at the releases and agreed that advance information of the sort could be traded upon profitably. Accordingly, Arkadiy Dubovoy opened and funded brokerage accounts, in which Korchevsky would trade. Arkadiy’s son, Igor Dubovoy, equipped Korchevsky with computers, phones, 1 The resolution of this appeal was held pending resolution of the appeal to this court in United States v. Chow, No. 19-325, which in part concerned a related legal issue. See infra Part II. Chow was decided on April 6, 2021. United States v. Chow,993 F.3d 125
(2d Cir. 2021). 5 19-197 (L) and a software program enabling easy access to the server hosting the stolen releases. From January 2011 until February 2015, Korchevsky executed advantageous trades using the information in the stolen press releases. In return for trading on Arkadiy’s behalf, he received a percentage of the profits. Korchevsky did most of the trading in the window of time after the press release was uploaded to a newswire’s internal computer system but before it was publicly disseminated (i.e., trading “in-window”). He then closed on his trading position after the release became public and the market had reacted to its contents. During the scheme, Korchevsky ultimately amassed roughly $15 million in net profits—a 1,660% return on investment— in Arkadiy’s brokerage accounts. The Dubovoys eventually decided to bring in another trader, Khalupsky. Khalupsky owned a trading company in Ukraine and used its employees to conduct trading as part of the charged scheme. As with Korchevsky, the Dubovoys shared the stolen releases with Khalupsky, funded brokerage accounts in Arkadiy’s name, and paid Khalupsky a piece of the profits. These trades, too, were generally initiated in-window. The Khalupsky trades yielded roughly $3.1 million in net profits during the scheme. The scheme faltered for a time after the relationship with the hackers soured. Arkadiy had opened additional brokerage accounts unknown to the hackers in order to exclude them from some of the profits. The hackers grew suspicious and, in early 2014, stopped sending stolen press releases to the Dubovoys. Without access to the 6 19-197 (L) nonpublic information, Korchevsky’s trading volume and profits plummeted. By late 2014, the Dubovoys found another Ukrainian hacker who could steal pre-publication press releases. This new hacker charged more for the service, however, so the Dubovoys questioned whether the arrangement would still be worthwhile. Korchevsky insisted that the Dubovoys secure this new source of press releases. They did, and the scheme continued, albeit in modified form. Rather than trading directly out of Arkadiy’s brokerage accounts, Korchevsky now received the stolen press releases from Igor, reviewed them, and sent him a coded text message telling him how much of which stocks he should purchase. The scheme continued into 2015. On August 15, 2015, a grand jury returned the first indictment in this case, charging Khalupsky and Korchevsky with conspiracy to commit wire fraud, in violation of 18 U.S.C. § 1349 (Count One); conspiracy to commit securities fraud, in violation of 18 U.S.C. § 371 (Count Two); securities fraud, in violation of 15 U.S.C. §§ 78j(b) and 78ff (Counts Three and Four); and money laundering conspiracy, in violation of 18 U.S.C. § 1956(h) (Count Five). On September 13, 2016, a second grand jury returned a superseding indictment, replicating the first one but adding computer intrusions as an object of the conspiracy to commit securities fraud charge in Count Two. Following a three-week jury trial that concluded in July 2018, Khalupsky and Korchevsky were convicted on all counts. The district court sentenced Khalupsky to four years’ imprisonment to be followed by two years’ supervised release, and ordered him to forfeit 7 19-197 (L) $397,281.12 and pay $339,062.99 in restitution. It sentenced Korchevsky to five years’ imprisonment to be followed by three years’ supervised release, and ordered him to forfeit $14,452,245 and pay $339,062.99 in restitution. This appeal followed. DISCUSSION Korchevsky’s principal argument on appeal is that the evidence was insufficient to establish his participation in the single charged conspiracy with Khalupsky. Korchevsky also argues that: the evidence was insufficient to support the securities fraud convictions; venue was improper in the Eastern District of New York (EDNY) for the securities fraud counts (an argument Khalupsky joins); the proof at trial constituted either a constructive amendment of the superseding indictment or prejudicial variance from it; and the district court erred by giving a particular exhibit to the jury in response to a note during deliberations. Khalupsky additionally asserts that the district court erred in charging the jury on conscious avoidance (an argument Korchevsky joins in his reply brief). Each of the defendants also adopted the arguments of the other pursuant to Federal Rule of Appellate Procedure 28(i). None of the arguments of either defendant, however, is persuasive. I. Sufficiency of the Evidence Korchevsky challenges the sufficiency of evidence in support of both his conspiracy convictions and his substantive securities fraud convictions. In challenging the sufficiency of the evidence, Korchevsky “face[s] a heavy burden, as the standard of review is 8 19-197 (L) exceedingly deferential to the jury’s apparent determinations.” 2 “[W]e view the evidence in the light most favorable to the government, crediting every inference that could have been drawn in the government’s favor.” 3 When the sufficiency challenge is to a conspiracy conviction, “deference to the jury’s findings is especially important because a conspiracy by its very nature is a secretive operation, and it is a rare case where all aspects of a conspiracy can be laid bare in court.” 4 We will uphold the challenged convictions if “any rational trier of fact could have found the essential elements of the crime beyond a reasonable doubt.” 5 Here, we find no basis to disturb the convictions. A. Conspiracy To challenge his conspiracy convictions, Korchevsky makes the following argument: co-conspirators must know one another, but the evidence established that he did not know Khalupsky, so the evidence cannot support his participation in one conspiracy with Khalupsky. 6 This argument fails because its premise is incorrect. Korchevsky and Khalupsky need not have known one another to be co-conspirators. United States v. Flores,945 F.3d 687
, 710 (2d Cir. 2019) (internal quotation 2 marks omitted). 3Id.
(internal quotation marks omitted). 4Id.
(internal quotation marks and alteration omitted). 5Id. 6
Korchevsky also argues that, because he could not have been Khalupsky’s co-conspirator, he suffered spillover prejudice by being tried jointly with Khalupsky. Because we find that the defendants were co-conspirators, we have no occasion to address this argument. 9 19-197 (L) The evidence was sufficient to support the defendants’ knowing participation in a single conspiracy. “Whether the government has proved a single or multiple . . . conspiracies is a question of fact for a properly instructed jury.” 7 To prove conspiracy, “the government must show that two or more persons entered into a joint enterprise for an unlawful purpose, with awareness of its general nature and extent.” 8 It must “show that each alleged member agreed to participate in what he knew to be a collective venture directed toward a common goal.” 9 But “[t]he government need not show that the defendant knew all of the details of the conspiracy,” “[n]or must the government prove that the defendant knew the identities of all of the other conspirators.” 10 That is “especially [true] where the activity of a single person was central to the involvement of all” conspirators. 11 “Indeed, a defendant may be a co-conspirator if he knows only one other member of the conspiracy . . . .” 12 7 United States v. Sureff,15 F.3d 225
, 229 (2d Cir. 1994) (internal quotation marks omitted). The jury in this case was instructed only on the possibility of a single conspiracy, not on multiple conspiracies. Korchevsky does not challenge that decision on appeal. 8 United States v. Torres,604 F.3d 58
, 65 (2d Cir. 2010) (collecting cases). 9United States v. Maldonado-Rivera,922 F.2d 934
, 963 (2d Cir. 1990) (internal quotation marks omitted). 10 United States v. Huezo,546 F.3d 174
, 180 (2d Cir. 2008); see also Sureff,15 F.3d at 230
(“A single conspiracy may encompass members who neither know one another’s identities nor specifically know of one another’s involvement.” (citations omitted)). 11 Maldonado-Rivera,922 F.2d at 963
(internal quotation marks omitted). 12 Huezo,546 F.3d at 180
. 10 19-197 (L) Korchevsky contends that he was a member of one conspiracy with the Dubovoys, while Khalupsky was a member of an entirely separate conspiracy with the Dubovoys. To suggest that his view of the evidence is the only reasonable one, Korchevsky relies on the following brief passage of Arkadiy’s direct testimony: Q: You were intentionally trying to keep [Khalupsky and Korchevsky] away from each other? A: Yes. . . . We wanted to see who was better at trading. 13 But this exchange does not compel the conclusion Korchevsky seeks. To the contrary, the testimony indicates that Arkadiy kept Khalupsky and Korchevsky apart precisely because doing so furthered the common goal of the conspiracy: to maximize profits by successfully trading on information from the stolen press releases. That Khalupsky’s and Korchevsky’s individual goals were limited in scope to their own trading activity is irrelevant. Co-conspirators’ goals “need not be congruent for a single conspiracy to exist, so long as their goals are not at cross-purposes.” 14 Upon review of the full record, we have no doubt that the evidence was sufficient to support the conspiracy convictions. It is clear that Korchevsky not only “agreed to participate in what he knew to be a collective venture directed toward a common goal,” 15 but also “had reason to know that in dealing with” the Dubovoys he “w[as] 13 App. at 351–52. 14 Maldonado-Rivera,922 F.2d at 963
. 15Id.
(internal quotation marks omitted). 11 19-197 (L) involved with a larger organization.” 16 For example, the first time Arkadiy and Korchevsky met, Arkadiy told him that he would be trading on information originally coming from an unnamed group of Ukrainian hackers, with everybody doing their part in return for a percentage of the profits. Separately, Igor and Korchevsky discussed what portion of earnings was paid to the hackers and the fact that there was an additional intermediary between the hackers and the Dubovoys also taking a cut. Faced with this evidence, Korchevsky argues that the record at most shows his awareness of other upstream co-conspirators, but fails to support his awareness of a co-conspirator similarly situated to Khalupsky. His argument is unavailing because our precedent does not require that level of specific awareness. In United States v. Sureff, we affirmed the defendant’s conviction for a single drug dealing conspiracy even though there was no evidence that her two retailer partners—participants in the charged single conspiracy—were aware of one another’s existence. 17 The retailers nevertheless had the required awareness that “they were involved with a larger organization” because each knew that the defendant was working with “the bank” upstream from the retail operations. 18 There is no relevant distinction between the awareness the retailers in Sureff each had of the defendant and her upstream co-conspirators and the awareness Khalupsky and Korchevsky each had about the Dubovoys and the hackers. 16 Sureff,15 F.3d at 230
. 1715 F.3d at 229
–30. 18Id. at 230
. 12 19-197 (L) Korchevsky instead attempts to analogize this case to United States v. McDermott, 19 but McDermott is inapposite. In that case, the defendant (McDermott) gave non-public stock information to a woman (Gannon) with whom he was having an affair. 20 Unbeknownst to McDermott, Gannon was simultaneously having an affair with another man (Pomponio) and conveying McDermott’s stock recommendations to him. 21 Pomponio traded on McDermott’s information, sharing the profits with Gannon. 22 McDermott was ultimately tried with Pomponio and convicted as his co-conspirator on the theory that, at least from the perspective of two members of the love triangle, the three of them were working toward “a unitary purpose to commit insider trading.” 23 On appeal, we vacated the conviction because there was “no record evidence suggesting that McDermott’s agreement with Gannon encompassed a broader scope than the two of them.” 24 Unlike Korchevsky or the retailers in Sureff, McDermott was not aware he was “involved with a larger organization.” 25 He had not agreed that Gannon could “pass [his] 19245 F.3d 133
(2d Cir. 2001). 20Id. at 136
. 21Id. 22
Id. 23
Id. at 137
. 24Id. at 138
. To the extent language in McDermott suggests that McDermott would have needed to be aware that “there existed others similarly situated” to him in the scheme, it is dicta; we vacated his conviction because he was unaware there was anybody other than Gannon involved, regardless of the other person’s relationship to Gannon.Id.
(emphasis added). 25 Sureff,15 F.3d at 230
. 13 19-197 (L) insider information to . . . another person, even if unknown.”26 Korchevsky, by contrast, knew that he depended on a large network of people to facilitate his illicit trading, and he agreed that the profits he generated would be shared with them. B. Securities Fraud Counts Three and Four charged Khalupsky and Korchevsky with fraudulent trading in securities as corporate outsiders, in violation of Section 10(b) of the Securities and Exchange Act and Rule 10b-5, promulgated thereunder. Section 10(b) prohibits the “use or employ, in connection with the purchase or sale of any security . . . [, of] any manipulative or deceptive device or contrivance in contravention of such rules and regulations as the [Securities and Exchange] Commission may prescribe.” 27 Rule 10b-5 prohibits “employ[ing] any device, scheme, or artifice to defraud . . . in connection with the purchase or sale of any security.” 28 To challenge his convictions on these substantive securities fraud counts, Korchevsky first argues that the government could not prove he engaged in a “scheme or artifice to defraud” within the meaning of Rule 10b-5. Specifically, he claims the proof necessarily failed because he did not owe a fiduciary duty to investors or potential investors in the companies whose press releases were stolen, and because any deception employed to obtain the releases did not target the investors. Second, Korchevsky argues that the type of 26 McDermott,245 F.3d at 138
. 27 15 U.S.C. § 78j(b). 28 17 C.F.R. § 240.10b-5. 14 19-197 (L) computer hacking used to access Marketwired’s systems—the conduct charged in Count Four—did not constitute a “deceptive device or contrivance” within the meaning of Section 10(b). 29 We are unpersuaded. First, we dispatch Korchevsky’s contention that he did not engage in a “scheme or artifice to defraud.” Although a fiduciary duty is relevant to other securities violations—e.g., insider trading— it need not be shown to prove the securities fraud charged here: fraudulent trading in securities by an outsider. 30 Further, Korchevsky’s assertion that the deception must have targeted investors contradicts the plain language of Rule 10b-5. The deception need only be “in connection with the purchase or sale of any security,” 31 and here it was. The newswire hacking directly prompted and enabled the charged securities trading. 32 Indeed, the ensuing trades needed to occur soon after a press release was illicitly obtained from 29Korchevsky initially challenged his convictions on both Counts Three and Four on the basis that computer hacking was not “deceptive” within the meaning of Section 10(b). In reply, he abandoned his challenge to his conviction on Count Three, which charged securities fraud in connection with the “spear phishing” hack of PR Newswire’s systems. Spear phishing occurs when a hacker sends a misleading email to an account user in order to deceive that user into providing the hacker with his login credentials, often by inducing the user to click on a link that in turn prompts them to enter the credentials. As Korchevsky concedes in reply, spear phishing to obtain credentials and then using the ill- gotten credentials to log in is “deceptive” under Section 10(b). Def.-Appellant Korchevsky’s Reply at 21 (citing S.E.C. v. Dorozhko,574 F.3d 42
, 44–49 (2d Cir. 2009)). 30 See Dorozhko,574 F.3d at 46
–49. 31 17 C.F.R. § 240.10b-5 (emphasis added). 32See S.E.C. v. Zandford,535 U.S. 813
, 822 (2002) (“It is enough that the scheme to defraud and the sale of securities coincide.”). 15 19-197 (L) a newswire’s servers, but before the newswire could publish the release, in order to maximize the hacked information’s value. Second, we find that the hack of Marketwired’s systems qualified as a “deceptive device or contrivance” under Section 10(b). The hackers initially accessed Marketwired’s systems using a technique known as SQL injection. This enabled them to glean the architecture of the hacked computer system, identify vulnerabilities, and extract data. Then, having gained initial access, the hackers extracted employee login credentials and used those credentials to intrude into the system’s more secure areas. Regardless of how one might characterize the initial SQL injection technique, the subsequent use of stolen employee login credentials to gain further system access was deceptive. Every time the hackers attempted to access parts of the system by entering stolen credentials, they misrepresented themselves to be authorized users. “[M]isrepresenting one’s identity in order to gain access to information that is otherwise off limits, and then stealing that information is plainly ‘deceptive’ within the ordinary meaning of the word.” 33 Korchevsky cannot carry his heavy burden to overcome the jury’s findings and demonstrate that the evidence was insufficient to support conviction on any count. II. Venue Khalupsky and Korchevsky both argue that there was insufficient evidence to establish venue in the EDNY for the securities fraud counts. We disagree. It was foreseeable to the defendants that 33 Dorozhko,574 F.3d at 51
. 16 19-197 (L) acts constituting the securities fraud violations would take place in the EDNY. The Securities and Exchange Act provides that, for securities fraud, the “criminal proceeding may be brought in the district wherein any act or transaction constituting the violation occurred.” 34 That test is satisfied in any district where “the defendant intentionally or knowingly causes an act in furtherance of the charged offense to occur,” or where “it is foreseeable to the defendant that such an act would occur . . . and that act does in fact occur.” 35 “To be in furtherance of the charged offense, acts or transactions must constitute the securities fraud violation—mere preparatory acts are insufficient.” 36 “Venue may also be established if the defendant aids and abets another’s crime of securities fraud in the district.” 37 The government bears the burden of proving appropriate venue on each count, as to each defendant, by a preponderance of the evidence. 38 Our review is de novo, but we view the evidence “in the light most favorable to the government, crediting every inference that could have been drawn in its favor.” 39 In this case, the government 34 15 U.S.C. § 78aa(a). 35 United States v. Lange,834 F.3d 58
, 69 (2d Cir. 2016) (alteration and internal quotation marks omitted) (quoting United States v. Royer,549 F.3d 886
, 894 (2d Cir. 2008), and United States v. Svoboda,347 F.3d 471
, 483 (2d Cir. 2003)). 36Id.
(internal quotation marks omitted). 37Id. 38
Chow, 993 F.3d at 143 (noting that proof is only by a preponderance of the evidence because venue is not an element of a crime); Lange, 834 F.3d at 71. United States v. Tzolov,642 F.3d 314
, 318 (2d Cir. 2011) (internal quotation 39 marks omitted). 17 19-197 (L) presented an assortment of evidence to establish venue in the EDNY. Viewing this evidence collectively, we agree that venue was proper in the EDNY. First, evidence suggested the defendants foresaw that some of their trades would be consummated with counterparties in the EDNY. The government’s expert confirmed that 175 of the defendants’ trades were in fact consummated with counterparties in the EDNY, and that 300 more may have been. 40 This evidence, along with the vast scope of the trading scheme 41 and the defendants’ expertise as traders, 42 cumulatively supports the inference that the defendants foresaw the existence of counterparties in the EDNY. Second, the government introduced evidence that one of Korchevsky’s brokerage accounts used J.P. Morgan Clearing Corporation, located in the EDNY, as its clearing agent. The account- opening forms Korchevsky signed listed the J.P. Morgan Clearing Corporation’s address. So did the account’s monthly statements. The jury was thus entitled to infer that Korchevsky knowingly used an 40 The expert was unable to identify a single precise counterparty for each of these 300 trades, but narrowed down the universe of possible counterparties for each trade to a small number, at least one of which was located in the EDNY. A jury could therefore reasonably infer that, more likely than not, at least some of these 300 counterparties were in fact in the EDNY. 41 See Royer,549 F.3d at 894
(reasonable for jury to infer that at least one of 300 recipients of the disseminated information would trade on it in the EDNY). 42See Chow, 993 F.3d at 143–44 (jury could infer from defendant’s college and graduate business degrees that he would have been aware shares were listed on the Nasdaq in Manhattan); Svoboda,347 F.3d at 483
(jury could infer that a “savvy investor” would foresee what exchanges his trades would be executed on). 18 19-197 (L) EDNY-based clearing agent for the illicit trades from that account.43 This evidence also established venue as to Khalupsky by virtue of the aiding and abetting charges. Once proper venue is established in the EDNY for the scheme through Korchevsky, it is enough that Khalupsky “aided and abetted the scheme of securities fraud” writ large; we “do[] not require that a defendant aid and abet the specific criminal activity occurring within the district of venue.” 44 Finally, all of this evidence concerns acts or transactions “constituting” the securities fraud violation, as they must to establish venue, rather than “mere preparatory acts.” 45 Counterparties and clearing agents are both “crucial to the success of the scheme.” 46 Without them, there would be no completed sale of a security. Accordingly, venue was proper in the EDNY. 47 43 Cf. United States v. Geibel,369 F.3d 682
, 697 (2d Cir. 2004) (“The government failed to establish that defendants’ trades . . . utilized the facilities of any . . . securities exchange or brokerage firm” in the venue district, in a case where “the only connection” to the district was that the initial misappropriation of information occurred there.). 44 Lange, 834 F.3d at 73–74. Id. at 69; see also Chow, 993 F.3d at 143 (affirming venue in the district 45 where, among other things, the counterparties’ brokers were located and “purchases of [the] shares were executed, cleared, and recorded”). 46 Royer,549 F.3d at 895
. 47 Additionally, the government presented evidence about how trades executed on the New York Stock Exchange and the Nasdaq are often processed and settled through a Depository Trust and Clearing Corporation (DTCC) data center located in the EDNY. The government identified at least two of Khalupsky’s trades that were in fact cleared through the DTCC. Despite a lack of direct evidence that either Khalupsky or Korchevsky was aware of the DTCC’s existence or location, the government urged the jury to infer that traders of their 19 19-197 (L) III. Constructive Amendment and Prejudicial Variance Korchevsky argues that the government’s proof at trial either (a) constructively amended the superseding indictment, or (b) prejudicially varied from it. Specifically, he objects to the presentation of three categories of evidence: (1) trades involving target companies that were not identified in the superseding indictment, (2) trades involving press releases hacked from Business Wire, which were not charged in their own securities fraud count, and (3) trades taking place in 2015, even though much of the activity alleged in the indictment took place in 2011–2014. For the reasons below, none of this evidence constructively amended or prejudicially varied from the superseding indictment. 48 A. Constructive Amendment To satisfy the Fifth Amendment’s Grand Jury Clause, “an indictment must contain the elements of the offense charged and fairly inform the defendant of the charge against which he must defend.” 49 This clause is violated, and reversal is required, if the experience would have been. We need not address this proffered basis for venue in this case, however, because the other evidence in support of venue was sufficient. The parties dispute whether Korchevsky adequately objected to the 48 government’s proof before the district court, and thus dispute the applicable standard of review. Because the standard is irrelevant to our conclusion, we review de novo. See United States v. Dove,884 F.3d 138
, 146 (2d Cir. 2018). 49Id. at 146 (internal quotation marks and alteration omitted); see U.S. CONST. amend. V, cl. 1 (“No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment of a Grand Jury . . . .”). 20 19-197 (L) indictment has been constructively amended. 50 “A constructive amendment occurs when the charge upon which the defendant is tried differs significantly from the charge upon which the grand jury voted.” 51 A defendant claiming constructive amendment “must demonstrate that either the proof at trial or the trial court’s jury instructions so altered an essential element of the charge that, upon review, it is uncertain whether the defendant was convicted of conduct that was the subject of the grand jury’s indictment.” 52 The charge has been so altered “either where (1) an additional element, sufficient for conviction, is added, or (2) an element essential to the crime charged is altered.” 53 We undertake this inquiry mindful that “courts have constantly permitted significant flexibility in proof, provided that the defendant was given notice of the core of criminality to be proven at trial.” 54 “The core of criminality of an offense involves the essence of a crime, in general terms; the particulars of how a defendant effected the crime falls outside that purview.” 55 We do not find a constructive amendment resulting from any of the evidence to which Korchevsky objects. The trades involving 50 Dove, 884 F.3d at 149. 51 Id. at 146. 52 United States v. Salmonese,352 F.3d 608
, 620 (2d Cir. 2003). Dove, 884 F.3d at 146 (citations omitted) (first citing United States v. Miller, 53471 U.S. 130
, 138–39 (1985), and then citing United States v. Agrawal,726 F.3d 235
, 259 (2d Cir. 2013)). 54United States v. Ionia Mgmt. S.A.,555 F.3d 303
, 310 (2d Cir. 2009) (per curiam) (internal quotation marks and emphasis omitted). United States v. D’Amelio,683 F.3d 412
, 418 (2d Cir. 2012) (internal 55 quotation marks omitted). 21 19-197 (L) stocks of other target companies simply served as additional examples of the same conduct constituting the charged scheme. 56 So, too, did proof of the trades in 2015, particularly given that the superseding indictment alleged the scheme persisted into 2015. Korchevsky’s argument about the trades resulting from the Business Wire hack is similarly weak. Even though the Business Wire hack was not charged as a standalone securities fraud count, Business Wire was identified as one of the victim newswires in the superseding indictment’s introductory section, which was incorporated by reference into all charged counts. In sum, although “not specifically pleaded in the indictment, [these trades] are plainly within the charged core of criminality.” 57 None of it was proof of a different kind, setting forth “an additional basis . . . not considered by the grand jury” for conviction. 58 56See Salmonese,352 F.3d at 621
(no constructive amendment where indictment alleged twenty-five occasions on which conspirators sold inflated stripped warrants as part of fraud conspiracy, and at trial government proved additional, unalleged sales of stripped warrants).Id. at 621
; see also United States v. Dupre,462 F.3d 131
, 140–41 (2d Cir. 2006) 57 (”[T]he evidence at trial concerned the same elaborate scheme to defraud investors as was described in the indictment.”). Dove, 884 F.3d at 146. Korchevsky’s reliance on Stirone v. United States, 58361 U.S. 212
(1960), is misplaced for this reason. In Stirone, the defendant was charged with violating the Hobbs Act by obstructing interstate importation of sand destined for use in construction of a steel mill.Id. at 217
. At trial, the government argued that the defendant had also interfered with commerce (an element of the Hobbs Act violation) by obstructing the interstate exportation of the yet-to-be manufactured steel from that mill.Id.
The Court found that to be a constructive amendment, noting that “when only one particular kind of commerce is charged to have been burdened a conviction must rest on that charge and not another.”Id. at 218
. 22 19-197 (L) B. Prejudicial Variance We also do not find that the evidence at trial prejudicially varied from the superseding indictment. “A variance occurs when the charging terms of the indictment are left unaltered, but the evidence at trial proves facts materially different from those alleged in the indictment.” 59 To warrant reversal, the defendant must show “that substantial prejudice occurred at trial as a result” of the variance. 60 “A defendant cannot demonstrate that he has been prejudiced by a variance where the pleading and the proof substantially correspond, where the variance is not of a character that could have misled the defendant at the trial, and where the variance is not such as to deprive the accused of his right to be protected against another prosecution for the same offense.” 61 For the reasons discussed in the context of constructive amendment, we do not think that the evidence Korchevsky points to “materially differe[d]” from what was alleged in the superseding indictment. 62 And in any event, Korchevsky cannot demonstrate “substantial prejudice.” 63 The superseding indictment itself put Korchevsky on notice of much of the evidence about which he complains. To the extent he had not been on notice of every piece of trade data, he was notified by the government’s pretrial disclosures 59 Dove, 884 F.3d at 149 (internal quotation marks omitted). 60 Id. (internal quotation marks omitted). 61 Salmonese,352 F.3d at 621
–22 (internal quotation marks omitted). 62 Dove, 884 F.3d at 149. 63 Id. 23 19-197 (L) of exhibits about the trades it intended to rely upon and of the vast data set underlying its statistical analysis of his trading activity. IV. Response to Jury Note Korchevsky argues that the district court’s response to a jury note during deliberations caused the jury to resolve a disputed factual question against him. We review a trial court’s response to a jury request during deliberations only for abuse of discretion, 64 and we find none here. The fact in dispute was whether Korchevsky had traded on any stolen press releases from the Dubovoys. Korchevsky contended he had never received them. To prove that he had, the government introduced forensic reports for a number of electronic devices seized from Korchevsky’s home, including a 221-page report on the contents of an iPad. The forensic report indicated that the iPad had been used to access the “stargate11@e-mail.ua” email account (Stargate Account). On July 30, 2012, the Stargate Account sent four emails to itself, each containing the one-word message “Updates” along with an attachment. Forensics could not recover the attached files. Other evidence at trial, however, established that the conspirators shared login credentials for communal email accounts in order to disseminate the press releases amongst themselves. The government urged the jury to infer that the July 30 Stargate Account emails attached stolen press releases, that Korchevsky had 64 See United States v. Rommy,506 F.3d 108
, 126 (2d Cir. 2007) (“[R]esponse to jury request ‘is a matter committed to the sound exercise of a trial court’s discretion.’” (quoting United States v. Young,140 F.3d 453
, 456 (2d Cir. 1998))). 24 19-197 (L) read the emails on the iPad, and that he had relied upon these attachments in his stock trades. Korchevsky, on the other hand, claimed that somebody else had accessed the Stargate Account from the iPad. He suggested it was Igor, pointing to evidence that Igor’s Skype account had been used on that iPad in December 2012. During deliberations, the jury sent out a note requesting “Any and ALL Texts[,] Phone calls[,] Emails[,] Bank records To and/or From Korchevsky on or in any devices found in his residence, or offices possession past or at time of arrest.” 65 While the parties and the court were discussing whether the iPad evidence would be responsive to that request, the jury sent out a second note, this time asking for “Korchevsky – Stargate – dubavoy correspondence.” 66 The defense argued that there was no such correspondence. Further, it argued that if the district court sent the iPad report back to the jury, the district court would be endorsing the government’s argument that Korchevsky had used the iPad to access the Stargate Account. The district court decided to send the iPad report to the jury. It also permitted the government place a flag on the page concerning the July 30 Stargate Account emails. We do not find an abuse of discretion in the district court’s response to the jury’s request. The jury’s “Korchevsky – Stargate – dubavoy correspondence” note was not entirely clear, and we think the district court “gave it a reasonable interpretation” 67 by inferring 65 App. at 820. 66 Id. at 821. 67See United States v. McElroy,910 F.2d 1016
, 1026 (2d Cir. 1990) (“[T]here plainly was no abuse of discretion here. The jury’s written response to the court’s 25 19-197 (L) from the “Stargate” mention that the jury hoped to receive the Stargate Account emails in the iPad report. District courts are significantly better situated than we are to interpret cryptic jury notes, and they accordingly “enjoy[] considerable discretion in construing the scope of a jury inquiry and in framing a response tailored to the inquiry.” 68 We find no reason to upset that exercise of discretion here. V. Conscious Avoidance The defendants challenge the district court’s decision to charge the jury that conscious avoidance can satisfy the knowledge requirement. They also challenge the particular instruction given. We find no merit in these challenges. “Instructions are erroneous if they mislead the jury as to the correct legal standard or do not adequately inform the jury of the law.” 69 “Objectionable instructions are considered in the context of the entire jury charge, and reversal is required where, based on a review of the record as a whole, the error was prejudicial or the charge was highly confusing.” 70 A conscious avoidance charge is appropriate: “(i) when a defendant asserts the lack of some specific aspect of knowledge required for conviction[,] and (ii) the appropriate factual predicate for query was ambiguous, and the trial judge gave it a reasonable interpretation in rereading the cross-examination by the government and asking if that was what the jury wished to hear.”). 68 Rommy,506 F.3d at 126
. United States v. Kopstein,759 F.3d 168
, 172 (2d Cir. 2014) (internal 69 quotation marks omitted). 70Id.
(internal quotation marks omitted). 26 19-197 (L) the charge exists, i.e., the evidence is such that a rational juror may reach the conclusion beyond a reasonable doubt that the defendant was aware of a high probability of the fact in dispute and consciously avoided confirming that fact.” 71 Even where the government’s primary theory is that the defendant has actual knowledge, a conscious avoidance charge can be properly given in the alternative “because ordinarily the same evidentiary facts that support the government’s theory of actual knowledge also raise the inference that he was subjectively aware of a high probability of the existence of illegal conduct and thus properly serve as the factual predicate for the conscious avoidance charge.” 72 The district court in this case gave the following conscious avoidance instruction to the jury, over Khalupsky’s objection: [T]he government is required to prove that the defendants acted knowingly. To determine whether the defendant acted knowingly[,] you may consider whether the defendant deliberately closed his eyes as to what would otherwise have been obvious to him. If you find beyond a reasonable doubt that the defendant acted or that the defendant’s ignorance was solely and entirely the result of a conscious purpose to avoid learning the truth, then this element may be satisfied. However, guilty knowledge may not be established by 71 Lange, 834 F.3d at 76 (internal quotation marks omitted). 72 Id. at 78 (internal quotation marks and alterations omitted). 27 19-197 (L) demonstrating that the defendant was merely negligent, foolish, or mistaken . . . . If you find that the defendant was aware of the high probability that the press releases were stolen, and that defendant acted with deliberate disregard of that fact, you may find the defendant acted knowingly. However, if you find that the defendant believed that the information was lawfully obtained, he must be found not guilty. It is entirely up to you whether you find the defendant deliberately closed his eyes[,] and any inferences to be drawn from the evidence on this issue. 73 In challenging this instruction on appeal, Khalupsky argues both that there was no factual predicate warranting a conscious avoidance instruction, and that the instruction led the jury to believe that conscious avoidance could satisfy the intent needed to convict on conspiracy or aiding and abetting. Korchevsky joins these arguments in reply, and also argues that the language of the conscious avoidance instruction was prejudicial. We first reject the argument that there was no factual predicate for the conscious avoidance instruction. The inclusion of the charge was properly objected to before the district court, so we review de novo. 74 We find that the record contained ample evidence from which a jury could reasonably infer that “the defendant[s] w[ere] aware of a 73 App. at 680–81. 74 United States v. Applins,637 F.3d 59
, 72 (2d Cir. 2011). 28 19-197 (L) high probability of the fact in dispute and consciously avoided confirming that fact.” 75 As to Khalupsky, the government presented evidence that he had received passwords to access the press releases on which his employees were trading. The jury would have been entitled to infer that the need for password-protection signaled to Khalupsky that the press releases—documents usually publicly disseminated without need for security—had been illicitly obtained, and that he chose not to confirm that suspicion. Similar reasoning prevails as to Korchevsky, because there was evidence that Arkadiy had shown Korchevsky printouts of the press releases and provided him with login credentials to access the information. Second, we reject the argument that the conscious avoidance instruction confused the jury into thinking that it could convict on conspiracy or on aiding and abetting without finding the necessary intent. As the defendants concede, because they did not object before the district court to any particular language in the charge, we review this issue only for plain error. 76 It is not “clear or obvious” to us, as it must be on plain error review, that the charge confused the jury in the way defendants claim. 77 As to conspiracy, we do not think the jury could have convicted the defendants by finding only conscious avoidance of the fact of participation in the conspiracy. Conscious avoidance may satisfy the 75Lange, 834 F.3d at 76 (internal quotation marks omitted). It is undisputed that the first condition necessary for a conscious avoidance charge—that the “defendant asserts the lack of some specific aspect of knowledge required for conviction”—was satisfied. Id. 76 See United States v. Vilar,729 F.3d 62
, 88 (2d Cir. 2013). 77 Seeid. at 70
(defining plain error). 29 19-197 (L) defendant’s “knowledge of the conspiracy’s unlawful goals,” but it may not be used to support the defendant’s prerequisite “knowing participation or membership in the scheme charged.” 78 The jury instructions made clear that proof of membership in the conspiracy required a showing of actual knowledge. In describing what the government needed to prove to show that the defendants joined the conspiracy, the district court charged that it had to prove a defendant “knowingly and willfully was or became a member of the conspiracy,” and that he became a member “with knowledge of its criminal goal, willfully and intending by his actions to help it succeed.” 79 Further, the district court defined “willfully” as something “done knowingly and purposefully with intent to do something the law forbids.” 80 Nor do we think there was any risk that the jury convicted on the aiding and abetting theory of securities fraud—a specific intent crime 81—by finding only conscious avoidance. The district court charged the jury that, “in order to aid and abet someone to commit a crime, it is necessary that the defendant knowingly aid[] another person in committing a crime with the intent to facilitate the crime and make it succeed.” 82 It went on to explain that “[t]o establish that the defendants knowingly aided another person with the intent to facilitate a crime, the [g]overnment must prove the defendants of course acted knowingly and intentionally.” 83 Nowhere in the 78 Lange, 834 F.3d at 76 (internal quotation marks omitted). 79 App. at 646–47 (emphases added). 80 Id. at 647. 81 United States v. Rosemond,572 U.S. 65
, 70–77 (2014). 82 App. at 661–62. 83 Id. at 662 (emphasis added). 30 19-197 (L) discussion of aiding and abetting liability did the court reference conscious avoidance as a relevant form of that intent. Third, we reject Korchevsky’s argument that the conscious avoidance charge given in this case was prejudicial. Korchevsky asserts that the district court’s instruction to the jury presupposed that Korchevsky had seen the stolen press releases, and therefore prejudiced the jury in disposing of a disputed fact. Korchevsky did not make this objection to the district court, however, and we do not think any potential for confusion in this respect rises to the level of plain error. Indeed, we think it clear that the district court was referencing the stolen press releases by way of example in order to demonstrate to the jury how conscious avoidance operates. Lest the jurors be confused, the district court reiterated Korchevsky’s theory in defense—that “he did not knowingly and intentionally access stolen press releases or trade on non-public information” 84— immediately after charging on conscious avoidance. Finally, we note that even if we had found any error in the issuance or form of this conscious avoidance instruction, we would have found the error harmless. The “overwhelming evidence” of actual knowledge in support of the jury’s verdict, coupled with the fact that the government did not at all rely on conscious avoidance in its summation, renders this dispute over conscious avoidance beside the point. 85 84 Id. at 681. 85 United States v. Ferrarini,219 F.3d 145
, 154 (2d Cir. 1993) (“[A]n erroneously given conscious avoidance instruction constitutes harmless error if the jury was charged on actual knowledge and there was overwhelming evidence 31 19-197 (L) CONCLUSION We have considered all of the defendants’ arguments and found them without merit. For the foregoing reasons, we AFFIRM the judgments of conviction. to support a finding that the defendant instead possessed actual knowledge of the fact at issue.” (internal quotation marks and emphasis omitted)).
Securities & Exchange Commission v. Dorozhko ( 2009 )
United States v. Huezo ( 2008 )
united-states-v-roberto-jose-maldonado-rivera-antonio-camacho-negron ( 1990 )
United States v. Tzolov ( 2011 )
united-states-v-benjamin-v-salmonese-jr-frank-piscitelli-marco-g-fiore ( 2003 )
United States v. Royer ( 2008 )
United States v. Rommy ( 2007 )
United States v. Thomas J. McElroy Jr., and Robert H. ... ( 1990 )
United States v. Richard A. Svoboda, Michael A. Robles ( 2003 )
United States v. Applins ( 2011 )
United States v. Ionia Management S.A. ( 2009 )
United States v. Roberta Dupre, Beverly Stambaugh ( 2006 )
united-states-v-james-j-mcdermott-jr-kathryn-b-gannon-also-known-as ( 2001 )
United States v. Jon Geibel, Chad L. Conner, and Gordon K. ... ( 2004 )
United States v. Paul Sureff and Michael Cardone, Maritza ... ( 1994 )
United States v. Torres ( 2010 )
Securities & Exchange Commission v. Zandford ( 2002 )
Stirone v. United States ( 1960 )