Академический Документы
Профессиональный Документы
Культура Документы
No. 96-1317
UNITED STATES,
Appellee,
v.
RICHARD W. CZUBINSKI,
Defendant - Appellant.
____________________
____________________
Before
_____________________
were on
brief for
appellant.
S. Theodore Merritt, Assistant
___________________
____________________
Defendant-appellant
Richard
Czubinski
("Czubinski")
appeals
his jury
computer
fraud,
computer fraud
18 U.S.C.
prosecution that
on
nine
1030(a)(4).
motions.
conviction
The wire
led to the
fraud and
conviction survived
scope of the
selective prosecution
of
dismissing the
indictment, however,
because we
reverse the
by
and
judgment of acquittal
Unauthorized browsing of
BACKGROUND
BACKGROUND
I.
I.
Pertinent Facts
Pertinent Facts
On
an appeal
relevant facts
from a
in the light
jury conviction,
most favorable
we review
to the
government.
United States v. Tierney, 760 F.2d 382, 384 (1st Cir. 1985).
_____________
_______
evidence
in this case,
so presented,
is inadequate
the
The
to support
conviction,
the defendant
Czubinski was
employed as
a Contact
-2-
Representative
in the
Boston
office of
the Taxpayer
Integrated
Data
password given
To perform his
Services
accessed
Retrieval
System
("IDRS").
Using
from
as the
valid
and
taxpayer
retrieve, to
social security
his terminal
numbers,
screen in
Czubinski
Boston, income
is
permanently
stored in
the
IDRS
was able
to
tax return
-- information that
"master file"
located
in
IRS rules plainly stated that employees with passwords and access
the
In
1992, Czubinski
carried out
numerous unauthorized
____________________
In 1987 Czubinski
Employees
must
assure security
disclosure of
make
every
effort
to
of the
in the
computers.
not use any
In addition,
employees may
for
See
___
Government's Exhibit
1.
In
addition, Czubinski
received
Access
only
those accounts
required to
-3-
searches
looking
of IDRS files.
at
He knowingly disregarded
confidential
information
obtained
IRS rules by
by
performing
Contact Representative,
searches
listed in the
internal
IRS auditors
information
but not
indictment.2
Audit
IDRS in 1992.
regarding:
the
limited to,
the
trails performed by
unauthorized accesses on
accessed
including,
frequently made
For example,
tax
returns
Czubinski
of
two
joint
prosecuting
and his
Czubinski's father on
wife;
Kelly's Campaign
the
tax
return of
an unrelated
Boston
felony offense)
City Counselor
Jim
Czubinski in the
previous election for the Counselor seat for District 2); the tax
return
a community
organization with
Czubinski
one of Czubinski's
brothers, and
Czubinski had
Nothing
in
the
record indicates
that
Czubinski did
____________________
2
the
information
of
entities;
the
four
that also
underlay four of
the ten
wire
-4-
does
the
government
contend,
confidential information he
government's only
confidential
that
Czubinski
participated in
parties.
The
for
nefarious
any intent to
ends
briefly
the
evidence demonstrating
information
disclosed
was
the
use the
trial
of Czubinski who
Knights of
the Ku Klux Klan ("KKK") chapter and worked with him on the David
Duke campaign.
at a social
gathering in "early
once stated
to use
"the white
supremacist movement."
170,
188.
the
information he
to Murray.
knowledge of
2 at
out
comment
accessed in
No
he browsed), or
shared any of
other witness
testified to
the single
having any
create "dossiers" on
KKK members.
The
record shows
that Czubinski
did not
perform any
He continued to be employed as
Contact Representative
returned
until
June 1995,
when
a grand
jury
fraud under 18
U.S.C.
The
portion
of
the
1030(a)(4).
indictment
alleging wire
fraud
-5-
using
his
valid
information
password
as part
of
to
acquire
a scheme
to:
confidential
1) build
by
taxpayer
"dossiers"
on
a Boston
City
therefore,
Councilor
seat.
The
articulated particular
unauthorized
access
to
wire
personal
confidential
fraud
ends
indictment,
to which
information
the
through
The
portion
of
the
indictment
setting
forth
the
obtained something
of
II.
II.
Proceedings Below
Proceedings Below
After
indictment
and
arraignment
in
June
1995,
motion to
In separate
orders, a
magistrate judge
Specifically,
rejected
that counts
Czubinski's argument
the
court
1 through 10
of the
-6-
right to honest
statutes, was
December
services amendment
unconstitutionally vague
1995,
essentially
to the mail
Czubinski
sought
to
filed
prevent
as applied
motions
references
trial.
This motion
to him.
in
limine
___________
to
during
and wire
certain
fraud
In
which
white
a KKK chapter,
court
gave a
limiting
Czubinski's KKK
instruction regarding
membership
to
finding
the relevance
of
wire
fraud
of
and
computer fraud.
On
December
15,
1995,
the
district
court
denied
for count 3,3 and on that day the jury returned a verdict finding
Czubinski guilty on
Czubinski challenges
the
indictment, including
claim,
of
denial of
the rejection
selective prosecution,
inflammatory
activities, the
evidence
denial of
his motion
of a
Czubinski's
his
On
appeal,
to dismiss
the
selective prosecution
the admission
of
counts.
motion for
at trial
of allegedly
white
supremacist
acquittal, the
jury
court erred
____________________
On
count
3,
the
district
court
ruled
that
there
was
-7-
STANDARD OF REVIEW
STANDARD OF REVIEW
A motion
make
a sufficiency challenge.
and Procedure:
judgment
Crim. 2d
v. Staula, 80 F.3d
______
Cir.
anew
1996).
We
determine
whether
"the
evidence
is
of a guilty
verdict,
"the relevant
question is
viewing the
evidence
in the
most favorable
light
whether, after
to the
prosecution, any
___
U.S.
reasonable doubt."
Jackson v.
_______
210, 216
(1st Cir.
totality of
"take
1995).
the evidence,
a hard look at
interpretations
The
scope of
and
illations
Virginia, 443
________
v. Valle, 72 F.3d
_____
review
is over
the
circumstantial:
we
that
are
unreasonable,
DISCUSSION
DISCUSSION
I.
I.
We
turn first
to Czubinski's
conviction on
the nine
-8-
government
must prove
two elements
beyond a
the
reasonable doubt:
or artifice to defraud
defraud, and
the scheme.
United States v.
_____________
Cir.
1993)).
Although
of
defendant's
motion
for
1011 (1st
judgment
of
the
second element,
by arguing that
the wire
transmissions at
reasonable doubt
scheme
participated in a
____________________
1343, provides in
pertinent part:
or intending
to
or
for obtaining
means of false
or property
or fraudulent
representations,
or causes
money
or
by
pretenses,
promises, transmits
to be transmitted by
means of
commerce,
signals,
purpose
any writings,
pictures,
of
or
executing
sounds
such
signs,
for
the
scheme
or
five years,
or both.
We
conclude
beyond
reasonable doubt
that
Czubinski's searches
could
See,
___
reasonably
e.g.,
____
be
inferred
Testimony of
-9-
in Boston.
from
Edward
The interstate
circumstantial
Makaskill,
Trial
That
is, assuming
searches
of
the counts
taxpayer
accurately describe
returns
through
rational
unauthorized
interstate
wire
The government
pursued two
theories of wire
fraud in
this prosecution:
property,
section
under
information for
1343,
by
acquiring
confidential
second, that he
defrauded the IRS and the public of their intangible right to his
honest
We consider the
A.
A.
The
government
correctly
notes
that
confidential
____________________
Transcript, Vol. 3
at 82 (explaining that
computer).
The district
court's jury
instructions
on the
In
Mr. Czubinski
artifice,
with devising a
that
is, a
plan,
scheme or
to do
two
things:
(1) to defraud the IRS, the United States
Government,
taxpayers
and
of
the
the
United
his
honest
employee; and
citizens
States
and
by
intangible right
services
as
an
IRS
wire fraud
property, that
information,
by
false
pretenses,
-10-
information
may constitute
intangible "property"
its
property rights.
See
___
and that
its
19, 26
recognized as property. . . .
in
keeping
publication,
column.).
or
the
confidential
of
the
and
making exclusive
schedule
and contents"
use,
of
prior
to
particular
wire fraud
statute, is
shown.
in
this
context
is
showing
See id.
___ __
at
27.
Thus, a
that
the
defendant intended
to
its
contention
here
that
merely
accessing
confidential
to do, more, is
tantamount
statute.
defendants's use to
their substantial
trading in anticipation" of
that
intent
authorized
searches,
browsing, even
into thinking he
constitutes
-11-
See
___
id. at
__
27
newspaper column).
Czubinski's unauthorized
benefit.
We do
not think
if done
with the
"deprivation"
within
the
Binding
conclusion
that
precedents,
to
"deprive"
and
good
sense,
person
of
support
their
the
intangible
either some
articulable
harm
information
as a result
of the defendant's
gainful
use
information,
must
be
whether
economic sense.7
intended
or
not
must befall
by
this
the
the
of
the
activities, or some
person
use is
holder
accessing
profitable
in
the
the
of his "use"
that
of the information.
an intent to
deprive cannot be
proven,
All
search
in itself constitutes
support our
a deprivation of
property in fact
from
1978),
United States v.
______________
in which
Seidlitz, 589
________
a former
employee of
F.2d
152, 160
a computer
(4th Cir.
systems firm
secretly accessed its files, but never was shown to have sold
or
____________________
For
example, had
the government
disclosed or intended to
established that
Czubinski
-12-
fraud.
The affirming
a jury
could
have reasonably
raided a
found
competitor's computer
that, at
the
time the
system, he intended
defendant
to retrieve
computer
firm.
confidential
appeared to
information
through
be performing his
fraudulent
duties when
pretenses
in fact he
--
he
used IRS
Nevertheless, it was
The resolution
it
is
well-established that
to be
is complex because
convicted
scheme to defraud.
of mail
or wire
out an intended
to
intent to achieve
to
scheme to defraud,
not contend
that
he
either that
accomplished
information.
required
to
deprivation
of interstate
It need
prove
actual use of
some
other
not do so.
was the
intent
______
end
through
All that
to
dossiers or
use
of
the
follow
through with
-13-
to the accomplishment
of the scheme
812 F.2d
to defraud.
754, 760
See, e.g.,
___ ____
(1st Cir.
1987).
In
the case
at bar,
the
The
not
shown beyond a
Czubinski intended to
confidential information.
Czubinski
to create
intended either
dossiers
for the
sake of
advancing
personal
causes
or
to
disseminate
confidential
deprive
the
IRS
information.
to make
its
property
interest
in
confidential
any
testimony
of
use of
the
information he
browsed rests
on
the
on
We must assume,
during
the
the months
period
searches -- he
in
did not
on this appeal,
Nevertheless, the
which Czubinski
made
his
-- that
is,
unauthorized
was no
evidence
unauthorized
person testifying
____________________
-14-
as to Czubinski's involvement
had
any
knowledge
of
Czubinski's
alleged
intent
to
create
not
single piece
shared taxpayer
have
evidence suggests
that
found beyond
browsing
of
a reasonable
taxpayer files,
he was
doing so
Czubinski ever
Czubinski was
in furtherance
of a
they
nefarious or otherwise.
that
Czubinski
disclosed,
or
used
to
his
advantage,
any
Mere
enough
to sustain a wire
fraud conviction on
a "deprivation of
officer may
lead
Curiosity
to dismissal,
but
on the part
curiosity alone
of an
IRS
will
not
B.
B.
In
the
do not
property
right to
honest government
services. Id.
___
at 359-60.9
____________________
a broad
example,
shield"
by
this
and
other
circuits,
"read as
applying,
for
-15-
Congress responded
to McNally in 1988 by
_______
For
term
the purposes
"scheme
includes
or
of
this chapter,
artifice
to
the
defraud"
18 U.S.C.
11, 1988).
1346
effectively
restores to
statutes10
their
pre-McNally
_______
officials'
schemes
to defraud
right
to honest
the scope
services.
of the
mail and
applications
individuals of
See
___
Grandmaison,
___________
to
wire fraud
government
their intangible
77 F.3d
at
566
(collecting cases).11
We
length,
the
recently had
proper
the opportunity
application
of
the
to discuss,
section
1346
at some
honest
See
___
____________________
had used
public
the mails
in furtherance
of a
scheme to defraud
to honest services.
the
See, e.g.,
___ ____
Silvano,
_______
812 F.2d
754 (1st
Cir. 1987)
(applying, pre-McNally,
_______
see generally
_____________
10
Identical standards
defraud"
apply
in determining
the
"scheme to
States v. Boots, 80
______
_____
United
______
(citing
11
issue of
concerns.
-16-
challenge
directly guide
as
to
honest
services "eludes
convictions
of
corruption,
such as
public
public
officials, or
disclose certain
cautioned
easy
officials
First,
definition,"
typically
honest services
involve
serious
embezzlement
of public
funds, bribery
the failure
of public
decision-makers to
conflicts of interest.
that "[t]he
appeal.12
broad scope
of
Id. at 724.
___
the mail
of
Second, we
fraud statute,
that
results
in the
official's personal
gain."
Id.
at 725.
___
Third,
and most
must not
importantly, Sawyer
______
holds that
by a
the government
public official,
but
of that public
pre-McNally
_______
officials
servant's official
precedent
to
demonstrate that
defraud citizens of
duties.
Id.
___
at 725
even
where
In other
engage
reprehensible
in
____________________
words, "although
misconduct
public
not found to
properly).
(citing
a public
related
duties
official might
to
an
official
12
In Sawyer, we
______
the mail
The
violation of
conviction
statute,
was vacated
because the
the gift
to establish a scheme
-17-
the
Applying these
principles to Czubinski's
outside
of
Czubinski
the
core
cannot stand.
of
decision-making capacity.
receive, nor
tangible
can it
benefit.
honest
First, this
services
precedents.
in any public
official
he intended to
duty
was
He did not
receive, any
to
respond
relatively straightforward
specter
of
secretive,
task that
self-interested
is
case falls
fraud
or otherwise influenced
be found that
His
acts, it
Id.
___
action,
as
to
raise the
does
discretionary,
decision-making
fraud
violation
1245, 1251
where
city
role.
Cf.
___
United States
______________
employee
(finding no
accepted
v.
gratuities
in
language
of
Second,
Sawyer is
______
we believe
particularly
that
appropriate
the cautionary
here,
given
the
evidence
searches
--
would
be
punishable
-18-
by
anything
more
than
dismissal.13
such
violation
countenanced."
into
federal
felony;
this
Here, the
cannot
be
threat is one
into felonies.
to a draconian personnel
regulation.
We hesitate to
imply such
an
unusual result
in the
absence
of the
clearest legislative
mandate.
conclusive:
they
conviction that
scheme to
us as
in this
doubts
as to
can be outweighed
defraud.
instructing
defraud
raise
The third
to
conclusive consideration
propriety
by sufficient
of
requirements
settles any
is that
this
evidence of
principle identified in
the basic
context,
the
of a
remaining
Sawyer,
______
scheme
doubts.
to
The
did not
or his
he
clearly
committed
information, there is no
wrongdoing
in
searching
Although
confidential
carry out
the
public of his
in addition to defrauding
____________________
13
See
___
Appendices to Czubinski's
Motion to Dismiss
(including
that the
probable
taxpayer
penalty
for
"unauthorized
accessing"
-19-
of
IRS
as
well.
contention
Czubinski
The
IRS
sufficiently
did not
is
a public
answered
defraud
entity,
by
our
the public
rendering
holding
of his
above
this
that
honest services.
honest
services
indicate that
employer
more
convictions
there must be a
that involves
serious
involving
fraud
breach of a fiduciary
self-dealing of
than the
private
misconduct at
an
issue
victims
duty to an
order significantly
here.
See, e.g.,
___ ____
United States v. Lemire, 720 F.2d 1327, 1332-34 (D.C. Cir. 1983)
______________
______
1983)
(employees
used
corporate
funds
for
was
(2d Cir.
non-corporate
purposes);
United States
_____________
Cir.
1982) (union official bribed into accepting lower wages for union
members).
Czubinski
intended to
do not
use
the IRS
files
he browsed
to prove that
for
any
reprehensible,
II.
II.
Czubinski
was convicted
on all
ten
convicted
of
violating
the computer
the indictment.
18
four of
U.S.C.
of the
Specifically, he was
1030(a)(4),
provision
-20-
whoever .
. . knowingly and
with intent
to defraud, accesses
a Federal
computer
authorization,
without
such
fraud
and
unless the
conduct
obtains
interest
and by
furthers the
anything
object of the
or
means
intended
of
value,
fraud and
the
only of the
use
Section
of the computer.
We
have never
before addressed
unquestionably exceeded
computer.14
of
section 1030(a)(4).
authorized access to a
Czubinski
Federal interest
value."
We
agree, finding
that
his searches
of taxpayer
he
obtain
"anything of
relative to one's
Czubinski
The
value of
information is
of a fraudulent scheme.
that
value."
intended
in light
anything
more than
to
satisfy
idle
curiosity.
The
that more
plain language
than mere
of
unauthorized
section 1030(a)(4)
use is
emphasizes
required: the
"thing
obtained"
showing
may not
of some
merely be the
additional
unauthorized use.
end --
to
which the
lacking here.
It
is the
unauthorized
satisfy his
____________________
14
"[T]he
term 'exceeds
information
in the
to access
computer
that
18 U.S.C.
-21-
the
obtain or
accesser is
1030(e)(6).
not
curiosity
and
by viewing
information about
political rivals.
use
or
information he browsed.
to
friends, acquaintances,
disclose
No
rational jury
that
information,
and
merely
viewing
of
the
term "anything
of
value."
"In
the
game
of
statutory
card,"
to the extent that they are compatible with the plain language of
section 1030(a)(4).
19
Rhode Island v.
____________
Bell, 465
____
U.S. 555,
comments
suggest that
punish
attempts
567 (1984)).
Here,
a Senate
Congress intended
to steal
co-sponsor's
section 1030(a)(4)
valuable data,
and
did not
to
wish to
The
acts
of
proposed
thefts
fraud
we
are
section 1030(a)(4)
in
which
someone
addressing
in
are essentially
uses
federal
____________________
15
The
computer
indictment
district
fraud
court, in
counts
in
denying a
the
sufficiently alleged
motion
indictment,
that the
to dismiss
found
that
the
the
confidential taxpayer
The indictment,
information, such
for the
Czubinski
did
not
recording, disclosure
confidential information --
obtain
"anything
of
value"
we find that
through
his
unauthorized searches.
-22-
is
intended
to
reflect
the
felony, and
mere
unauthorized access,
misdemeanor.
132 Cong.
Rec. 7128,
The
Senate Committee
section
should
Report further
apply to
those
who
that this
steal information
through
The
Committee
must be a
remains convinced
and
in
misdemeanor
The
that there
element in
computer
the
[under
[under section
first
instance
a different
the
new
trespass,
a
provision].
paragraph
as
(a)(4),
defraud,
that distinction, as is
property wrongfully
furthers the
intended
fraud.
S.
Rep. No.
U.S.C.C.A.N.
evidence
132,
2479.
99th
Cong.,
For the
2d
Sess.,
same reasons
reprinted in
_____________
we deemed
1986
the trial
under section
___
1343 supra,
_____
we find
information
in
that
Czubinski has
furtherance
of
not obtained
fraudulent
scheme
valuable
for
the
CONCLUSION
CONCLUSION
We
curse.
fall
The broad
language of the
within more
specific legislation.
-23-
that fail to
Maze,
____
414 U.S. 395, 405-06 (1974) (observing that the mail fraud
to tackle
is developed)
they
cannot
basis of
to the
reasonably
insistence,
before
Also
trial,
On the other
The
by the
on
federal prosecutors,
instigators to
case at bar
discomforting
the
hand,
aesthetics of
be expected
a federal felony.
category.
dissenting).
prosecute kinds of
morals or
"stopgap device"
(Burger, C.J.,
might be used to
offensive
latter
is
admission
form the
falls within
the
of
the
prosecution's
inflammatory
evidence
regarding
supremacist
defraud,
the
defendant's
groups purportedly as a
when, on appeal, it
itself is
sufficient ground
membership
in
means to prove
white
a scheme to
for
conviction on
all
counts.
Finally, we caution that the wire fraud statute must not serve as
a vehicle for
against the
prosecuting only
tide, no
those citizens
whose views
or uncivilized
run
such
views are.
For
district
the reasons
court's denial
acquittal on counts 1, 2,
stated in this
of defendant's
opinion, we
motion for
hold the
judgment of
The
-24-