KINSLOW v. THE STATE
S20G1001
Supreme Court of Georgia
Decided: June 21, 2021
PETERSON, Justice.
Jereno Sadatrice Kinslow appeals his felony conviction for computer trespass in violation of
Viewed in the light most favorable to the verdict, the evidence presented at trial shows that, in 2013, Kinslow was an information technology (“IT“) employee of the City of Norcross (“the City“). In October 2013, Greg Cothran was hired to manage the IT department, with an objective to increase the reliability and efficiency of the City‘s computer system. Shortly after Cothran started his new position, he began having difficulties with Kinslow. In November 2013, Cothran criticized Kinslow‘s work performance, which led to an argument and a loud outburst from Kinslow. Due to Kinslow‘s behavior, Cothran became concerned that Kinslow might damage the City‘s computer network. As a result, Cothran attempted to place certain safety measures on the system, and Kinslow‘s employment was eventually terminated in June 2014.
In August 2014, Monique Lang, the City Clerk, sent an e-mail from her work account to Cothran at his work account. Lang addressed this message solely to Cothran. In response, Lang received a “bounce-back” e-mail notification stating, in relevant part, that Lang‘s e-mail was undeliverable to a recipient with an “@me.com” e-mail address. Lang alerted Cothran about this occurrence, and subsequent investigation revealed that the @me.com e-mail address was a personal account that had been established by Kinslow. The City also discovered that the City‘s computer network settings had been altered by checking a box in the City‘s computer program to cause Cothran‘s incoming e-mail messages to be copied and forwarded to Kinslow‘s personal @me.com account. The forwarding of Cothran‘s e-mail messages began in approximately December 2013, while Kinslow was still employed by the City. At that time, only Cothran and Kinslow had the necessary “administrator-level access” to alter the settings in order to forward Cothran‘s incoming e-mails. This forwarding continued until it was discovered in August 2014, two months after Kinslow‘s termination. Evidence indicates that Kinslow routinely accessed the @me.com account from his cell phone prior to discovery by the City.
At the end of a jury trial, Kinslow was found guilty of one count of violating
When we consider whether the evidence [was] legally sufficient to sustain a conviction under Jackson, we view the evidence in the light most favorable to the verdict, draw every reasonable inference from the evidence that is favorable to the verdict, ignore any conflicts or inconsistencies in the evidence, assume that the jury reasonably
believed every word of testimony favorable to the verdict and reasonably disbelieved every word unfavorable to it, and only then inquire whether any reasonable person could conclude that the State has proved the guilt of the accused beyond a reasonable doubt.
Debelbot v. State, 308 Ga. 165, 168 n.6 (839 SE2d 513) (2020) (citing Jackson, 443 U.S. at 319).
Kinslow‘s use was done with the intention of obstructing or interfering with the use of data.3
“The fundamental rules of statutory construction require us to construe [a] statute according to its own terms, to give words their plain and ordinary meaning, and to avoid a construction that makes some language mere surplusage.” La Fontaine v. Signature Research, Inc., 305 Ga. 107, 108 (823 SE2d 791) (2019) (citation and punctuation omitted). “In construing language in any one part of a statute, a court should consider the statute as a whole.” Id.
The Court of Appeals concluded simply that Kinslow‘s “act of altering network settings to copy and redirect his supervisor‘s incoming e-mail . . . amounts to conduct sufficient to constitute the offense of computer trespass, i.e., ‘[o]bstructing, interrupting, or in any way interfering with the use of a
We can reject fairly quickly the State‘s argument that the evidence supported a finding that Kinslow acted with the intention of “obstructing” data. Using a dictionary contemporaneous with the 1991 enactment of the statute, “obstruct” may be defined as “to block or stop up . . . with obstacles or impediments“; “to hinder” or “impede“; or “to cut off from being seen.” See Webster‘s New World Dictionary of American Language 983 (2d College ed. 1980). Contrary to the State‘s suggestion, the State presented no evidence that Kinslow‘s e-mail forwarding scheme “blocked” or even “hindered” the flow of data in the form of e-mails to Cothran, who continued to receive those e-mails intended for him. Rather, the evidence showed only that Kinslow‘s actions created an additional flow of data to another account. And although the State suggests that “interrupt” is another meaning of the term “obstruct,” that does not help the State at all. “Interrupt” carries a similar definition of stopping or hindering, although “interrupt” often denotes a more temporary stoppage than “obstruct,” such as “to make a break in the continuity of.” See id. at 737. Again, the State presented no evidence that Kinslow‘s actions hindered the flow of e-mails to Cothran, either permanently or temporarily.
As discussed in more detail below, the term “interfere” carries a range of meanings, from merely meddling where one‘s help or interest is unwelcome, to stopping something from happening. Thus, the question of whether Kinslow acted with the intention of “in any way interfering” with the use of data is a closer question. But canons of statutory construction indicate that the term “interfering” as used in
Dictionary definitions of “interfere” contemporaneous with the enactment of the statute include meanings such as “intrude in the affairs of others,” “meddle,” and “intervene.” See The American Heritage Dictionary of the English Language 940 (3d ed. 1992); Black‘s Law Dictionary 814 (6th ed. 1990). The State also cites language from an academic work included in a legal dictionary, to suggest that “interference” happens whenever one “bring[s] about a particular result which is different from that which would have been produced if the mechanism had been allowed unaided to follow its inherent principles.” See Black‘s Law Dictionary (11th ed. 2019) (quoting 2 Friedrich A. Hayek, Law, Legislation, and Liberty 128-129 (1976)). That is a particularly broad definition.
But other dictionaries from the relevant time period also include much narrower definitions of “interfere” closer to “obstruct,” such as “[t]o check; hamper; hinder; [or] infringe“; “to come into collision or opposition“; and “[t]o come between so as to be a hindrance or an obstacle.” See The American Heritage Dictionary of the English Language 940 (3d ed. 1992); Black‘s Law Dictionary 814 (6th ed. 1990); Webster‘s New World Dictionary of the American Language 734 (2d College ed. 1980). And Georgia case law reflects this narrower sort of definition of “interfere.” See Huckaby v. Cheatham, 272 Ga. App. 746, 751 (1) (612 SE2d 810) (2005) (parking on easement for shared driveway would “interfere” with neighbor‘s ingress and egress over the easement because it would “hinder or infringe” on neighbor‘s ability to use the easement); Ratliff v. State, 133 Ga. App. 256, 256-257 (3) (211 SE2d 192) (1974) (rejecting challenge to jury charge on what constitutes “interfering” with police officers in the performance of their lawful duties, noting that the trial court said, “I think the test that the law requires would be that it effectively hindered or impeded the law enforcement in the
It is important to remember that “when we determine the meaning of a particular word or phrase in a constitutional provision or statute, we consider text in context, not in isolation.” Elliott v. State, 305 Ga. 179, 186 (II) (B) (824 SE2d 265) (2019); see also Upper Chattahoochee Riverkeeper, Inc. v. Forsyth County, 318 Ga. App. 499, 502 (1) (734 SE2d 242) (2012) (“[E]ven if words are apparently plain in meaning, they must not be read in isolation and instead, must be read in the context of the regulation as a whole.“). And several canons of construction addressing the importance of examining the context in which a word appears point us toward a narrower definition of “interfering.”
First, under the canon of noscitur a sociis, the word “interfering” should be understood in relation to the other words in the statute, because “words, like people, are judged by the company they keep.” Warren v. State, 294 Ga. 589, 590-591 (1) (755 SE2d 171) (2014) (citation and punctuation omitted). In particular, we normally should “avoid ascribing to one word a meaning so broad that it is inconsistent with its accompanying words, thus giving unintended breadth to” an act of the General Assembly. Gustafson v. Alloyd Co., 513 U.S. 561, 575 (115 SCt 1061, 131 LE2d 1) (1995). Here, this canon counsels us to afford “interfering” a meaning that is consistent with the category of words to which “obstructing” and “interrupting” belong, if such a meaning is reasonable. See id. at 573-575 (applying noscitur a sociis canon to conclude that § 2 (10) of the federal Securities Act of 1933, which defined a “prospectus” as “any prospectus, notice, circular, advertisement, letter, or communication, written or by radio or television, which offers any security for sale or confirms the sale of any security,” refers only to documents of wide dissemination, not all written communications). As noted above, “obstruct” and “interrupt” carry meanings akin to “hinder” or “stop.” A meaning of “interfering” consistent with the terms “obstructing” and “interrupting” thus would be more like “to come between so as to be a hindrance or an obstacle” than merely “intruding,” “meddling,” or “intervening.”
Often applied in conjunction with the noscitur a sociis canon, the canon of ejusdem generis also counsels reading “interfering” narrowly.
[W]hen a statute or document enumerates by name several particular things, and concludes with a general term of enlargement, this latter term is to be construed as being ejusdem generis (i.e., of the same kind or class) with the things specifically named, unless, of course, there is something to show that a wider sense was intended.
Ctr. for a Sustainable Coast v. Coastal Marshlands Protection Comm., 284 Ga. 736, 737-738 (1) (670 SE2d 429) (2008) (citation omitted). Here, “interfering” is a general term of enlargement and thus should be construed as being of the same kind or class as “obstructing” and “interrupting.” Again, that means we should construe “interfering” as requiring a level of disruption commensurate with the meanings of the preceding words “obstruct” and “interrupt,” something more narrow than merely inserting oneself into a situation without request or necessity. See id. at 739 (1) (limiting meaning of “otherwise alter” in
Moreover, courts “typically use ejusdem generis to ensure that a general word will not render specific words meaningless.” CSX Transp., Inc. v. Ala. Dept. of Revenue, 562 U.S. 277, 295 (131 SCt 1101, 179 LE2d 37) (2011) (italics in original). And, relatedly, “courts should avoid a statutory construction that will render some of the statutory language mere surplusage.” Thornton v. State, 310 Ga. 460, 469 (3) (851 SE2d 564) (2020) (citation and punctuation omitted); see also Campaign for Accountability v. Consumer Credit Research Found., 303 Ga. 828, 832 (2) (815 SE2d 841) (2018).
If
On the other hand, defining “interfering” along the lines of “coming in between so as to be a hindrance or an obstacle” is not so narrow a definition that it means precisely the same thing as “obstructing” or “interrupting.” As noted above, “obstruct” often means to stop or block passage of something; in this sort of case, it might mean to stop the flow of data altogether. “Interrupt” can mean to inflict more of a temporary stoppage, in the sense of making a break in the continuity of something; in this sort of case, it might mean that the data stops flowing intermittently or temporarily. Even ascribing to “interfering” the narrow meaning of “hindering,” “interfering” is a term of enlargement that has some overlap with the terms “obstructing” and “interrupting,” but also means something additional. Applying this definition, the term “interfering” could mean a slowing of the flow of data that is neither “obstructing” or “interrupting” — for example, changing a network‘s e-mail settings such that a particular account receives e-mails five minutes after all other intended recipients do.
Applying each of the above canons — noscitur a sociis, ejusdem generis, and the canon against surplusage — leads to the conclusion that “interfering” as used in
But even if such meaning was not entirely clear, and if we were to conclude that the statute is ambiguous on this point, the rule of lenity should resolve this ambiguity against the State. For more than 50 years, this Court has recognized and employed the rule of lenity when construing statutes in criminal cases. See, e.g., Gee v. State, 225 Ga. 669, 676 (7) (171 SE2d 291) (1969). “Under the rule of lenity, ambiguity in a statute defining a crime or imposing a penalty should be resolved in the defendant‘s favor.” State v. Hanna, 305 Ga. 100, 103 (2) (832 SE2d 785) (2019) (citation and punctuation omitted); see also State v. Hudson, 303 Ga. 348, 353 (3) n.5 (812 SE2d 270) (2018). It “is applied only when an ambiguity still exists after having applied the traditional canons of statutory construction.” Hanna, 305 Ga. at 102 (2) (citation omitted). Here, if, after consideration of the other canons of construction, there were still ambiguity as to whether “interfering”
Finally, the use of the phrase “in any way” prior to “interfering” does not mean that we must interpret the term “interfering” more broadly. That phrase does not tell us which of the definitions of “interfering” applies; it just says that whatever “interfering” means, undertaking that action “in any way” qualifies. As discussed above, the term “interfering” may be defined in a variety of different, non-overlapping ways. A word means something particular, not several different things simultaneously.
In the context of this statute, the most plausible meaning of “interfering” is hindering the use of data in some way. Applying this narrow construction, the State did not present sufficient evidence as a matter of constitutional due process to convict Kinslow as charged under
Judgment reversed. All the Justices concur, except Melton, C. J., and Ellington and LaGrua, JJ., who dissent.
BETHEL, Justice, concurring.I concur fully in the Court‘s opinion and write separately only to emphasize that the State prosecuted this case solely on the theory that Kinslow committed the crime of computer trespass by interfering with the use of data in violation of
In reaching its erroneous conclusion, the majority rewrites part of the statute that is the subject of this case, ignores other plain language in that same statute which compels a different result, and upends the constitutional standard of review in sufficiency cases. There was sufficient evidence to support the jury‘s finding of guilt in this case. Accordingly, I dissent.
(a) Sufficient evidence was presented at trial to prove that Kinslow knew that his use of the City‘s computer network was done without authority. “‘Without authority’ includes the use of a computer or computer network in a manner that exceeds any right or permission granted by the owner of the computer or computer network.”
(b) There was also sufficient evidence that Kinslow‘s use of the City‘s computer network was done with the intention of “obstructing, interrupting, or in any way interfering with the use of” a computer program or data. Because
(i) It is simplest here to consider the meaning of “in any way interfering.” In doing so, we apply the fundamental rules of statutory construction that require us to construe the statute according to its terms, to give words their plain and ordinary meaning, and to avoid a construction that makes some language mere surplusage. We must also seek to effectuate the intent of the Georgia legislature.
Coates v. State, 304 Ga. 329, 330 (818 SE2d 622) (2018).9
Here, the evidence showed that Kinslow, knowing that he lacked authority to do so, accessed the City‘s computer network and altered the City‘s computer program10, thereby causing Cothran‘s e-mails to be duplicated and the duplicates to be diverted to Kinslow‘s personal e-mail account outside of the City‘s network. Kinslow‘s actions satisfied the plain meaning of “interfering.” By manipulating the data stream to give himself access to Cothran‘s e-mails, Kinslow intermeddled in the affairs of others and the data intended to go to others with neither authority nor invitation. As such, there was sufficient evidence to support a finding that Kinslow interfered with the use of the City‘s computer program and its data. See Jackson, supra, 443 U. S. at 319 (III) (B).
Contrary to the majority opinion‘s assertion, it is of no consequence that the original e-mail made its way to Cothran‘s account. At the moment Kinslow entered into the City‘s computer program and checked the box that generated duplicate data, he had committed exactly the sort of “trespass” that the statute was intended to reach. At that point, Kinslow had improperly used the computer to access data that he was not authorized to see. The fact that he obtained this data from an unauthorized copy does not diminish the crime, as trespass does not require the theft of data from its intended recipient - it requires only that one accesses that data from a place one is not authorized to be. The majority opinion educates wrongdoers that they are better off from both a detection standpoint and from prosecution as a matter of law if they simply copy data rather than block its delivery.
Moreover, the jury was instructed on the entirety of
(ii) To the extent that Kinslow contends that his actions did not affect “data” because the definition of data under the statute must be read to exclude e-mails, the plain language of the statute undermines his argument.
“Data” includes any representation of information, intelligence, or data in any fixed medium, including documentation, computer printouts, magnetic storage media, punched cards, storage in a computer, or transmission by a computer network.
In relevant part, an “electronic communication” is defined as
any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photoelectronic, or photo-optical system that affects interstate or foreign commerce.
(Emphasis supplied.)
(iii) Lastly, the State sufficiently proved that Kinslow intended to interfere with the use of the City‘s computer program and its data. Evidence presented at trial shows that, prior to termination of his employment, Kinslow evinced questionable behavior at work, including a loud outburst directed at Cothran when he criticized Kinslow‘s job performance. In fact, Cothran testified that Kinslow‘s behavior was so alarming that Cothran believed that Kinslow might attempt to damage the City‘s computer network. And Kinslow‘s act of giving himself access to Cothran‘s e-mails, which required intentional acts to access the City‘s computer program and check the box required to forward Cothran‘s e-mails to Kinslow‘s personal address, occurred in temporal proximity to Kinslow‘s confrontation with Cothran, indicative of a decision to interfere. Furthermore, Kinslow‘s access to Cothran‘s e-mails continued after his termination, until it was finally discovered by the City.
Though circumstantial, this evidence is sufficient to support the jury‘s verdict in this case.
[w]hether an alternative hypothesis raised by the defendant is “reasonable” is a question committed principally to the jury, and where the jury is authorized to find that the evidence, though circumstantial, was sufficient to exclude every other reasonable hypothesis save that of the guilt of the accused, we will not disturb that finding unless it is insupportable as a matter of law.
(Citation and punctuation omitted.). Smith v. State, 307 Ga. 680, 684 (838 SE2d 321) (2020). At trial, there was some testimony that forwarding e-mails to a personal account outside of a company‘s server might be a convenient way to be able to quickly determine whether the company‘s server might be down. In addition, Kinslow testified that his former boss, whom Cothran replaced, advised Kinslow to use this method, but Kinslow‘s former boss testified that he could not recall whether he gave Kinslow any such directions. Kinslow‘s reliance on his former boss‘s advice, possibly conveyed before Cothran was hired, is not persuasive. If Kinslow only wanted to monitor the network, as opposed to improperly accessing Cothran‘s e-mails, Kinslow could have forwarded his own e-mails, not those of anyone else. Accordingly, we cannot say that the jury‘s decision to reject Kinslow‘s explanation was not supportable as a matter of law. See id. Moreover, “[i]t was for the jury to determine the credibility of the witnesses and to resolve any conflicts or inconsistencies in the evidence.” (Citation omitted.) Vega v. State, 285 Ga. 32, 33 (673 SE2d 223) (2009).13
3. In conclusion, when the evidence is viewed in the light most favorable to the verdict and
authority to rewrite statutes.“).
I am authorized to state that Justice Ellington and Justice LaGrua join this dissent.
Notes
The General Assembly finds that: (1) Computer related crime is a growing problem in the government and in the private sector; (2) Such crime occurs at great cost to the public, since losses for each incident of computer crime tend to be far greater than the losses associated with each incident of other white collar crime; (3) The opportunities for computer related crimes in state programs, and in other entities which operate within the state, through the introduction of fraudulent records into a computer system, unauthorized use of computer facilities, alteration or destruction of computerized information files, and stealing of financial instruments, data, or other assets are great; (4) Computer related crime operations have a direct effect on state commerce; (5) Liability for computer crimes should be imposed on all persons, as that term is defined in this title; and (6) The prosecution of persons engaged in computer related crime is difficult under previously existing Georgia criminal statutes.
