THE PEOPLE OF THE STATE OF NEW YORK, Respondent, v LOUIS PUESAN, Appellant.
Appellate Division of the Supreme Court of New York, First Department
October 8, 2013
110 A.D.3d 222 | 973 N.Y.S.2d 121
APPEARANCES OF COUNSEL
Cyrus R. Vance, Jr., District Attorney, New York City (Naomi C. Reed and Alan Gadlin of counsel), for respondent.
OPINION OF THE COURT
SAXE, J.
Since 1986, when the New York State Legislature first enacted
Essentially, it is asserted that, while on leave from his job as a fiеld technician for Time Warner Cable, and therefore unauthorized to enter its offices or use its computers, defendant entered Time Warner Cable’s Northern Manhattan office and installed a
Defendant was charged with almost every offense defined in
I. The Trial Evidence
On November 9, 2007, dеfendant was placed on disability leave from his job as a field technician for Time Warner Cable. Tom Allen, vice-president of security at Time Warner, testified that an employee who is placed on work leave is not considered an active employee; his or her access card is disabled and thus cannot be used to gain access to the company’s offices. This policy is announced in employee handboоks provided to employees, and any employee placed on leave is instructed by human resources department personnel regarding that policy. Since the public is not allowed to enter Time Warner Cable’s Northern Manhattan office, security guards are stationed outside to ensure that those entering the building have valid ID cards.
David Lopez, a head-end technician for Time Warner Cable, testified that sometime in latе January or early February 2008, he arrived at work at the company’s Northern Manhattan office, located at 401 West 219th Street, and spotted defendant nearby. During a brief conversation, defendant asked Lopez for Lopez’s personal log-in and password for Time Warner Cable’s billing and customer information system, CSG, but Lopez
It is undisputed that on February 10, 2008, defendant entered the Time Warner Cable Northern Manhattan office at 5:17 p.m., and left at 6:03 p.m. Lopez testified that at 5:30 p.m., he saw defendant using a computer in the service ready room. However, while both Lopez and Harris saw defendant using all three of those computers during that period of time, neither could see what he was doing with the computers. According to Lopez, there were approximately six other employees in the room while defendant was using the computers, but they were in a separate area of the room, not near the computers.
From the time he first saw defendant using the computers tо the time he left at 6:30 p.m., Harris saw no other individual using the computers. Harris did not notify anyone about defendant’s use of the computer at the time; nor did he check the computers after defendant left.
The following morning, on February 11, Harris logged on to the computers in the service ready room and noticed that a program, Cracks, was open and running on the main computer. Harris was curious as to what the program was, and said that he visited the website and found that it was a site that showed “how to generate password keys for software.” This website and program was used to gain access to password-protected software. Harris discovered that the same program was open and running on the other two computers in the room. As Harris went to report his findings, he saw Lopez walking in to the room. He and Lopez talked, and then Harris reported his findings to Paul Hart, a foreman. Hart in turn notified supervisor Lance Giancotti about the situation, and Giancotti concluded that there had been a security breach.
Giancotti reported the security breach to Sandip Gupta, Time Warner Cable’s senior director of information technology, and
When the three computers arrived at Time Warner Cable’s lab on 23rd Street, Rosenthal and Gupta discovered that unplugging them had caused the hard drives to be erased on the two “thin client” computers. However, the main comрuter’s hard drive remained intact, and Rosenthal was able to make a copy of it to analyze without damaging the contents of the original hard drive.
Rosenthal testified that he was unable to access Winvestigator’s log file, which keeps track of the program’s information and data, and discovered it had been password protected. To gain access to that log file, Gupta purchased a “back-door” password to access Winvestigator. Rosenthal was able to gain access to the program. He discovered that the program had stored his own password as well as Giancotti’s password. The individual who installed Winvestigator on the Time Warner computers, Rosenthal testified, had set the program’s password to “lp.”
Tom Allen, Time Warner Cable’s vice-president of security, testified that on February 12, 2008, he was notified of the security problem in the Northern Manhattan office, and reported the security breach to the New York City Police Department.
On April 3, Allen and Rosenthal turned over two hard drives and a desktop computer tower to Detective Jorge Ortiz, a member of the NYPD’s Computer Crime Squad, who had received specialized training in computer forensics. Ortiz made copies of the hard drives and desktop tower and then conducted a forensic analysis on the copies. He ran a program named Net Analysis, which analyzes the computer’s Internet history, and two malware detection programs, Gargoyle and Encase. He
Both Gargoyle and Encase showed that Winvestigator had been installed on the desktop computer on February 10, 2008, during the time period under investigation. Ortiz determined that Winvestigator’s settings were set to log keystrokes, user sign-ons, and the times that programs opened and closed. Additionally, Winvestigator was programmed to self-encrypt and not warn others that the program was running, so that anyone without the programmed password would be unable to look at the Winvestigator log file, because it would display only incomprehensible text. Ortiz determined that Winvestigator had started to log keystrokes at 5:37 p.m. on February 10, 2008.
II. Discussion
To determine the legal sufficiency of the evidence to support a conviction, the Court must view the evidence in the light most favorable to the People to decide whether any rational trier of fact, using any valid line of reasoning, cоuld have found the elements of each crime beyond a reasonable doubt (see People v Ramos, 19 NY3d 133, 136 [2012]; People v Bleakley, 69 NY2d 490, 495 [1987]).
A. Computer Trespass
To convict an individual of computer trespass under
The term “without authorization” is defined as “access of a computer service by a person without permission . . . or after actual notice to such person, that such access was without permission” (
Defendant’s reliance on People v Katakam (172 Misc 2d 943 [Sup Ct, NY County 1997]) is misplaced. There, unlike here, the defendant obtained materials during a period of time whеn he was given free access to them; thus, his access was not “without authorization” (172 Misc 2d at 947-948). To the extent defendant argues that proof of computer trespass requires the People to show that he engaged in his conduct to gain a competitive advantage, and that they failed to do so, we note that the statute contains no such intent element; therefore, the People had no such obligation. The Katakam court discussed the defendant’s intent to gain a benefit only in the context of the charge of criminal possession of computer related material (id. at 947).
As to whether the information defendant gained access to constituted “computer material” for purposes of
Notably, the statute requires only that defendant “knowingly gain[ ] access to computer material“; it does not require that he actuаlly make use of the material in any way. The evidence is sufficient to establish that with the information defendant obtained by illicitly installing Winvestigator he gained access to the confidential customer information in Time Warner’s CSG system. Moreover, the testimony of David Lopez that defendant asked him for his personal log-in and password for access to the CSG system adds weight to the evidence that defendant’s actions were purposefully geared toward gaining access to information in that system.
Therefore, all the elements of computer trespass under
B. Computer Tampering
The crime of computer tampering in the third degree (
Dеfendant’s actions here amounted to an even clearer alteration of programs than the actions of the defendant in Versaggi. The installation of a program that secretly monitors and replicates other users’ keystrokes, and self-encrypts if the wrong password is used to attempt access to it, constitutes an alteration of the computer programs on the computers on which it was installed.
Of the four aggravating factors thаt can elevate fourth-degree computer tampering to the third degree, the People rely on the one specifying that the defendant did so “with an intent to commit or attempt to commit or further the commission of any felony” (
C. Unlawful Duplication of Computer Related Material
“A person is guilty of unlawful duplication of computer related material in the first degree when hav-ing
no right to do so, he or she copies, reprоduces or duplicates in any manner . . . any computer data or computer program with an intent to commit or attempt to commit or further the commission of any felony” ( Penal Law § 156.30 [2] ).
Defendant argues that there is insufficient evidence that he duplicated or copied computer materials. Additionally, he again challenges the sufficiency of the evidence supporting the finding that he committed felony computer trespass.
The act оf installing a keystroke logging program to reproduce other employees’ user IDs and passwords amounts to arranging for the duplication of that log-in information, to which defendant alone gained access. The finding that defendant arranged for the duplication of the user log-in information in furtherance of his commission of the felony of computer trespass is fully supported by the evidence.
D. Criminal Possession of Computer Related Material
As defined by
“A person is guilty of criminal possession of сomputer related material when having no right to do so, he knowingly possesses, in any form, any copy, reproduction or duplicate of any computer data or computer program which was copied, reproduced or duplicated in violation of section 156.30 of this article, with intent to benefit himself or a person other than an owner thereof.”
The term “benefit” is defined as “any gain or advantage to the beneficiary” (
Having determined that there is legally sufficient evidence to establish that defendant arranged for the duplication of computer data in violation of
Accordingly, the judgmеnt of the Supreme Court, New York County (Michael R. Sonberg, J.), rendered September 13, 2010, convicting defendant, after a jury trial, of computer trespass (three counts), computer tampering in the third degree (three counts), unlawful duplication of computer related material in the first degree, and criminal possession of computer related material, and sentencing him to an aggregate term of five years’ probation, should be affirmed.
Mazzarelli, J.P., Acosta, Renwick and Clark, JJ., concur.
Judgment, Supreme Court, New York County, rendered September 13, 2010, affirmed.
