UNITED STATES of America, Plaintiff-Appellee v. Michael THOMAS, Defendant-Appellant
No. 16-41264
United States Court of Appeals, Fifth Circuit.
December 11, 2017
877 F.3d 591
Aaron Kyle Williamson, Tor Ekeland, Tor Ekeland, P.C., New York, NY, for Defendant-Appellant.
Before WIENER, HIGGINSON, and COSTA, Circuit Judges.
GREGG COSTA, Circuit Judge:
Michael Thomas worked as the Information Technology Operations Manager for ClickMotive, LP, a software and webpage hosting company. Upset that a coworker had been fired, Thomas embarked on a weekend campaign of electronic sabotage. He deleted over 600 files, disabled backup operations, eliminated employees from a group email a client used to contact the company, diverted executives’ emails to his personal account, and set a “time bomb” that would result in employees being unable to remotely access the company‘s network after Thomas submitted his resignation. Once ClickMotive discovered what Thomas did, it incurred over $130,000 in costs to fix these problems.
A jury found Thomas guilty of “knowingly caus[ing] the transmission of a program, information, code, or command, and as a result of such conduct, intentionally caus[ing] damage without authorization, to a protected computer.”
I.
Thomas‘s duties at ClickMotive included network administration; maintaining production websites; installing, maintaining, upgrading, and troubleshooting network servers; ensuring system security and data integrity; and performing backups. He was granted full access to the network operating system and had the authority to access any data and change any setting on the system. Thomas was expected to perform his duties using his “best efforts and judgment to produce maximum benefit” to ClickMotive.
Thomas was not happy when his friend in the IT department was fired. It was not just a matter of loyalty to his former colleague; a smaller IT staff meant more work for Thomas. So Thomas, to use his word, “tinkered” with the company‘s sys
- He deleted 625 files of backup history and deleted automated commands set to perform future backups.
- He issued a command to destroy the virtual machine1 that performed ClickMotive‘s backups for one of its servers and then Thomas failed to activate its redundant pair, ensuring that the backups would not occur.
- He tampered with ClickMotive‘s pager notification system by entering false contact information for various company employees, ensuring that they would not receive any automatically-generated alerts indicating system problems.
- He triggered automatic forwarding of executives’ emails to an external personal email account he created during the weekend.
- He deleted pages from ClickMotive‘s internal “wiki,” an online system of internal policies and procedures that employees routinely used for troubleshooting computer problems.
- He manually changed the setting for an authentication service that would eventually lead to the inability of employees to work remotely through VPN. Changing the setting of the VPN authentication service set a time bomb that would cause the VPN to become inoperative when someone rebooted the system, a common and foreseeable maintenance function.
- And he removed employees from email distribution groups created for the benefit of customers, leading to customers’ requests for support going unnoticed.
Thomas was able to engage in most of this conduct from home, but he did set the VPN time bomb on Sunday evening from ClickMotive‘s office, which he entered using another employee‘s credentials. It was during this visit to the office that Thomas left his resignation letter that the company would see the next day. When the dust settled, the company incurred over $130,000 in out-of-pocket expenses and employees’ time to undo the harm Thomas caused. In a subsequent interview with the FBI, Thomas stated that he engaged in this conduct because he was “frustrated” with the company and wanted to make the job harder for the person who would replace him.
A grand jury eventually charged Thomas with the
At trial, company employees and outside IT experts testified that none of the problems ClickMotive experienced as a result of Thomas‘s actions would be attributable to a normal system malfunction. They further stated that Thomas‘s actions were not consistent with normal troubleshooting and maintenance or consistent with mistakes made by a novice. ClickMotive employees asserted that it was strange for the wiki pages to be missing and that someone in Thomas‘s position would know that changing the setting of the VPN authentication service would cause it to become inoperative when someone rebooted the system.
The jury instructions included the statutory definition of “damage,” which is “any impairment to the integrity or availability of data, a program, a system, or information.”
After the jury returned a guilty verdict, the district court sentenced Thomas to time served (which was the four months since he had been detained after returning to the country), plus three years of supervised release, and ordered restitution of $131,391.21. Thomas then filed an unsuccessful motion for judgment of acquittal. That motion, like this appeal, argued that the evidence was not sufficient to convict Thomas because he was authorized to damage the computer as part of his routine IT duties.
II.
A.
Although raised in the context of a sufficiency challenge which usually focuses on the evidence, Thomas‘s argument is principally a question of statutory interpretation.2 So we will begin with an analysis of the statute as the elements of the statute establish what the evidence must prove.
Because Thomas‘s argument that he was authorized to damage a computer seems nonsensical at first glance, it is helpful at the outset to explain the steps he takes to get there. He first points out that his job duties included “routinely deleting data, removing programs, and taking systems offline for diagnosis and maintenance.” Thomas says this conduct damaged the computer within the meaning of the Computer Fraud and Abuse Act because damage is defined to just mean “any impairment to the integrity or availability of data, a program, a system, or information,”
critical leap: Thomas argues that because he was authorized to damage the computer when engaging in these routine tasks, any damage he caused while an employee was not “without authorization.” Thus he cannot be prosecuted under
Thomas‘s support for reading the statute to cover only individuals who “had no rights, limited or otherwise [to] impair” a system comes from cases addressing the separate “access” provisions of
Crimes involving unauthorized access are more numerous in the Computer Fraud and Abuse Act. See, e.g.,
None of these concerns translates to the damage statute. “Without authorization” modifies damage rather than access. Kerr, supra, at 1661 (explaining that the federal damage statute uses “without authorization” in “a very different way” from how it is used in the access statutes).
Nor is there a significant threat that liability under the damage statute would extend to largely innocuous conduct because the requirement of “intentionally causing damage” narrows the statute‘s reach. Cf. Kerr, supra, at 1660-62 (stating that
So Thomas‘s reading of “without authorization” is at odds with the statutory language and legislative intent. His offered construction thus finds no recourse in the rule of lenity because there is no interpretive tie for that principle to break. United States v. Castleman, 572 U.S. 157, 134 S.Ct. 1405, 1416, 188 L.Ed.2d 426 (2014)
We conclude that
B.
With this understanding of the damage statute, we turn to the more typical sufficiency review and evaluate whether the evidence supported the conviction. This analysis usually begins with talk of the considerable deference the jury‘s view of the evidence should receive, with it getting to make credibility determinations, draw reasonable inferences, and the like. United States v. Winkler, 639 F.3d 692, 696 (5th Cir. 2011). Reliance on that standard of review is unnecessary here as there is overwhelming evidence to support the jury‘s view that Thomas did not have permission to engage in the weekend damage campaign.
The nature of Thomas‘s conduct is highly incriminating. No reasonable employee could think he had permission to stop the system from providing backups, or to delete files outside the normal protocols, or to falsify contact information in a notification system, or to set a process in motion that would prevent users from remotely accessing the network. Phillips, 477 F.3d at 220 (affirming jury finding of lack of authorization to launch a brute-force attack program when that would not be permissible “within the understanding of any reasonable computer user“). Thomas emphasizes the unlimited access he had to the system that gave him the ability to inflict this damage. But it is not conceivable that any employee, regardless of their level of computer access, would be authorized to cause these problems. The incidents for which Thomas was held liable were nothing like the periodic acts he performed as part of his duties. Those tasks may have impaired the system on a limited basis in order to benefit the computer network in the long run. Routine deletions of old files provide that benefit by increasing storage space. Taking systems offline allows for necessary maintenance. In contrast, the various types of damage Thomas caused during the last few days before he resigned resulted in over $130,000 in remediation costs. Regardless of whether the definition of “damage” under the statute requires a showing of harm, impairments that harm the system are much less likely to be authorized than those that benefit the system. It would rarely if ever make sense for an employer to authorize an employee to harm its computer system.
The harmful acts themselves would be enough to support the verdict, but Thomas‘s words and conduct in response to the criminal investigation provide additional support. When questioned by federal agents, he acknowledged the distinction we have just made. He did not say that he caused the damage in order to maintain or improve the system; instead, his motive was to make things more difficult for the person hired to replace him. And his flight to Brazil is not what is expected of some
The circumstances surrounding the damaging acts provide even more support for the finding of guilt. Thomas committed the various acts one after the other in a concentrated time span beginning Friday evening and continuing through the weekend. Thomas did most of this from home, but the one time he had to go the office he did so using another employee‘s credentials. One of his acts—falsification of contact information in the alert system—prevented Thomas‘s conduct from being detected during the weekend as employees would not receive notifications about the damage to the system. He submitted his resignation immediately after completing the damage spree and timed the most damaging act—the one that would prevent remote access—so that it would not occur until he was gone. Why this sequence of events if Thomas had permission to cause the damage?
All of this provided ample support to conclude that Thomas lacked permission to inflict the damage he caused. As that question of authorization is the only element he challenges, sufficient evidence supports the conviction.
III.
What we have just said about the straightforward application of the damage statute to Thomas‘s conduct also dooms his claim that the law is unconstitutionally vague. That is because even if a statute might be vague when applied to some situations, “a defendant whose conduct is clearly prohibited cannot be the one making that challenge.” United States v. Westbrooks, 858 F.3d 317, 325 (5th Cir. 2017).
Further proof that Thomas‘s conduct is a paradigmatic application of
Employee sabotage: Sam is a computer programmer who is angry at his employer for denying him a promotion. Sam decides to take revenge by deleting some of his employer‘s important files, and by launching a denial-of-service attack that overwhelms his company‘s webserver with requests and takes it offline for a few hours. The deletion of the files will not constitute an unauthorized access. Sam accessed his employer‘s computer when he used it to delete files, but as a programmer he was authorized to access those files and therefore has not committed access without authorization. Similarly, the denial-of-service attack will not itself constitute an unauthorized access crime. Sending the data to the computer does access the computer, but the access is not without authorization: The webserver has been configured to accept all web traffic requests, such that sending many requests will not circumvent any code-based restrictions.
Sam does not avoid criminal liability, however. The deletion of the files may constitute destruction of property or conversion and, depending on the applicable state laws, he could be prosecuted under general property crime statutes. Sam could also be prosecuted for damaging the computer under the federal
computer damage statute, 18 U.S.C. § 1030(a)(5)(A)(i) .
Kerr, supra, at 1664-65 (emphasis added).
The law review article is not all that undermines the contention that Thomas lacked notice that his conduct was criminal. Just a couple weeks after the damage spree, and before the FBI had contacted Thomas, he told the friend whose firing had set this in motion that “he thought he might have broken the law.” Which law, the friend inquired? Thomas‘s response: “the Computer Fraud and Abuse Act.”
* * *
The judgment of the district court is AFFIRMED.
GREGG COSTA
UNITED STATES CIRCUIT JUDGE
