AND NOW, this 16th dаy of January 2014, upon consideration of Defendant Yijia Zhang’s Motion to Dismiss Count II of Indictment (Doc. No. 45) and Memorandum of Law in Support thereof (Doc. No. 46), and the Government’s Memorandum of Law in Opposition to Motion to Dismiss Count Two (Doc. No. 47) and Supplemental Memorandum (Doc. No. 48), it is hereby ORDERED that Zhang’s Motion to Dismiss Count II of Indictment is GRANTED.
I. FACTUAL BACKGROUND
On September 13, 2012, the Government filed an indictment (the “Indictment”) charging Yijia Zhang with damaging a protected computer in violation of 18 U.S.C. §§ 1030(a)(5)(A) and 1030(c)(4)(A)(i)(I) (“Count I”), and violating the National Stolen Property Act (“NSPA”), 18 U.S.C. § 2314 (“Count II”). (Indictment 1-5, Doc. No. 1.)
According to the Indictment, Zhang worked as a computer systems manager for “Company A” until July 6, 2010. (Indictment ¶¶ 2, 6.) On June 28, 2010, Zhang copied approximately 6,700 of Company A’s confidential files from an unspecified location on Company A’s internal network to the desktop computer provided to Zhang by Company A. (Indictment ¶ 7.) Zhang then transferred some or all of these files from his computer to one of Company A’s servers (the “Server”). (Indictment ¶ 8.) The copied and transferred files contained “sensitive information regarding the operation and development of Cоmpany A’s computer network.” (Indictment ¶ 13.) Two days later, on June 30, 2010, Zhang gave Company A written notice that his last day with the company would be July 6, 2010. (Indictment ¶ 6.)
On Saturday, July 3, 2010, Zhang copied approximately 2,800 more confidential files from Company A’s network to his desktop computer. (Indictment ¶ 10.) On Sunday, July 4, 2010, Zhang copied roughly 300 more 'confidential files to his computer. (Indictment ¶ 11.) Zhang then transferred some or all of the confidential files that he had accumulated on his desktop computer that weekend to the Server. (Indictment ¶ 12.) Next, Zhang established an Internet connеction between the Server and Internet storage sites in Sweden and Germany that Zhang maintained. (Indictment ¶¶ 3,14.) Zhang then used this connection to transfer an unspecified number of Company A’s confidential files to the Internet storage sites. (Indictment ¶ 14.) After completing this transfer, Zhang covered his digital tracks by deleting unspecified files from the Server. (Indictment ¶ 17.) The deletion of these files eliminated evidence of Zhang’s transfers and prevented the Server from functioning as intended. (Id.)
Presently before the Court is Zhang’s motion to dismiss Count II of the Indictment pursuant to Federal Rule оf Criminal Procedure 12(b)(3)(B). (See Def.’s Mot. Dismiss Count II, Doc. No. 45.) Zhang argues that the allegations in the Indictment fail to state an offense under the NSPA. The Government opposes this motion.
II. LEGAL STANDARD
Federal Rule of Criminal Procedure 7(c)(1) provides that an “indictment ... must be a plain, concise, and definite written statement of the essential facts constituting the offense charged.” “A facially sufficient indictment (1) contains the elements of the offense intended to be charged, (2) sufficiently apprises the defendant of what he must be prepared to meet, and (3) allows the defendant to show with accuracy to what extent he may plead a former acquittal or conviction in the
“Under Rule 12(b)(3)(B), a defendant may contest the sufficiency of an indictment on the basis that it fails to state an offense ... [because] the specific facts alleged fall beyond the scope of the relevant criminal statute, as a matter of statutory interpretation.” Id. (internal quotation marks omitted). A district court evaluates a challenge under this Rule by “determining whether, assuming all of those facts as true, a jury could find that the defendant committed the offense for which he was charged.” United States v. Huet,
III. ANALYSIS
Federal crimes are “solely creatures of statute.” Dixon v. United States,
The Supreme Court instructs that “ambiguity concerning the ambit of criminal statutes should be resolved in favor of lenity.” Jones v. United States,
The NSPA makes it a crime for a person to “transport! ], transmit! ], or transferí] in interstate or foreign commerce any goods, wares, merchandise, securities or money, of the value of $5,000 or more, knowing the same to have been stolen, converted or taken by fraud.” 18 U.S.C. § 2314. The digital files at issue in this case are neither securities nor money. (Cf. Gov’t’s Mem. Opp. Mot. Dismiss 2 (“The central issue to this motion is whether there is a difference between ‘goods, wares, and merchandise’ in paper and digital form.”).) Thus, to survive Zhang’s motion to dismiss, the indictment must allege: (1) that Zhang transported, transmitted, or transferred goods, wares, or merchandise in interstate or foreign commerce; (2) that those goods, wares, or merchandise had a value of $5,000 or more; and (3) that Zhang knew “the same” to have been stolen, converted, or taken by fraud. Id.; cf. Dowling v. United States,
Zhang argues that the Indictment fails to state an offense for two reasons. Fust, Zhang argues that the Indictment fails to allege that “the stolen item was in some tangible or physical form” when it was stolen. (Def.’s Mem. Supp. Def.’s Mot. Dismiss Count II, at 8, Doc. Nо. 46.) Second, Zhang argues that the Indictment fails to allege the existence of a market for the confidential information stolen by Zhang. (Id. at 12-13.)
The Court must determine whether the NSPA requires the government to make these allegations, and, if it does so require, whether the government makes these allegations in the Indictment.
A. Are Digital Files Transmitted Over a Computer Network Goods, Wares, or Merchandise Within the Meaning of the NSPA?
1. Does the NSPA Include a Tangibility Requirement?
The NSPA does not define the terms “goods,” “wares,” or “merchandise.” It is
Third Circuit and the Supreme Court have considered similar issues; and other courts have squarely addressed whether the NSPA criminalizes the theft of intangible information.
In 1959, the Third Circuit held that the phrase “goods, wares, merchandise” in the NSPA is “a general and comprehensive designation of such personal property or chattels as are ordinarily a subject оf commerce.” United States v. Seagraves,
Roughly 25 years later, in 1985, the Supreme Court addressed whether the NSPA criminalizes the “interstate shipments of bootleg and pirated sound recordings and motion pictures whose unauthorized distribution infringed valid copyrights.” Dowling,
The Supreme Court began its analysis by noting that the text of the NSPA does not plainly cover the interstate shipment of bootleg records for two reasons. First, copyrighted works are not obviously goods, wares, or merchandise. The Court explained that the NSPA “seems clearly to contemplate a physical identity between the items unlawfully obtained and those eventually trаnsported” by “requiring that the ‘goods, wares, [or] merchandise’ be ‘the same’ as those ‘stolen, converted or taken by fraud.’” Id. at 216,
In the years since the Supreme Court announced its opinion in Dowling, the Courts of Appeals for the First, Second, Seventh, and Tenth Circuits have concluded that only tangible property can constitute goods, wares, or merchandise within the meaning of the NSPA. The Tenth Circuit holds that a “computer program itsеlf is an intangible intellectual property, and as such, it alone cannot constitute goods, wares, merchandise, securities or moneys which have been stolen, converted or taken within the meaning of [the NSPA].” United States v. Brown,
'Likewise, the Seventh Circuit holds that the “Comdata codes” used in the trucking industry to transfer money are not “goods, wares, or merchandise” because they are, instead, “information.” United States v. Stafford,
The First Circuit agrees that the NSPA “does not apply to purely intangible information,” but “does apply when there has been some tangible item taken, however insignificant or valueless it may be, absent the intangible component.” United States v. Martin,
The Second Circuit held that the theft of “purely intangible property embodied in a purely intangible format” falls outside the NSPA. Id. at 78. The Court reasoned that the NSPA “presupposes that the thing stolen was a good or ware, etc., at the time of the theft” by requiring that the good be “transported with knowledge that ‘the same’ has been stolen.” Id. at 78. Put differently, the text of the NSPA “ ‘eon-template[s] a physical identity between the items unlawfully obtained and those eventually transported.’ ” Id. (alteration in original) (quoting Dowling,
The following year, the Second Circuit again considered the scope of the NSPA when presented with another appeal by a defendant, Agrawal, convicted under the NSPA of stealing “confidential computer code ... used to conduct high frequency securities trades” from his employer. United States v. Agrawal,
Not all courts to consider the issue have held that the NSPA includes a tangibility requirement. In 1990, a District Court Judge sitting in the Northern District of Illinois held that the NSPA covers “proprietary business information” sent across “state lines via computer-generated electronic impulses.” United States v. Riggs,
Similarly, in 2001, a Judge of the United States District Court for the Southern District of New York held that “the transfer of electronic documents via the internet across state lines does fall within the purview of [the NSPA].” United States v. Farraj,
The government argues that this Court should not be persuaded by the rationales of the Courts of Appeals in cases like Aleynikov and Brown because the reasoning in those cases is “wrong,” “inconsistent with logic and [analogous case law],” and “leads to absurd results.” (Gov’t’s Mem. Opp. Mot. Dismiss 2.) Instead, the government urges us to decide that the NSPA includes no tangibility requirement. The government argues that Dowling does not compel a contrary conclusion for two reasons.
First, the government argues that Dowling did not hold that the NSPA requires “a physical identity between the items unlawfully obtained and those eventually transported, and hence some prior physical taking of the subject gоods,” Dowling,
Second, the government argues that any “tangibility requirement was removed when Congress amended the [NSPA] in 1988.” (Gov’t’s Mem. Opp. Mot. Dismiss 3.) That year, Congress amended the NSPA by “striking ‘transports’ and inserting ‘transports, transmits, or transfers.’ ”
We find that the NSPA is ambiguous about whether stolen “goods, wares, and merchandise” must take a physical form. The Third Circuit directs that the ordinary meaning of goods, wares, and merchandise is “personal property or chattels” that are “ordinarily a subject of commercе.” Seagraves,
The government’s contrary position is not unreasonable. In this digital era, we think that intangible products could reasonably be understood to constitute personal property that is ordinarily the subject of commerce. For example, we agree with the government that one could reasonably conclude that a consumer who pays for and downloads a digital copy of Microsoft Windows has purchased a good.
When faced with an ambiguous criminal statute, this Court must construe that statute in the defendant’ favor. Jones,
2. Does the Indictment Allege the Theft of Something Tangible ?
Zhang argues that the tangibility requirement has not been met because “nowhere in the Indictment does the Government state, nor even suggest, that the information [stolen by Zhang] ever took a physical form.” (Def.’s Mem. Supp. Def.’s Mot. Dismiss Count II, at 11.) “Instead, the Government alleges that Mr. Zhang transferred electroniс files over the internet from a network to a server.” (Id.)
The government responds that “storage of information in digital format on a server, a computer hard drive, or a disk is just as physical as the storage on a piece of paper.” (Gov’t’s Mem. Opp. Mot. Dismiss at 14.) The government argues that the Indictment satisfies any tangibility requirement because “the material had a physical embodiment on the servers of Company A” and on Zhang’s “storage space in Europe.” (Id. at 15.)
We agree with the government that information stored in computer hardware has а physical manifestation. Accord United States v. Walter,
The government has not alleged, as it must, that the digital files transmitted by Zhang had been stolen, converted, or taken by fraud while in a tangible form. Bits transmitted over the Internet are intangible information falling outside the NSPA’s ambit. Accordingly, the government has failed to state an offense under the NSPA.
B. Whether the Indictment Must and Does Allege the Existence of a Market for the Digital Files Zhang Allegedly Stole
Having concluded that the indictment must be dismissed because it does not allege that Zhang stole goods, wares, or merchandise within the meaning of the NSPA, we do not reach Zhang’s argument that the Indictment must also be dismissed for failure to allege the existence of a market for the files Zhang allegedly stole.
IV. CONCLUSION
For the foregoing reasons, we will grant Zhang’s motion to dismiss Count II of the Indictment.
Notes
. Indeed, the legislative history of the 1988 amendment suggests that the amendment's purpose was to codify appellate court decisions holding that the interstate, digital transfer of money and securities falls within the reach of the NSPA. See, e.g., United States v. Goldberg,
. The government hаs filed a supplemental memorandum addressing the Seagraves Court's citation to Western Union Telegraph Co. v. Lenroot,
. Of course, this does not mean that such theft is lawful. In 1996, Congress enacted the Economic Espionage Act (“EEA”) to protect “proprietary economic information from theft and misappropriation in a systematic, principled manner.” S.Rep. No. 104-359,
The EEA makes it a crime to “knowingly engage! ] in the theft of trade secrets ... 'with intent to convert a trade secret, that is related to or included in a product that is produced for or placed in interstate or foreign commerce, to the economic benefit of anyone other than the owner thereof, and intending or knowing that the offense will! 1 injure any owner of that trade secret.’ ” Hsu,
. In Bottone, Judge Friendly wrote for the Second Circuit that "the transformation of the information in the stolen papers into a tangible object never possessed by the original owner should be deemed immaterial” where "tangible goods are stolen and transported and the only Legróme D. Davis, J. obstacle to condemnation is a clever intermediate transcription or use of a photocopy machine.”
. We echo the sentiment expressed by the Second Circuit: In terms of moral culpability, there may be little to distinguish a defendant who transports information stolen in purely digital form from a defendant who transports information stolen by storing it on a flash drive or printing it on paper. "But it is Congress’s task, not the courts’, to define crimes and prescribe punishments.” Agrawal,
