Indictment Defective for Failure to Plead Computer Fraud as a Continuing Course of Conduct

 State v. Shaw (HSC October 1, 2021)

Background. Susan Shaw was prosecuted for one count of computer fraud in the third degree and fraudulent use of a credit card. In the indictment, the prosecution pleaded in the computer fraud count that from January 16, 2017 through and including May 18, 2017, Shaw “did knowingly access a computer, or computer network with the intent to commit the offense of theft in the third degree[.]” The count also provided the elements to theft in the third degree. Shaw moved to dismiss the indictment based on lack of probable cause. Shaw argued that aggregating the amounts for the thefts into a single felony is not permitted under the computer fraud statute. The motion was denied. Shaw was convicted as charged and the circuit court—the Hon. Judge Fa‘auuga L. To‘oto‘o presiding—sentenced her to five years imprisonment. She appealed to the ICA. The ICA held that the credit card offense should have been dismissed. The ICA vacated judgment and remanded the case back to a new trial on the computer fraud count only. Shaw petitioned to the HSC.

 

Computer Fraud can be Prosecuted Based on the Aggregate of Multiple Transactions . . . The HSC held that the ICA was correct in concluding that the offense allows the aggregation of multiple transactions into a single offense. “A person commits the offense of computer fraud in the third degree if the person knowingly accesses a computer, computer system, or computer network with the intent to commit the offense of theft in the third or fourth degree.” HRS § 708-891.6. The offense requires the specific intent to commit either theft in the fourth degree. In other words, the HSC needed to resolve if the offense could be prosecuted under a continuing course of conduct theory.

 

The continuing offense doctrine determines “whether the individual acts are prohibited, or the course of action which they constitute.” Blockburger v. United States, 284 U.S. 299, 302 (1932). Whether an offense allows the continuous course of conduct theory turns on the language of the statute. “[W]hether a crime may be charged on a continuous conduct theory is whether the language, structure, and purpose of the statute reveals a legislative intent to criminalize continuing conduct.” State v. Decoite, 132 Hawai'i 436, 438, 323 P.3d 80, 81 (2014). More specifically, courts examine if the conduct “is statutorily defined as an uninterrupted and continuing course of conduct, or manifests a plain legislative purpose to be treated as such or both[.]” State v. Arceo, 84 Hawai'i 1, 19, 928 P.2d 843, 861 (1996). And even more specifically, if the statute criminalizes “acts that essentially are of a transitory nature or brief duration,” then the Legislature did not permit a continuous course of conduct theory. State v. Temple, 65 Haw. 261, 267, 650 P.2d 1358, 1362 (1982). On the other hand, when the statute “describes an ongoing course of conduct,” the theory is permitted. Id.

 

The HSC examined the conduct element in computer fraud—“accessing” a computer. Access means “to gain entry to, instruct, communicate with, store data in, retrieve data from, or otherwise make use of any resources of a computer, computer system, or computer network.” HRS § 708-890. For the HSC, this language strongly suggests that the criminalized conduct was more than a “transitory” or brief encounter. It criminalizes an “ongoing process” And so the HSC held that computer fraud can be a continuous course of conduct.

 

. . . But you have to Plead it. Having held that the prosecution can bring computer fraud as a continuing course of conduct, the HSC examined if it did here. The indictment failed to aver that Shaw’s “access” was a continuing course of conduct. The argument of a defective charging instrument was raised for the first time on appeal. That means the indictment must be “liberally construed.” State v. Motta, 66 Haw. 89, 90, 657 P.2d 1019, 1019-1020 (1983); State v. Wells, 78 Hawai'i 373, 381, 894 P.2d 70, 78 (1995).

 

Under the Motta-Wells standard, appellate courts will not vacate the conviction for defective pleading “unless the defendant can show prejudice or that the indictment cannot within reason be construed to charge a crime.” Motta, 66 Haw. at 91, 657 P.2d at 1020. The liberal construction also allows the appellate court to look to other counts in the same indictment and read them together. State v. Sprattling, 99 Hawai'i 312, 319, 55 P.3d 276, 383 (2002).

 

Elements, however, are essential. When an element is omitted in the charging instrument, the charge fails to state an offense. State v. Baker, 146 Hawai'i 299, 308, 463 P.3d 956, 965 (2020).

 

The Problem with this Indictment. The HSC examined the indictment and held that the computer fraud count was defective—even under a liberal construction. Computer fraud in the third degree requires the specific intent to commit theft in either the third or fourth degree. HRS § 708-891.6. The indictment did not aver any intent to commit theft in the fourth degree and it failed to aver the conduct was in the aggregate or a continuing course of conduct. That meant for the HSC that an essential element was missing. The HSC held that “the indictment must allege that the defendant acted pursuant to a scheme or course of conduct” when computer fraud is based on the aggregation theory. The scheme or course of conduct is an element that the prosecution must prove beyond a reasonable doubt. The HSC vacated the order denying Shaw’s motion to dismiss.

Comments

Popular posts from this blog

HSC overrules a nine-month-old case and goes back to the bright-line rule to determine “custody” in custodial interrogation

Judge accidentally strikes the entire expert opinion in a murder trial

Officer’s False Testimony Prompts New Trial Even Though it did not Pertain to the Defendant’s Guilt