State v. Krause

Decision Date12 April 2017
Docket Number27629,27628
Citation894 N.W.2d 382
Parties STATE of South Dakota, Plaintiff and Appellee, v. Ryan Alan KRAUSE, Defendant and Appellant. State of South Dakota, Plaintiff and Appellee, v. Brian Michael Krause, Defendant and Appellant
CourtSouth Dakota Supreme Court

MARTY JACKLEY, Attorney General, KIRSTEN E. JASPER, Assistant Attorney General, Pierre, South Dakota, Attorneys for plaintiff and appellee.

CHAD C. NELSON, Milbank, South Dakota, Attorney for defendants and appellants.

GILBERTSON, Chief Justice

[¶1.] Twin brothers Ryan Alan Krause and Brian Michael Krause appeal the circuit court's imposition of four consecutive, two-year sentences on each brother for multiple convictions of unlawfully using a computer system. The Krauses first argue their sentences violate the Eighth Amendment's prohibition against cruel and unusual punishment. They also argue the circuit court erred by deviating from presumptive sentences of probation for these offenses and in failing to state the aggravating circumstances justifying such deviation. We affirm.

Facts and Procedural History

[¶2.] In 2014, the Krauses were both employed in information-technology positions in Milbank. Brian worked for Valley Queen Cheese, and Ryan worked for Big Stone Therapies. Valley Queen Cheese had contracted with the Xerox Company to supply toner cartridges. Under the agreement, Xerox maintained ownership of a cartridge even while it was in Valley Queen Cheese's possession. In order to protect its property interest in leased cartridges, Xerox maintains a security division that monitors the internet for the sale of such consumables.

[¶3.] In January 2014, Xerox's security division discovered some of its toner cartridges posted for sale on the internet. The cartridges had been assigned to Valley Queen Cheese and were offered for sale by someone using the email address Brian.Krause1@html.com. Xerox purchased the cartridges and made similar purchases from the same seller in April 2014. Afterward, the seller offered to sell Xerox additional property worth $5,800 for the price of only $600. After this exchange, Xerox notified the Milbank Police Department.

[¶4.] The subsequent investigation uncovered a scheme in which the Krauses stole equipment from both Valley Queen Cheese and Big Stone Therapies and sold it on the internet. An internal investigation conducted by Valley Queen Cheese revealed that approximately $180,000 in equipment had been stolen by the Krauses. The stolen equipment included: toner, toner cartridges, computers, computer monitors, printers, phones, electronic equipment, and other miscellaneous items of inventory. The Krauses had also taken additional electronics from Big Stone Therapies.

[¶5.] In addition to stealing company property, the Krauses also accessed sensitive and private information. On December 27, 2013, the Krauses accessed the restricted database of Valley Queen Cheese's accounting department and copied the 2013 payroll statement, which included the ID numbers, salaries, benefits, accrued leave, bonus payments, mailing addresses, and bank-account numbers of its employees. On July 1, 2014, Brian accessed the email account of the chief financial officer (CFO) and copied an email containing a local businessman's development-loan application, which included the businessman's taxpayer ID number, social security number, underwriting documents, personal financial statement, and business financial statement. On July 23, 2013, Brian accessed the CFO's personal files and copied the personal financial statements of the CFO and the chief executive officer. On May 31, 2013, and February 12, 2014, Brian accessed the CFO's and IT administrator's email accounts and used their information to access the CFO's and administrator's online banking records. In each of the foregoing instances, Brian shared and discussed the information he accessed with Ryan.

[¶6.] On July 10, 2015, the Krauses entered into identical plea agreements with the State. The Krauses agreed to pay restitution to Valley Queen Cheese and Big Stone Therapies in the amount of $80,000 and to sign over the title to a jointly owned pontoon boat. In exchange, the State agreed to limit charges to one count each of grand theft for the property taken and four counts each of unlawfully using a computer system. The State also agreed to recommend that the sentences for unlawfully using a computer system run concurrent with the sentence for grand theft. Pursuant to these agreements, the State filed separate complaints against the Krauses on July 14. Each complaint alleged one count of grand theft under SDCL 22–30A–1 and four counts of unlawfully using a computer under SDCL 43–43B–1(2).

[¶7.] The Krauses entered guilty pleas to all charges on July 20, 2015, and the circuit court sentenced them on September 15, 2015. Focusing on punishment and deterrence, the circuit court sentenced each of the Krauses to four years imprisonment for grand theft. The court also sentenced the Krauses to two years imprisonment for each count of unlawfully using a computer system. Additionally, the court ordered all sentences run consecutively.

[¶8.] In this consolidated appeal, the Krauses raise two issues:1

1. Whether their consecutive sentences for unlawfully using a computer system violate the Eighth Amendment's prohibition against cruel and unusual punishment.2
2. Whether the circuit court erred by imposing sentences of imprisonment instead of probation for the unlawful-use-of-computer-system convictions.
Analysis and Decision

[¶9.] 1. Whether the Krauses' consecutive sentences for unlawfully using a computer system violate the Eighth Amendment's prohibition against cruel and unusual punishment.

[¶10.] "We generally review a circuit court's decision regarding sentencing for abuse of discretion." State v. Rice , 2016 S.D. 18, ¶ 11, 877 N.W.2d 75, 79 (quoting State v. Chipps , 2016 S.D. 8, ¶ 31, 874 N.W.2d 475, 486 ). "However, when the question presented is whether a challenged sentence is cruel and unusual in violation of the Eighth Amendment, we conduct a de novo review to determine whether the sentence imposed is grossly disproportionate to the offense." Id. (quoting Chipps , 2016 S.D. 8, ¶ 31, 874 N.W.2d at 486 ).

[¶11.] The Krauses argue that their sentences for unlawfully using a computer are grossly disproportionate to the circumstances of their crimes. They contend that the circumstances of their crimes were minor. They also contend their crimes are mitigated because: (1) neither of the Krauses has a substantial criminal record, (2) they cooperated with law enforcement in interviews and by surrendering computer evidence, (3) they immediately enrolled in counseling, and (4) they made restitution prior to sentencing. However, the Krauses' mitigation arguments are entirely irrelevant to an Eighth Amendment analysis. The Supreme Court has rejected individualized sentencing in noncapital cases. Harmelin v. Michigan , 501 U.S. 957, 995, 111 S.Ct. 2680, 2702, 115 L.Ed.2d 836 (1991) ; accord Rice , 2016 S.D. 18, ¶ 18 & n.3, 877 N.W.2d at 81–82 & n.3. Therefore, we simply determine whether the sentences imposed appear grossly disproportionate to the offenses committed.3

[¶12.] To determine whether a sentence is grossly disproportionate to an offense, we first compare "the gravity of the offense and the harshness of the penalty." Chipps , 2016 S.D. 8, ¶ 38, 874 N.W.2d at 488 (quoting Solem v. Helm , 463 U.S. 277, 290–91, 103 S.Ct. 3001, 3010, 77 L.Ed.2d 637 (1983) ). "This comparison rarely ‘leads to an inference of gross disproportionality’ and typically marks the end of our review." Id. ¶ 38, 874 N.W.2d at 489 (quoting State v. Garreau , 2015 S.D. 36, ¶ 9, 864 N.W.2d 771, 775 ). "If the penalty imposed appears to be grossly disproportionate to the gravity of the offense, then we will compare the sentence to those ‘imposed on other criminals in the same jurisdiction’ as well as those ‘imposed for commission of the same crime in other jurisdictions.’ " Id. (quoting Helm , 463 U.S. at 291, 103 S.Ct. at 3010 ).

[¶13.] The Krauses pleaded guilty to unlawfully using a computer system. Among other instances, this offense occurs when a person "[k]nowingly obtains the use of, accesses, or exceeds authorized access to, a computer system, or any part thereof, without the consent of the owner, and the access or use includes access to confidential data or material[.]" SDCL 43–43B–1(2). This particular variation of the offense violates both property and privacy rights of the victim. As noted above, supra ¶ 5, the Krauses accessed and discussed payroll data, bank accounts, personal financial statements, email, and other confidential data belonging to a number of people. The Krauses argue that because they did not further disseminate the confidential information they accessed or use it to extort their victims, their crimes are not representative of the most serious of their kind. Yet, the offense for which the Krauses were convicted addresses only obtaining the use of , accessing , or exceeding authorized access to a computer system, without the consent of the owner, to access confidential data or material. Id. The fact that the Krauses could have committed additional crimes but did not do so does not diminish the gravity of the crimes that occurred. Regardless, these crimes already lie on the lower end of the gravity-of-offense spectrum. A two-year sentence correspondingly lies on the low end of the spectrum of punishments. Therefore, considering the property and privacy interests that the Krauses violated, their sentences do not appear grossly disproportionate to their offenses, and our review ends. See Chipps , 2016 S.D. 8, ¶¶ 43–45, 874 N.W.2d at 490–91 (upholding five-year sentence of imprisonment for four occurrences of identity theft).

[¶14.] 2. Whether the circuit court erred by imposing sentences of imprisonment instead of probation for the unlawful-use-of-computer-system convictions.

[¶15.]...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT