U.S. v. Aleynikov
| Court | U.S. District Court — Southern District of New York |
| Writing for the Court | DENISE COTE |
| Citation | U.S. v. Aleynikov, 737 F.Supp.2d 173 (S.D. N.Y. 2010) |
| Decision Date | 03 September 2010 |
| Docket Number | No. 10 Cr. 96(DLC),10 Cr. 96(DLC) |
| Parties | UNITED STATES of America, v. Sergey ALEYNIKOV, Defendant. |
Joseph P. Facciponti, Rebecca A. Rohr, United States Attorney Office, New York, NY, for the United States.
Kevin H. Marino, John D. Tortorella, Marino Tortorella, P.C., Chatham, NJ, for Defendant.
Defendant Sergey Aleynikov ("Aleynikov") has moved to dismiss each count in a three-count Indictment filed against him on February 11, 2010. Aleynikov, a former employee of Goldman Sachs & Co. ("Goldman"), is charged with misappropriating computer source code used in Goldman's high-frequency trading system. For the following reasons, the motion is granted in part.
As charged in the Indictment, Goldman is a global financial services firm engaged in, inter alia, high-frequency trading on securities and commodities markets, including the New York Stock Exchange ("NYSE") and NASDAQ Stock Market ("NASDAQ"). Aleynikov was a computer programmer employed by Goldman as a Vice President in its Equities Division from May 2007 until June 2009. In this position, Aleynikov was responsible for developing and maintaining some of the computer programs used to operate Goldman's high-frequency trading system. Aleynikov resigned in June 2009 to work for Teza Technologies, LLC ("Teza"), a company founded earlier that year. Teza offered Aleynikov the title of "Executive Vice President, Platform Engineering," in which position he would be responsible for developing Teza's own high-frequency trading business that would compete with Goldman.
High-frequency trading, an activity in which various banks and financial institutions engage, involves the rapid execution of high volumes of trades in which trading decisions are made by sophisticated computer programs that use complex mathematical formulae known as algorithms. The algorithms use statistical analyses of past trades and current market developments. Goldman used a proprietary system of computer programs, which the Indictment calls the "Platform," to rapidly obtain information on the latest market movements, to process that information into a form that can be analyzed by the algorithms, and to execute the trading decisions reached by the application of the algorithms to that information. Together, the trading algorithms and Platform comprise Goldman's trading system (the "Trading System").
Goldman acquired portions of the Platform when it purchased the Hull Trading Company ("Hull") in 1999 for approximately $500 million. Since then, Goldman's computer programmers have developed and modified the computer programs that Goldman uses in its Trading System by writing and altering their source code. 1 Goldman has not licensed its Trading System or made it or its components available to the public, and has taken measures to protect the Trading System's source code. Among other things, Goldman employees must execute a confidentiality agreement and assign to Goldman the rights to any ideas or information developed during their employment. Goldman also limits access to the Trading System's source code only to Goldman employees who have reason to access that source code, such as the programmers working on the Trading System.
During his employment at Goldman, Aleynikov was a member of a team of computer programmers responsible for developing and improving aspects of the Platform, including the Platform's interface with NASDAQ. On his last day of employment at Goldman, June 5, 2009, Aleynikov copied, compressed, encrypted, and transferred to an outside server in Germany hundreds of thousands of lines of source code for the Trading System, including trading algorithms that determine the value of stock options. The entity that operates the German server offers free and paid services to computer programmers who wish to store their source code projects. After transferring the source code to the German server, Aleynikov deleted the program he used to encrypt the files. He also deleted his "bash history," i.e., the history of his most recent computer commands. That evening, and in the days that followed, Aleynikov accessed the German server and downloaded the source code to his home computer, and from there to other home computers and to a portable flash drive.
On July 2, Aleynikov flew to Chicago, Illinois, to meet with Teza. He brought with him a laptop computer and the flash drive containing source code for Goldman's Trading System, including some of the source code that he copied and transferred to the German server on June 5.
The Indictment charges Aleynikov in three counts with theft of trade secrets in violation of 18 U.S.C. §§ 1832(a)(2) and (4); transportation of stolen property in interstate commerce, in violation of 18 U.S.C. § 2314; and unauthorized computer access and exceeding authorized access in violation of 18 U.S.C. §§ 1030(a)(2)(C) and 1030(c)(2)(B)(i)-(iii). On July 16, 2010, Aleynikovmoved to dismiss each of these counts. The motion became fully submitted on August 13.
Aleynikov moves to dismiss all counts of the Indictment pursuant to Rule 12(b)(3)(B), Fed.R.Crim.P. Rule 12(b)(3)(B) provides that "at any time while the case is pending, the court may hear a claim that the indictment or information fails to invoke the court's jurisdiction or to state an offense." Fed.R.Crim.P. 12(b)(3)(B).
The law on determining the sufficiency of an indictment is well-settled. Under the Federal Rules of Criminal Procedure, the indictment "must be a plain, concise, and definite written statement of the essential facts constituting the offense charged" and must include the "statute, rule, regulation, or other provision of law that the defendant is alleged to have violated." Fed.R.Crim.P. 7(c)(1). There are also "two constitutional requirements for an indictment: 'first, [that it] contains the elements of the offense charged and fairly informs a defendant of the charge against which he must defend, and, second, [that it] enables him to plead an acquittal or conviction in bar of future prosecutions for the same offense.' " United States v. Resendiz-Ponce, 549 U.S. 102, 108, 127 S.Ct. 782, 166 L.Ed.2d 591 (2007) (quoting Hamling v. United States, 418 U.S. 87, 117, 94 S.Ct. 2887, 41 L.Ed.2d 590 (1974)); see also United States v. Yannotti, 541 F.3d 112, 127 (2d Cir.2008).
But, it is also well established that "an indictment need do little more than to track the language of the statute charged and state the time and place (in approximate terms) of the alleged crime." Yannotti, 541 F.3d at 127 (citation omitted); see also United States v. De La Pava, 268 F.3d 157, 162 (2d Cir.2001). Thus, the indictment need only allege "the 'core of criminality' the government intend[s] to prove" at trial, and consequently, the indictment is "read ... to include facts which are necessarily implied by the specific allegations made." United States v. Rigas, 490 F.3d 208, 229 (2d Cir.2007) (citation omitted).
On a pretrial motion to dismiss, "the facts alleged by the government must be taken as true." United States v. Velastegui, 199 F.3d 590, 592 n. 2 (2d Cir.1999). It is not proper to weigh the sufficiency of the evidence underlying the indictment, unless the Government has already made "a full proffer of the evidence it intends to present at trial." United States v. Perez, 575 F.3d 164, 166 (2d Cir.2009) (citation omitted). This is because indictments are "not meant to serve an evidentiary function," but rather, "to acquaint the defendant with the specific crime with which he is charged, allow him to prepare his defense, and protect him from double jeopardy." United States v. Juwa, 508 F.3d 694, 701 (2d Cir.2007) (citation omitted).
An indictment may be dismissed, however, where it "fails to allege the essential facts constituting the offense charged." United States v. Pirro, 212 F.3d 86, 91 (2d Cir.2000). Indeed, "an important corollary purpose" of the requirement that an indictment state the elements of an offense "is to inform the court of the facts alleged, so that it may decide whether they are sufficient in law to support a conviction, if one should be had." Russell v. United States, 369 U.S. 749, 768, 82 S.Ct. 1038, 8 L.Ed.2d 240 (1962) (citing United States v. Cruikshank, 92 U.S. 542, 558, 23 L.Ed. 588 (1875)). Dismissal is required where the conduct alleged in the indictment as a factual basis for the offense is not actually prohibited by the language of the statute.See, e.g., Pirro, 212 F.3d at 91, 93 (); United States v. Pacione, 738 F.2d 567, 572 (2d Cir.1984) (same); United States v. Mennuti, 639 F.2d 107, 113 (2d Cir.1981) (same), abrogated in part on other grounds, Russell v. United States, 471 U.S. 858, 105 S.Ct. 2455, 85 L.Ed.2d 829 (1985).
Oftentimes, the adequacy of an indictment will turn on the interpretation of statutory language. "Federal crimes, of course, are solely creatures of statute." Dowling v. United States, 473 U.S. 207, 213, 105 S.Ct. 3127, 87 L.Ed.2d 152 (1985) (citation omitted). "[S]tatutory construction must begin with the language employed by Congress and the assumption that the ordinary meaning of that language accurately expresses the legislative purpose." United States v. Albertini, 472 U.S. 675, 680, 105 S.Ct. 2897, 86 L.Ed.2d 536 (1985) (citation omitted). When the statutory language is clear, there is no need to examine the statutory purpose, legislative history, or the rule of lenity. See Boyle v. United States, --- U.S. ----, 129 S.Ct. 2237, 2246, 173 L.Ed.2d 1265 (2009); see also United States v. Nelson, 277 F.3d 164, 193 (2d Cir.2002).
Count One of the Indictment charges Aleynikov with theft of trade secrets in violation of 18 U.S.C. § 1832(a)(2) and (4):
From at least in or about May 2009, up to and...
Get this document and AI-powered insights with a free trial of vLex and Vincent AI
Get Started for FreeStart Your Free Trial of vLex and Vincent AI, Your Precision-Engineered Legal Assistant
-
Access comprehensive legal content with no limitations across vLex's unparalleled global legal database
-
Build stronger arguments with verified citations and CERT citator that tracks case history and precedential strength
-
Transform your legal research from hours to minutes with Vincent AI's intelligent search and analysis capabilities
-
Elevate your practice by focusing your expertise where it matters most while Vincent handles the heavy lifting
Start Your Free Trial of vLex and Vincent AI, Your Precision-Engineered Legal Assistant
-
Access comprehensive legal content with no limitations across vLex's unparalleled global legal database
-
Build stronger arguments with verified citations and CERT citator that tracks case history and precedential strength
-
Transform your legal research from hours to minutes with Vincent AI's intelligent search and analysis capabilities
-
Elevate your practice by focusing your expertise where it matters most while Vincent handles the heavy lifting
Start Your Free Trial of vLex and Vincent AI, Your Precision-Engineered Legal Assistant
-
Access comprehensive legal content with no limitations across vLex's unparalleled global legal database
-
Build stronger arguments with verified citations and CERT citator that tracks case history and precedential strength
-
Transform your legal research from hours to minutes with Vincent AI's intelligent search and analysis capabilities
-
Elevate your practice by focusing your expertise where it matters most while Vincent handles the heavy lifting
Start Your Free Trial of vLex and Vincent AI, Your Precision-Engineered Legal Assistant
-
Access comprehensive legal content with no limitations across vLex's unparalleled global legal database
-
Build stronger arguments with verified citations and CERT citator that tracks case history and precedential strength
-
Transform your legal research from hours to minutes with Vincent AI's intelligent search and analysis capabilities
-
Elevate your practice by focusing your expertise where it matters most while Vincent handles the heavy lifting
Start Your Free Trial of vLex and Vincent AI, Your Precision-Engineered Legal Assistant
-
Access comprehensive legal content with no limitations across vLex's unparalleled global legal database
-
Build stronger arguments with verified citations and CERT citator that tracks case history and precedential strength
-
Transform your legal research from hours to minutes with Vincent AI's intelligent search and analysis capabilities
-
Elevate your practice by focusing your expertise where it matters most while Vincent handles the heavy lifting
Start Your Free Trial
-
Aleynikov v. McSwain
...to his conduct. (Am. Cplt. ¶ 79) Judge Cote, in a lengthy written opinion, ruled that the NSPA and EEA did apply. See U.S. v. Aleynikov, 737 F. Supp. 2d 173 (S.D.N.Y. 2010), rev'd, 676 F.3d 71 (2d Cir. 2012). Aleynikov was convicted on both counts at trial. See U.S. v. Aleynikov, 785 F. Sup......
-
JBCHoldings N.Y., LLC v. Pakter, 12 Civ. 7555(PAE).
...addressed the issue.7 District courts within the Second Circuit have taken opposing views. Compare United States v. Aleynikov, 737 F.Supp.2d 173, 190–94 (S.D.N.Y.2010) (Cote, J.) (taking the narrow approach, and stating that “[t]he phrases ‘accesses a computer without authorization’ and ‘ex......
-
Sandvig v. Sessions
...No. 11-CR-470 SDW, 2012 WL 5389142, at *1 (D.N.J. Oct. 26, 2012), rev'd, 748 F.3d 525 (3d Cir. 2014) ; United States v. Aleynikov, 737 F.Supp.2d 173, 190 (S.D.N.Y. 2010).7 It also matters that the CFAA is a civil as well as a criminal statute. The possibility of administrative or private ci......
-
United States v. Agrawal
...secret at issue in [the EEA Count] is the source code, and that the relevant ‘product’ is the Trading System.” United States v. Aleynikov, 737 F.Supp.2d 173, 178 (S.D.N.Y.2010). It was on this understanding that this court held the Aleynikov indictment legally insufficient. As Aleynikov con......
-
FinTech Update: New York’s Highest Court Upholds Conviction of Programmer Who Misappropriated Electronic Data
...however, dismiss a third charge against Aleynikov, under the Computer Fraud and Abuse Act, 18 U.S.C. § 1030. See United States v. Aleynikov, 737 F. Supp. 2d 173 (S.D.N.Y. 2010). [10] United States v. Aleynikov, 676 F.3d 71, 74–75 (2d Cir. [11] Id. at 75. [12] 18 U.S.C. § 2314. [13] 676 F.3d......
-
"Recent Amendment to the Economic Espionage Act Extends Protection Against Misappropriation"
...the source code for the HFT system, including the algorithms that determined the value of stock options. See United States v. Aleynikov, 737 F. Supp. 2d 173, 175 (S.D.N.Y. 2010). Aleynikov later downloaded the source code from the German server to his home computer in the United States, fle......
-
The Continuing Split Of Authority In The Interpretation Of The Computer Fraud And Abuse Act
...which that employee had to know was in contravention of the wishes and interests of his employer"); Cf. United States v. Aleynikov, 737 F. Supp. 2d 173, 192 (S.D.N.Y. 2010) (finding there was no violation of the CFAA when the Defendant, who had authorization to access the system, misappropr......
-
New York v. Aleynikov: New York State’s Penal Code (Like Federal Criminal Law) Does Not Cover Electronic Reproduction of Source Code
...has been introduced in Congress and may prove to be the best tool for combatting acts like Aleynikov’s. [1] United States v. Aleynikov, 737 F. Supp. 2d 173, 177, 185 (S.D.N.Y. 2010). Aleynikov was also indicted on a charge of unauthorized computer access in violation of the Computer Fraud a......
-
§ 5.03 Analysis of the Act
...had challenged in the court below.[407] United States v. Aleynikov, 676 F.3d 71, 82 (2d Cir. 2012).[408] United States v. Aleynikov, 737 F. Supp. 2d 173 (S.D.N.Y. 2010).[409] United States v. Aleynikov, 676 F.3d 71, 79 (2d Cir. 2012).[410] Id., 676 F.3d at 82.[411] Id., 676 F.3d at 80.[412]......
-
BACKDOOR MAN: A RADIOGRAPH OF COMPUTER SOURCE CODE THEFT CASES.
...(estimating that Google's Internet services code is approximately two billion lines of code). (21) See United States v. Aleynikov, 737 F. Supp. 2d 173, 175 (S.D.N.Y. 2010) (recounting Goldman Sach's $500 million purchase to obtain the source code misappropriated by the defendant); see also ......
-
C. "related to or Included in a Product Produced for or Placed in Interstate or Foreign Commerce"
...jurisdiction for § 1832, whereas the jurisdictional nexus for § 1832 was provided by its focus on the actions of foreign governments." 737 F. Supp. 2d 173, 181 (S.D.N.Y. 2010), rev'd, 676 F.3d 71 (2d Cir. 2012). The Aleynikov court also noted that the EEA was passed one year after the Supre......