U.S. v. Trotter

Decision Date23 February 2007
Docket NumberNo. 05-4202.,05-4202.
Citation478 F.3d 918
PartiesUNITED STATES of America, Appellee, v. John Larkin TROTTER, Appellant.
CourtU.S. Court of Appeals — Eighth Circuit

Jeffrey B. Jensen, U.S. Attorney's Office, St. Louis, MO, for Appellee.

John Larkin Trotter, St. Louis, MO, pro se.

Paul Kaiser, St. Charles, MO, for Appellant.

Before RILEY, MELLOY, and SHEPHERD, Circuit Judges.

PER CURIAM.

John Larkin Trotter was charged with intentionally causing damage to a protected computer without authorization, in violation of 18 U.S.C. § 1030(a)(5)(A)(i). Trotter pleaded guilty, reserving the right to challenge the constitutionality of § 1030(a)(5)(A)(i) as applied. The district court1 sentenced Trotter to eighteen months' imprisonment and ordered Trotter to pay approximately $19,000 in restitution. On appeal, Trotter argues § 1030(a)(5)(A)(i) is unconstitutional as applied to his conduct: an attack on a not-for-profit organization's computer network that was connected to the Internet and used to communicate with out-of-state computers. We affirm.

I. Background

On September 12, 2003, Trotter was fired from his job at the Midland Division of the Salvation Army in St. Louis, Missouri. Trotter had been employed as an information technology supervisor. Starting in October 2003, the Midland Division of the Salvation Army began experiencing computer network difficulties. First, numerous files were deleted from the network. Next, a computer-operated phone system was shut down. On November 8, 2003, a folder containing several files was completely erased. On November 22, 2003, someone using the account of Arnice Trotter, the defendant's mother and an employee of the Salvation Army, logged onto the Salvation Army's computer network and inserted several files with obscenities directed towards the Salvation Army. Files continued to be deleted. Some time later, a number of Salvation Army employees received pop-up messages on their computers reading "Trotter was here." The Midland Division of the Salvation Army spent over $19,000 to repair the damage inflicted by these attacks.

A law enforcement investigation discovered the intrusions into the Salvation Army's network originated from a DSL account in St. Louis, Missouri, registered to Malynda Ramsey, Trotter's girlfriend and co-habitant. The email address attached to the account included Trotter's first name, last initial, and birth year. The instant federal charge followed.

After unsuccessfully seeking dismissal of his indictment, Trotter pleaded guilty to one count of computer sabotage, a violation of 18 U.S.C. § 1030(a)(5)(A)(i). Trotter reserved the right to raise a constitutional challenge on appeal.2

As part of his plea agreement, Trotter admitted he sent computer commands from his residence in St. Louis to the computer network of his former employer and intentionally caused damage to the network without authorization. He further agreed that:

The computer network of the Midland Division of the Salvation Army, located at 1130 Hampton Avenue, St. Louis, Missouri, was used in interstate communications in that (a) it was connected to and used the Internet, (b) was used to communicate with other Salvation Army computers located outside the State of Missouri, and (c) was used to communicate with computers not associated with the Salvation Army which were located outside the State of Missouri.

Additionally, at Trotter's plea hearing, Trotter stated to the court that the computers he accessed were connected to and used the Internet and were regularly used to communicate with both Salvation Army computers and non-Salvation Army computers outside the State of Missouri.

II. Discussion

We review a constitutional challenge to a statute de novo. United States v. Mugan, 441 F.3d 622, 627 (8th Cir.2006). Title 18 U.S.C. § 1030(a)(5)(A)(i) prohibits a person from knowingly causing "the transmission of a program, information, code, or command, and as a result of such conduct, intentionally caus[ing] damage without authorization, to a protected computer." A "protected computer" is defined, in pertinent part, as a computer "which is used in interstate or foreign commerce or communication." 18 U.S.C. § 1030(e)(2)(B).

The Commerce Clause of the Constitution grants Congress the power to regulate interstate commerce. U.S. Const. Art. 1, § 8, cl. 3. This includes the ability to regulate channels of interstate commerce, instrumentalities of interstate commerce, and those activities that substantially affect interstate commerce. United States v. Lopez, 514 U.S. 549, 558-59, 115 S.Ct. 1624, 131 L.Ed.2d 626 (1995). No additional interstate nexus is required when instrumentalities or channels of interstate commerce are regulated. See, e.g., United States v. Corum, 362 F.3d 489, 494-95 (8th Cir.2004).

Trotter challenges the application of § 1030(a)(5)(A)(i) to his conduct. He contends the Salvation Army's computer network was not a "protected computer" and therefore his attack falls outside the scope of the statute. He also implies that § 1030 is unconstitutional as applied to his conduct because the Salvation Army is a not-for-profit organization. His argument, in essence, is that because "[n]early all computers [these] days are used someway in interstate commerce through the [I]nternet or private networks," the statute cannot possibly be so broad as to cover the computer network of a not-for-profit organization like the Salvation Army. We disagree.

Trotter's admissions demonstrate the Salvation Army's computers fall within the statutory definition of a "protected computer." Trotter admitted the computers were connected to the Internet. "The Internet is an international network of interconnected computers," Reno v. ACLU, 521 U.S. 844, 850, 117 S.Ct. 2329, 138 L.Ed.2d 874 (1997), and is comparable to "a sprawling mall offering goods and services." Id. at 853, 117 S.Ct. 2329. As both the means to engage in commerce and the method by which transactions occur, "the Internet is an instrumentality and channel of interstate commerce." United States v. MacEwan, 445 F.3d 237, 245 (3rd Cir.2006); see also United States v. Hornaday, 392 F.3d 1306, 1311 (11th Cir.2004) ("Congress clearly has the power to regulate the [I]nternet, as it does other instrumentalities and channels of interstate commerce. . . ."). With a connection to the Internet, the Salvation Army's computers were part of "a system that is inexorably intertwined with interstate commerce" and thus properly within the realm of Congress's Commerce Clause power. MacEwan, 445 F.3d at 245.

Trotter also admitted the computers were used in interstate communication. He agreed in his plea agreement and again at his plea hearing that the computers were used to communicate with other computers outside the State of Missouri. Thus, the computer network of the Midland Division of the Salvation Army was ...

To continue reading

Request your trial
65 cases
  • Publius v. Boyer-Vine, 1:16–cv–1152–LJO–SKO
    • United States
    • U.S. District Court — Eastern District of California
    • 27 Febrero 2017
    ...and channel of interstate commerce,’ " United States v. Sutcliffe , 505 F.3d 944, 953 (9th Cir. 2007) (quoting United States v. Trotter , 478 F.3d 918, 921 (8th Cir. 2007) (per curiam)). Thus, "regulation of the Internet impels traditional Commerce Clause considerations." American Libraries......
  • Teva Pharm. USA, Inc. v. Sandhu
    • United States
    • U.S. District Court — Eastern District of Pennsylvania
    • 30 Enero 2018
    ...or communication." 18 U.S.C. § 1030(e)(2)(B). A computer is "protected" if it is connected to the Internet. United States v. Trotter , 478 F.3d 918, 921 (8th Cir. 2007) (quoting United States v. MacEwan , 445 F.3d 237, 245 (3d Cir. 2006) ). The complaint clearly alleges that the computer Sa......
  • U.S. v. Hayes
    • United States
    • United States Courts of Appeals. United States Court of Appeals (8th Circuit)
    • 3 Agosto 2009
    ...denied the motion to dismiss the superceding indictment on the ground that jurisdiction was lacking. See United States v. Trotter, 478 F.3d 918, 920 n. 2 (8th Cir.2007) (per curiam) (rejecting defendant's argument that the district court erred in failing to dismiss his indictment for lack o......
  • United States v. Yücel
    • United States
    • U.S. District Court — Southern District of New York
    • 2 Febrero 2015
    ......Trotter, 478 F.3d 918, 921 (8th Cir.2007) (upholding the constitutionality of the CFAA as applied to a defendant who admitted that the relevant computers ......
  • Request a trial to view additional results
14 books & journal articles
  • Table of Cases
    • United States
    • ABA Antitrust Premium Library Consumer Protection Law Developments (Second) - Volume II
    • 2 Febrero 2016
    ...13-cv-8998 (S.D.N.Y. Dec. 19, 2013) (Stipulated Order for Permanent Injunction and Civil Penalty Judgment), 203 United States v. Trotter, 478 F.3d 918 (8th Cir. 2007), 259 United States v. Union Circulation Co., 1982 WL 1912 (N.D. Ga. 1982), 472 United States v. United Mine Workers, 330 U.S......
  • § 7.05 The Computer Fraud and Abuse Act (18 U.S.§ 1030)
    • United States
    • Full Court Press Intellectual Property and Computer Crimes Title Chapter 7 The Computer Fraud and Abuse Act (CFAA)
    • Invalid date
    ...processor, examples of which are legion." United States v. Kramer, 631 F.3d 900, 903-04 (8th Cir. 2011).[66] In United States v. Trotter, 478 F.3d 918 (8th Cir. 2007), the court rejected defendant's argument that because "'nearly all computers these days are used someway in interstate comme......
  • § 8.02 Civil Violations Under the Wiretap Act
    • United States
    • Full Court Press Intellectual Property and Computer Crimes Title Chapter 8 The Electronic Communications Privacy Act (ECPA)
    • Invalid date
    ...legion." United States v. Kramer, 631 F.3d 900, 903-04 (8th Cir. 2011). See also, §7.05(2)(b), supra.[219] In United States v. Trotter, 478 F.3d 918 (8th Cir. 2007), the court rejected defendant's argument that because " ' nearly all computers these days are used someway in interstate comme......
  • § 7.06 Civil Liability Under the CFAA
    • United States
    • Full Court Press Intellectual Property and Computer Crimes Title Chapter 7 The Computer Fraud and Abuse Act (CFAA)
    • Invalid date
    ...Forge Industrial Staffing, Inc. v. De La Fuente, 2006 WL 2982139 (N.D. Ill. Oct. 16, 2006). Eighth Circuit: United States v. Trotter, 478 F.3d 918 (8th Cir. 2007). Ninth Circuit: Shurgard Storage Centers v. Safeguard Self Storage, 119 F. Supp. 2d 1121, 1125 (W.D. Wash. 2000). Eleventh Circu......
  • Request a trial to view additional results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT