United States v. Valle

Decision Date03 December 2015
Docket Number14–4396–cr.,Nos. 14–2710–cr,s. 14–2710–cr
Citation807 F.3d 508
Parties UNITED STATES of America, Appellant/Appellee, v. Gilberto VALLE, Defendant–Appellee/Defendant–Appellant.
CourtU.S. Court of Appeals — Second Circuit

Justin Anderson and Randall W. Jackson (Hadassa Waxman and Brooke Cucinella, of counsel), Assistant United States Attorneys fori Preet Bharara, United States Attorney for the Southern District of New York, New York, N.Y., for Appellant/Appellee.

Edward S. Zas (Robert M. Baum and Julia L. Gatto, of counsel), Federal Defenders of New York, Inc., New York, N.Y., for DefendantAppellee/DefendantAppellant Gilberto Valle.

Eugene Volokh (Hanni Fakhoury and Jamie Williams, Electronic Frontier Foundation, San Francisco, CA, on the brief), Scott & Cyan Banister First Amendment Clinic, UCLA School of Law, Los Angeles, CA, for Amici Curiae Electronic Frontier Foundation, Center for Democracy & Technology, Marion B. Brechner First Amendment Project, National Coalition Against Censorship, Pennsylvania Center for the First Amendment, and Law Professors.

Stephen L. Braga, Appellate Litigation Clinic, University of Virginia School of Law, Charlottesville, VA, for Amici Curiae Frederick S. Berlin, M.D., Ph.D., and Chris Kraft, Ph.D.

Hanni Fakhoury and Jamie Williams (Richard D. Willstatter, National Association of Criminal Defense Lawyers, White Plains, New York, and Harley Geiger, Center for Democracy & Technology, Washington, D.C., on the brief), Electronic Frontier Foundation, San Francisco, CA, for Amici Curiae Electronic Frontier Foundation, Center for Democracy & Technology, National Association of Criminal Defense Lawyers, and Scholars.

Before: STRAUB, PARKER, and CARNEY, Circuit Judges.

BARRINGTON D. PARKER, Circuit Judge:

This is a case about the line between fantasy and criminal intent. Although it is increasingly challenging to identify that line in the Internet age, it still exists and it must be rationally discernible in order to ensure that "a person's inclinations and fantasies are his own and beyond the reach of the government." Jacobson v. United States, 503 U.S. 540, 551–52, 112 S.Ct. 1535, 118 L.Ed.2d 174 (1992). We are loath to give the government the power to punish us for our thoughts and not our actions. Stanley v. Georgia, 394 U.S. 557, 565, 89 S.Ct. 1243, 22 L.Ed.2d 542 (1969). That includes the power to criminalize an individual's expression of sexual fantasies, no matter how perverse or disturbing. Fantasizing about committing a crime, even a crime of violence against a real person whom you know, is not a crime.

This does not mean that fantasies are harmless. To the contrary, fantasies of violence against women are both a symptom of and a contributor to a culture of exploitation, a massive social harm that demeans women. Yet we must not forget that in a free and functioning society, not every harm is meant to be addressed with the federal criminal law. Because "[t]he link between fantasy and intent is too tenuous for fantasy [alone] to be probative," United States v. Curtin, 489 F.3d 935, 961 (9th Cir.2007) (en banc) (Kleinfeld, J., concurring), and because the remaining evidence is insufficient to prove the existence of an illegal agreement or Valle's specific intent to kidnap anyone, we affirm the district court's judgment of acquittal on the single count of conspiracy to kidnap.

In an issue of first impression that has sharply divided our sister circuits, we must also decide the meaning of "exceeds authorized access" in section 1030(a) of the Computer Fraud and Abuse Act ("CFAA"), which imposes both criminal and civil liability. 18 U.S.C. § 1030. Specifically, we must determine whether an individual "exceeds authorized access" to a computer when, with an improper purpose, he accesses a computer to obtain or alter information that he is otherwise authorized to access, or if he "exceeds authorized access" only when he obtains or alters information that he does not have authorization to access for any purpose which is located on a computer that he is otherwise authorized to access. Because we conclude that the text, statutory history, and purpose of the CFAA permit both interpretations, we are required to apply the rule of lenity and adopt the latter construction. We therefore reverse the judgment of conviction as to the CFAA count.

BACKGROUND

Gilberto Valle is a native of Forest Hills, Queens. At the time of the events giving rise to his prosecution, he was an officer in the New York City Police Department living with his wife, Kathleen Mangan, and their infant daughter in Forest Hills. Valle has no prior criminal record and there is no evidence that he ever acted violently or threateningly towards anyone.

Valle was, however, an active member of an Internet sex fetish community called Dark Fetish Network ("DFN"). He connected with individuals around the world whom he knew only by screen names such as "Moody Blues" or "Aly Kahn," or by email addresses. Valle communicated with these individuals by email or web chat, usually in the late evening and early morning hours after his work shift. Many of his Internet communications involved the transmission of photographs of women he knew—including his wife, her colleagues from work, and some of his friends and acquaintances—to other DFN users with whom he discussed committing horrific acts of sexual violence. These "chats" consisted of gruesome and graphic descriptions of kidnapping, torturing, cooking, raping, murdering, and cannibalizing various women.

Valle's online fantasy life was, to say the least, extremely active during this period. However, there is no evidence that he ever learned the real identities of the individuals with whom he chatted, nor is there any evidence that he ever made concrete plans to meet in person or speak by telephone or web camera with any of them.

In September 2012, Mangan became concerned about Valle's late-night Internet activities after she found several disturbing images of dead women on a laptop that the couple shared. She installed spyware on the computer, which recorded each website entered by the computer's users and captured screen shots every five minutes. With the use of the spyware, Mangan found more disturbing pictures and records of websites that Valle visited. These included detailed emails and chats where Valle discussed butchering her and raping and torturing other women whom they knew. After confronting Valle about his computer use and moving out of the home with their daughter, Mangan contacted federal authorities.

Valle was subsequently arrested and charged with a single conspiracy to kidnap several of the women who were the subject of his chats. Although he had chatted with numerous individuals he met on DFN, the Government identified three alleged co-conspirators: Michael VanHise, a man from New Jersey who was known to Valle as "mikevanhise81@aol.com" and "michael19902135@yahoo.com"; an unidentified individual apparently located in Pakistan who used the screen name "Aly Khan"; and Dale Bolinger, a man in England who was known to Valle only by his screen name, "Moody Blues." And although Valle had discussed up to one hundred different women in his chats, the indictment alleged five targets of the kidnapping conspiracy: Kathleen Mangan, his wife; Alisa Friscia, Mangan's former co-worker; Andria Noble; Kristen Ponticelli; and Kimberly Sauer, a former college classmate of Valle's who was living in the Baltimore area.

Valle was also charged with improperly accessing a government computer and obtaining information, in violation of section 1030(a)(2)(B) of the CFAA. As an NYPD officer, Valle had access to the Omnixx Force Mobile ("OFM"), a computer program that allows officers to search various restricted databases, including the federal National Crime Information Center database, which contain sensitive information about individuals such as home addresses and dates of birth. It is undisputed that the NYPD's policy, known to Valle, was that these databases could only be accessed in the course of an officer's official duties and that accessing them for personal use violated Department rules. In May 2012, he accessed the OFM and searched for Maureen Hartigan, a woman he had known since high school and had discussed kidnapping with Aly Khan. This access with no law enforcement purpose is the basis for the CFAA charge.

The Government's evidence at trial included the chats and emails between Valle and his alleged co-conspirators; testimony from several of the alleged targets of the kidnapping conspiracy, including his wife; other evidence seized from Valle's computer, including videos and images he downloaded; his search term and browser history; and excerpts from a post-arrest statement. Following a 13–day trial, the jury returned a verdict of guilty on both counts. Valle subsequently moved for a judgment of acquittal pursuant to Rule 29 or, in the alternative, for a new trial pursuant to Rule 33 on both counts.

In a thorough and thoughtful 118–page opinion, the district court (Gardephe, J. ) granted Valle's Rule 29 motion with respect to the conspiracy charge. 301 F.R.D. 53 (S.D.N.Y.2014). While remaining "mindful of the jury's critical role in our legal system," Judge Gardephe acknowledged his responsibility to ensure that the government satisfies its burden of establishing proof beyond a reasonable doubt. Id. at 80. Emphasizing "the unique circumstances of this extraordinary case," he concluded that, notwithstanding the jury's verdict to the contrary, the prosecutors had failed to prove beyond a reasonable doubt that Valle and his alleged co-conspirators had entered into a conspiracy to kidnap or that Valle had formed the requisite specific intent to kidnap. Id. at 62, 89.

In reaching this conclusion, Judge Gardephe cited extensively to the testimony of FBI Special Agent Corey Walsh, the lead agent assigned to review and analyze Valle's emails and chats whose testimony had formed (in the court's...

To continue reading

Request your trial
110 cases
  • Exec. Trim Constr., Inc. v. Gross
    • United States
    • U.S. District Court — Northern District of New York
    • March 10, 2021
    ...within the meaning of the CFAA.The meaning of this phrase arose in a similar context in the criminal case of United States v. Valle , 807 F.3d 508, 523 (2d Cir. 2015), in which the defendant police officer used his employer's database for personal purposes. The defendant conceded that he ha......
  • Van Buren v. United States
    • United States
    • U.S. Supreme Court
    • June 3, 2021
    ...parameters of authorized access by entering an area of the computer to which [that] authorization does not extend." United States v. Valle , 807 F.3d 508, 524 (CA2 2015).Van Buren's account of subsection (a)(2) makes sense of the statutory structure because it treats the "without authorizat......
  • United States v. Hunt
    • United States
    • U.S. District Court — Eastern District of New York
    • November 18, 2021
    ...on the "equipoise" rule the Second Circuit invoked in United States v. Coplan , 703 F.3d 46, 69 (2d Cir. 2012), and United States v. Valle , 807 F.3d 508, 522 (2d Cir. 2015). In Coplan , the court explained that "if the evidence viewed in the light most favorable to the prosecution gives eq......
  • Sandvig v. Sessions
    • United States
    • U.S. District Court — District of Columbia
    • March 30, 2018
    ...Fourth, and Ninth Circuits have held that this language prohibits only unauthorized access to information. See United States v. Valle, 807 F.3d 508, 523–28 (2d Cir. 2015) ; WEC Carolina Ener. Solutions LLC v. Miller, 687 F.3d 199, 206 (4th Cir. 2012) ; Nosal, 676 F.3d at 863 ; see also Pult......
  • Request a trial to view additional results
1 firm's commentaries
  • Federal Court Rejects Employer's Trade Secret And Computer Fraud And Abuse Act Claims
    • United States
    • Mondaq United States
    • March 8, 2016
    ...difficult question under the CFAA was whether Haight exceeded his authorized computer access. The judge found persuasive U.S. v. Valle, 807 F.3d 508 (2nd Cir. 2015), which held that an employee's authority to access a computer file is dispositive in determining that the CFAA has not been vi......
13 books & journal articles
  • Lengthening Shadows: Biotechnology and Patent Eligibility
    • United States
    • ABA General Library Landslide No. 9-5, May 2017
    • May 1, 2017
    ...used that access to obtain or steal information as part of a criminal scheme.”). 33. John , 597 F.3d at 272. 34. United States v. Valle, 807 F.3d 508 (2d Cir. 2015); WEC Carolina Energy Sols. LLC v. Miller, 687 F.3d 199 (4th Cir. 2012); United States v. Steele, 595 F. App’x 208, 211 (4th Ci......
  • CRIMINAL TRESPASS AND COMPUTER CRIME.
    • United States
    • November 1, 2020
    ...Congress intended courts to analogize the CFAA to state criminal trespass laws. See infra Part IV.A; see also United States v. Valle, 807 F.3d 508, 525 (2d Cir. 2015) ("[T]he legislative history consistently characterizes the evil to be remedied--computer crime--as 'trespass.'"); Kerr, supr......
  • § 7.05 The Computer Fraud and Abuse Act (18 U.S.§ 1030)
    • United States
    • Full Court Press Intellectual Property and Computer Crimes Title Chapter 7 The Computer Fraud and Abuse Act (CFAA)
    • Invalid date
    ...access, . . .").[91] Musacchio v. United States, ___ U.S. ___, 136 S. Ct. 709, 713, 193 L. Ed. 2d 639 (2016).[92] United States v. Valle, 807 F.3d 508, 524 (2d Cir. 2015) (quoting Random House Unabridged Dictionary 139 (2001).[93] United States v. Nosal, 844 F.3d 1024 (9th Cir. 2016).[94] F......
  • INTELLECTUAL PROPERTY CRIMES
    • United States
    • American Criminal Law Review No. 58-3, July 2021
    • July 1, 2021
    ...FOR ONLINE SYSTEMS (July 2017), https://www.justice.gov/criminal- ccips/page/f‌ile/983996/download. 144. See United States v. Valle, 807 F.3d 508 (2d Cir. 2015) (holding police off‌icer who had right to access information, but exceeded the restrictions on such access, was not liable under t......
  • Request a trial to view additional results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT