United States v. Brady

820 F. Supp. 1346, 1993 U.S. Dist. LEXIS 11209, 1993 WL 122351
CourtDistrict Court, D. Utah
DecidedApril 7, 1993
Docket2:92-cr-00265
StatusPublished
Cited by5 cases

This text of 820 F. Supp. 1346 (United States v. Brady) is published on Counsel Stack Legal Research, covering District Court, D. Utah primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Brady, 820 F. Supp. 1346, 1993 U.S. Dist. LEXIS 11209, 1993 WL 122351 (D. Utah 1993).

Opinion

MEMORANDUM OPINION

JENKINS, Chief Judge.

On October 24, 1992, John K. Brady was indicted on four counts of violation of 18 U.S.C. § 1029(a)(1). Counts I through III allege that on or about “between January 1, 1991 and February 28, 1991,” “April, 1991” and “December 1991,” respectively:

within the Central Division of the District of Utah, John K. Brady knowingly, and with intent to defraud, trafficked in a counterfeit access device, as defined in 18 U.S.C. § 1029(e)(2); that is, an altered cellular telephone, permitting unauthorized access to telephone services, such conduct having an effect on interstate commerce, all in violation of 18 U.S.C. § 1029(a)(1).

Count IV alleges that “between January, 1991 and December 31,1991, within the Central Division of the District of Utah,”

John K. Brady knowingly, and with intent to defraud, used a counterfeit access device, as defined in 18 U.S.C. § 1029(e)(2); that is, an altered- cellular telephone, permitting unauthorized access to telephone services, such conduct having an effect on interstate commerce, all in violation of 18 U.S.C. § 1029(a)(1).

Defendant Brady has moved to dismiss the indictment on several grounds: (1) that the indictment is legally insufficient for failure to allege an essential element of the offense, viz., that access was gained to one or more accounts; (2) that the Government has breached an agreement not to prosecute this defendant; 1 and (3) that the Government has since admitted that it is unable to prove the elements of an offense under section. 1029(a)(1).

Cellular telephone service is based upon a system of individual cellular telephone units having wireless radio transmission capabilities and which operate within a series of geographic “cells,” each of which is served by a radio transmitter capable of handling as many as 666 channels. As the user moves *1348 from one cell to another, transmission of telephone calls is automatically shifted from one transmitter to the other, thus maintaining a consistent signal quality. See generally MCI Cellular Tel. Co. v. Federal Communications Comm’n, 738 F.2d 1322, 1324 (D.C.Cir.1984); Transcript of Hearing, 2/25/93, at 112:21-113:4 (Testimony of DeRay Sudweeks).

As explained by the Government and defense witnesses, cellular telephone units typically are programmed to contain two identifying code numbers, commonly referred to as the ESN 2 and the MIN. 3 For identification purposes, both numbers are transmitted to the cellular system by the cellular telephone unit at the time that a call is initiated.

Through proffer and presentation of testimony at the hearing on defendant’s motion, 4 the Government now avers that each of the four Mitsubishi Series 800 cellular phones at issue herein have been “altered” and thereby rendered “counterfeit” through either the replacement or- reprogramming of the microchip containing the unit’s Electronic Serial Number (ESN). 5 According to the Government’s witnesses, cellular telephones altered in this fashion may be used to circumvent the normal billing process for use of the cellular system in two ways: “cloning” 6 and “free riding.” 7 See generally, Carla Lazzareschi, Bootleg Cellular Phones are Dialing Up a Fortune, Los ÁNGELES Times, December 4, 1992, at Al.

Based upon the testimony and argument offered at the hearing, there appears to be little doubt that a “cloned” cellular phone— one with an ESN and MIN identical to another existing but legitimate unit — would represent an “access device” clearly falling within the ambit of section 1029(a)(1). However, the Government has conceded that cloning of cellular telephones is not at issue under the existing indictment. See Transcript of Hearing, 3/1/93, at 236:4-237:21.

Instead, the question now presented in this case is whether a cellular telephone used for the purposes of “free riding” on the telephone system or transferred to another for that purpose, constitutes an “access device” within the meaning of section 1029. The Government argues that the cellular telephones at issue gained access to accounts of Cellular One and U.S. West (the two cellular phone carriers licensed to provide such *1349 services in this geographical service area 8 ), but concedes that it cannot show that these units gained access to identifiable valid customer or subscriber accounts at either U.S. West or Cellular One. (See Transcript of Hearing, 3/1/93, at 236:17-24, 237:12-21.)

The Statute

The indictment alleges that defendant Brady has violated section 1029(a)(1), which reads as follows:

(a) Whoever — ■
(1) knowingly and with intent to defraud produces, uses, or traffics in one or more counterfeit access devices; ... shall, if the offense affects interstate or foreign commerce, be punished as provided in subsection (c)....

The key terms of section 1029(a)(1) are given further definition by section 1029(e)(1) and (2):

(e) As used in this section — ■
(1) the term “access device” means any card, plate, code, account number, or other means of account access that can be used, alone or in conjunction with another access device, to obtain money, goods, services, or any other thing of value, or that can be used to initiate a transfer of funds (other than a transfer originated solely by paper instrument);
(2) the term “counterfeit access device” means any access device that is counterfeit, fictitious, altered, or forged, or an identifiable component of an access device of a counterfeit access device;....

The statute itself is silent on the subject of cellular telephones, telephone account numbers, or access codes. Some limited guidance as to meaning may be found in the legislative history of section 1029.

Section 1029 was added to Title 18 of the United States Code as part of the “Counterfeit Access Device and Computer Fraud and Abuse Act of 1984,” which was incorporated into the Comprehensive Crime Control Act of 1984, Pub.L. No. 98-473, Title II, § 1602(a), 98 Stat. 2183-84. As capsulized by the Department of Justice Manual,

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Bruce
531 F. Supp. 2d 983 (N.D. Illinois, 2008)
Universal City Studios, Inc. v. Corley
273 F.3d 429 (Second Circuit, 2001)
United States v. Edmonson
175 F. Supp. 2d 889 (S.D. Mississippi, 2001)
People v. Butler
43 Cal. App. 4th 1224 (California Court of Appeal, 1996)
United States v. John K. Brady
13 F.3d 334 (Tenth Circuit, 1993)

Cite This Page — Counsel Stack

Bluebook (online)
820 F. Supp. 1346, 1993 U.S. Dist. LEXIS 11209, 1993 WL 122351, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-brady-utd-1993.