United States v. Michael Thomas

877 F.3d 591
CourtCourt of Appeals for the Fifth Circuit
DecidedDecember 11, 2017
Docket16-41264
StatusPublished
Cited by7 cases

This text of 877 F.3d 591 (United States v. Michael Thomas) is published on Counsel Stack Legal Research, covering Court of Appeals for the Fifth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Michael Thomas, 877 F.3d 591 (5th Cir. 2017).

Opinion

GREGG COSTA, Circuit Judge:

Michael Thomas worked as the Information Technology Operations Manager for ClickMotive, LP, a software and webpage hosting company. Upset that a coworker had been fired, Thomas embarked on a weekend campaign of electronic sabotage. He deleted over 600 files, disabled backup operations, eliminated employees from a group email a client used to contact the company, diverted executives’ emails to his personal account, and set a “time bomb” that would result in employees being unable to remotely access the company’s network after Thomas submitted his resignation. Once ClickMotive discovered what Thomas did, it incurred over $130,000 in costs to fix these problems.

A jury found Thomas guilty of “knowingly causing] the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causing] damage without authorization, to a protected computer.” 18 U.S.C. § 1030(a)(5)(A). Thomas challenges the “without authorization” requirement of this provision of the Computer Fraud and Abuse Act. He contends that because his IT job gave him full access to the system and required him to “damage” the system—for example, at times his duties included deleting certain files—his conduct did not lack authorization. In support of his view that the statute does not reach those whose access to a system includes the ability to impair it, Thomas invokes the rule of lenity and principle that vague statutes cannot be enforced. But we conclude that Thomas’s conduct falls squarely within the ordinary meaning of the statute and affirm his conviction.

I.

Thomas’s duties at ClickMotive included network administration; maintaining production websites; installing, maintaining, upgrading, and troubleshooting network servers; ensuring system security and data integrity; and performing backups. He was granted full access to the network operating system and had the authority to access any data and change any setting on the system. Thomas was expected to perform his duties using his “best efforts and judgment to produce maximum benefit” to ClickMotive.

Thomas was not happy when his friend in the IT department was fired. It was not just a matter of loyalty to his former colleague; a smaller IT staff meant more work for Thomas. So Thomas, to use his word, “tinkered” with the company’s system. The tinkering, which started on a Friday evening and continued through Monday morning, included the following:

• He deleted 625 files of backup history and deleted automated commands set to perform future backups.
• He issued a command to destroy the virtual machine 1 that performed ClickMotive’s backups for one of its servers and then Thomas failed to activate its redundant pair, ensuring that the backups would not occur.
• He tampered with ClickMotive’s pager notification system by entering false contact information for various company employees, ensuring that they would not receive any automatically-generated alerts indicating system problems.
• He triggered automatic forwarding of executives’ emails to an external . personal email account he created during the weekend.
• He deleted pages from ClickMotive’s internal “wiki,” an online system of internal policies and procedures that employees routinely used for troubleshooting computer problems.
• He manually changed the setting for an authentication service that would eventually lead to the inability of employees to work remotely through VPN. Changing the setting of the VPN authentication service set a time bomb that would cause the VPN to become inoperative when someone rebooted the system, a common and foreseeable maintenance function.
• And he removed employees from email distribution groups created for the benefit of customers, leading to customers’ requests for support going unnoticed.

Thomas was able to engage in most of this conduct from home, but he did set the VPN time bomb on Sunday evening from ClickMotive’s office, which he entered using another employee’s credentials. It was during this visit to the office that Thomas left his resignation letter that the company would see the next day. When the dust settled, the company incurred over $130,000 in out-of-pocket expenses and employees’ time to undo the harm Thomas caused. In a subsequent interview with the FBI, Thomas stated that he engaged in this conduct because he was “frustrated” with the company and wanted to make the job harder for the person who would replace him.

A grand jury eventually charged Thomas with the section 1030(a)(5)(A) offense. But two days before the grand jury met, Thomas fled to Brazil. Nearly three years later, Thomas was arrested when he surrendered to FBI agents at Dallas/Fort Worth International Airport.

At trial, company employees and outside IT experts testified that none of the problems ClickMotive experienced as a result of Thomas’s actions would be attributable to a normal system malfunction. They further stated that Thomas’s actions were not consistent with normal troubleshooting and maintenance or consistent with mistakes made by a novice. ClickMotive employees asserted that it was strange for the wiki pages to be missing and that someone in Thomas’s position would know that changing the setting of the VPN authentication service would cause it to become inoperative when someone rebooted the system.

ClickMotive’s employee handbook was not offered at trial and there was no specific company policy that governed the deletions of backups, virtual machines, or wiki modifications. Employees explained, however, that there were policies prohibiting interfering with ClickMotive’s normal course of business and the destruction of its assets, such as a virtual machine or company data. Thomas’s own Employment Agreement specified he was bound by policies that were reasonably necessary to protect ClickMotive’s legitimate interests in its clients, customers, accounts, and work product. ’ '

The jury instructions included the statutory definition of “damage,” which is “any impairment to the integrity or availability of data, a program, a system, or information.” 18 U.S.C. § 1030(e)(8). The district court denied Thomas’s proposed instruction for “without authorization,” which was “without permission or authority.” It did not define the phrase.

After the jury returned a guilty verdict, the district court sentenced Thomas to time served (which was the four months since he had been detained after returning to the country), plus three years of supervised release, and ordered restitution of $131,391.21. Thomas then filed an unsuccessful motion for, judgment of acquittal. That motion, like this appeal, argued that the evidence was not sufficient to convict Thomas because he was authorized to damage the computer as part of his routine IT duties.

II

A.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Doster
Fifth Circuit, 2025
Kiser v. Moyal
M.D. Louisiana, 2024
Sandvig v. Sessions
District of Columbia, 2020
IberiaBank v. Darryl Broussard
907 F.3d 826 (Fifth Circuit, 2018)

Cite This Page — Counsel Stack

Bluebook (online)
877 F.3d 591, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-michael-thomas-ca5-2017.