United States v. Savader

944 F. Supp. 2d 209, 2013 WL 1943014, 2013 U.S. Dist. LEXIS 65661
CourtDistrict Court, E.D. New York
DecidedMay 7, 2013
DocketNo. 13-MJ-359
StatusPublished
Cited by2 cases

This text of 944 F. Supp. 2d 209 (United States v. Savader) is published on Counsel Stack Legal Research, covering District Court, E.D. New York primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Savader, 944 F. Supp. 2d 209, 2013 WL 1943014, 2013 U.S. Dist. LEXIS 65661 (E.D.N.Y. 2013).

Opinion

MEMORANDUM AND ORDER

GARY R. BROWN, United States Magistrate Judge.

This matter, which came before the Court for a bail determination on April 26, 2013, presents novel factual issues as well as the kind of legal challenges that often arise, when applying traditional legal concepts to cases emanating from digital tech[210]*210nology. As described in further detail herein, the undersigned directed that the defendant be removed in custody to face charges in the Eastern District of Michigan. Because the Second Circuit has encouraged courts to create a record in the defendant’s home district that may assist the charging district in making further determinations, I am setting forth the rationale underlying that decision in this Memorandum.

BACKGROUND

The Affidavit for Criminal Complaint, executed in the Eastern District of Michigan, describes the victimization of fifteen young women through unauthorized access to computer systems, extortion and cyber stalking. See Docket Entry (“DE”) [1] Ex. A (“Affidavit”). In sum and substance, the events described include the hacking of various Internet-based accounts belonging to these victims, including email and social media sites. See generally id. The perpetrator apparently gained access to these accounts, using various forms of social engineering to trick the victim into providing him with account passwords. See, e.g., id. ¶¶ 9, 22. Using these passwords, he obtained compromising photos of the victims — usually in various states of undress, though in one instance involving a nude photo of a victim’s mother1 — that had either been sent by the victims via private email or otherwise electronically stored in a manner not intended for public access. E.g., id. ¶¶ 15, 22, 23.

Once in possession of these photographs, the perpetrator electronically transmitted them by anonymous text message to the victims, usually with threats that the photos would be shared with parents, employers, boyfriends or other members of the community unless the perpetrator’s demands were met. E.g., id. ¶¶ 10, 15, 23. Principally, the perpetrator demanded that the victims provide him with additional nude photographs and/or other sexual details about themselves. E.g., id. ¶¶ 11, 23. Additionally, he sent victims anonymous texts describing his use of the photographs he already obtained to masturbate. Id. ¶ 12.

The anonymous text messages sent to victims not only contained extortionate threats, but were vulgar, controlling and cruel. One victim described that she “felt frightened and terrorized by his comments.” Id. ¶ 9(c). Another felt “blackmailed” and “alarmed” by the messages, and contacted the police. Id. ¶ 3 9(c).

The Affidavit provides specific technical evidence — the details of which are unimportant for this determination — linking the defendant to the computer hacking alleged, which is more than sufficient to establish probable cause. See generally id. The technical details are notable, however, in that they demonstrate considerable sophistication with computers. See, e.g., id. ¶¶ 16-20 (tying defendant to a web of internet service providers, social media accounts, and telephone numbers from which the threatening messages originated). At the bail hearing, the government proffered that it removed approximately 25 computer devices from the defendant’s home. Additionally, the Affidavit presents evidence linking the defendant to many of the victims, with whom the defendant attended high school or college. See generally id. Importantly, in one instance, the Affidavit describes a historical obsession the defendant evidenced toward one of the [211]*211victims several years ago. See, e.g., id. ¶ 26(c).

DISCUSSION

Defendant’s Right to a Bail Hearing in the District of Arrest

The first question is whether the defendant is entitled to a bail hearing in the district of arrest. One Second Circuit case, decided shortly after passage of the Bail Reform Act of 1984, holds that the detention hearing should usually be conducted in the charging district, after defendant’s removal from the district of arrest. In United States v. Melendez-Carrion, 790 F.2d 984, 989 (2d Cir.1986), seven defendants charged in the District of Connecticut with armed robbery of a Wells Fargo office were arrested in Puerto Rico. Several of the defendants were ordered detained by a magistrate judge in San Juan. The Court of Appeals held:

Neither the Bail Reform Act nor Fed. R.Crim.P. 40 governing removal hearings specifies the sequence for a detention hearing and a removal hearing. We agree with the conclusion recently reached by the Seventh Circuit that a removal hearing may precede a detention hearing, leaving the latter normally to occur in the district of prosecution after removal. United States v. Dominguez, 783 F.2d 702, 704-05 (7th Cir.1986). There is no indication that Congress, in specifying that a detention hearing shall occur, absent continuances, upon the defendant’s “first appearance” before a judicial officer, considered the context of an arrest in a district other than the district of prosecution. As the Seventh Circuit pointed out, it is highly unlikely that Congress would have wanted detention hearings to occur in districts scattered across the country in which those accused in multi-defendant cases might happen to be arrested. The decision whether to seek detention and the evidence necessary to support a finding of dangerousness and risk of flight sufficient to justify detention will normally be located primarily in the district of prosecution.

Id. at 990. Melendez-Carrion emphasized that defendants “were not entitled to detention hearings prior to removal.” Id. at 991; cf. United States v. Morris, No. CRI-MA.00-MG-267, 2000 WL 1455244, at *6 (N.D.N.Y. Sept. 21, 2000) (holding that “the appropriate forum for the detention hearing to be held in this case is in the charging district” and directing the defendant be transported in custody). A later Second Circuit decision read Melendez-Carrion as adopting a “flexible” approach, stressing that “a removal may precede a detention hearing.” United States v. Coonan, 826 F.2d 1180, 1185 (2d Cir.1987) (emphasis added).

Subsequently, in United States v. El-Edwy, 272 F.3d 149 (2d Cir.2001), the Circuit considered the appropriate venue for reviewing an order of release issued by a magistrate judge in the district of arrest. Without expressly overruling Melendez-Carrion, the Second Circuit observed that:

Rule 40 makes explicit what should in any event be clear in logic.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Manley
District of Columbia, 2023
Encompass Servs., Pllc v. Maser Consulting P.A.
2021 NCBC 40 (North Carolina Business Court, 2021)

Cite This Page — Counsel Stack

Bluebook (online)
944 F. Supp. 2d 209, 2013 WL 1943014, 2013 U.S. Dist. LEXIS 65661, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-savader-nyed-2013.