United States v. Shea

493 F.3d 1109
CourtCourt of Appeals for the Ninth Circuit
DecidedJuly 10, 2007
Docket06-10450
StatusPublished

This text of 493 F.3d 1109 (United States v. Shea) is published on Counsel Stack Legal Research, covering Court of Appeals for the Ninth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Shea, 493 F.3d 1109 (9th Cir. 2007).

Opinion

HALL, Senior Circuit Judge:

Defendant William Carl Shea challenges his conviction for intentionally causing damage to a “protected computer” without authorization, in violation of 18 U.S.C. § 1030(a)(5)(A)®. Shea argues that the government presented insufficient evidence to convict, and, more specifically, presented no evidence that he committed a criminal act on the date alleged in the indictment. He also argues that the district court improperly denied his request for substitute counsel. We disagree with each of Shea’s contentions and, therefore, affirm the conviction.

I. Background

The defendant was an employee at Bay Area Credit Services (BACS) from August 6, 2001, until January 17, 2003. BACS provides debt collection services, and Shea managed the company’s database operating system, which was designed by a company called Columbia Ultimate. In December 2002, Shea asked for permission to work from home because his daughter had been diagnosed with diabetes, but his request was denied because, as BACS CEO Michael Priest testified, Shea had been unproductive and difficult to reach during his previous stints working at home.

*1113 On January 6, 2003, company executives met with Shea and gave him a “performance plan” requiring him to meet certain productivity targets and to communicate with his superiors about any planned absences. Shea did not come in to work on January 17 and was subsequently terminated.

On January 30, BACS discovered that its database of debtor accounts had been corrupted. It discovered a foreign program on its system that was coded to replace debt principal amounts with random numbers, switch client identification numbers and eliminate the Social Security numbers tied to each account. The program was coded to modify 5,000 records at a time and to repeat after each batch. Later investigation revealed that the program had stopped on its own because it had run multiple, simultaneous sessions. Before the program “hung,” however, it had corrupted approximately 50,000 entries. BACS and representatives from Columbia Ultimate, who had designed its database software, were able to retrieve much of the data, but the process took approximately two months to resolve and cost BACS thousands of dollars in fees to technical support consultants.

BACS' and Columbia Ultimate blamed the file corruption on a program called “CLEAR.CF.MARKS,” which used a file naming convention similar to other files on the BACS system. For example, there was a CLEAR-CF-MARKS in the same file directory. CLEAR.CF.MARKS was triggered by one line of code in the program “Collector-Summary-II,” which was an authorized program that ran late in the evening or early in morning to process the previous day’s collection activities, as logged by BACS debt collectors;

Government witnesses estimated that CLEAR.CF.MARKS had been on the BACS system since at least December 9, 2002. They made this estimation based on the fact that on December 9, the relevant line of Collector-Summary-II’s code had been edited to launch CLEAR.CF. MARKS. Back-up tapes indicated that the program had not been on the system in September 2002.

The government referred to 'CLEAR. CF.MARKS as a “time bomb” program. Though Collector-Summary-II presumably launched the program every night since December 9, CLEAR.CF.MARKS would not actually detonate, continuing the government’s metaphor, until a date provided in its own source code. Though CLEAR.CF.MARKS deleted its own source code as part of its operation, backup tapes revealed a copy of the source code that set the trigger date at any date “greater than” January 29, 2003.

Columbia Ultimate consultants assisting BACS looked through hard drive back-up materials and network logs to investigate the origins of the malicious program. They discovered that a person using various log-in names and passwords associated with Shea had made edits to both Collector-Summary-II and the source code for CLEAR.CF.MARKS during December 2002 and January 2003. Shea had been hired specifically in 2002 to help BACS convert to the latest release of Columbia Ultimate’s software and remained on staff as its programmer. He had experience in many programming languages including those necessary to access the IBM “Universe” databases Columbia Ultimate designed for BACS and to work in the code of the files it contained. In his previous jobs, Shea worked with several of the Columbia Ultimate employees who were called in to fix the problem on January 30.

FBI Agent Andrew Myers interviewed Shea at his home on March 28, 2003. When Agent Myers presented Shea with a copy of the source code of CLEAR.CF. MARKS, Shea immediately recognized the *1114 program as foreign to the system, and remarked that it should have been titled CLEAR-CF-MARKS, with dashes instead of dots. Upon a brief examination of the code, Shea noted that it would likely cause debt amounts to be altered. He said he thought the program would not run and would eventually “hang itself.”

When the agents pointed out that his user name had been associated with the file, Shea initially denied authoring the program and offered no hypothesis as to why his user name was involved. Upon further questioning he stated that at the time the code was written he was experiencing medical problems. According to the agent, Shea also said that he had “difficulty determining if events were real or if he was dreaming them.” Shea also explained his problems with BACS, and that he thought people at the company were “out to get him.”

The initial indictment charging Shea was returned on April 30, 2003, and was superseded by a new indictment on August 5, 2004. A Second Superceding Indictment was returned on August 3, 2005, charging Shea with seven counts of intentionally causing damage to a protected computer in violation of 18 U.S.C. § 1030(a)(5)(A)(i). Each count corresponded to a particular act of entering or editing code on seven different dates before the program corrupted the database.

During his trial, at the close of evidence, Shea moved for appointment of new counsel. The court denied this request. Shea moved for dismissal of six of the seven counts, and moved for dismissal on the remaining count under Rule 29 of the Federal Rules of Criminal Procedure. After consulting with the parties, the district court consolidated the counts into count 7, which related to January 29, 2003. It did not expressly rule on Shea’s motion to dismiss the remaining count.

The jury convicted Shea, and the district court sentenced him to twelve months and one day in prison. He was also ordered to pay $40,000 in restitution. This timely appeal followed.

II. Sufficiency of the Evidence

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Berger v. United States
295 U.S. 78 (Supreme Court, 1935)
Jackson v. Virginia
443 U.S. 307 (Supreme Court, 1979)
Wright v. West
505 U.S. 277 (Supreme Court, 1992)
Microsoft Corp. v. At&t Corp.
550 U.S. 437 (Supreme Court, 2007)
Arthur Thomas Lelles v. United States
241 F.2d 21 (Ninth Circuit, 1957)
United States v. Bill Edward Rush
749 F.2d 1369 (Ninth Circuit, 1984)
United States v. Ronald Appoloney
761 F.2d 520 (Ninth Circuit, 1985)
United States v. Daniel Bruce Bonallo
858 F.2d 1427 (Ninth Circuit, 1988)
United States v. Clayton R. Jackson
72 F.3d 1370 (Ninth Circuit, 1995)
United States v. Walter R. Tucker, III
133 F.3d 1208 (Ninth Circuit, 1998)
United States v. Quentin Hinton, AKA Ronnie Baldwin
222 F.3d 664 (Ninth Circuit, 2000)
United States v. Kayle Nordby
225 F.3d 1053 (Ninth Circuit, 2000)
United States v. Nicholas Middleton
231 F.3d 1207 (Ninth Circuit, 2000)
United States v. Thomas Eli Ray
428 F.3d 1172 (Eighth Circuit, 2005)

Cite This Page — Counsel Stack

Bluebook (online)
493 F.3d 1109, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-shea-ca9-2007.