Articles Posted in Law and Technology

A US Magistrate Judge in California ruled recently that technology giant Apple could be required to create specialized software to help federal investigators bypass the security protocols on the encrypted Iphone 5S used by Syed Farook, one of the San Bernardino shooters.  This ruling conflicts with the ruling of a US Magistrate Judge in Brooklyn, who found that he could not order Apple to take steps to bypass the security features of an Iphone seized during an earlier drug investigation.

The media coverage of the more recent San Bernardino case has been far more extensive because it involves the December 2, 2015 mass-shooting committed by a married couple who were radicalized by ISIS.  The facts and events giving rise to the older Brooklyn case are far more ordinary.   But for the Iphone issue, that matter arises from just another relatively routine federal narcotics investigation – one of who-knows-how-many that play out in federal courts across the country every single day.

But a review of the ordinary drug case reveals far more about the development of the cell phone security issue that is at the heart of this debate.  The drug case involves an alleged methamphetamine dealer named Jun Feng, who’s phone was seized during the 2014 search of his Queens, New York residence.  Investigators sought to access his phone to obtain information that is fairly routine in drug cases, such as contact lists.  According to prosecutors in that case, Apple had assisted federal agents in extracting information from Iphones tied to criminal investigations approximately 70 times in seven years.  To law enforcement’s surprise, Apple suddenly changed its position as to such issues in Feng’s case.  Feng entered a guilty plea last October, but attorneys for both Apple and the Government continued to press the Court for a ruling and the Court ruled against the Government. Continue reading ›

The latest decision from the NJ Appellate Division involving sex offenders, State v. F.W., consists largely of a rather complex discussion concerning the interrelationship of Community Supervision for Life (“CSL”), Parole Supervision for Life (“PSL”), The Sex Offender Monitoring Act (“SOMA”), and the Ex Post Facto clauses of the Federal and New Jersey State Constitutions.  That part of the decision is for attorneys and academics.  However, the decision is noteworthy because it reviews significant elements of the regimen used to supervise sex offenders living in the State.  Offenders subject to CSL or PSL and related requirements such as GPS monitoring need to understand the array of rules and restrictions governing their movements in the community, and their rights if they are accused of a violation.

Sex offenders in New Jersey, like most States, are subject to a bewildering array of regulations.  Sex offender supervision in New Jersey began with CSL, which was enacted in 1994 as part of Megan’s Law.  The Legislature enacted the current supervision law, PSL, in 2003.  The number of defendants sentenced under CSL is dropping with the passage of time, but there are still many CSL offenders in the parole supervision system.  F.W. was sentenced under CSL.

The decision reminds us that CSL and PSL differ in several significant ways.  A violation of CSL is a crime and must be handled as any criminal case.  Thus, the matter is heard by a Superior Court judge, and the defendant is represented by competent defense counsel and has all of the procedural protections typically afforded a criminal defendant.  In sharp contrast, PSL offenders who violate the terms and conditions of their supervision can have their matters prosecuted as a criminal case involving a fourth degree charge or, alternatively, have their matters disposed of as parole violations.  If the latter course is adopted, the matter will be heard by the Parole Board.  The offender will have a relatively cursory administrative hearing before the Board that lacks all of the procedural protections available in a regular criminal case.  As to punishment, the Board can revoke parole and return the offender to prison.  Additionally, a CSL defendant adjudicated guilty of a violation and sentenced to a prison term can ultimately be released on parole.  PSL defendants who are imprisoned as a result of violations (even if the violation stems from an offense identical to that committed by a CSL defendant) may not be released on parole.   Thus, with respect to violations, a PSL offender will have fewer procedural protections than a CSL offender, but could face the same or even greater punishment. Continue reading ›

The United States Attorney’s Offices for the Southern District of New York and the Northern District of Georgia recently announced three indictments charging several defendants with, among other things, computer hacking, theft and fraud.  [US v. Shalon, No. 15-cr-00333 (S.D.N.Y.); US v. Murgio, No. 15-cr-00769 (S.D.N.Y.); and US v. Shalon, No. 15-cr-00393 (N.D.Ga.)]  More specifically, the grand juries hearing these cases charged the defendants with computer hacking, securities and wire fraud, identity theft, illegal internet gambling, conspiracy to commit money laundering, and operating an unlicensed money transmitter.  These cases are noteworthy not only because of the sheer magnitude of the enterprise described by federal prosecutors, but also because of the manner in which they highlight the increasingly aggressive posture that the Justice Department continues to take toward cybercrime.

According to the US Attorney, the defendants hacked into the computer systems of several large financial services companies and financial news publishers.  Federal prosecutors did not identify the companies involved, but other news sources identified at least some of them as JPMorgan Chase, ETrade, Scottrade, TDAmeritrade, Fidelity Investments, and Dow Jones.  The defendants allegedly stole personal information for more than 100 million people and used it to, among other things, market securities in a deceptive manner by arranging to have prospective purchasers cold-called.

The defendants’ other activities allegedly included operating illegal online casinos, payment processing for criminals, operating an illegal bitcoin exchange, and laundering money through up to 75 shell companies and accounts around the world.  In the course of doing so, the defendants purportedly procured and used over 200 false identification documents which included over 30 false passports issued by almost 20 different countries, as well as servers located in Egypt, the Czech Republic, South Africa, Brazil and other countries.  The US Attorney believes the defendants generated hundreds of millions of dollars in illegal proceeds.  Many of the charged offenses carry federal prison terms of 20 years. Continue reading ›

A federal statute (18 U.S.C. Sec. 875(c)) makes it a crime to transmit in interstate commerce communications containing threats to injure someone.  Anthony Elonis, who was an active Facebook user, placed posts on his Facebook page that purportedly threatened patrons and employees of the park where he worked, his ex-wife, police officers, and school-age children.  His online activities were eventually brought to the attention of the FBI.  An agent created a Facebook account to just to monitor Elonis’ online activities.  The agent later visited his home, after which Elonis posted material on his page threatening her.  A grand jury charged Elonis with five counts of violating the above-referenced statute.  He went to trial and lost, was sentenced to a custodial term of almost four years with three years of supervised release, and the Third Circuit Court of Appeals affirmed.

At this point, some legal background is unfortunately necessary.  Every crime consists broadly of two parts – a physical act or acts and a particular mental state.  The act or acts have to be accomplished with the required mental state in order to constitute a crime.  Some criminal statutes will say specifically which mental state is required in order to make out that particular offense (e.g., purposely, knowingly, recklessly, intentionally).  But not every criminal statute defines the required mental state.  The statute that Elonis violated did not include a particular mental state, and the question before the Court was which mental state was required to support the conviction and whether or not Elonis’ jury was properly instructed on this issue.  The Court ultimately found that the jury instruction was defective, reversed the Third Circuit’s decision, and remanded the case for further proceedings.

The Court’s decision contains a terrific analysis of the interplay between mental states and potentially criminal conduct, and how to ascribe a particular mental state to a set of potentially criminal acts when the statute in question is silent on this issue.  All of that will certainly be of great interest to lawyers and judges but, given the prominent role social networking sites play in our daily lives, what does this case mean for the average user of these electronic media? Continue reading ›

The United States Supreme Court decided Grady v. North Carolina on March 30, 2015.  After completing his prison term for sex offenses, the State determined that Grady was a recidivist sex offender, and wanted to place him on satellite-based monitoring.  Grady argued that the monitoring program, which required him to wear a monitoring device at all times, violated his Fourth Amendment right to be free from unreasonable searches and seizures.  Grady’s argument was based on U.S. v. Jones, where the Supreme Court held that installing a GPS tracking device on a suspect’s car was a “search” within the meaning of the Fourth Amendment.  The State courts rejected Grady’s argument, finding that the monitoring program at issues was not a Fourth Amendment search.  This conclusion was based, apparently in large part, upon the view that the proceeding giving rise to the monitoring was civil in nature, whereas Jones was a criminal case, which entailed different (higher) legal standards.

The Supreme Court rejected the reasoning of the State courts.  First, the monitoring program was a “search” because it enabled the State to “physically intrude on a constitutionally protected area … [A] State conducts a search when it attaches a device to a person’s body, without consent, for the purpose of tracking that individual’s movements.”  The fact that the monitoring program was civil in nature was rendered meaningless by settled law establishing “that the Fourth Amendment’s protection extends beyond the sphere of criminal investigations [] and the government’s purpose in collecting information does not control whether the method of collection constitutes a search.”

Ultimately, however, the Court observed that the Fourth Amendment protects only against unreasonable searches and seizures.  Thus, it remanded the matter to the North Carolina courts to determine whether the monitoring program was reasonable when viewed as a search. Continue reading ›

Justia Lawyer Rating
New Jersey Bar Association Badge
National Association of Criminal Defense Lawyers Badge
 ACDL - NJ Badge
Contact Information