United States v. Gasperini
Opinion
*485
Fabio Gasperini was convicted by a jury in the United States District Court for the Eastern District of New York (Nicholas G. Garaufis,
Judge
) of one count of misdemeanor computer intrusion in violation of
BACKGROUND
The evidence discussed below is taken from the trial record. Insofar as it relates to the offense of conviction, the evidence is viewed in the light most favorable to the government, and we draw all reasonable inferences in its favor.
United States v. Guadagna
,
In 2014, a virus began infecting QNAP-brand devices. 1 Computer security experts who detected the virus determined that the attacker behind the virus was attempting to covertly infiltrate computers. The attacker targeted QNAP computers, which do not log external internet connections, and used an often-overlooked port to access the computers. The virus installed malware, which included several commands for the computer to execute, in hidden directories on the infected computers. Once a computer was infected, the attacker installed a "backdoor" account, which had the status of a "superprivileged user," with unrestricted access to and control over the computer's data. After creating the backdoor account, the attacker patched the initial vulnerability that had allowed him access, thereby locking out other hackers. The infected computer was then instructed to scan the internet for other computers with the same vulnerability and infect them. In this way, the attacker created what is known as a "botnet"-a network of infected computers under the attacker's control. An analysis of one of the servers used in the scheme revealed that more than 155,000 computers were infected worldwide. Many of those computers were located in the United States.
The virus's commands accomplished different tasks. One command was designed to take certain username and password files from the infected computers and copy them onto a server. Another caused the infected computer to disguise itself as a *486 human browsing the internet, and to click on certain banner advertisements. Yet another command prompted the botnet to launch coordinated attacks on certain websites, a practice known as distributed denial-of-service attacks.
United States investigators identified Gasperini, an Italian citizen, as the creator of the virus and perpetrator of the various attacks because he leased and operated several servers around the world that were used to host the malware and communicate with the infected computers. A search of Gasperini's email account also found a "test" copy of the computer virus that was initially used to infect QNAP computers, and emails from Gasperini expressly referencing several of the scripts installed on the infected computers.
Evidence later adduced at trial also linked Gasperini to a related "click fraud" scheme, in which the botnet computers were commanded to click on certain advertisements. Business records showed that several websites implicated in the scheme were registered in Gasperini's name. Additionally, Gasperini contracted with an Italian advertising company to earn money for each advertisement viewed on these websites. Finally, evidence at trial tended to show that Gasperini monitored the operation. This included emails from his servers reporting "clicks completed" and a photograph of his home computer commanding his botnet to click on an advertising banners. After his arrest in the Netherlands, Gasperini deleted the contents of his Google account, deactivated his Facebook account, and instructed someone to discard the hard drives in his home and erase others.
A grand jury charged Gasperini with felony crimes of computer intrusion with intent to defraud, for financial gain, and in furtherance of criminal acts; wire fraud conspiracy; wire fraud; and money laundering. After a seven-day jury trial, he was acquitted of all felony charges, and was convicted only of misdemeanor computer intrusion in violation of
DISCUSSION
I. Vagueness
The statute under which Gasperini stands convicted punishes anyone who "intentionally accesses a computer without authorization ... and thereby obtains ... information from any protected computer."
*487
Because Gasperini did not raise this challenge below, we review it for plain error.
United States v. Boyland
,
Gasperini cannot clear the hurdle set by the second of these requirements. "At a minimum, a court of appeals cannot correct an error pursuant to Rule 52(b) unless the error is clear under current law."
United States v. Olano
,
In any event, Gasperini has not identified a due process violation here. "A conviction fails to comport with due process if the statute under which it is obtained fails to provide a person of ordinary intelligence fair notice of what is prohibited, or is so standardless that it authorizes or encourages seriously discriminatory enforcement."
United States v. Williams
,
Even if we assume,
arguendo
, that the statute's application may be unclear in some marginal cases (including some fanciful possibilities conjured in Gasperini's appellate brief), Gasperini's conduct falls squarely and unambiguously within the core prohibition of the statute. "Congress enacted the CFAA in 1984 to address 'computer crime,' which was then principally understood as 'hacking' or trespassing into computer systems or data."
United States v. Valle
,
II. Suppression
Gasperini next argues that the district court should have suppressed certain evidence introduced by the government at trial, including (1) evidence obtained pursuant to search warrants issued under the Stored Communications Act ("SCA"),
Gasperini first argues that the SCA warrants were extraterritorial warrants not authorized by that Act. He relies on this Court's decision in
Matter of Warrant to Search a Certain E-Mail Account Controlled and Maintained by Microsoft Corp.
,
Even assuming that at least some of the warrants demanded and acquired electronic communications stored abroad,
6
and that our ruling in
Microsoft
-which was vacated as moot by the Supreme Court-correctly states the law, suppression still would not be required, because suppression of evidence is not a remedy available for violation of the SCA. Congress provided a number of specific remedies for such violations; these do not include suppression of evidence in a criminal case.
See
*489
Gasperini's challenge to the use of hard drives and documents obtained from Italian law enforcement officials who searched his home fares no better. The searches were conducted pursuant to an Italian warrant, and Gasperini makes no claim that the warrant was issued in violation of Italian law. He argues instead that the Italian officials acted at the behest of American law enforcement agents, thus making them subject to American constitutional requirements for searches. "In order to render foreign law enforcement officials virtual agents of the United States, American officials must play some role in controlling or directing the conduct of the foreign parallel investigation."
United States v. Getto
,
III. The Wayback Machine
Finally, Gasperini challenges an evidentiary ruling made by the district court permitting the government to introduce screenshots of various websites taken by the Internet Archive, more commonly known as the "Wayback Machine." "A district court judge is in the best position to evaluate the admissibility of offered evidence. For that reason, we will overturn a district court's ruling on admissibility only if there is a clear showing that the court abused its discretion or acted arbitrarily or irrationally."
United States v. Valdez
,
Gasperini challenges the authentication of screenshots of websites registered to Gasperini for use in the click fraud scheme, which were captured and stored by the Internet Archive, and maintained as business records of that entity. Federal Rule of Evidence 901(a) requires that before evidence is admitted, "the proponent must produce evidence sufficient to support a finding that the item is what the proponent claims it is." That standard was amply met here.
*490
Gasperini relies on
Novak v. Tucows, Inc.
,
The Third Circuit considered the admissibility of Internet Archive records on a similar record in
United States v. Bansal
,
CONCLUSION
For the foregoing reasons, and those set forth in the accompanying summary order, we AFFIRM the judgment of the district court.
QNAP Incorporated is a company headquartered in Taiwan, with offices and warehouses in California, that manufactures and sells "network attached storages," which are computers specifically designed for the storage of data.
The misdemeanor offense lacks the aggravating purpose element of the felony charged in the indictment.
See
Gasperini has served his sentence and has been deported to Italy.
Gasperini's questioning of the definition of "protected computer" is also meritless. The definition describes a wide range of computers, including ones "used in or affecting interstate or foreign commerce or communication."
As we explained in
Microsoft
, SCA "warrants," although issued only when the constitutional standards governing conventional search warrants are met, do not authorize agents to enter premises and search for evidence, but rather are served on a third-party holder of electronic communications and demand that the third party turn over the information called for in the warrant.
See
Gasperini asserts that because he lived in Italy, it is "obvious" that his emails and Google Drive files were stored in Google's foreign servers. Appellant's Br. at 36. That assertion is far from obvious, however. Prior to our decision in
Microsoft
, Google appears to have stored user data at locations that bore no relation to the location of the user.
See, e.g.
,
In re Search of Content that is Stored at Premises Controlled By Google
, No. 16-MC-80263-LB,
Our reading of the SCA as not requiring or authorizing suppression of evidence for nonconstitutional violations of its provisions is consistent the rulings of our sister circuits that have considered the issue.
See
,
e.g.,
United States v. Clenney
,
Reference
- Full Case Name
- UNITED STATES of America, Appellee, v. Fabio GASPERINI, Defendant-Appellant.
- Cited By
- 48 cases
- Status
- Published