Category Archives: Technology

Domestic Violence & Cell Phone Privacy

Image result for washington privacy act

In State v. Smith, the WA Supreme Court held that the accidental recording of a domestic violence confrontation between the defendant and his wife was admissible at trial and did not violate the defendant’s rights under the Washington Privacy Act.

BACKGROUND FACTS

John Garrett Smith and Sheryl Smith were married in 2011. On the evening of June 2, 2013, the Smiths engaged in an argument at their home that turned violent. During the incident, Mr. Smith used the home’s landline cordless phone to dial his cell phone in an attempt to locate the cell phone. The cell phone’s voice mail system recorded the incident because Mr. Smith left the landline open during his attempt to find his cell phone. This voice mail contained sounds of a woman screaming, a male claiming the woman brought the assault on herself, more screams from the female and name calling by the male.

Mr. Smith punched and strangled Mrs. Smith to the point of unconsciousness and then left their home. When Mrs. Smith regained consciousness, her eyes were black and swollen shut, her face was swollen and bleeding, and she had difficulty breathing.’ Mrs. Smith was hospitalized for several days due to the severity of her injuries, which included a facial fracture and a concussion. For months after the assault, she suffered severe head pain, double vision, nausea, and vertigo.

The State charged Mr. Smith with attempted first degree murder, attempted second degree murder, first degree assault, and second degree assault for the incident.

The Motion to Suppress & Trial

Prior to trial, Mr. Smith filed a motion to suppress the audio recording found on his cell phone that captured part of the incident, including him threatening to kill his wife. Mr. Smith argued that Ms. Williams had unlawfully intercepted the recording pursuant to the Washington Privacy Act, when she listened to the voice message left on his phone. The trial court denied the motion to suppress, ruling that Ms. Williams’s conduct did not constitute an interception. The court also ruled that Washington’s Privacy Act, which prohibits the recording of private conversations without consent, did not apply because the information was accidentally recorded.

The case proceeded to a bench trial. The trial court found Mr. Smith guilty of attempted second degree murder, second degree assault, and the related special allegations of domestic violence, but acquitted him of the remaining counts and the aggravator. Mr. Smith was sentenced to a standard range sentence of 144 months.

The Appeal

He appealed, and his appellate argument focused on the trial court’s denial of the motion to suppress. Smith continued to assert that the recording was unlawfully admitted because Ms. Williams had unlawfully intercepted it.

The Court of Appeals reversed Mr. Smith’s conviction for attempted second degree murder, holding that the trial court erred in denying the motion to suppress the recording of the incident because (1) the recording was of a “private conversation” and (2) Mr. Smith had unlawfully recorded the “private conversation,” despite the fact that the recording was made inadvertently. The Court of Appeals rejected Mr. Smith’s assertion that Ms. Williams had unlawfully intercepted the conversation, and decided the case on a different issue, that is, whether Mr. Smith’s actions violated the privacy act. The State sought review on the issue of how the privacy act is to be properly applied in this case.

ISSUE

Whether the voice mail recording is admissible in Mr. Smith’s criminal prosecution.

COURT’S ANALYSIS & CONCLUSIONS

The WA Supreme Court  reverse the Court of Appeals and reinstated Mr. Smith’s attempted second degree murder conviction.

The Court reasoned that accidental, inadvertent recording on a cell phone voice mail of a domestic violence assault did not contain a “conversation” within the meaning of the privacy act, where the recorded verbal exchange consisted mostly of sounds of a woman screaming, a male claiming the woman brought the assault on herself, more screams from the female, name calling by the male, and the man stating he will kill the woman when she told him to get away. Furthermore, the owner of the cell phone was deemed to have consented to the voice mail recording due to his familiarity with that function.

The lead opinion was authored by Justice Madsen and signed by Justices Wiggins, Johnson and Owens. Justice González concurred in the result on the grounds that the defendant cannot invade his own privacy and cannot object about a recording he made being used against himself. Justice Gordon McCloud authored a separate concurring opinion, which was signed by Justices Stephens, Yu, and Fairhurst, in which she stated that the verbal exchange on the recording constitutes a “private” conversation which was solely admissible pursuant to statute.

Please contact my office if you, a friend or family member are charged with a crime. Hiring an effective and competent defense attorney is the first and best step toward justice.

“Revenge Porn” Outlawed by the Feds?

Image result for revenge porn

Excellent article by Brian Murphy and Andrea Drusch of mcclatchydc.com discusses how congressional lawmakers are pushing to make “revenge porn” or “sextortion” a federal crime.

Tuesday, Sens. Richard Burr, R-N.C., Kamala Harris, D-Calif., and Amy Klobuchar, D-Minn., said they’d sponsor the new legislation to make “revenge porn” a federal crime by passing a bill very similar to a bill introduced last year by Rep. Jackie Speier, D-Calif. Speier introduced the bill in the House again Tuesday.

According to the article, Rep. Joe Barton, a Texas Republican who is sponsoring the bill, said he shared a sexually explicit video and text messages with a woman he was seeing after he separated from his second wife. An image from that video of a naked Barton, now 68, appeared on the internet last week, becoming the talk of his hometown and spurring debate over criminal intent.

Barton apologized last week for the leaked video, saying he should have used better judgment. He also suggested he’d been the victim of the crime of revenge porn, which is illegal under Texas’s law, but not federal law.

Barton sent the video to a woman who he saw over the span of several years. In a recorded phone conversation that the woman gave to the Washington Post, Barton asked her not to use the video to hurt his career. She said she had no intention of doing so, but the video surfaced last week from an anonymous Twitter account.

Barton took the incident to the U.S. Capitol Police, but said last week he’d heard no word that an investigation had been opened.

According to Murphy and Drusch’s article, thirty-eight states and D.C. have laws against distributing “revenge porn.” The new federal legislation would make it “unlawful to knowingly distribute a private, visual depiction of an individual’s intimate parts or of an individual engaging in sexually explicit conduct, with reckless disregard for the individual’s lack of consent to the distribution, and for other purposes.”

Murphy and Drusch wrote that North Carolina passed legislation outlawing “revenge porn” in 2015 and updated the provision in 2017. The state law makes it illegal to post nude photos online without the consent of the victim.

The FBI defines “sextortion” as “when someone threatens to distribute your private and sensitive material if you don’t provide them images of a sexual nature, sexual favors, or money.”

In short, the proposed federal legislation would establish federal criminal liability for people who share private, explicit images without consent. In order to prosecute someone under the proposed law, officials would have to prove the defendant was aware of a substantial risk that the victim expected the image would remain private and that sharing could cause harm to the victim.

“Perpetrators of exploitation who seek to humiliate and shame their victims must be held accountable,” said Harris, the former attorney general of California who prosecuted operators of “revenge porn” sites. “It is long past time for the federal government to take action to give law enforcement the tools they need to crack down on these crimes.”

The bill provides up to five years in prison and/or unspecified fines.

My opinion? Washington State has already outlawed “revenge porn” as a Class C Felony under the “Disclosing Intimate Images” statute RCW 9A.86.010. Other states have also followed suit. It appears the feds are simply catching up.

Immediately contact my office if you, a friend or family member face criminal charges for distributing suggestive content online. It’s imperative to find a competent criminal defense attorney who can possibly suppress the evidence and/or convince prosecutors and judges to reduce or dismiss these egregious charges.

The Eyes Never Lie

Image result for The eyes expose our lies. Now AI is noticing.

Interesting article by reporter Matt McFarland of CNN describes new artificial intelligence (AI) which detects deception by tracking dilations in the pupils in our eyes.

A Utah-based company called Converus has developed technology called EyeDetect. It’s gaining popularity as a more affordable, less biased version of a polygraph exam, which has long been the gold standard for detecting lies.

EyeDetect relies on an algorithm that weighs a variety of factors. The key indicators are if a person’s eyes dilates while reading a question, and how fast they read questions. Our pupils dilate when we’re deceptive because lying takes more mental energy. The eyes allow in more light and information to help our brains with their added workload. This evolved as a survival instinct, according to David Raskin, a retired University of Utah professor, who worked on the team that developed the science behind EyeDetect.

According to McFarland, EyeDetect, which launched in 2014, is used today in 34 countries as part of job interviews and corporate investigations. Latin American banks, for example, use the technology to determine if their tellers can be trusted. Research has shown the accuracy rates of EyeDetect and polygraph are similar, both nearing 90%.

A person taking an EyeDetect exam sits at a desk and answers true-or-false questions on a tablet. An infrared camera tracks eye movement, blinking and pupil dilation. After 30 minutes, an algorithm scores their deceptiveness on a scale from zero to 100.

According to McFarland, some local U.S. law enforcement departments and private investigators have started using EyeDetect.

“The eyes are the window of the soul,” said Juan Becerra, an investigator at Panther Security and Investigations. He used to work with polygraphs at the FBI and now uses EyeDetect. “This is something that’s revolutionary and that’s going to change the entire deception detection field.”

Converus and the Utah scientists say the U.S. federal government has been slow to embrace the technology. The U.S. House of Representatives passed a bill this summer lifting the polygraph requirement for U.S. Customs and Border Patrol applicants to address staffing shortages. Advocates for the bill have said flaws in polygraphs have made it more difficult to fill open positions.

Apparently, a deceptive person will generally take longer to answer questions on a test, as they’re being careful. But on the specific questions they’re lying on, they will respond faster.

Raskin and the other Utah professors — a group of leading polygraph researchers who gravitated toward optical tests for deception — said there are several advantages to sensing lies through the human eyes. Polygraph exam results can be biased because humans administer and score the tests. EyeDetect removes the human element.

Ken Roberts, a deputy sheriff in the Dona Ana County Sheriff Department in Las Cruces, New Mexico, has switched from administering polygraphs to EyeDetect exams for pre-employment screenings. Roberts still sees some uses for polygraphs, such as interviewing a suspect in a homicide case, when tailored follow-up questions are necessary.

My opinion? Although interesting, this new technology could be viewed as a more technologically advanced version of junk science.

The general rule in Washington is that polygraph testimony is inadmissible unless it is agreed by both parties. This is because the accuracy (i.e., validity) of polygraph testing has long been controversial. An underlying problem is theoretical: there is no evidence that any pattern of physiological reactions is unique to deception. An honest person may be nervous when answering truthfully and a dishonest person may be non-anxious.

However, even if the test isn’t used in court, it can still be used by police during questioning. If that happens to you, make sure to have an experienced criminal lawyer present to make sure there’s no funny business such as leading questions and/or unscrupulous interrogation tactics.

Please contact my office if you, a friend or family member are charged with a crime. Hiring an effective and competent defense attorney is the first and best step toward justice.

Jail Calls Make Revenue

Image result for video chat jail inmates

Wonderful article by Brian Alexander of The Atlantic claims that private companies have much to gain from installing and maintaining video technology connecting inmates with visitors.

VIDEO CHAT TECHNOLOGY

Over the past decade, many prisons  have outsourced video chat the systems to private corporations, often as part of a package that includes phone services. As of 2014, according to a report by the nonprofit Prison Policy Initiative, over 500 jails and prisons in 43 states had adopted video visitation.

An unknown number of those 500-plus facilities have also adopted “remote” video visitation, something akin to Skype, in which a “visitor” can communicate with an inmate via a computer, from any location. Unlike the in-facility video visitation systems, these remote setups come with charges of up to a dollar per minute, not counting account-deposit fees and set-up charges—expenses that can be quite burdensome for the often-poor families of inmates.

Despite the expense, however, the benefits cannot be ignored. Many visitors may conclude that driving to the jail is a waste of time and gas, and opt to pay. And jailers argue that video visitation has obvious security advantages and improves staff efficiency, as deputies don’t have to remove a prisoner from a housing unit or check visitors in.

Additionally, the revenues cannot be ignored either. Video chat systems make jailers—whether local governments or private corporations—the de-facto business partners of the companies, while enriching private-equity firms (which own many video-visitation providers) and their investors. “Video visitation is a link in the whole system that sees inmates as a revenue opportunity,” says Daniel Hatcher, a law professor at the University of Baltimore and the author of The Poverty Industry: The Exploitation of America’s Most Vulnerable Citizens. “It’s part of a larger system that sees the broader vulnerable family as a revenue opportunity, too.”

Image result for video chat jail inmates expensive costs

A LUCRATIVE BUSINESS
Reporter Brian Alexander says that inmate-communication services have proven to be a very lucrative business, and expensive phone charges borne by the families of prisoners have stoked controversy for years. In response, the Federal Communications Commission (FCC) capped per-minute rates in 2015. Prison-telecom companies sued. President Trump’s appointee to head the FCC, Ajit Pai, dropped the FCC’s defense of the rate-cap rules, and, in June, a court struck them down. Even so, the phone charges became a scandal and some in Congress vowed to take action. Administrators began to feel queasy about the rates. 
The procedural hurdles and the outright bans on in-person visitation seem designed to nudge visitors to stay home and visit remotely. This not only benefits providers, but jails, prisons, and local jurisdictions too, which can use income from company commissions or profit-sharing to benefit the facility, a county’s general fund, or some other local cause. For example, the Prison Policy Initiative uncovered a contract between Securus and Maricopa County, Arizona, that provided for a 10 percent commission to the county of gross monthly revenues, but only if the number of paid video visits reached at least 8,000 for that month. If Securus grossed $2.6 million or more, the county’s percentage rose to 20 percent.

VIDEO VISITATION NO REPLACEMENT FOR IN-PERSON VISITS.

Alexander emphasizes that video visitation is no replacement for in-person visits. As an oft-cited Minnesota Department of Corrections study from 2011 showed, “prison visitation can significantly improve the transition offenders make from the institution to the community. Any visit reduced the risk of recidivism by 13 percent for felony reconvictions and 25 percent for technical violation revocations.” Also, a report by the National Institute of Corrections (part of the U.S. Department of Justice) similarly concluded that video visitation “cannot replicate seeing someone in-person, and it is critical for a young child to visit his or her incarcerated parent in person to establish a secure attachment.”

INVESTORS ARE PIQUED

Meanwhile, because the largest inmate telecom-and-video providers generate a healthy flow of cash, they’ve attracted the interest of private equity, or PE. The fees that flow upward from prisoners and their families find their way to these firms and their investors. In 2013, for example, Global Tel Link, another major inmate phone-and-video provider, borrowed $885 million to fund dividend recapitalizations at the behest of its PE sponsor, American Securities; that debt would be paid back with the proceeds from inmate calls and video visitations.

VIDEO CHAT: GOOD OR BAD?

Alexander says that even a critic like Hatcher, the author and law professor, believes that video visitation has the potential for good. Such a service can complement in-person visits. It could allow an inmate to see a child’s school performance. It could substitute for an in-person visit when weather makes travel to a jail or prison hazardous. But Hatcher fears that it’s being used to restrict contact and drain money from people who are often already poor.

Please contact my office if you, a friend or family member are charged with a crime. Hiring an effective and competent defense attorney is the first and best step toward justice.

The Rise of Bitcoin

Image result for bitcoin

 of The Washington Times claims that the value of the shadowy digital currency known as Bitcoin has jumped to record highs this month, sending shock waves through America’s defense and intelligence agencies, which fear its growth signals a surge in use by terrorists, drug kingpins, white-collar criminals and Russian cybercriminals who don’t want to be tracked by the world’s governments.
BACKGROUND ON BITCOIN
For those who don’t know, Bitcoin is a worldwide cryptocurrency and digital payment system invented by an unknown programmer, or a group of programmers, under the name Satoshi Nakamoto. It was released as open-source software in 2009. The system is peer-to-peer, and transactions take place between users directly, without an intermediary. These transactions are verified by network nodes and recorded in a public distributed ledger called a blockchain. Since the system works without a central repository or single administrator, bitcoin is called the first decentralized digital currency.

Besides being created as a reward for mining, Bitcoin can be exchanged for other currencies, products, and services in legal or black markets.

As of February 2015, over 100,000 merchants and vendors accepted bitcoin as payment. According to research produced by Cambridge University in 2017, there are 2.9 to 5.8 million unique users using a cryptocurrency wallet, most of them using Bitcoin.

The currency’s unique power comes from its independency and lack of reliance on any single government for its legitimacy. Unlike regular money, digital or cryptocurrencies are not connected to banks or governments and allow anonymous purchases or money exchanges completely outside the realm of banks, credit card firms or other third parties. Instead, the coins exist because users “mine” them by lending their computing power to verify other users’ transactions.

CYBER TERRORISM & BITCOIN

In Britain, screenshots on social media showed National Health Service computer screens with messages demanding $300 worth of Bitcoin to regain access to files.

While cyberattacks have increasingly targeted businesses around the world, Bitcoin ransom attacks, especially in the U.S., are skyrocketing. The FBI’s Internet Crime Complaint Center reported it received 2,673 ransomware incidents last year — nearly double the  figure from 2014.

Despite Moscow’s denials of meddling in the U.S. presidential election, major investigations also continue into Russian hackers suspected of using cyberattacks to undermine or influence the vote.

WORLD GOVERNMENTS STRIKE BACK AGAINST CYBER CRIMES AND BITCOIN
This summer, the U.S. Treasury’s Financial Crimes Enforcement Network (FinCEN), the Department of Justice and scores of European illicit finance law enforcement officials have fought back with a wave of operations against Russian cybercriminals. Late last month, they shuttered AlphaBay and Hansa — two of the biggest “dark web” contraband marketplaces rife with the illegal sale of guns, drugs and other forbidden merchandise.

In an even more startling sign of the battle raging around Bitcoin, a FinCEN-led international illicit financing task force arrested a Russian “mastermind of organized crime” on a small beachside village in northern Greece less than two weeks ago.

 Alexander Vinnik, who is accused of laundering more than $4 billion worth of illegal funds using Bitcoin accounts, operated BTC-e, one of the world’s oldest Bitcoin exchanges.

U.S. authorities accuse Mr. Vinnik of facilitating crimes including drug trafficking, public corruption, hacking, fraud, identity theft and tax refund fraud.

“Just as new computer technologies continue to change the way we engage each other and experience the world, so too will criminals subvert these new technologies to serve their own nefarious purposes,” Brian Stretch, U.S. attorney for the Northern District of California, said about BTC-e.

Mr. Vinnik was arrested amid worldwide cyberhavoc triggered by massive WannaCry’s Bitcoin ransomware attacks in May and June. The attacks forced a production shutdown at Renault auto plans, crashed computers at Britain’s National Health Service and targeted India’s ATM network.

A little-noticed provision of the law passed by Congress and signed by President Trump this month imposing new sanctions for North Korea, Iran and Russia mandated the formulation of a national security strategy to combat “the financing of terrorism and related forms of illicit finance.” Among those forms, according to the text of the law, were “so-called cryptocurrencies and other methods that are computer, telecommunications, or internet-based” for cybercrime.

America’s defense and intelligence agencies, FinCEN in particular, pride themselves on the U.S. government’s ability to track and disrupt the illicit financial networks that work through traditional banks and finance channels.

This summer’s crackdowns on illicit Bitcoin activity has been considerable, but the dramatic surge in the currency’s overall value poses even more challenges.

WHAT IS A BITCOIN WORTH NOWADAYS?

Over the past month, Bitcoin prices are up more than 30 percent. According to the CoinDesk Bitcoin Price Index, a bitcoin traded for more than $3,000 — a record high — this past weekend.

The surge follows a spinoff another cryptocurrency, Bitcoin Cash. Anticipation of the spinoff sent bitcoin values spiraling last month as market analysts predicted a “civil war” with the rival. The opposite appears to have occurred with the spinoff driving up Bitcoin’s value. Market analysts say the value surge demonstrated bitcoin’s resiliency in addition to a growing public appetite for cryptocurrencies.

On Thursday, bitcoins traded at $3,439.55 per coin, driving the overall market value of all existing bitcoins to $56 billion. Adding Bitcoin’s overall value to other cryptocurrencies such as Ethereum and Litecoin and the total market capitalization of such digital cash is roughly $120 billion.

HOW DO WE RESPOND TO THE INCREASED USE OF CRYPTOCURRENCIES?

Yaya Fanusie, a former counterterrorism analyst for the CIA, is credited with identifying the first verifiable instance of a terrorist organization attempting to use bitcoin to raise funds. He now runs analysis for the Center on Sanctions and Illicit Finance at the Foundation for Defense of Democracies and told The Washington Times in an interview that the increased volume of bitcoin trading in itself is not the concern.

“The national security concern is not that criminals will use this type of technology — they use all technologies,” Mr. Fanusie said. “The policy question is: How do you deal with something that governments can’t control?” He said the U.S. needs to engage with the cryptocurrencies as much as possible and pointed to Defense Department procurement experiments already underway.

“Bitcoin is like a rebellious teenager,” he said. “It wants to do its own thing. So what do you do? Do you ban it? No, you want to have a good relationship with it and influence how it develops.”

BUILDING A CRIMINAL DEFENSE 

Virtual currencies like Bitcoin can play a central role in more traditional types of crime. Bitcoin trading enables some types of unlawful purchases that may be serious offenses, such as illegal purchases of weapons or drugs. One such high-profile case is that of Silk Road’s alleged owner, Ross Ulbricht, whose Bitcoin assets of over $28 million were seized in a criminal investigation into alleged illegal drug sales.

Unfortunately, Identity Theft can play a part of these cryptocurrency transactions.

Even ordinary cash has a history of being used for nefarious ends, but digital currency transactions can make the courtroom defense of criminal charges more complex. When facing the possibility of fines, forfeiture, or even incarceration, it is best to find an attorney with the experience it takes to build a nuanced, creative defense.

Please contact my office if you, a friend or family member are charged with a crime. Hiring an effective and competent defense attorney is the first and best step toward justice.

Juror Misconduct

All about juries: why do we actually need them and can they get it 'wrong'?

In Godoy v. Spearman, the Ninth Circuit Court of Appeals overturned a murder conviction because a juror inappropriately communicated with a “judge friend” about the case during deliberations.

BACKGROUND FACTS

Enrique Godoy was convicted of second-degree murder by a Los Angeles County Superior Court jury. A week before his June 12, 2006 sentencing, he moved for a new trial alleging that Juror 10 had improperly communicated about the case with a “judge friend” during deliberations. To substantiate his allegations, Godoy brought brought alternate juror “E.M.” to his sentencing hearing. The trial court continued Godoy’s sentencing to a future court date. Later, Godoy sent the Prosecutor a declaration about Juror 10’s misconduct from alternate juror N.L., who wrote the following:

“During the course of the trial, juror number ten kept continuous communication with a gentleman up north, who she referred to as her “judge friend.” Juror number ten explained to us, the jury as a whole, that she had a friend that was a judge up north. From the time of jury selection until the time of verdict, juror number ten would communicate with her “judge friend” about the case via her TMobile Blackberry, a two way text paging system. When the jury was not sure what was going on or what procedurally would happen next, juror number ten would communicate with her friend and disclose to the jury what he said.”

Despite this “smoking gun” declaration, the trial court nevertheless sentenced Godoy to 16 years’ to life imprisonment. Godoy appealed his conviction to the California Court of Appeal, arguing the trial court erred by (1) refusing to presume Juror 10’s communications prejudiced the verdict and (2) refusing to hold an evidentiary hearing on the alleged misconduct. However, the California Court of Appeal rejected both of these arguments on the merits and affirmed Godoy’s conviction. Gody again appealed, this time going to the Ninth Circuit Court of Appeals.

COURT’S ANALYSIS AND CONCLUSION

This Ninth Circuit’s opinion began with the following:

“One of the most fundamental rights in our system of criminal justice is the right to trial before an impartial jury. Its common law origin can be traced back to the Middle Ages. It was enshrined in the Sixth Amendment to the Constitution, and it has been embraced by the Supreme Court in numerous cases . . .”

Against this backdrop, the Ninth Circuit held that the California Court of Appeal decision violated the clearly established Supreme Court law that governs this case. It reasoned that under Mattox v. United States, due process does not tolerate any ground of suspicion that the administration of justice has been interfered with by external influence.

“Thus, when faced with allegations of improper contact between a juror and an outside party, courts apply a settled two-step framework,” said the Ninth Circuit. At step one, the court asks whether the contact was “possibly prejudicial,” meaning it had a tendency to be injurious to the defendant. If so, the contact is deemed presumptively prejudicial and the court proceeds to step two, where the burden rests heavily upon the State to establish the contact was, in fact, harmless.

If the State does not show harmlessness – or in other words, if the defendant was, in fact, harmed by the juror’s contact with an outside party – then the court must grant the defendant a new trial.  However, when the prejudicial effect of the contact is unclear, then the trial court must hold a hearing to determine the circumstances of the contact, the impact thereof upon the juror, and whether or not it was prejudicial.

“Here, the California Court of Appeal failed to adhere to this framework in three key respects,” said the Ninth Circuit. First, although the State court correctly acknowledged at step one that N.L.’s declaration raised a presumption of prejudice, it never required the State to rebut that presumption at step two. It concluded instead that the presumption was rebutted because Godoy’s evidence failed to prove prejudice.”

The Ninth Circuit further reasoned that under Mattox and Remmer, however, Mr. Godoy was not required to prove prejudice at step two. Once he triggered the presumption, the burden rested heavily upon the State to disprove prejudice. “Thus, in denying relief because Godoy’s evidence did not prove prejudice at step two, the State court acted contrary to well established law,” reasoned the Ninth Circuit.

Second, the California Court of Appeal decision to set aside the State court’s failure to hold the State to its burden was error. In other words, it was wrong for the California Court of Appeal to rely on the very same statement from N.L.’s declaration both to raise the presumption of prejudice and to rebut it.  “This defies not only logic, but also the clearly established definition of a ‘presumption,’” reasoned the Ninth Circuit.

Third, the California Court of Appeal denied Godoy a hearing on prejudice under the wrong legal rule. It held he had to show a “strong possibility” of prejudice, but Remmer requires a hearing whenever, as here, the presumption attaches but the prejudicial effect of the contact is unclear from the record. “Because the state court’s decision contravened these bedrock principles, it was contrary to clearly established Supreme Court precedent under 28 U.S.C. § 2254(d)(1),” reasoned the Ninth Circuit.

The Ninth Circuit concluded that because Godoy showed the presumption of prejudice, he was entitled to the evidentiary hearing that he never had to begin with. With that, the Ninth Circuit reversed the judgment of the lower court and remanded the case back with instructions to hold an evidentiary hearing to determine the circumstances of Juror 10’s misconduct, the impact thereof upon the jury, and whether or not it was prejudicial.

My opinion? There’s a lot to be learned from this case. First, in all of my trials I admit a jury instruction prohibiting the jurors from accessing the internet and/or their smartphone devices. Jurors must rely on the evidence and the law and not be guided by outside influences. Second, I try and discuss the case with jurors immediately after they render verdicts. These conversations are very helpful teaching moments because jurors reveal what swayed their decisions. Also – and important to the defense of my clients – jurors may reveal whether their fellow jurors committed misconducts  similar to the type described in this case.

Good decision. And kudos to the defense attorney who discovered the juror misconduct. Although my heart goes out to the friends and family of the murder victim, justice is not served when our courts fail to administer their obligation to give defendants a fair trial.

Please contact my office if you, a friend or family member are charged with a crime. Hiring an effective and competent defense attorney is the first and best step toward justice.

the “Do’s & Dont’s” of Washington’s Distracted Driving Law

Recent Changes to Distracted Driving Law | The Weekly Villager

Great article by reporter Mike Lindblom of the Seattle Times discusses Washington’s Driving Under the Influence of Electronics (DUIE) Act set to be enforced in July.  The law forbids virtually all use of handheld gadgets such as phones, tablets, laptop computers and gaming devices while driving.

According to Lindblom, nearly one-tenth of motorists are holding a device at any given moment, state observation teams have found. That far outnumbers traffic police on the road and raises questions about the law’s chances of success. On the other hand, the state has a history of reducing drunken driving and posting a 95 percent compliance with seat-belt requirements. Linblom gave helpful insights to the law:

Q. When does the law take effect?

A. Approximately July 23, which is 90 days after the Legislature’s regular session adjourned, the governor’s staff say.

“Public safety is better served by implementing this bill this year,” Inslee wrote in his partial-veto message. Bill sponsor Sen. Ann Rivers, R-La Center, had initially proposed a Jan. 1, 2018, start, and then agreed to a year delay, in negotiations with the House, to give police and drivers more time to prepare.

Q. What will be banned?

A. Texting is already illegal, as is holding a cellphone at the ear. Drivers constantly flout those rules, or evade them by holding a phone between the legs, or just below the chin.

The new bill forbids handheld uses, including composing or reading any kind of message, picture or data. Photography while driving is illegal. Drivers also cannot use handheld devices while at a stop sign or red-light signal.

Q. What is still legal?

A. Drivers may still use a smartphone mounted in a dashboard cradle, for instance to use a navigation app, but not to watch video. The new law permits “minimal use of a finger” to activate an app or device.

Built-in electronic systems, such as hands-free calling and maps, remain legal. Calls to 911 or other emergency services are legal, as are urgent calls between transit employees and dispatchers. Amateur radio equipment and citizens-band radio, remain legal. Handheld devices may be used if the driver has pulled off the roadway or traffic lanes, where the vehicle “can safely remain stationary.”

Q. What are the penalties?

A. The standard traffic fine of $136 would nearly double to $235 on the second distracted-driving citation.

Q. Is DUIE a primary offense?

A. Yes. A police officer can pull someone over just for using a handheld device.

Q. Will a ticket raise my insurance rates?

A. Probably. Distracted-driving citations will be reported on a motorist’s record for use by the insurance industry, which testified in favor of the law. There was considerable debate about that, as some lawmakers sought to keep DUIE offenses off the record, the way texting violations are currently. But the safety hawks managed to make them reportable — a penalty that House sponsor Jessyn Farrell, D-Seattle, gained in exchange for allowing that now-vetoed 1½ year implementation time.

The cost of a citation on personal insurance bills will depend on what the data show, about a correlation between someone’s violations and crash history, said Nicole Ganley, public-affairs director for the Property Casualty Insurers Association of AmericaArkansas, North Dakota, and Colorado lawmakers passed stronger distraction bills this year, she said, but insurers especially like the Washington law’s broader sweep.

“It’s modernizing the driving code, so that all the behaviors are included,” she said. “This new law will serve as a deterrent and draws a line in the sand that this behavior is not safe for anyone.”

Q. What about other kinds of distraction?

A. Miscellaneous distractions such as grooming or eating will be a secondary offense, meaning a ticket may be issued if a law-enforcement officer pulls you over for some other offense, such as speeding or a dangerous lane change. The penalty will be an extra $30.

Q. Who will enforce this?

A. Lack of staffing is a potential weakness. Earlier this year, there were as few as a half-dozen State Patrol troopers some shifts in the whole Bellevue detachment, patrolling Interstate 405 and Interstate 90. Those teams should grow somewhat. The Legislature voted to raise trooper pay 16 percent this year, based on a governor’s agreement with the troopers’ labor union, in hopes of winning recruits and stopping attrition.

A new class of 49 people just graduated from the academy May 1, of which 16 will work in King County, said Trooper Rick Johnson, a spokesman in Bellevue. Another class is due in September. “We’re moving in the right direction, definitely,” he said.

In early April, the state’s law-enforcement agencies spent $400,000 in federal grants to add 6,000 patrol hours aimed at driver distraction. The same program in April 2016 produced 5,412 citations statewide, double the usual monthly pace, according to the Washington Traffic Safety Commission. Statistics show 171 of 568 road deaths in the state in 2015 were blamed on some form of driver distraction, not necessarily electronics.

Officials haven’t issued plans for any extra patrols, to break in the new law this summer. To date, only $19,000 has been budgeted to support the distraction law. Lawmakers weren’t intending to fund a big education blitz until next year.

So the safety commission will do what it can, to possibly include informational cards for police to hand drivers, before the tougher law begins July 23, according to spokeswoman Erica Stineman.

Gina Bagnariol-Benavides, who also testified for tougher laws, said the governor’s sudden change was “a pretty exciting thing.”

“Common sense tells you (that) you shouldn’t use your phone behind the wheel of a car,” Bagnariol-Benavides said. “I don’t think there’s a huge amount of education that should have to go along with that.”

Please contact my office if you, a friend or family member are charged with a crime. Hiring an effective and competent defense attorney is the first and best step toward justice.

Seattle Allows Filming Cops

 

You Have a First Amendment Right to Record the Police | Electronic Frontier Foundation

Great article in the Seattle Times by Daniel Beekman discusses how Seattle’s City Council voted Monday to enshrine in the Seattle Municipal Code the rights of the public to observe, record and criticize police activity without fear of retaliation.

 The only exceptions are when an observer hinders, delays or compromises legitimate police activity, threatens someone’s safety or attempts to incite other people to violence, according to the ordinance sponsored by Councilmember Lisa Herbold.

The First Amendment can offer protections to members of the public when they watch and record police. And a Seattle Police Department policy adopted in 2008 says bystanders may remain nearby and record the incident as long as they don’t interfere.

So, people already were allowed to watch and record police in Seattle. But the council’s vote means the rights of police observers are now recognized in city law.

According to Beekman, the ordinance says officers should assume members of the public are observing and possibly recording their work at all times. Councilmember Herbold initially proposed the change last year, pointing to high-profile shootings that was recorded by bystanders.

 “The value of video and audio recordings by the public is keenly evident from the recordings in 2016 of the deaths of Philando Castile in Minnesota, Alton Sterling in Baton Rouge … and law-enforcement officers in Dallas and Baton Rouge,” the ordinance says.

Across the country, smartphones are helping regular people hold their police departments accountable. But people watching, recording and criticizing officers have in some instances been arrested, according to a council memo.

Though Seattle police are recorded by patrol-car cameras and are being outfitted with body-worn cameras, civilian recordings are still important, Herbold said Monday.

My opinion? Wonderful! I’ve had many Clients complain that their attempts to record interactions with police result in their cameras being confiscated and being slapped with charges of Obstructing and Resisting police.

I’ve said it once, and I’ll say it again: recording interactions between police and citizens makes everyone behave better and shows proof of what really happened. Kudos to the Seattle City Council.

Please contact my office if you, a friend or family member are charged with a crime. Hiring an effective and competent defense attorney is the first and best step toward justice.

Backpage.com Evidence Admitted at Trial as “Business Record.”

Image result for backpage

In State v. Butler, the WA Court of Appeals decided a trial court rightfully admitted business records connecting showing the defendant used Backpage.com to facilitate the commercial sexual abuse of a minor because the State’s failure to provide the written notice of the evidence did not prejudice the defendant, who was given the business records months before trial.

BACKGROUND FACTS

N.C. was 14 years old when she first met 22-year-old defendant Ivory Butler. One day, N.C. skipped school and spent the day with Butler. N.C.’s mother found out she had skipped school and punished her. N.C. ran away from home, and Butler picked her up. He took her to a motel room and arranged for her to meet men at the motel for sex. She gave the money she received to Butler. N.C. continued selling sexual services and giving the money to Butler.

Detective Raymond Unsworth found Internet ads on Backpage.com for female escort services with Butler’s phone number listed as the contact number. The ads included photographs of the body, but not the face, of a young woman. The ads alluded to sexual services that would be provided, with the prices that would be charged.

An undercover detective responded to the Backpage ads by contacting Butler’s phone number. The detective, posing as a customer, arranged to obtain sexual services for $300 from a woman in room 201 of the New Horizon Motel. Police found N.C. in that room, together with a disposable cellphone under the mattress, condoms in a Crown Royal bag, and a knife in the bedside table drawer.

In Butler’s phone, the contact name assigned to the disposable phone found in the motel room was “Money Baby Money Baby.” Text messages between Butler’s phone and the disposable phone found in the motel room included details about providing sexual services for money. The messages also included instructions from Butler to N.C. to discard the phone in the toilet if the police came. Butler was arrested and charged under RCW 9.68A.101 with promoting commercial sexual abuse of a minor.

The Trial Exhibits

At trial, the State sought to admit three exhibits. Exhibits #3 and #4 relate to Backpage ads for escort services. Exhibit #5 was the certification from the Backpage records custodian. Detective Unsworth testified that he found the ads on Backpage’s public website. Each ad included photographs of a young woman, information about the sexual services that could be provided, the price, and Butler’s telephone number as the contact.

Exhibits #3 and #4 compiled the ads that were online, more photographs that Detective Unsworth had not seen online, the date each ad was posted, and the poster’s fictitious name, mailing address, and e-mail address. Backpage provided the certification from its records custodian in response to a search warrant for business records.

The State provided these exhibits to Butler months before trial as part of discovery. The trial court admitted the exhibits over Butler’s objection.

The jury found Butler guilty as charged. On Appeal, Butler argues the Exhibits #3, #4 and #5 were wrongfully admitted.

COURT’S ANALYSIS AND DECISION

Butler argues Exhibits #3, #4 and #5 were inadmissible because the State did not give proper notice under RCW 10.96.030(3). This statute contains an exception to the general rule requiring witness testimony to admit business records. To ensure the opposing party has a fair opportunity to challenge the business records and certification, the statute provides in part:

“A party intending to offer a record into evidence under this section must provide written notice of that intention to all adverse parties, and must make the record and affidavit, declaration, or certification available for inspection sufficiently in advance of their offer into evidence to provide an adverse party with a fair opportunity to challenge them.”

The court reasoned that approaching these issues is similar to approaching the child hearsay rule: basically, cases addressing the child hearsay statute have upheld the admission of statements without prior notice “so long as the adverse party had or was offered an opportunity to prepare to challenge the statements.”

Here, Butler argued the State was required to provide a separate written notice to inform him that it intended to rely on RCW 10.96.030 for admission of the business records. But months before trial, the State provided the certification of the Backpage records custodian, together with the Backpage business records. Mid-trial, the State also offered to produce the custodian for live testimony and a defense interview. This allowed Butler ample opportunity to prepare to challenge the records. With that, the Court denied Butler’s arguments:

“Consistent with the cases addressing the child hearsay statute, we conclude the lack of written notice required by RCW 10.96.030 did not cause any prejudice to Butler. He had ample opportunity to prepare to challenge the business records when the State provided all of the proposed business records and the certification from the records custodian months prior to trial.”

Moreover, the Court reasoned that the State offered to call the records custodian as a witness and to allow Butler to interview the custodian. However, Butler declined to request a continuance to interview the witness.

Finally, the Court of appeals rejected arguments that the Backpage ads bolstered N.C.’s testimony tying Butler to the Backpage evidence. The Court reasoned that even without the admission of the Backpage ads, overwhelming evidence links Butler to his exploitation of N.C.:

“The physical evidence, text messages, jail phone calls, testimony from N.C., and successful undercover sting operation provide overwhelming evidence that Butler promoted the prostitution of N.C.”

Consequently, the Court concluded that the lack of written notice required by RCW 10.96.030 did not cause prejudice to Butler. Overwhelming evidence supported Butler’s guilt.

Please contact my office if you, a friend or family member are charged with a crime. Hiring an effective and competent defense attorney is the first and best step toward justice.

Cell Phone Spying Is Unlawful

Image result for cell phone spying

In State v. Novick, The WA Court of Appeals Division II held the Defendant committed Computer Trespass in the First Degree when he installed “Mobile Spy” software on the victim’s cell phone and sent commands to activate the recording feature of the program in order to intentionally record the victim’s private communications.

David Novick and Lisa Maunu began dating in December 2013. Novick bought her a new mobile phone on March 11, 2014, and set it up for her. Unbeknownst to Maunu, Novick installed an application called Mobile Spy on Maunu’s new phone. The application allowed a person to log onto the Mobile Spy website and monitor the phone on which the application was installed.

From the Mobile Spy website, a user could access all the information stored on the monitored phone, including text messages, call logs, and e-mails. The versions of Mobile Spy software also permitted a user to send commands to the targetted phone from a “live control panel” on the website. One such command allowed a user to activate the phone’s microphone and recording features and record audio into a file that could then be downloaded from the website.

Eventually, Novick was caught after his girlfriend Maunu became suspicious. In short, Maunu became concerned because Novick expressed specific knowledge about Maunu’s health conditions, medications, doctors’ appointments, and private conversations.

With the assistance of Novick’s employer, it was discovered that Novick had downloaded over 500 audio files from Mobile Spy, searched for GPS (global positioning system) locations, and searched for particular telephone numbers.

The State charged Novick with eight counts of Computer Trespass in the First degree and eight counts of Recording Private Communications based on Novick’s use of Mobile Spy to record Maunu’s conversations. At trial, Novick was convicted on all charges.

Novick appealed on arguments that (1) the State failed to provide sufficient evidence that he intentionally recorded a private communication, and (2) entry of eight convictions of each crime violated his right against double jeopardy because the correct unit of prosecution covers the entire course of conduct.

Ultimately, the Court of Appeals disagree with Novick and affirmed his convictions.

  1. THE PROSECUTION SHOWED SUFFICIENT EVIDENCE OF COMPUTER TRESPASS FIRST DEGREE.
First, the Court explained that Computer Trespass in the First Degree occurs when a person intentionally gains access without authorization to a computer system or electronic database of another and the access is made with the intent to commit another crime. The Court further reasoned that here, the underlying crime was Recording Private Communications. A person commits the crime of recording private communications when he intercepts or records private communications transmitted by any device designed to record and/or transmit said communications.
Second, the Court reasoned that a forensic review of Novick’s computer activity revealed that he intentionally logged into Mobile Spy’s webiste and sent commands from the website to Maunu’s phone. Also, Novick’s computer records showed that he visited the live control panel on Mobile Spy’s website, downloaded audio files collected from Maunu’s phone and intentionally recorded Maunu’s private communications.
Accordingly, the Court held that the State presented sufficient evidence that Novick committed the crime of Recording Private Communications, and with that, committed Computer Trespass First Degree.
2. NO EVIDENCE OF DOUBLE JEOPARDY.
Next, the Court rejected arguments that Novick’s multiple convictions for Computer Trespass and Recording Private Communications violated the prohibition against Double Jeopardy because the correct unit of prosecution for each crime covers the entire course of Novick’s conduct.
The Court began by saying the Fifth Amendment to the United States Constitution provides that no “person be subject for the same offense to be twice put in jeopardy of life or limb.” Similarly, article I, section 9 of the Washington Constitution says, “No person shall . . . be twice put in jeopardy for the same offense.” In short, explained the Court, these double jeopardy provisions prohibit multiple convictions for the same offense.
Furthermore, when a defendant is convicted for violating one statute multiple times, the proper inquiry is, “What unit of prosecution has the Legislature intended as the punishable act under the specific criminal statute?” The Court explained that in order to determine whether there is a double jeopardy violation, the question becomes “what act or course of conduct has the Legislature defined as the punishable act?” Consequently, the scope of the criminal act as defined by the legislature is considered the unit of prosecution.
The Court explained that the first step is to analyze the statute in question. If the statute does not plainly define the unit of prosecution, we next examine the legislative history to discern legislative intent. Finally, a factual analysis is conducted to determine if, under the facts of the specific case, more than one unit of prosecution is present.
Ultimately, the Court was not persuaded by Novick’s “plain language of the statute” argument the if the legislature intended a single unit of prosecution based on a course of conduct, it could have said so plainly.
“What matters is not what the legislature did not say, but what it did say,” said the Court. “The plain language of the statutes support the conclusion that the units of prosecution . . . are each separate unauthorized access and each recording of a conversation without consent.” The Court further reasoned that while Novick’s actions were somewhat repetitious, they were not continuous:
“On at least eight separate and distinct times, Novick logged onto Mobile Spy’s website, accessed Maunu’s phone by issuing a command through the live control panel, and downloaded at least eight different recordings of conversations between Maunu and various other people. Each access was separated by time and reflected a separate intent to record a separate conversation.”
The Court concluded that the State proved that Novick intentionally recorded eight private communications. Additionally, Novick’s actions constituted multiple units of prosecution, and therefore, his multiple convictions did not violate double jeopardy principles. Thus, the Court affirmed Novick’s convictions.
My opinion? On the one hand, it’s shocking that citizens can be convicted of felonies by accessing mainstream computer software. Shouldn’t the software itself be outlawed instead? On the other hand, I see how parents can legally using the same software to track their minor children’s whereabouts, conversations and activities. That type of activity os not illegal.
This case presents a very good example of an atypical computer crime. We see that Computer Trespass First Degree is very similar to standard Burglary charges in that the State must prove the Defendant intends to commit a crime once they gain access to the victim’s computer system or electronic database. Recording Private Communications is a crime.  Therefore, if a defendant records private communications after gaining access, they can be found guilty of Computer Trespass in the First Degree. Simple.
Computer crime cases require experts and/or lay witnesses who are competent in discussing these matters. Speaking for the defense, it’s usually best to hire experts familiar with computer forensics to determine if/when the said access was unlawful and/or intentional. Again, the State must prove intent.

Please contact my office if you, a friend or family member are charged with a crime. Hiring an effective and competent defense attorney is the first and best step toward justice.



Alexander F. Ransom

Attorney at Law
Criminal Defense Lawyer

119 North Commercial St.
Suite #1420
Bellingham, WA 98225

117 North 1st Street
Suite #27
Mount Vernon, WA 98273

Phone: (360) 746-2642
Fax: (360) 746-2949

Consultation Request

Footer Consultation Request

Copyright 2024 Law Offices of Alex Ransom, PLLC   |   Sitemap   |   Website Design by Peter James Web Design Studio
error: Content is protected !!