Lund v. Commonwealth

Last updated

Lund v. Commonwealth (Va. 1977) 232 S.E.2d 745 is a Supreme Court of Virginia case involving theft of services. [1]

Contents

Facts

Charles Walter Lund was a statistics graduate student at the Virginia Polytechnic Institute and State University. While working on his Ph.D. research in the 1970s, Lund utilized the resources of Virginia Tech's computer lab.

The workings of the lab were complex. The computers were leased from IBM computers and the cost was distributed through various departments that used the computer facilities. Student who wished to use the computers were required to obtain the approval of the department head. Access keys were required to gain access to the lab, and a key was required to use PO boxes used to receive materials printed out on the computers. The student would ask for an item to be printed. The department would print the item and it would be placed in the PO box for retrieval. If the printed projects were too large to fit in the PO box a note would be placed there instead so the student could pick it up at the computer center main window.

Lund was put under surveillance on October 12, 1974, because departments were noticing unauthorized charges being made to their accounts. When asked about his activities on the computers, Lund initially denied any use of the computers. Later he admitted that he had been using it and turned over seven PO box keys to the investigator. Mr. Lund claimed that other students had given him those keys. Upon searching Lund's apartment, a large number of computer cards and print-outs were taken, the estimated value by the university being as much as $26,384.16.

Lund was charged in an indictment with the theft of keys, computer cards, computer printouts and using "without authority computer operation time and services of Computer Center Personnel... with intent to defraud, such property and services having a value of one hundred dollars or more." Lund waived his right to a jury trial and was convicted of grand larceny and sentenced to two years in the state penitentiary. His sentence was suspended and he was placed on probation for five years.

Holding

The Supreme Court of Virginia held that labor and services and the unauthorized use of the University's computer cannot be construed to be subject of larceny. The Court reasoned that labor or services cannot be the subject of the crime of larceny because neither time nor services may be taken or carried away, and that the unauthorized use of the computer could not be the subject of larceny, because "Nowhere in Code §§ 18.1-100[…] do we find the word 'use'."

On the subject of the "stolen" items, the Commonwealth argued that the printouts and the computer cards had as much market value as scrap paper: "The cost of producing the print-outs is not the proper criterion of value for the purpose here. Where there is no market value of an article that has been stolen, the better rule is that its actual value should be proved..."

The judgment and indictment of the trial court was reversed based on lack of evidence to convict the defendant of grand larceny under Code §18.1-100 or § 18.1-118.

Related Research Articles

Theft Act of taking anothers property without permission or consent

Theft is the taking of another person's property or services without that person's permission or consent with the intent to deprive the rightful owner of it. The word theft is also used as an informal shorthand term for some crimes against property, such as burglary, embezzlement, larceny, looting, robbery, shoplifting, library theft or fraud. In some jurisdictions, theft is considered to be synonymous with larceny; in others, theft has replaced larceny. Someone who carries out an act of or makes a career out of theft is known as a thief.

Authentication act of confirming the truth of an attribute of a datum or entity, often used as part of access control

Authentication is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicating a person or thing's identity, authentication is the process of verifying that identity. It might involve validating personal identity documents, verifying the authenticity of a website with a digital certificate, determining the age of an artifact by carbon dating, or ensuring that a product or document is not counterfeit.

Robbery is the crime of taking or attempting to take anything of value by force, threat of force, or by putting the victim in fear. According to common law, robbery is defined as taking the property of another, with the intent to permanently deprive the person of that property, by means of force or fear; that is, it is a larceny or theft accomplished by an assault. Precise definitions of the offence may vary between jurisdictions. Robbery is differentiated from other forms of theft by its inherently violent nature ; whereas many lesser forms of theft are punished as misdemeanors, robbery is always a felony in jurisdictions that distinguish between the two. Under English law, most forms of theft are triable either way, whereas robbery is triable only on indictment. The word "rob" came via French from Late Latin words of Germanic origin, from Common Germanic raub "theft".

Larceny is a crime involving the unlawful taking or theft of the personal property of another person or business. It was an offence under the common law of England and became an offence in jurisdictions which incorporated the common law of England into their own law, where in many cases it remains in force.

Identity theft Deliberate use of someone elses identity, usually as a method to gain a financial advantage

Identity theft is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss. The person whose identity has been assumed may suffer adverse consequences, especially if they are held responsible for the perpetrator's actions. Identity theft occurs when someone uses another's personally identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term identity theft was coined in 1964. Since that time, the definition of identity theft has been statutorily defined throughout both the U.K. and the United States as the theft of personally identifiable information, generally including a person's name, date of birth, social security number, driver's license number, bank account or credit card numbers, PINs, electronic signatures, fingerprints, passwords, or any other information that can be used to access a person's financial resources.

Embezzlement is the act of withholding assets for the purpose of conversion (theft) of such assets, by one or more persons to whom the assets were entrusted, either to be held or to be used for specific purposes. Embezzlement is a type of financial fraud. For example, a lawyer might embezzle funds from the trust accounts of their clients; a financial advisor might embezzle the funds of investors; and a husband or a wife might embezzle funds from a bank account jointly held with the spouse.

The Computer Fraud and Abuse Act (CFAA) is a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law, which had been included in the Comprehensive Crime Control Act of 1984. The law prohibits accessing a computer without authorization, or in excess of authorization. Prior to computer-specific criminal laws, computer crimes were prosecuted as mail and wire fraud, but the applying law was often insufficient.

Bank fraud is the use of potentially illegal means to obtain money, assets, or other property owned or held by a financial institution, or to obtain money from depositors by fraudulently posing as a bank or other financial institution. In many instances, bank fraud is a criminal offence. While the specific elements of particular banking fraud laws vary depending on jurisdictions, the term bank fraud applies to actions that employ a scheme or artifice, as opposed to bank robbery or theft. For this reason, bank fraud is sometimes considered a white-collar crime.

Theft Act 1968 United Kingdom legislation

The Theft Act 1968 is an Act of the Parliament of the United Kingdom. It creates a number of offences against property in England and Wales. On 15 January 2007 the Fraud Act 2006 came into force, redefining most of the offences of deception.

Theft of services is the legal term for a crime which is committed when a person obtains valuable services — as opposed to goods — by deception, force, threat or other unlawful means, i.e., without lawfully compensating the provider for these services. It may also overlap with some types of fraud in which payment is made on credit, but under an assumed identity, and ultimately disavowed.

Anti-theft systems protect valuables such as vehicles and personal property like wallets, phones, and jewelry. They are also used in retail settings to protect merchandise in the form of security tags and labels. Anti-theft systems include devices such as locks and keys, RFID tags, and GPS locators.

Information diving is the practice of recovering technical data, sometimes confidential or secret, from discarded material. In recent times, this has chiefly been from data storage elements in discarded computers, most notably recoverable data remaining on hard drives. Those in charge of discarding computers usually neglect to erase the hard drive. It is often in such circumstances for an information diver to copy installed software. Other data may also be available, such as credit card information that was stored on the machine. Companies claim to be especially careful with customer data, but the number of data breaches by any type of entity suggest problems for them as well. In the UK, information diving has been referred to as "binology."

Credit card fraud is an inclusive term for fraud committed using a payment card, such as a credit card or debit card. The purpose may be to obtain goods or services, or to make payment to another account which is controlled by a criminal. The Payment Card Industry Data Security Standard is the data security standard created to help businesses process card payments securely and reduce card fraud.

Albert Gonzalez American computer hacker and computer criminal

Albert Gonzalez is an American computer hacker and computer criminal who is accused of masterminding the combined credit card theft and subsequent reselling of more than 170 million card and ATM numbers from 2005 to 2007: the biggest such fraud in history. Gonzalez and his accomplices used SQL injection to deploy backdoors on several corporate systems in order to launch packet sniffing attacks which allowed him to steal computer data from internal corporate networks. During his spree, he was said to have thrown himself a $75,000 birthday party and complained about having to count $340,000 by hand after his currency-counting machine broke. Gonzalez stayed at lavish hotels but his formal homes were modest.

<i>United States v. Riggs</i>

In United States v. Riggs, the government of the United States prosecuted Robert Riggs and Craig Neidorf for obtaining unauthorized access to and subsequently disseminating a file held on BellSouth's computers. The file, referred to as the E911 file, gave information regarding BellSouth's products implementing 911 emergency telephone services. Riggs and Neidorf were both indicted in the District Court of the Northern District of Illinois on numerous charges relating to the dissemination of the E911 text file. As Riggs had previously been indicted in the Northern District of Georgia in relation to the same incident, his charges from Illinois were transferred to Georgia. Riggs ultimately pleaded guilty in Georgia and was sentenced to 21 months in prison and two years' supervised release. Neidorf pleaded not guilty in Illinois and the government dropped all charges against Neidorf four days after the trial began.

Sarah Palin email hack

The Sarah Palin email hack occurred on September 16, 2008, during the 2008 United States presidential election campaign when the Yahoo! personal email account of vice presidential candidate Sarah Palin was subjected to unauthorized access. The hacker, David Kernell, had obtained access to Palin's account by looking up biographical details such as her high school and birthdate and using Yahoo!'s account recovery for forgotten passwords. Kernell then posted several pages of Palin's email on 4chan's /b/ board. Kernell, who at the time of the offense was a 20-year-old college student, was the son of longtime Democratic state representative Mike Kernell of Memphis.

Commonwealth v. Tluchak, 166 Pa. Super. 16, 70 A.2d 657 (1950). Judge Reno wrote the opinion of the Court. This in the Commonwealth of Pennsylvania in the United States case involves defendants convicted of larceny.

Marcel Lazăr Lehel, known as Guccifer, is a Romanian hacker responsible for high-level computer security breaches in the U.S. and Romania. Lehel targeted celebrities, Romanian and U.S. government officials, and other prominent persons.

<i>United States v. Agrawal</i> Litigation

United States v. Agrawal, 726 F.3d 235, was a case heard in the United States Court of Appeals for the Second Circuit involving theft of trade secrets and intellectual property. The court upheld the conviction of Samarth Agrawal, former quantitative analyst at Paris-based bank Société Générale S.A ("SocGen"), for stealing high-frequency trading code from SocGen and replicating proprietary software for New York-based hedge fund Tower Research Capital ("Tower").

Package theft

Package theft is the theft of a package or parcel. It can occur anywhere in the distribution channel including theft of packages left on at a household: porch piracy".

References

  1. "Lund v. Commonwealth". casebriefs.com. Retrieved 18 April 2011.