People v. Zhani , 2022 IL App (1st) 200307-U ( 2022 )


Menu:
  •                                      
    2022 IL App (1st) 200307-U
    No. 1-20-0307
    June 21, 2022
    Second Division
    NOTICE: This order was filed under Supreme Court Rule 23 and is not precedent except in the
    limited circumstances allowed under Rule 23(e)(1).
    ______________________________________________________________________________
    IN THE
    APPELLATE COURT OF ILLINOIS
    FIRST DISTRICT
    ______________________________________________________________________________
    THE PEOPLE OF THE STATE OF ILLINOIS,                           )   Appeal from the
    )   Circuit Court of
    Plaintiff-Appellee,                                  )   Cook County.
    )
    v.                                                         )   No. 17 CR 9567
    )
    WASSIM ZHANI,                                                  )   Honorable
    )   Ursula Walowski,
    Defendant-Appellant.                                 )   Judge Presiding.
    JUSTICE HOWSE delivered the judgment of the court.
    Presiding Justice Fitzgerald Smith and Justice Cobbs concurred in the judgment.
    ORDER
    ¶1        Held: Defendant’s conviction for theft by threat is affirmed where the evidence presented
    at trial was sufficient to prove him guilty beyond a reasonable doubt.
    ¶2        Following a bench trial, defendant Wassim Zhani was found guilty of theft by threat (720
    ILCS 5/16-1(a)(3)(A) (West 2014)). The trial court imposed a sentenced of 18 months of felony
    probation and ordered defendant to pay $2000 in restitution. On appeal, defendant challenges the
    No. 1-20-0307
    sufficiency of the evidence to sustain his conviction, arguing that the State failed to prove beyond
    a reasonable doubt that he acted knowingly. For the reasons explained below, we affirm.
    ¶3     Defendant’s conviction arose from the events of September 18, 2015. Following his arrest,
    defendant was charged by indictment with one count of theft by threat, based on an allegation that
    he had knowingly obtained, by threat, from Transcontinental Fund Administration, Ltd. (TFA), an
    amount of money between $500 and $10,000, intending to deprive TFA permanently of the use or
    benefit of the property.
    ¶4     At trial, Claudia Woerheide testified that she and her husband, Alak Chakravorty, owned
    TFA, a company that provides fund administration for alternative investment funds. In 2015, TFA
    had about 12 employees, including accountants who would deal with clients’ confidential bank
    and portfolio information. At that time, Woerheide was the chief executive officer, and her
    responsibilities included seeking and hiring employees.
    ¶5     In August 2015, Woerheide posted an opening for an accountant position on Craigslist.
    One of the applications she received as a result of the post was from defendant, whom she
    interviewed and then hired, with a salary of $40,000 per year and a pay schedule of once per month.
    The email address that defendant provided on TFA’s new employee form was
    wzhani@sycamores.indstate.edu. When defendant started employment on August 27, 2015, his
    job duties were to perform accounting and value calculation for particular funds that were assigned
    to him. He was not allowed to take files home or back up files on a personal server.
    ¶6     After defendant had been working for TFA for about one and a half weeks, Woerheide got
    the impression that his employment “was not as smooth as [she] would have imagined it should
    be.” Woerheide and defendant had a conversation regarding his work performance during which
    -2-
    No. 1-20-0307
    he expressed concern about the status of his job, and she told him they were not looking to replace
    him. During the conversation, they discussed, among other things, a listing that she had posted on
    Craigslist for an accountant, which defendant had seen. According to Woerheide, TFA was looking
    to hire an additional accountant to enlarge the business. A day or two later, defendant asked
    Woerheide for a letter stating he would be permanently employed by TFA, as he was moving and
    needed employment verification for his landlord. She told him that she would write a letter, but,
    because he was an employee at will, she would not use the word “permanently.” On or about
    September 15, 2015, Woerheide provided defendant an employment verification letter.
    ¶7     On September 17, 2015, Woerheide was notified by Craigslist that someone was
    attempting to change her post for an accountant so that résumés would be sent to a different email
    address. She explained, “And it was supposed to be changed to an address that resembled the name
    of Wassim Zhani but it was not his normal e-mail address that I was aware of.” The new email
    address was zaheminem@hotmail.com.
    ¶8     When Woerheide arrived at the office the next day, September 18, 2015, it was in an
    “uproar” and employees were upset. She spoke with two employees in her office and then with
    defendant in a common area. Woerheide asked defendant if he had tried to change the email
    address on Craigslist, and he replied by asking, “[W]hat is Craigslist[?]” Woerheide told him it
    was the platform through which he had applied for the job with TFA. She also asked him “what
    he was doing with the files on the computer of funds that he was not supposed to deal with.”
    Defendant became upset and said that he had had enough of his job and was giving it up “right
    now.” Woerheide told him he could not work at TFA any longer because his behavior was
    unacceptable. Defendant left the office about 11 a.m.
    -3-
    No. 1-20-0307
    ¶9     Around noon, Woerheide started receiving a series of three emails with multiple
    attachments of files that belonged to TFA and its clients. The emails indicated that “soon TFA files
    will all be public” and that “confidential information was going to be disclosed to people who were
    not supposed to see that information.” The emails were from “Lio Bao,” with an address of
    “liobao123@gmail.com,” and were addressed to TFA clients and the clients’ funds managers,
    employees, and outside service providers. The attached files consisted of proprietary information
    that TFA had made for its clients and that were the type and nature of files to which someone in
    the accounting operations unit would be able to access.
    ¶ 10   About 12:50 p.m., Woerheide received a phone call. She recognized the caller’s voice as
    defendant’s. He told Woerheide that he wanted money that he thought was due to him. Throughout
    the afternoon, Woerheide and defendant spoke on the phone several times. At some point,
    Woerheide asked him whether he was Lio Bao and told him that as long as she was getting emails
    from Lio Bao, he would “not get a cent from TFA.” Defendant denied that he was Lio Bao and
    said, “[D]on’t worry about the Chinese hacker. If I get the money, the e-mail will go away.” When
    Woerheide asked how he could make such a promise if he was not Lio Bao, defendant stated, “I
    have control over him.” Defendant asked for $20,000 “[o]r the e-mails would continue.”
    Woerheide notified the police.
    ¶ 11   Over the course of several phone calls, Woerheide negotiated with defendant. Eventually,
    she generated a proposal, which she emailed to him at the address he had provided when he applied
    for the job. In the email, which was sent at about 4:30 p.m., Woerheide suggested that TFA could
    pay defendant on a monthly basis for the next six months and that he would receive “the equivalent
    of your former salary.” In exchange, defendant would destroy the information he took from TFA’s
    -4-
    No. 1-20-0307
    server and not distribute it. In court, Woerheide explained that she suggested the six-month
    timeframe “[b]ecause it is very hard for us to pay $20,000 at once. And also we have informed the
    police in between and the FBI and were hoping that somebody would help us stop it.”
    ¶ 12   After Woerheide sent the email, she had another phone conversation with defendant, during
    which he insisted he needed $5000 right away. He also wanted to have the remainder of the money
    distributed over the next three months, as opposed to six. Woerheide agreed and prepared a check
    written out to defendant from a TFA account for $5000, which she left at the office building’s
    security desk for defendant to pick up. In the memo line on the check, Woerheide wrote, “as per
    our proposal.” According to Woerheide, defendant picked up the check around 5:30 p.m. About
    half an hour or an hour later, he called Woerheide and told her he needed the remaining $15,000,
    which was “due now as well.”
    ¶ 13   Around 7 p.m., defendant appeared outside TFA’s locked office doors, followed by a
    building security guard. He demanded that he be paid $15,000 that day. Sometime before midnight,
    Woerheide checked the TFA bank account online and saw that $5000 had been withdrawn.
    ¶ 14   Woerheide testified that defendant was an at-will employee of TFA. He was never given
    an employment contract. She and defendant never had an agreement regarding any sort of
    severance package, and TFA never provided severance packages for at-will employees who
    worked at TFA for only a couple of weeks. TFA did not give bonuses to its employees. When
    asked why she gave defendant $5000, she answered, “Because he threatened us.” She explained
    that defendant threatened the survival of TFA with the potential public release of clients’
    confidential data. Woerheide also testified that as a result of the emails, TFA lost clients, which
    was a “huge financial loss” to the company.
    -5-
    No. 1-20-0307
    ¶ 15   On cross-examination, Woerheide reiterated that during a conversation with defendant, he
    said if TFA paid him, he would be able to stop the “Chinese hacker.” When asked whether she
    knew when the files at issue were downloaded, she answered that she had been told it occurred
    over several days, starting a day or two before September 18, 2015, “which was one of the reasons
    why the other employees in my office noticed that something was happening that was not correct
    because [defendant] was working on files that he was not supposed to work on.” She did not
    personally observe defendant doing such work. She explained that each computer at the office was
    only accessible to the person assigned to it, as employees had to log in with user names and
    passwords. After the incident, TFA hired a company to conduct forensic research into the
    downloaded files and prepare a report. Woerheide did not recall the exact date provided in the
    report for when the files were downloaded, but did remember that the downloading began “way
    before” September 18, 2015. She also recalled that some files “suddenly became missing” and
    were deleted from the server on that date.
    ¶ 16   On further cross-examination, Woerheide testified that at the time of the incident, TFA
    employed Candace Dent as her personal assistant. Dent performed office management tasks,
    including billing and payments. Sometime after September 2015, some checks were stolen from
    TFA checking ledgers. Woerheide eventually discovered that Dent was “dealing with the checks
    improperly,” and informed the police. According to Woerheide, Dent was prosecuted.
    ¶ 17   Alak Chakravorty testified that in 2015, he was the Chief Operating Officer of TFA and
    was involved in the hiring process for the company, including the hiring of accountants. TFA
    employed about five accountants, who managed and administered about 30 clients and 40 to 45
    -6-
    No. 1-20-0307
    funds. The primary duty of accountants was to calculate net asset values and maintain accounting
    books, and each accountant would be responsible for 15 to 20 clients.
    ¶ 18   Chakravorty testified that each employee was given a unique user name and password to
    access his or her work computer. Depending on their roles, accountants were also given access to
    certain locations on the server. An accountant who was not assigned to a certain client could have
    access to some of the client’s files, but would not have access to the client’s “books.” Employees
    were not authorized to share clients’ confidential information with other employees who were not
    assigned to those clients. According to Chakravorty, TFA hired defendant as a junior accountant
    in August 2015.
    ¶ 19   On September 18, 2015, Chakravorty arrived at TFA’s office mid-day and found it “in an
    uproar.” He learned that Woerheide had fired defendant that morning. He then logged in on his
    computer and began looking at emails, at which point he discovered he had received an email from
    liobau123@gmail.com. The subject line of the email indicated TFA files would be made public,
    and attachments to the email included a number of clients’ files that were confidential. Chakravorty
    received two more emails from the same address with client files attached. He also received a
    phone call from a client who had been copied on the emails and whose files were attached.
    ¶ 20   Around 12:45 or 12:50 p.m., Woerheide received a call on her cell phone, which
    Chakravorty picked up. He recognized the caller’s voice as defendant’s. Chakravorty asked
    defendant whether he knew anything about the emails. Defendant did not admit to sending the
    emails, but told Chakravorty that the “problem” would stop if TFA paid him compensation of
    $20,000. Chakravorty understood the “problem” to be the threatening emails. He told defendant
    he needed to talk with Woerheide and they would call him back. According to Chakravorty,
    -7-
    No. 1-20-0307
    because defendant had only worked at TFA for about three weeks, he was owed his salary for that
    time but not any other compensation.
    ¶ 21   Chakravorty participated in several other phone conversations with defendant that
    afternoon, some on speaker. During those calls, defendant demanded that $5000 be paid to him
    that day, and $15,000 be paid to him over the course of three months. At one point, on speaker,
    Woerheide asked defendant about the “Chinese hacker,” and defendant indicated there was no
    “Chinese hacker” and the “Chinese hacker problem” would go away if he was paid.
    ¶ 22   A check for $5000 was made out to defendant from the company account and left at the
    office building’s security desk for defendant to pick up. The check was cashed later that night.
    Chakravorty and Woerheide planned with the FBI to have defendant come to the TFA office.
    However, defendant came up the elevator earlier than he was supposed to have arrived at the office.
    Chakravorty met defendant at the door and told him the check for the remaining amount was not
    ready and he should come back at 9 p.m. Defendant agreed.
    ¶ 23   Chakravorty authorized the FBI to provide him with a body recorder and transmitter to
    record his conversation with defendant when he returned to pick up a second check. When
    defendant arrived around 9:30 p.m., Chakravorty and Woerheide were by the computers in the
    open area of the office, and FBI agents were in the office but out of sight. Chakravorty and
    defendant then engaged in a conversation, the recording of which was introduced into evidence.
    ¶ 24   During the conversation, defendant related that he wanted compensation because he did
    not know how long he would be unemployed and because he incurred costs, particularly by buying
    suits, while working at TFA. Defendant denied sending any emails to accounts outside the office
    and told Chakravorty he would not have to worry “about anything” after he left. After Chakravorty
    -8-
    No. 1-20-0307
    gave defendant a password to access a TFA computer, defendant showed Chakravorty 14
    gigabytes of files. Chakravorty asked, “So this is a OneDrive account that you put it onto?”
    Defendant answered, “This is everything,” and indicated that he was going to delete it all. At the
    end of the recording, FBI agents identified themselves and arrested defendant.
    ¶ 25   In court, Chakravorty explained that in the normal course of TFA’s business, client files
    would not be saved in a OneDrive account. He further stated that there was no legitimate reason
    for the files that defendant deleted from his personal OneDrive account to have been stored there.
    He never gave defendant permission to transfer client files from the company server to OneDrive.
    ¶ 26   On cross-examination, Chakravorty confirmed that Candace Dent had been an employee
    of TFA, but denied that she had access to “work stations” in the company. He was aware that Dent
    was involved in some fraud at TFA. Neither he nor anyone at TFA ever inquired as to whether
    Dent was involved in the emails, as “she would not have had access or known about any of those
    files because that was not her department.”
    ¶ 27   FBI Special Agent Christopher Weismentel testified that in 2015, he was working in cyber
    intrusion and cyber-enabled fraud in the Chicagoland area and was assigned to the TFA
    investigation on September 21, 2015. In the course of his investigation, he reviewed bank records
    for a BMO Harris checking account for TFA and a JP Morgan Chase bank account for New
    Sterling Factory, a partnership with partners listed as defendant and Wang Ming Guan. Defendant
    and Wang Ming Guan were the signers on the JP Morgan Chase account.
    ¶ 28   Included in the bank records was a copy of a check from the TFA account, dated September
    18, 2015. The check was payable for $5000 to defendant, signed by Woerheide, and indicated “as
    per our proposal” in the memo line. The JP Morgan Chase records included a deposit slip from
    -9-
    No. 1-20-0307
    September 18, 2015, and a copy of the same check. Weismentel noted that defendant’s signature
    on the JP Morgan Chase account was similar to the signature for endorsement of the check from
    TFA. He also noted that defendant’s name was provided on the deposit slip. Weismentel
    determined that the funds moved from TFA’s checking account to the joint bank account defendant
    held with Wang Ming Guan, and that the check was deposited the same day it was issued.
    ¶ 29   On cross-examination, Weismentel stated that he did not know who Candace Dent was,
    but that her name “came up related to one of the other fraudulent activities” Woerheide told him
    had occurred around the time defendant was fired. He did not interview Dent. He also did not have
    an opportunity to determine when any TFA files were uploaded to a OneDrive account.
    ¶ 30   The parties stipulated that, if called as a witness, James Day would testify that on
    September 18, 2015, he was working security for the building where TFA had its office. Around
    4:15 or 4:30 p.m., he was provided an envelope with instructions to give it to defendant, who was
    not given access to the building. Around 5:30 or 6:00 p.m., Day gave defendant the envelope and
    informed him he was not allowed inside the building. Defendant left with the envelope. Later that
    evening, defendant returned, “was able to get past Day,” and entered an elevator. Day took a
    separate elevator to the floor where TFA had its office. There, he saw defendant speaking to a man
    and woman, who told defendant to return at 9 p.m. Day then escorted defendant out of the building.
    ¶ 31   The parties stipulated that, if called as a witness, Wang Ming Guan would testify that
    defendant was her husband and that she “is on the account” from JP Morgan Chase bank titled
    “New Sterling Factories,” which was a business that was going to be set up to sell jewelry. She
    never signed or deposited the $5000 check in question, and the signature on the deposit slip was
    not hers. She would have further testified that she never made or transmitted any threats to TFA.
    - 10 -
    No. 1-20-0307
    ¶ 32    Defendant made a motion for a directed finding, which the trial court denied.
    ¶ 33    Defendant testified that he started working at TFA as an accountant on August 27, 2015,
    and was trained by a senior accountant. Defendant experienced some “conflict” with other
    employees about job responsibilities involving a particular client that was not going to renew its
    contract with TFA. When he arrived at work on the morning of September 18, 2015, a coworker
    mentioned to him that “some files got deleted.” Three coworkers then told him to shut down his
    workstation. Defendant continued working.
    ¶ 34    When Woerheide arrived, defendant’s coworkers went into her office and talked to her.
    Later, Woerheide approached defendant and told him “some files were deleted.” Defendant did
    not know anything about the deleted files and told Woerheide so. Woerheide then told him he was
    fired. Defendant replied that he left another job to work at TFA, so she would have to give him a
    severance package. Woerheide responded that if he wanted a severance package, he would have
    to go look for an employment lawyer.
    ¶ 35    After defendant went home, he called Woerheide and told her he wanted a severance
    package because he relocated for the job, had to buy new suits, and trained himself in QuickBooks.
    Woerheide mentioned “something about the files,” but he did not pay attention. Later, Woerheide
    called and told him he could come to the office to pick up his severance pay. According to
    defendant, “[w]e were discussing severance package about $20,000,” but when he picked up his
    check, it was for only $5000. He deposited it into the joint checking account he shared with his
    wife.
    ¶ 36    Defendant denied that he ever made any threats in order to secure the money he received.
    He also denied sending any emails containing confidential TFA information. He explained that in
    - 11 -
    No. 1-20-0307
    the FBI recording, he was talking about files on his desktop at his work station, not files “in
    OneDrive or anything like that.”
    ¶ 37       Following closing arguments, the trial court found defendant guilty of theft by threat. In
    announcing its decision, the court stated it found that defendant may have felt that he deserved
    some kind of compensation, but “the way he went about it was illegal, the way he went about it
    was a threat.” The court found that TFA paid defendant $5000 because he had threatened
    Woerheide and Chakravorty, and noted that it found Woerheide and Chakravorty to be credible.
    In contrast, the court noted that nothing corroborated defendant’s position that the $5000 he
    received was severance, and stated, “I don’t find that his denial as to the threats were [sic] credible
    at all.”
    ¶ 38       Defendant filed a posttrial motion arguing, among other things, that the evidence was
    insufficient to prove him guilty beyond a reasonable doubt. The trial court denied the motion. In
    doing so, the court explained that it found Woerheide and Chakravorty credible and that there was
    a lack of corroboration for defendant’s testimony that TFA paid him money because they owed
    him.
    ¶ 39       The trial court sentenced defendant to 18 months of felony probation and ordered him to
    pay $2000 in restitution. Defendant filed a timely notice of appeal.
    ¶ 40       On appeal, defendant challenges the sufficiency of the evidence to sustain his conviction,
    arguing that the State failed to prove beyond a reasonable doubt that he had the required mental
    state for theft by threat.
    ¶ 41       When reviewing the sufficiency of the evidence, the relevant inquiry is whether, after
    viewing the evidence in the light most favorable to the prosecution, any rational trier of fact could
    - 12 -
    No. 1-20-0307
    have found the essential elements of the crime beyond a reasonable doubt. Jackson v. Virginia,
    
    443 U.S. 307
    , 318-19 (1979). This standard of review applies regardless of whether evidence is
    direct or circumstantial, and circumstantial evidence meeting this standard is sufficient to sustain
    a criminal conviction. People v. Jackson, 
    232 Ill. 2d 246
    , 281 (2009). All reasonable inferences
    from the evidence must be drawn in favor of the State. People v. Hardman, 
    2017 IL 121453
    , ¶ 37.
    The credibility of the witnesses, the weight to be given their testimony, and the resolution of any
    conflicts in the evidence are within the province of the trier of fact, and a reviewing court will not
    substitute its judgment for that of the trier of fact on these matters. People v. Brooks, 
    187 Ill. 2d 91
    , 131 (1999). Reversal is justified only where the evidence is “so unsatisfactory, improbable or
    implausible” that it raises a reasonable doubt as to the defendant’s guilt. People v. Slim, 
    127 Ill. 2d 302
    , 307 (1989).
    ¶ 42   In this case, defendant was convicted of theft by threat. 720 ILCS 5/16-1(a)(3)(A) (West
    2014). A person commits theft by threat when he or she knowingly obtains by threat control over
    property of the owner, and intends to deprive the owner permanently of the use or benefit of the
    property. 
    Id.
     The prescribed mental state of knowledge applies to each element of the offense. See
    720 ILCS 5/4-3(b) (West 2014). Knowledge is defined by statute as follows:
    “A person knows, or acts knowingly or with knowledge of:
    (a) The nature or attendant circumstances of his or her conduct, described by the
    statute defining the offense, when he or she is consciously aware that his or her conduct is
    of that nature or that those circumstances exist. Knowledge of a material fact includes
    awareness of the substantial probability that the fact exists.
    - 13 -
    No. 1-20-0307
    (b) The result of his or her conduct, described by the statute defining the offense,
    when he or she is consciously aware that that result is practically certain to be caused by
    his conduct.” 720 ILCS 5/4-5(a), (b) (West 2014).
    ¶ 43   The mental state of “knowingness” may be proven by circumstantial evidence and inferred
    from a defendant’s actions and the conduct surrounding them. People v. Jackson, 
    2017 IL App (1st) 142879
    , ¶ 24. Inferences regarding a defendant’s mental state are matters particularly within
    the province of the trier of fact. People v. Lemke, 
    384 Ill. App. 3d 437
    , 445-46 (2008). As such,
    we will not substitute our judgment for that of the trier of fact regarding a defendant’s mental state
    unless the inferences accepted by the trier of fact were inherently impossible or unreasonable.
    People v. Price, 
    225 Ill. App. 3d 1032
    , 1035 (1992).
    ¶ 44   Defendant argues that the State failed to prove beyond a reasonable doubt that he had the
    required mental state for the element “by threat.” In this court, defendant does not dispute that the
    emails sent to Woerheide and Chakravorty constituted threats for purposes of his theft by threat
    conviction. Rather, he maintains that the State did not prove either that he was the source of the
    threats emailed to Woerheide and Chakravorty, or that he directed someone else to send the emails.
    Noting that “other employee fraud” was occurring at TFA around the time of the incident,
    defendant suggests that Woerheide may have misattributed the emailed threats to him when he
    was asking for severance. He also suggests that he only knew about the emails because Woerheide
    had asked him about them. Defendant reasons that absent proof he made the threats contained in
    the emails, the State failed to show that he knowingly obtained money from TFA “by threat,” and,
    therefore, his conviction must be reversed.
    - 14 -
    No. 1-20-0307
    ¶ 45   After reviewing the evidence in the light most favorable to the prosecution, we find that it
    supports the trial court’s determination that defendant knowingly obtained the $5000 at issue by
    threat. Woerheide testified that during one of her phone conversations with defendant, she asked
    him whether he was Lio Bao and told him that as long as she was getting emails from Lio Bao, he
    would “not get a cent from TFA.” In response, defendant denied that he was Lio Bao, but told
    Woerheide that if he got the money he was asking for, the emails would go away, as he had “control
    over” Lio Bao. Woerheide also testified that defendant asked for $20,000 “[o]r the e-mails would
    continue.” On cross-examination, she reiterated that during a conversation with defendant, he said
    if TFA paid him, he would be able to stop the “Chinese hacker.” When asked in court why TFA
    gave defendant $5000, Woerheide answered, “Because he threatened us.”
    ¶ 46   Consistent with Woerheide, Chakravorty testified that during one of his own phone
    conversations with defendant, he asked defendant about the emails and defendant responded that
    the “problem” would stop if TFA paid him compensation of $20,000. Chakravorty also listened in
    on a phone conversation between Woerheide and defendant on speaker, during which defendant
    indicated that the “Chinese hacker problem” would go away if he was paid.
    ¶ 47   Although the State did not present evidence that defendant personally sent the damaging
    emails to TFA and its clients or explicitly directed someone else to send them, such a showing was
    not necessary. The State was required to prove that defendant knowingly obtained the $5000 in
    question by threat. Both Woerheide and Chakravorty testified as to threats defendant made to them
    over the phone, indicating that the cessation of the emails was contingent on them paying him,
    which they did. Based on this evidence, a rational fact-finder could conclude that defendant was
    consciously aware that his conduct was of a threatening nature. See 720 ILCS 5/4-5(a), (b) (West
    - 15 -
    No. 1-20-0307
    2014). Thus, the evidence was sufficient to prove the requisite mental state of knowingness. See
    Jackson, 
    2017 IL App (1st) 142879
    , ¶ 24.
    ¶ 48     In reaching this conclusion, we are mindful that defendant presented a different version of
    events at trial. However, the trial court was not obligated to accept his testimony as true. The trial
    court specifically found Woerheide and Chakravorty to be credible, and defendant’s denial of the
    threats to be incredible. This was the court’s prerogative in its role as the trier of fact (People v.
    Moody, 
    2016 IL App (1st) 130071
    , ¶ 52) and we will not substitute our judgment for that of the
    trial court on questions of credibility (Brooks, 
    187 Ill. 2d at 131
    ).
    ¶ 49     Moreover, in reaching its decision the trier of fact was “not required to disregard inferences
    which flow normally from the evidence and to search out all possible explanations consistent with
    innocence and raise them to a level of reasonable doubt.” People v. Hall, 
    194 Ill. 2d 305
    , 332
    (2000). In turn, this court will not search out possible theories of acquittal and prefer them over
    the findings of the trial court. People v. Lee, 
    2015 IL App (1st) 132059
    , ¶ 63. Viewing the evidence
    in the light most favorable to the prosecution, which we must, we find that a rational trier of fact
    could have found defendant guilty of theft by threat beyond a reasonable doubt. The evidence is
    not “so unsatisfactory, improbable or implausible” that it raises a reasonable doubt as to
    defendant’s guilt. Slim, 
    127 Ill. 2d at 307
    . Defendant’s challenge to the sufficiency of the evidence
    fails.
    ¶ 50     For the reasons explained above, we affirm the judgment of the circuit court.
    ¶ 51     Affirmed.
    - 16 -
    

Document Info

Docket Number: 1-20-0307

Citation Numbers: 2022 IL App (1st) 200307-U

Filed Date: 6/21/2022

Precedential Status: Non-Precedential

Modified Date: 6/21/2022