State v. Adam Jilling, Gary Gagne, Daniel Anton, George Quintal ( 2022 )


Menu:
  • June 16, 2022
    June 16, 2022
    Supreme Court
    State                 :                 No. 2020-200-C.A.
    (N2/18-350D)
    v.                   :
    Adam Jilling.             :
    State                 :                 No. 2020-201-C.A.
    (N2/18-350C)
    v.                   :
    Gary Gagne.               :
    State                 :                 No. 2020-205-C.A.
    (N2/18-350B)
    v.                   :
    Daniel Anton.             :
    State                 :                 No. 2020-208-C.A.
    (N2/18-350A)
    v.                   :
    George Quintal.               :
    NOTICE: This opinion is subject to formal revision
    before publication in the Rhode Island Reporter. Readers
    are requested to notify the Opinion Analyst, Supreme
    Court of Rhode Island, 250 Benefit Street, Providence,
    Rhode Island 02903, at Telephone (401) 222-3258 or
    Email:      opinionanalyst@courts.ri.gov,     of     any
    typographical or other formal errors in order that
    corrections may be made before the opinion is published.
    Supreme Court
    State                 :                 No. 2020-200-C.A.
    (N2/18-350D)
    v.                   :
    Adam Jilling.              :
    State                 :                 No. 2020-201-C.A.
    (N2/18-350C)
    v.                   :
    Gary Gagne.               :
    State                 :                 No. 2020-205-C.A.
    (N2/18-350B)
    v.                   :
    Daniel Anton.              :
    State                 :                 No. 2020-208-C.A.
    (N2/18-350A)
    v.                   :
    George Quintal.             :
    Present: Suttell, C.J., Goldberg, Robinson, Lynch Prata, and Long, JJ.
    OPINION
    Justice Goldberg, for the Court. These cases came before the Supreme
    Court on May 12, 2022, pursuant to orders directing the parties to appear and show
    -1-
    cause why the issues before us should not be summarily decided.1 The State of
    Rhode Island appeals from the orders and decisions of the Superior Court granting
    motions to dismiss pursuant to Rule 9.1 of the Superior Court Rules of Criminal
    Procedure brought by the defendants, Adam Jilling, Gary Gagne, Daniel Anton,
    and George Quintal (collectively defendants).        The Superior Court dismissed
    several counts of the criminal information against them alleging accessing a
    computer system for fraudulent purposes, in violation of G.L. 1956 § 11-52-2, and
    conspiracy.    On appeal, the state argues that the trial justice erred when he
    conducted what the state contends was an erroneous statutory analysis and
    overlooked material facts in the criminal information that established probable
    cause to believe that the defendants committed these crimes.       We affirm the
    decisions in all respects.
    Facts and Travel
    The following facts derive from the criminal information and the attached
    supporting documents.        In May 2018, the Rhode Island State Police began
    investigating a complaint that employees at Flint Audio and Video (Flint), an
    electronics and repair store and certified Apple retailer in Middletown, Rhode
    1
    Although these cases were appealed separately, these are related matters with
    substantially similar issues. The defendants were charged in the Superior Court as
    codefendants in a single criminal information, and their cases were heard and
    decided together. Similarly, oral arguments were heard simultaneously. In the
    interest of judicial economy and simplification, these cases are consolidated for
    this opinion.
    -2-
    Island, were improperly accessing the electronic devices of female customers in
    order to obtain private photographs and videos. All defendants were current or
    former Flint employees: Gagne was the owner; Quintal was the sales associate
    manager; Anton was a sales associate2; and Jilling was a former sales associate and
    manager.
    The complaint was reported by a female Flint employee who observed nude
    images of Flint customers in an e-mail from Quintal to Gagne and Anton. The
    employee also recounted similar incidents when Quintal would deliberately target
    attractive female customers and intercept them as they entered the store, in order to
    personally handle their electronic devices and then search the equipment for nude
    photographs. Another witness, a former Flint employee, reported having observed
    Quintal accessing the customers’ devices and disseminating nude pictures and
    videos to the other defendants. This information ultimately led to the discovery of
    thirteen of Flint’s female customers whose electronic devices were improperly
    accessed by Quintal, and whose nude images and videos were distributed to other
    Flint employees.
    Arrest and search warrants were obtained, and Quintal was charged with
    access to a computer for fraudulent purposes and computer trespass, in violation of
    2
    In a police narrative included in the criminal information package, Anton was
    represented to be the co-owner of Flint; he has disputed this with extrinsic
    evidence presented to the Superior Court. Notwithstanding, this issue has no
    bearing on our resolution of these cases.
    -3-
    § 11-52-2 and § 11-52-4.1, respectively. Several items were seized, including
    electronic and storage devices containing numerous media files of images and
    videos that were suspected to be of Flint customers, and electronic
    communications between Quintal and other Flint employees depicting the
    dissemination of those files were uncovered.           The discovery of these
    communications resulted in the arrests of five other Flint employees, including
    defendants Gagne, Anton, and Jilling, who were parties to these communications.3
    The criminal information contained ten counts against defendants: five
    counts charged violations of § 11-52-2, and the remaining counts alleged
    conspiracy.   Count one was voluntarily dismissed, based on the statute of
    limitations. The individual defendants were charged in the information as follows:
    Jilling was charged with one count of conspiracy; Gagne and Anton were each
    charged with one count of computer fraud under § 11-52-2 and a conspiracy count;
    and Quintal was charged with all counts in the criminal information. Motions to
    dismiss for lack of probable cause, in accordance with Rule 9.1, subsequently were
    3
    The criminal information package revealed that Gagne and Jilling actively
    engaged in these conversations and requested nude images of customers from
    Quintal, but that Anton was only a recipient to these communications and did not
    actively engage in these conversations or request photographs.
    -4-
    filed by defendants.4     The trial justice granted the motions based on his
    interpretation of § 11-52-2 and lack of probable cause, concluding that defendants’
    conduct did not fall within the ambit of the statute and, therefore, defendants
    similarly could not be charged with conspiracy to violate § 11-52-2. The orders
    dismissing the criminal charges entered on June 26, 2020. The state filed timely
    appeals.
    Standard of Review
    “This Court reviews questions of statutory construction de novo.” State v.
    Peters, 
    172 A.3d 156
    , 159 (R.I. 2017). Typically, “[i]n accordance with our well-
    settled practice of statutory construction, we first determine whether these statutory
    definitions, by their plain language, are clear and unambiguous.” 
    Id. at 160
    .
    Nevertheless, “this [C]ourt has the responsibility of effectuating the intent of the
    Legislature by examining a statute in its entirety[.]” State v. Smith, 
    662 A.2d 1171
    ,
    1175 (R.I. 1995) (quoting In re Falstaff Brewing Corporation Re: Narragansett
    Brewery Fire, 
    637 A.2d 1047
    , 1049 (R.I. 1994)); see State v. Hazard, 
    68 A.3d 479
    ,
    485 (R.I. 2013) (“However, * * * even when confronted with a clear and
    unambiguous statutory provision, ‘it is entirely proper for us to look to the sense
    and meaning fairly deducible from the context.’”) (quoting In re Brown, 
    903 A.2d 4
    The lack of clarity in the criminal information also triggered defendants’ motions
    for a bill of particulars and motions to compel more responsive answers to the bill
    of particulars, which answers, defendants contend, are not sufficient.
    -5-
    147, 150 (R.I. 2006)). “Additionally, we remain mindful that ‘ambiguities in penal
    statutes must be strictly construed in favor of the party upon whom a penalty is to
    be imposed.’” Hazard, 68 A.3d at 485 (brackets omitted) (quoting State v. Clark,
    
    974 A.2d 558
    , 571 (R.I. 2009)); see Smith, 
    662 A.2d at 1175
     (“[U]nder the rules of
    statutory construction, a penal statute is subject to strict and narrow
    construction.”). “[T]his Court will not construe a statute to reach an absurd result.”
    Long v. Dell, Inc., 
    984 A.2d 1074
    , 1081 (R.I. 2009) (brackets omitted) (quoting
    Shepard v. Harleysville Worcester Insurance Co., Inc., 
    944 A.2d 167
    , 170 (R.I.
    2008)).
    “When reviewing a decision on a motion to dismiss, this Court accords great
    weight to a trial justice’s probable-cause findings; we will not set them aside
    ‘unless they are clearly erroneous or fail to do justice between the parties.’” State
    v. Reed, 
    764 A.2d 144
    , 146 (R.I. 2001) (quoting State v. Aponte, 
    649 A.2d 219
    ,
    222 (R.I. 1994)). “In determining a motion to dismiss an information for lack of
    probable cause, ‘the trial justice must examine the information and the attached
    exhibits to determine whether there is probable cause to believe that the offense
    charged was committed and that the accused had committed it.’” Peters, 172 A.3d
    at 158 (brackets omitted) (quoting Reed, 
    764 A.2d at 146
    ). It is well settled that
    “[a] trial justice[’s] review of whether probable cause exists is limited to ‘the four
    corners of the information package.’” 
    Id.
     (quoting State v. Young, 
    941 A.2d 124
    ,
    -6-
    128 (R.I. 2008)). “In performing this function, the trial justice should grant the
    state ‘the benefit of every reasonable inference’ in favor of a finding of probable
    cause.” Young, 
    941 A.2d at 128
     (quoting State v. Jenison, 
    442 A.2d 866
    , 876 (R.I.
    1982)).
    Analysis
    Statutory Construction
    The state claims that the trial justice misinterpreted § 11-52-2 and conducted
    an erroneous analysis.5 The state specifically contends that the trial justice erred in
    beginning his statutory analysis “by exploring the legislative intent behind the
    statutory scheme[,]” rather than “by examining the plain language of the statute,”
    and by failing to “mak[e] an express finding that the language of § 11-52-2 was
    ambiguous.”     Even though the trial justice began with a discussion of the
    legislative history of chapter 52 of title 11, we cannot fault him for addressing the
    legislative background of a developing area of the law since the advent of
    computers, personal electronic devices, and other technological innovations.
    Although our preference generally has been to look to the statute’s plain language,
    our primary focus in statutory interpretation is to remain faithful to the intent of the
    Legislature, a task that sometimes calls for an initial review of the legislative
    5
    The state directs this Court to federal statutes with similar language as instructive
    to our interpretation of G.L. 1956 § 11-52-2. We decline to consider federal law
    when our own jurisprudence contains sufficient guidance for our analysis.
    -7-
    history. See, e.g., State v. Jordan, 
    528 A.2d 731
    , 732 (R.I. 1987) (beginning its
    statutory-interpretation analysis with an examination of the development and
    legislative history of the sexual-assault statutory scheme); State v. Lussier, 
    511 A.2d 958
    , 959-60 (R.I. 1986) (same, relating to the development of the driving-
    under-the-influence statutory scheme).
    This Court has not had the occasion to interpret § 11-52-2, which provides,
    in relevant part, as charged in the criminal information:
    “Whoever directly or indirectly accesses or causes to be
    accessed any * * * computer system * * * for the purpose
    of * * * obtaining * * * property * * * by means of false
    or fraudulent pretenses, representations, or promises
    * * * shall be guilty of a felony and shall be subject to the
    penalties set forth in § 11-52-5.”
    Although our jurisprudence surrounding § 11-52-2 is limited, it is noteworthy that
    prior cases pertaining to financial fraud have arisen. See Retirement Board of
    Employees’ Retirement System v. Randall, 
    249 A.3d 629
    , 631 (R.I. 2021) (“[The]
    defendant was charged by way of criminal information with felony embezzlement,
    * * * and access to a computer for fraudulent purposes, in violation of G.L. 1956
    §§ 11-52-2 and 11-52-5.”); see also State v. Tatro, 
    659 A.2d 106
    , 109 (R.I. 1995)
    (involving a “wide-ranging credit card fraud scheme” and “twenty-five counts of
    computer crime under G.L. 1956 (1981 Reenactment) § 11-52-2”).
    The central issue in the cases before us is whether the property—that is, the
    nude photographs and videos of Flint customers—was obtained “by means of false
    -8-
    or fraudulent pretenses, representations, or promises[.]” Section 11-52-2. Because
    this is the sole element upon which the trial justice based his decisions, we limit
    our review to this element of § 11-52-2. Our resolution of this issue applies
    equally to all defendants and also settles the remaining counts in the criminal
    information.
    Section 11-52-2 prohibits access to a computer system for the purpose of
    obtaining property “by means of false or fraudulent pretenses, representations, or
    promises[.]” Section 11-52-2. Although chapter 52 of title 11 is devoid of any
    definition of the term “false or fraudulent pretenses,” the offense of obtaining
    property by false pretenses is a form of larceny.
    The crime of obtaining property by false pretenses is set forth in G.L. 1956
    § 11-41-4, which provides that “[e]very person who shall obtain from another
    designedly, by any false pretense or pretenses, any * * * property, with intent to
    cheat or defraud, * * * shall be deemed guilty of larceny.” Under § 11-41-4, “a
    false pretense may be a misrepresentation of a past or existing fact [or a] promise
    to perform a future act[.]”6 State v. Letts, 
    986 A.2d 1006
    , 1011 (R.I. 2010). “[T]he
    crime is complete when the defendant intentionally uses false pretenses to induce
    another to alter or terminate any of that person’s rights or powers concerning the
    6
    This definition clearly encompasses the whole phrase “false or fraudulent
    pretenses, representations, or promises” found in § 11-52-2.
    -9-
    * * * property with the intent to cheat or defraud that person.” State v. Fiorenzano,
    
    690 A.2d 857
    , 859 (R.I. 1997) (emphasis added).7
    The precise thrust of the state’s interpretation of § 11-52-2 in the context of
    this criminal information is difficult to discern. What is clear, however, is that the
    state insists that the criminal conduct was the access to a computer, rather than its
    use. We are of the opinion that § 11-52-2 prohibits direct or indirect access to a
    computer in order to obtain the property of another by means of false or fraudulent
    pretenses. The gravamen of the statute is the purpose for which the computer is
    being used: to commit a larcenous act—rather than the unlawful access itself. The
    larceny occurs after the accused has accessed the computer as the means to
    perpetrate the crime of obtaining property by false or fraudulent pretenses. Where
    false or fraudulent pretenses are employed to access the computer in the first
    7
    Different from § 11-52-2, G.L. 1956 § 11-41-4 requires an “intent to cheat or
    defraud”; nevertheless, the definition of “obtaining * * * property * * * by means
    of false * * * pretenses” in § 11-52-2 remains the same as that in § 11-41-4
    because of the terms “for the purpose of” and “fraudulent pretenses” in § 11-52-2,
    which is the equivalent of the intent-to-defraud requirement found in § 11-41-4.
    See Black’s Law Dictionary 746 (11th ed. 2019) (defining “false pretenses” as
    “[t]he crime of knowingly obtaining title to another’s personal property by
    misrepresenting a fact with the intent to defraud. * * * Also termed obtaining
    property by false pretenses; fraudulent pretenses; larceny by false pretenses”); see
    also Catherine Palo, J.D., L.L.M., 70 Am. Jur. Trials 435 § 18 (originally
    published in 1999) (“The use of the word ‘purpose’ in computer crime laws
    requires proof that the person charged under those laws had a specific intent to
    commit a certain type of crime.”).
    - 10 -
    instance, § 11-52-2 does not create a felony; the false or fraudulent pretenses must
    be intended as the means employed to obtain the property.
    “[I]t is well settled that a legislature is presumed to know of prior legislation
    on the same subject matter.” State v. Lewis, 
    91 R.I. 110
    , 116, 
    161 A.2d 209
    , 213
    (1960). “[I]n construing the provisions of statutes that relate to the same or to
    similar subject matter, the court should attempt to harmonize each statute with the
    other so as to be consistent with their general objective scope.” Billington v.
    Fairmount Foundry, 
    724 A.2d 1012
    , 1013-14 (R.I. 1999) (quoting Kaya v.
    Partington, 
    681 A.2d 256
    , 261 (R.I. 1996)). “This [C]ourt must assume that the
    Legislature intended that statutes relating to the same subject matter be construed
    together to be consistent and to effectuate the policy of the law.” Jordan, 
    528 A.2d at 734
    .
    Whether or not there was a finding that § 11-52-2 is ambiguous, an
    examination of the legislative history of the statutory scheme surrounding
    computer fraud is significant in our interpretation of § 11-52-2. Section 11-52-2
    was first enacted in 1979 to outlaw direct or indirect access to a computer or
    computer system for fraudulent purposes. See P.L. 1979, ch. 217, § 1. In that same
    session, the Legislature enacted § 11-52-3, which prohibits the intentional and
    unauthorized access, alteration, damage, or destruction of a computer, also as a
    felony offense. See id.    Subsequently, in 1983 the General Assembly added
    - 11 -
    § 11-52-4, prohibiting computer theft, including the theft of “data contained in a
    computer[.]”8 See P.L. 1983, ch. 246, § 2.           In 1999 the Legislature adopted
    § 11-52-4.1, which prohibits computer trespass.9 See P.L. 1999, ch. 421, § 2.
    8
    Section 11-52-4 states,
    “Whoever, intentionally and without claim of right,
    takes, transfers, conceals or retains possession of any
    computer, computer system, computer network,
    computer software, computer program, or data contained
    in a computer, computer system, computer program, or
    computer network with a value in excess of five hundred
    dollars ($500) shall be guilty of a felony and shall be
    subject to the penalties set forth in § 11-52-5. If the value
    is five hundred dollars ($500) or less, then the person
    shall be guilty of a misdemeanor and may be punishable
    by imprisonment for a term not exceeding one year or by
    a fine of not more than one thousand dollars ($1,000), or
    both.”
    9
    Section 11-52-4.1 states, in pertinent part,
    “(a) It shall be unlawful for any person to use a computer
    or computer network without authority and with the
    intent to:
    “* * *
    “(6) Make or cause to be made an unauthorized copy, in
    any form, including, but not limited to, any printed or
    electronic form of computer data, computer programs, or
    computer software residing in, communicated by, or
    produced by a computer or computer network[.]
    “* * *
    - 12 -
    These later provisions have relevance to the cases at bar. Lastly, although not
    found in chapter 52 of title 11, we note that in 2018 the General Assembly enacted
    G.L. 1956 § 11-64-3, proscribing unauthorized dissemination, by any means, of
    indecent material, which is characterized in that section as a “sexually explicit
    visual image of another person[.]” See P.L. 2018, ch. 27, § 2; P.L. 2018, ch. 28,
    § 2.
    The later addition of these provisions to chapter 52 of title 11 demonstrates
    the General Assembly’s intent to reach conduct that is different from that targeted
    in § 11-52-2. Additionally, the fact that the Legislature enacted § 11-64-3 in 2018
    to prohibit unauthorized dissemination of indecent material establishes that the
    General Assembly saw a need to target and proscribe that type of behavior.
    Because the Legislature is presumed to know the state of existing law, these
    subsequent enactments address conduct different from that set forth in § 11-52-2.
    An illustrative example is Jordan, where this Court was faced with a similar
    issue of statutory interpretation. See Jordan, 
    528 A.2d at 732
    . In that case, the
    defendant was convicted of first-degree child molestation sexual assault under G.L.
    “(b) * * * Whoever violates this section shall be guilty of
    a felony and shall be subject to the penalties set forth in
    § 11-52-2. If the value is five hundred dollars ($500) or
    less, then the person shall be guilty of a misdemeanor and
    may be punishable by imprisonment for a term not
    exceeding one year or by a fine of not more than one
    thousand dollars ($1,000) or both.” Section
    11-52-4.1(a)(6), (b).
    - 13 -
    1956 § 11-37-8.1, a felony offense carrying a maximum sentence of life
    imprisonment within the sexual-assault statutory scheme.10 See id. at 731, 733. On
    appeal, we held that § 11-37-8.1 was inapplicable to the defendant because the
    victim—who was thirteen years and ten months old—was not “thirteen (13) years
    of age or under” as specified in the statute. See id. at 734, 735; see also
    § 11-37-8.1, as enacted by P.L. 1984, ch. 59, § 2. In so holding, we examined the
    legislative history of the sexual-assault statutory scheme and concluded that
    Ҥ 11-37-8.1 applie[d] to those persons under thirteen years of age and to those
    who are exactly thirteen years of age[,] * * * [and] [u]pon and after the thirteenth
    anniversary of a person’s birth, he or she is ‘over thirteen’ within the meaning of
    § 11-37-6.”11 Id. at 734. This Court reasoned that:
    “If we were to accept the state’s position that the
    Legislature intended in its 1981 amendment of the first-
    10
    In 1987 the first-degree child molestation sexual assault statute, G.L. 1956
    § 11-37-8.1, titled “Definition of guilt of first degree child molestation sexual
    assault,” provided, “[a] person is guilty of first degree child molestation sexual
    assault if he or she engages in sexual penetration with a person thirteen (13) years
    of age or under.” See P.L. 1984, ch. 59, § 2; see also § 11-37-8.2, as enacted by
    P.L. 1984, ch. 59, § 2 (penalty for first-degree child molestation sexual assault of
    twenty years’ imprisonment to life imprisonment).
    11
    Also, in 1987, § 11-37-6, titled “Definition of guilt of third degree sexual
    assault,” provided, “[a] person is guilty of third degree sexual assault if he or she is
    over the age of eighteen (18) years and engaged in sexual penetration with another
    person over the age of thirteen (13) years and under the age of consent, sixteen
    (16) years of age.” See P.L. 1979, ch. 302, § 2; see also § 11-37-7, as enacted by
    P.L. 1979, ch. 302, § 2 (penalty for third-degree sexual assault of not more than
    five years).
    - 14 -
    degree sexual-assault statute to include within its
    provisions not only persons who are exactly thirteen
    years of age but also those persons who have passed the
    date on which they attained the age of thirteen, but are
    not yet fourteen, then we must also determine that the
    third-degree sexual-assault statute applies only to those
    persons who are fourteen years of age and over but under
    sixteen. Otherwise, both statutes would proscribe sexual
    assault upon persons who are older than exactly thirteen
    years of age but are not yet fourteen, vesting the state’s
    counsel with unfettered discretion to prosecute under
    either statute, one of which carries a minimum sentence
    of twenty years’ imprisonment and a potential sentence
    of life imprisonment, the other carrying a maximum
    penalty of five years’ imprisonment.” Jordan, 
    528 A.2d at 733
    .
    Viewed in this context, were we to subscribe to the state’s argument, the
    conduct alleged in these cases would be proscribed by more than one statute—that
    is, the intentional, and without claim of right, transfer of data contained in a
    computer (§ 11-52-4); or the use of a computer without authority and with the
    intent to make an unauthorized copy of computer data (§ 11-52-4.1); or the offense
    actually charged in the cases at bar, accessing a computer for the purpose of
    obtaining property by means of false or fraudulent pretenses (§ 11-52-2). It does
    not escape our attention that only the offense set forth in § 11-52-2 is a felony
    crime in the context of these cases. Clearly, the Attorney General is not vested
    with such unfettered discretion to prosecute from a menu of statutory enactments.
    See Jordan, 
    528 A.2d at 733
    .
    - 15 -
    Probable Cause
    A
    Access to Computer for Fraudulent Purposes
    The state argues that the trial justice also erred when he overlooked material
    facts set forth in the criminal information that provided sufficient evidence to
    establish probable cause that defendants violated § 11-52-2 and conspired to
    commit this crime.12 On the other hand, Quintal argues that this is a case of
    “prosecutorial overreach” where a “computer trespass * * * [is] arbitrarily [being]
    upgraded to a felony”; similarly, Anton argues that the state’s case “was based on
    its attempt to fit a round peg—the conduct at issue—in to [sic] a square hole—the
    language of § 11-52-2.”
    In his decisions, the trial justice found, after a full review of the criminal
    information package, that there was no evidence to suggest that defendants falsely
    represented anything to Flint customers; there were no statements or exhibits
    alleging that defendants made any false misrepresentations, promises, or
    statements. In fact, the trial justice noted, Flint customers were not persuaded to
    relinquish their devices, but rather, they voluntarily brought them to Flint for
    12
    During oral argument, the state also argued for the first time that defendants had
    an obligation to Flint customers pursuant to an implied covenant of good faith and
    fair dealing, as they were acting under a device-repair contract. Not only is this
    argument proscribed by our raise-or-waive rule, but it is also wholly inapplicable
    in a criminal case.
    - 16 -
    repair. Lastly, he concluded that defendants’ “opportunistic viewing and copying
    of images did not involve a misrepresentation of any fact to any of the victims.”
    More specifically, with respect to Quintal—the only defendant who was
    alleged to have directly accessed the devices—the trial justice found that he was
    capable of performing the repairs and that “there was no indication that [Quintal]
    specifically promised to limit his actions or access to a particular area within the
    device.” The trial justice also determined that there was no evidence that the
    repairs were not completed by Flint employees as promised. As to Gagne, Anton,
    and Jilling, the trial justice found that the complainants did not communicate or
    interact with these defendants, nor did these defendants access the devices or direct
    anyone to access a device for the purpose of obtaining nude photographs.
    We are satisfied that there is no evidence that these defendants made any
    misrepresentations, fraudulent or otherwise, to Flint customers. At best, the only
    evidence of false pretenses presented by the state was Quintal’s alleged request to
    Flint customers for a password to facilitate his access to their devices. The state,
    however, equates Quintal’s access to a customer’s device by unnecessarily
    requesting their password as accessing the device for the purpose of obtaining
    property “by means of false or fraudulent pretenses, representations, or
    promises[.]”   Yet, as discussed herein, the phrase “by means of false * * *
    pretenses” in § 11-52-2 does not relate to the term access by means of false
    - 17 -
    pretenses, but rather to the obtaining of the property by means of false pretenses.
    Here, Quintal accessed the devices, but there is no evidence that false pretenses
    were employed in obtaining the property once that access was achieved.
    We pause to note that the conduct of these defendants can be characterized
    in several ways. However, the presumption of innocence serves to preclude further
    comment. Accordingly, in the context of the state’s make-it-fit approach to the
    evidence in this case, we cannot conclude that defendants’ actions fell within the
    purview of § 11-52-2 in order to constitute a felony. Cf. Smith, 
    662 A.2d at 1176
    (“It is clear, however, that these actions are not felonies under the criminal-
    conversion statute as it reads at this time. We understand the frustration of the
    state in this controversy; however, we shall not engage in judicial legislation to
    reach a particular result.”).
    B
    Conspiracy
    “A criminal conspiracy is an ‘agreement by two or more persons to commit
    an unlawful act or to perform a lawful act for an unlawful purpose.’” State v.
    Huntley, 
    171 A.3d 1003
    , 1006 (R.I. 2017) (quoting State v. Abdullah, 
    967 A.2d 469
    , 474-75 (R.I. 2009)). “To convict the accused of the crime of conspiracy, ‘the
    prosecution must prove the existence and scope of the unlawful agreement beyond
    a reasonable doubt.’” 
    Id.
     (quoting Abdullah, 
    967 A.2d at 475
    ). “A coconspirator is
    - 18 -
    only vicariously liable for the actions of another coconspirator if those actions
    were committed in furtherance of an existing conspiracy.” State v. Lassiter, 
    836 A.2d 1096
    , 1106 (R.I. 2003) (emphasis omitted) (citing Pinkerton v. United States,
    
    328 U.S. 640
    , 647 (1946)). In fact, “[w]e, like the federal courts, tend to look with
    disfavor on attempts to broaden the already pervasive and wide-sweeping nets of
    conspiracy prosecution.” 
    Id.
     (quoting State v. Porto, 
    591 A.2d 791
    , 796 (R.I.
    1991)).
    Additionally, “although the crime of conspiracy is itself a separate offense,
    [conspiracy counts] should also [be] dismissed [when] * * * there [is] no
    underlying crime on which to base the conspiracy charge[s].” State v. Maxie, 
    187 A.3d 330
    , 341-42 n.13 (R.I. 2018). In Maxie, we dismissed the underlying crime
    of sex trafficking of a minor due to the absence of language setting forth a criminal
    offense within the statute. See id. at 341. This Court noted that the conspiracy
    count, which was charged under G.L. 1956 § 11-1-6, similarly should have been
    dismissed because there was no underlying crime on which to base the conspiracy
    offense. See id. at 341-42 n.13. In support, we cited to § 11-1-6, which penalizes
    “every person who shall conspire with another to commit an offense punishable
    under the laws of this state[.]” Id. at 341-42 n.13 (emphasis added); see also
    § 11-1-6. Section 11-1-6 clearly sets forth the penalty for conspiracy, and does not
    define, codify, or criminalize the offense of conspiracy, which remains a common
    - 19 -
    law crime. See State v. Donato, 
    414 A.2d 797
    , 803 (R.I. 1980) (“The crime of
    conspiracy [is] still a common-law crime in Rhode Island[.]”).         Therefore, a
    conspiracy count under § 11-1-6 alone is not sufficient to charge conspiracy.
    Here, the criminal information alleged that defendants “did agree, combine,
    confederate, contrive or conspire together, to do an unlawful act(s), to wit,
    fraudulently use a computer, in violation of § 11-1-6 of the General Laws of Rhode
    Island[.]” (Emphasis added.) Because the trial justice correctly concluded that
    defendants’ conduct did not fall within § 11-52-2—upon which the conspiracy
    charges were based—and § 11-1-6 cannot be the sole basis for these counts, we are
    satisfied the conspiracy counts properly were dismissed.
    Conclusion
    For the reasons set forth in this opinion, we affirm the orders of the Superior
    Court. The papers in these cases may be returned to the Superior Court.
    - 20 -
    STATE OF RHODE ISLAND
    SUPREME COURT – CLERK’S OFFICE
    Licht Judicial Complex
    250 Benefit Street
    Providence, RI 02903
    OPINION COVER SHEET
    State v. Adam Jilling.
    State v. Gary Gagne.
    Title of Case
    State v. Daniel Anton.
    State v. George Quintal.
    No. 2020-200-C.A.
    (N2/18-350D)
    No. 2020-201-C.A.
    (N2/18-350C)
    Case Number
    No. 2020-205-C.A.
    (N2/18-350B)
    No. 2020-208-C.A.
    (N2/18-350A)
    Date Opinion Filed                   June 16, 2022
    Suttell, C.J., Goldberg, Robinson, Lynch Prata, and
    Justices
    Long, JJ.
    Written By                           Associate Justice Maureen McKenna Goldberg
    Source of Appeal                     Newport County Superior Court
    Judicial Officer from Lower Court    Associate Justice William E. Carnes, Jr.
    For State:
    Mariana E. Ormonde
    Department of Attorney General
    For Defendants:
    Attorney(s) on Appeal
    Kevin O. Hagan, Esq.
    Peter A. DiBiase, Esq.
    Lauren E. Jones, Esq.
    Christopher S. Gontarz, Esq.
    SU-CMS-02A (revised June 2020)