                            ILLINOIS OFFICIAL REPORTS
                                         Appellate Court




                           People v. Kucharski, 2013 IL App (2d) 120270




Appellate Court             THE PEOPLE OF THE STATE OF ILLINOIS, Plaintiff-Appellee, v.
Caption                     STEVEN C. KUCHARSKI, Defendant-Appellant.



District & No.              Second District
                            Docket No. 2-12-0270


Filed                       March 29, 2013


Held                        In a prosecution arising from defendant’s actions in accessing his former
(Note: This syllabus        girlfriend’s MySpace page and posting comments and a photograph of
constitutes no part of      her, his convictions for harassment through electronic communications
the opinion of the court    were upheld over his contentions that the harassment statutes were
but has been prepared       unconstitutional and the evidence was insufficient to prove his guilt
by the Reporter of          beyond a reasonable doubt, since the alterations were clearly obscene for
Decisions for the           purposes of the statute, the statute was not vague or overbroad, and the
convenience of the          evidence established that defendant altered the victim’s page with the
reader.)
                            intent to harass her; however, his conviction for unlawful use of
                            encryption was reversed on the ground that changing a password did not
                            constitute “encryption” for purposes of the statute.


Decision Under              Appeal from the Circuit Court of Du Page County, No. 09-CM-6832; the
Review                      Hon. Brian J. Diamond, Judge, presiding.



Judgment                    Affirmed in part and reversed in part.
Counsel on                 Richard J. Dvorak, of Law Offices of Richard Dvorak, of Oak Brook
Appeal                     Terrace, for appellant.

                           Robert B. Berlin, State’s Attorney, of Wheaton (Lisa Anne Hoffman,
                           Assistant State’s Attorney, and Lawrence M. Bauer and Marshall M.
                           Stevens, both of State’s Attorneys Appellate Prosecutor’s Office, of
                           counsel), for the People.


Panel                      JUSTICE SCHOSTOK delivered the judgment of the court, with opinion.
                           Justices McLaren and Zenoff concurred in the judgment and opinion.



                                             OPINION

¶1          Following a bench trial, the defendant, Steven C. Kucharski, was convicted of two counts
        of violating the Harassing and Obscene Communications Act (the Act or the electronic
        harassment statute) (720 ILCS 135/1-2(a)(1), (a)(2) (West 2008)), and one count of unlawful
        use of encryption (720 ILCS 5/16D-5.5(b)(1) (West 2008) (the encryption statute) (amended
        by Pub. Act 96-1551, art. 5, § 5-5 (eff. July 1, 2011)); now 720 ILCS 5/17-52.5 (West
        2010)). On appeal, the defendant argues that his convictions should be reversed because the
        statutes at issue are unconstitutional. Alternatively, he challenges the sufficiency of the
        evidence and argues that he was not proved guilty beyond a reasonable doubt. For the
        following reasons, we affirm the defendant’s convictions of harassment through electronic
        communications but reverse his conviction of unlawful use of encryption.

¶2                                     I. BACKGROUND
¶3          On November 25, 2009, the defendant was charged by criminal complaint with attempted
        identity theft (720 ILCS 5/8-4(a) (West 2008)) (count I), harassment through electronic
        communications (720 ILCS 135/1-2(a)(2) (West 2008)) (count II), harassment through
        electronic communications (720 ILCS 135/1-2(a)(1) (West 2008)) (count III), and unlawful
        use of encryption (720 ILCS 5/16D-5.5(b)(1) (West 2008) (now 720 ILCS 5/17-52.5(b)(1)
        (West 2010))) (count IV).
¶4          Count I alleged that the defendant committed attempted identity theft by taking a
        substantial step toward the commission of that offense by knowingly, without authority,
        using personal identifying information (a computer password) of the victim without the
        victim’s express permission. Count II charged the defendant with “knowingly interrupting,
        with the intent to harass [the victim], the electronic communication service, being
        transmissions by a computer through the Internet, of [the victim].” Count III charged that the
        defendant knowingly “accessed the MySpace.com social networking website of [the victim]
        and changed the personal webpage of [the victim] and made the comment ‘Need a blow job?

                                                 -2-
     My dad buys them for my boyfriends!’ which is lewd, with the intent to offend [the victim].”
     Finally, count IV charged unlawful use of encryption in that the defendant “knowingly used
     or attempted to use encryption” to promote the offense charged in count III by changing the
     victim’s MySpace password, thereby “using a disruptive measure via computer to prevent
     [the victim’s] access to the MySpace.com global computer network.”
¶5       On May 10, 2011, a bench trial was held. The victim testified that the defendant had been
     her boyfriend for 2½ years. They broke up prior to August 2009 and they were not on good
     terms. While they were dating, the defendant created a MySpace account for her because she
     was “kind of computer illiterate.” She and the defendant, but nobody else, knew the
     password to that account. She was not aware that an email account was set up in association
     with the MySpace account. When she and the defendant broke up, she changed the password
     on the MySpace account “probably about five times just to make sure.”
¶6       On August 21, 2009, she noticed that her MySpace page had a picture of her in a thong
     along with her name, address, phone numbers, and other information about her family. The
     items about her family included “stuff about Kentucky, me being a slut, about my father,
     things like that.” She had not made these changes to her MySpace account and she did not
     know when they were made. She identified People’s Exhibit No. 3 as her MySpace page on
     that date. The photo on the page, of her in a thong, was taken by the defendant with his cell
     phone about five to six months prior. She gave the defendant permission to take the photo.
     However, when they broke up, she asked him to remove the photo from his cell phone. She
     did not give anyone permission to post the photo on MySpace. The alterations to her page
     made her feel degraded, hurt, and upset.
¶7       After observing her MySpace page as it appeared in People’s Exhibit No. 3, the victim
     called the defendant and told him to remove everything or she was going to call the police.
     The defendant started “giggling and laughing” and told her that she deserved it. The victim
     testified that she then called the police. Deputy Ben Hecht came to her house. She told the
     deputy that she suspected that the defendant had altered her MySpace page. She noticed that
     her MySpace page was again altered about two hours later on the same day. The photo and
     all her personal information was removed–her page was essentially deleted. She had not
     deleted the page. She was unable to delete the page herself because her password had been
     changed.
¶8       A review of People’s Exhibit No. 3 reveals the following. A box in the upper left corner
     of the page includes the victim’s name below the word “Whore” and also states “Mood:
     slut.” The box includes the photo of the backside of the victim, who is bending forward and
     wearing only a thong. Next to the photo, it states: “Need a blow job? My dad buys them for
     my boyfriends.” Another box states “Whore’s Interests” and includes the victim’s address
     and phone number. Another box, entitled “Whore’s Blurbs,” states:
         “About me:
         I’m a slut with no education. I’m gonna end up with 2 different baby daddys and I cant
         even get a GED. worst of all my dad buys my boyfriends blow jobs.”
         It then states “call me” and includes the victim’s name and phone number. The same box
         includes the following:

                                              -3-
           “Who I’d like to meet:
           my baby nephew! I cant go see him he lives in kentucky and I live in Illinois. I’m to
           ignorant to go visit I’d rather be in a club sucking dick. O and my mom so I can blaze a
           joint with her.”
¶9         Deputy Hecht testified that he worked in the patrol division of the Du Page County
       sheriff’s office. On August 21, 2009, he was dispatched to the victim’s home. The victim
       showed him her MySpace page on her computer. Deputy Hecht testified that what he saw
       was consistent with People’s Exhibit No. 3, a printed copy of what appeared on the victim’s
       computer. The victim had provided him with the defendant’s name. He called the defendant’s
       home phone number and spoke with someone. He explained that he needed to speak with the
       defendant. The investigation was then turned over to Detective David Chiesa.
¶ 10       Detective Chiesa testified that he was assigned to the detective division of the Du Page
       County’s sheriff’s office. He investigated computer-related offenses and had received
       extensive training in that regard. He was assigned to investigate the present case in
       September 2009. After speaking with the victim, he sent a search warrant to MySpace to
       obtain information regarding the victim’s MySpace account. People’s Exhibit No. 2 were the
       documents he received from MySpace in compliance with the warrant. Individual MySpace
       accounts can be identified by a web address, also known as a universal resource locator,
       which is a numerical designation assigned to the account. The number associated with the
       materials he received was *****9311. Additionally, there was an email address associated
       with the MySpace account. The email address was “***steve21@yahoo.com.”
¶ 11       Detective Chiesa further testified that he subpoenaed, from Comcast, the Internet
       protocol (IP) addresses associated with the victim’s MySpace account. People’s Exhibit No.
       1 was the information he received from Comcast. He explained that an IP address is a series
       of numbers separated by dots or decimal points, which identifies an individual computer on
       the Internet at a specific time. At any given time on the Internet, no IP addresses are the
       same. He testified that the subpoenaed information showed that, at certain dates and times,
       certain computers had accessed the victim’s MySpace account. Specifically, between August
       18 and 21, 2009, two IP addresses had accessed the victim’s MySpace account. The first IP
       address accessed the account on August 18, 2009, at 1:15 a.m. and at 1:18 a.m. and on
       August 21, 2009, at 5:23 p.m. and 5:27 p.m., all times being PST. The subscriber associated
       with this IP address was Paul Kucharski, the defendant’s father, at a service address that was
       the same as the defendant’s home address.
¶ 12       Detective Chiesa testified that the purpose of having email addresses associated with
       MySpace accounts was so that a user could receive information via the messaging utility,
       update his or her account information, and receive notifications of things posted to the
       account. He testified that at one point, if you were to change your password, the new
       password would go to the email address. He was not sure if that still happened, as MySpace
       had changed its account settings numerous times.
¶ 13       On cross-examination, Detective Chiesa acknowledged that he had not determined how
       many people resided at the defendant’s home address, how many people had access to the
       IP address at the home address, or how many computers were in the home. He had also not


                                                -4-
       interviewed anyone who resided at the address. Thereafter, the State rested. People’s Exhibits
       No. 1, No. 2, and No. 3 were admitted without objection.
¶ 14        The defendant made a motion for a directed finding. Defense counsel argued that there
       was no evidence that the defendant was the one who altered the victim’s MySpace page.
       Specifically, the defense argued that the State had proved that it was altered from a computer
       at the defendant’s home address, but the alteration could have been done by a family member
       or a friend. The State argued that it had proved that the defendant altered the MySpace page,
       because the defendant had the motive, the knowledge, and the photo. The State argued that,
       as to count II, the MySpace page was interrupted when it was changed through different
       transmissions by the defendant. The State argued that this was clearly done by the defendant
       with an intent to harass the victim. As to count III, the State argued that it had shown that the
       website was changed and certain comments were made. The changes were obscene and made
       without the victim’s permission and with the intent to offend. Following argument, the trial
       court found that the State had met its burden at that point and denied the defendant’s motion
       for a directed finding.
¶ 15        Paul Kucharski testified to his home address and stated that he lived there with his wife,
       his son the defendant, and a younger son. He remembered that a police officer had contacted
       him in mid-August 2009. After he spoke to the police officer, he spoke to his younger son.
       His younger son, who was proficient on a computer, then “went and proceeded to go to the
       computer and take away some stuff off the computer, to the best of my knowledge.” He
       testified that his younger son had shown him pictures of the victim provocatively dressed
       prior to August 2009. The defense rested.
¶ 16        The trial court found the victim’s testimony credible. Specifically, it found that (1) the
       defendant had set up the MySpace account for the victim, that it was her account, and that
       only the victim and the defendant knew the password; (2) a computer at the residence where
       the defendant lived had accessed the victim’s MySpace account; (3) the photo on People’s
       Exhibit No. 3 was taken by the defendant on his cell phone; and (4) the alteration to the
       MySpace posting was clearly done to harass the victim. The trial court noted that the victim
       had changed her MySpace password five times after she broke up with the defendant, yet the
       password was still changed without her knowledge, which prevented her from accessing the
       account. “This suggested someone who was intimately familiar with the details of the
       account, such as the individual who had set it up.” The trial court noted that the defendant
       had the motive and made statements to the victim that she deserved it. The trial court further
       noted that the MySpace page was taken down within a couple of hours after the victim called
       the defendant. The trial court found that the defendant’s father’s testimony was not credible
       and was simply “a father trying to help out his son.” The trial court determined that, based
       on the totality of the evidence, both circumstantial and direct, the defendant was proved
       guilty beyond a reasonable doubt of each charge.
¶ 17        Thereafter, the defendant was granted leave to substitute attorneys. The defendant filed
       a posttrial motion requesting dismissal of all the charges, arguing both that the statutes were
       unconstitutional based on vagueness and that there was insufficient evidence. The trial court
       granted the motion in part, vacating the conviction on count I, but upholding the remaining
       convictions. The trial court noted that the statute at issue in count I had been declared

                                                 -5-
       unconstitutional by our supreme court a few weeks prior to trial. The trial court found that
       the statutes that were the bases for the charges in counts II, III, and IV were not vague,
       because they adequately informed the defendant of the nature of the offenses such that the
       defendant was able to sufficiently prepare a defense. The trial court further noted that the
       statutes at issue did not infringe on the defendant’s first amendment rights or pertain directly
       to constitutionally protected speech. Finally, the trial court determined that there was
       sufficient evidence to find the defendant guilty beyond a reasonable doubt of each charge.
¶ 18        On February 9, 2012, the trial court sentenced the defendant to two years’ conditional
       discharge on count II. The trial court stated that it was not sentencing the defendant on count
       III or IV. At a hearing on March 7, 2012, the trial court noted that it had sentenced the
       defendant only on one count because it assumed there was a one-act, one-crime issue.
       However, it never allowed the parties to address the issue. Accordingly, it requested that the
       parties do so. The State argued that there was no one-act, one-crime issue, because counts
       II through IV were based on separate acts. The State argued that count IV was based on
       changing the password, count III was based on accessing the website and posting the obscene
       comments and photo, and count II was based on interrupting communication. The defendant
       argued that the statutes were too vague for him to know whether multiple convictions were
       a violation of the one-act, one-crime doctrine. The trial court found the State’s argument
       persuasive and sentenced the defendant to concurrent two-year terms of conditional discharge
       on counts III and IV, to run concurrently with the sentence on count II. Following the denial
       of his oral motion to reconsider the sentence, the defendant filed a timely notice of appeal.

¶ 19                                      II. ANALYSIS
¶ 20                A. Electronic Harassment: Making an Obscene Comment
¶ 21       The defendant’s first contention on appeal is that his conviction on count III, harassment
       through electronic communications (720 ILCS 135/1-2(a)(1) (West 2008)), should be
       reversed because the statute is unconstitutional or, alternatively, there was insufficient
       evidence to support his conviction. Section 1-2(a)(1) of the Act prohibits the use of
       electronic communications to make any comment “which is obscene with an intent to
       offend.” Id. With respect to his constitutional argument, the defendant contends that the
       statute proscribes only certain types of obscene speech, namely, obscene speech that is
       intended to offend others, and that it therefore amounts to content-based discrimination in
       violation of the first amendment to the United States Constitution (U.S. Const., amend. I).
       In so arguing, the defendant relies on R.A.V. v. City of St. Paul, Minnesota, 505 U.S. 377,
       383-84 (1992), in which the Supreme Court stated:
           “[A]reas of speech can, consistently with the First Amendment, be regulated because of
           their constitutionally proscribable content (obscenity, defamation, etc.)–not that they are
           categories of speech entirely invisible to the Constitution, so that they may be made the
           vehicles for content discrimination unrelated to their distinctively proscribable content.
           Thus, the government may proscribe libel; but it may not make the further content
           discrimination of proscribing only libel critical of the government.” (Emphases in
           original and omitted.)


                                                 -6-
       Based on the foregoing, the defendant reasons that, although it is constitutionally permissible
       to criminalize obscene speech, it is not permissible to criminalize only obscene speech that
       is intended to offend another person.
¶ 22        We find the defendant’s argument and reliance on R.A.V. unpersuasive. The R.A.V. court
       went on to explain:
                “The concurrences describe us as setting forth a new First Amendment principle that
            prohibition of constitutionally proscribable speech cannot be ‘underinclusiv[e],’ *** [i.e.,
            that] ‘a government must either proscribe all speech or no speech at all’ ***. That easy
            target is of the concurrences’ own invention. In our view, the First Amendment imposes
            not an ‘underinclusiveness’ limitation but a ‘content discrimination’ limitation upon a
            State’s prohibition of proscribable speech.” (Emphasis omitted.) Id. at 387.
       In the present case, criminalizing only obscene communication that is made with “an intent
       to offend” does not amount to content-based discrimination but, rather, is an attempt to
       regulate the conduct that accompanies the proscribed speech. “Speech may not be proscribed
       because of the ideas it expresses, but it may be restricted because of the manner in which it
       is communicated or the action that it entails.” Bergman v. District of Columbia, 986 A.2d
       1208, 1220 (D.C. 2010) (citing R.A.V., 505 U.S. at 385). In other words, speech may be
       restricted when it “embodies a particular intolerable (and socially unnecessary) mode of
       expressing whatever idea the speaker wishes to convey.” (Emphases in original and omitted.)
       R.A.V., 505 U.S. at 393. Here, an obscene electronic communication made with “an intent
       to offend” is restricted by the statute not because its content communicates any particular
       idea; rather, it is restricted because of the purpose for which it is communicated.
       Accordingly, there is no content-based discrimination and the defendant’s constitutional
       argument necessarily fails.
¶ 23        Alternatively, the defendant argues that the evidence was not sufficient to prove him
       guilty of count III beyond a reasonable doubt. When reviewing the sufficiency of the
       evidence, the standard of review is whether, after viewing the evidence in the light most
       favorable to the State, any rational trier of fact could have found the essential elements of the
       crime beyond a reasonable doubt. People v. Wheeler, 226 Ill. 2d 92, 114 (2007). In making
       this determination, the “reviewing court will not substitute its judgment for that of the trier
       of fact on issues of the weight of evidence or the credibility of witnesses.” People v. Phelps,
       211 Ill. 2d 1, 7 (2004). A conviction based on circumstantial evidence must rest on proof of
       a conclusive nature that tends to lead to a satisfactory conclusion and produces a reasonable
       and moral certainty that the defendant and no one else committed the crime. People v.
       Williams, 66 Ill. 2d 478, 484-85 (1977). This court will not disturb a guilty verdict unless the
       evidence is so improbable or unsatisfactory that it raises a reasonable doubt as to the
       defendant’s guilt. People v. Brandon, 197 Ill. App. 3d 866, 874 (1990).
¶ 24        To prove defendant guilty of harassment through electronic communications as charged
       in count III (720 ILCS 135/1-2(a)(1) (West 2008)), the State had to show that the defendant
       used electronic communication to make an obscene comment with an intent to offend. The
       defendant does not argue that the State failed to show that the alterations to the MySpace
       page were done with an intent to offend. Rather, the defendant argues only that (1) there was


                                                 -7-
       insufficient evidence to show that he altered the MySpace page and (2) the alterations were
       not “obscene.”
¶ 25       Turning to the first argument, the defendant notes that the account that accessed the
       victim’s MySpace page from the defendant’s home address was in his father’s name and that
       multiple household members had access to that account. The defendant also notes that he
       never admitted to making the alterations and that mere suspicion was not enough to convict
       him. We hold that the evidence created more than a mere suspicion that the defendant had
       altered the MySpace page.
¶ 26       It is the function of the trier of fact to assess the credibility of the witnesses, weigh their
       testimony, resolve inconsistencies and conflicts in the evidence, and draw reasonable
       inferences from the evidence. People v. Sutherland, 223 Ill. 2d 187, 242 (2006). In this case,
       the trial court specifically found the victim’s testimony credible. The victim testified that
       after she noticed the changes on her MySpace page she called the defendant, who laughed
       at her and told her she deserved it. The victim also testified that she and the defendant had
       broken up and were not on good terms at the time her MySpace page was altered. The
       defendant therefore had the motive to alter the MySpace page. Additionally, the defendant
       had the photo; the trial court found that the defendant had taken the photo of the victim with
       his cell phone. The victim also testified that the defendant helped her create her MySpace
       page, that only she and the defendant knew the password, and that she did not make the
       changes at issue. Although the victim testified that she changed her password, the evidence
       also showed that the victim’s MySpace page had been accessed by a computer from the
       defendant’s home address. Although there were multiple household members in the
       defendant’s home with computer access, only the defendant had the motive to alter the
       victim’s MySpace page. Based on the foregoing, we cannot say that the evidence was so
       unsatisfactory as to create a reasonable doubt of the defendant’s guilt.
¶ 27       The defendant next argues that the State failed to prove that the alterations to the
       MySpace page were “obscene” as a matter of law. The defendant notes that the statute at
       issue does not define “obscene” and argues that “obscene” should therefore be interpreted
       using the same definition set forth in Illinois’s obscenity statute (720 ILCS 5/11-20(b) (West
       2008)), which incorporates the three-part test of obscenity established in Miller v. California,
       413 U.S. 15, 24 (1973). Miller, which dealt with the mailing of materials advertising books
       and a film, characterized as obscene those materials “which, taken as a whole, appeal to the
       prurient interest in sex, which portray sexual conduct in a patently offensive way, and which,
       taken as a whole, do not have serious literary, artistic, political, or scientific value.” Id. Under
       that standard, the defendant argues that material is not obscene unless it can be considered
       “hard-core pornography” that is in some sense “erotic.” The defendant acknowledges that the
       words accompanying the photograph were “rude comments meant to ridicule [the victim]”
       but argues that, in light of current community standards, the MySpace page cannot be
       considered hard-core pornography or erotic. In response, the State argues that the word
       “obscene” as used in section 1-2(a)(1) should not be interpreted in accordance with the
       definition in the obscenity statute but, rather, should be given its common dictionary
       definition.
¶ 28       This argument presents an issue of statutory construction. In construing a statute, our task

                                                   -8-
       is to ascertain and give effect to the legislature’s intent. People v. Zakarauskas, 398 Ill. App.
       3d 451, 453 (2010). The best indicator of the legislature’s intent is the plain language of the
       statute. People v. Cordell, 223 Ill. 2d 380, 389 (2006). However, “[a] statute capable of two
       interpretations should be given that which is reasonable and which will not produce absurd,
       unjust, unreasonable or inconvenient results that the legislature could not have intended.”
       Collins v. Board of Trustees of the Firemen’s Annuity & Benefit Fund, 155 Ill. 2d 103, 110
       (1993).
¶ 29        In determining how to define “obscene” within the context of section 1-2(a)(1), we find
       People v. Hernandez, 283 Cal. Rptr. 81 (Cal. Ct. App. 1991), persuasive. In Hernandez, the
       court interpreted the meaning of “obscene” as used in a statute related to unlawful telephone
       communications. In relevant part, the statute at issue (Cal. Penal Code § 653m) prohibited
       telephone calls in which the caller (1) telephoned another with the intent to annoy and (2)
       used obscene language to or about the other person. Id. at 83-84. The court concluded that
       the ordinary dictionary definition should be used, based on the legislative intent behind
       section 653m and “the distinction between telephone harassment communications and other
       forms of speech subject to Miller.” Id. at 85. Specifically, the court noted:
            “The purpose of the statute was to protect an individual’s right to privacy from annoying
            intrusions. Accordingly, language that qualifies as ‘obscene’ under a common or
            dictionary definition would fall within the meaning of the statute. The Legislature did not
            intend to deter intentional and annoying telephone calls containing ‘obscene’ language
            dealing with sex and appealing to the prurient interest under the Miller standard, while
            exempting equally annoying telephone calls containing language that would be
            considered ‘obscene’ under a common or dictionary definition.” Id.
¶ 30        The court further acknowledged that the California Supreme Court adopted the Miller
       standard for obscenity crimes (Cal. Penal Code §§ 311 to 312.5) that involved “obscene
       matter” and “ ‘obscene live conduct.’ ” Id. at 86. The court noted, however, that conduct
       under section 653m did not qualify as obscene matter or obscene live conduct as defined in
       section 311 (Cal. Penal Code § 311). It reasoned, therefore, that there was no statutory intent
       to relate telephone harassment offenses to obscenity crimes. Finally, the court noted that
       numerous other jurisdictions had applied a common dictionary definition of “obscene” when
       used within the context of a telephone harassment statute. Id. at 87 (“ ‘a telephone
       harassment statute deals with different concerns than do statutes which seek to control
       literary or artistic content’ ” (quoting State v. Kipf, 450 N.W.2d 397, 405 (Neb. 1990)); see
       also id. (citing State v. Crelly, 313 N.W.2d 455, 457 (S.D. 1981), State v. Keaton, 371 So.
       2d 86, 92 (Fla. 1979), State v. Jaeger, 249 N.W.2d 688, 691 (Iowa 1977), and Baker v. State,
       494 P.2d 68, 70-71 (Ariz. Ct. App. 1972)).
¶ 31        In the present case, the electronic harassment statute resulted from amendments to the
       “Obscene Phone Call Act.” See Pub. Act 90-578 (eff. June 1, 1998). The electronic
       harassment statute has a purpose similar to the telephone harassment statute at issue in
       Hernandez: to prevent the personal invasion into people’s homes and lives by harassing
       communication via telephone or other electronic devices. People v. Karberg, 356 Ill. App.
       3d 500, 503 (2005); see also 90th Ill. Gen. Assem., House Proceedings, May 31, 1997, at
       265-66 (statements of Representative Burke that “Obscene Phone Call Act” was being

                                                 -9-
       amended to include electronics because “people can indeed begin to invade our homes and
       our lives through means of electronic devices”); 90th Ill. Gen. Assem., Senate Proceedings,
       Mar. 19, 1997, at 58 (statements of Senator Radogno that amendment of the “Obscene Phone
       Call Act” to include electronic communications is a recognition that obscene phone calls are
       not the only form of electronic harassment).
¶ 32        Although the Illinois obscenity statute does define “obscene” in accordance with the
       Miller standard, the purpose of the obscenity statute is to control the commercial
       dissemination of obscenity. See 720 ILCS Ann. 5/11-20, Committee Comments-1961, at 499
       (Smith-Hurd 2002). Accordingly, based on the differing purposes between the electronic
       harassment statute and the obscenity statute, it would be unreasonable to apply the definition
       of “obscene” from the obscenity statute when interpreting the electronic harassment statute.
       Hernandez, 283 Cal. Rptr. at 85; Kipf, 450 N.W.2d at 405 (“a telephone harassment statute
       deals with different concerns than do statutes which seek to control literary or artistic
       content”). There is no indication that the legislature intended to relate harassment offenses,
       via telephone or other electronic devices, to obscenity crimes. As in Hernandez, the
       legislature could not have intended to deter harassing electronic communications containing
       “obscene” matter under the Miller standard, while exempting equally invasive electronic
       communications that would be considered “obscene” under a common dictionary definition.
¶ 33        Baker, 494 P.2d 68, cited by the State, further supports this determination. In Baker, the
       Arizona appellate court addressed an argument that a statute, which made it unlawful to
       telephone another person and use obscene language with an intent to offend, was
       unconstitutionally vague. Id. at 69. The court, which had to interpret the word “obscene” as
       used within that statute, noted that the statute did not define “obscene.” Id. at 70. The court
       held that the statute was directed not at the communication of thoughts or ideas but at
       conduct, namely, the use of the telephone to offend people by the use of obscene language.
       Id. The court noted that the statute at issue was not an obscenity statute and that it would be
       “inane” to interpret the word “obscene” as in the context of Miller when dealing with
       obscene phone calls. Id. at 71. Accordingly, the court afforded the word “obscene” its
       ordinary dictionary definition: “[l]ewd, impure, filthy, offensive to modesty or decency.” Id.
¶ 34        Essentially, the Baker court distinguished between telephone harassment statutes, which
       seek to protect an individual from harassing telephone calls in the privacy of his home, and
       obscenity statutes, which seek to regulate the communication of thoughts and ideas. The
       court held that, because the telephone harassment statute included a specific intent element,
       it involved constitutionally unprotected conduct. Id. at 70. This distinction applies equally
       in the present case. The Act contains an intent element, and is therefore primarily concerned
       with regulating conduct rather than regulating the communication of thoughts or ideas.
¶ 35        Based on the foregoing, we agree with the State that the Miller standard has no
       application here. Rather, “obscene” as used in the electronic harassment statute should be
       afforded its ordinary dictionary definition: “disgusting to the senses” or “abhorrent to
       morality or virtue.” See Merriam-Webster Online Dictionary, http://www.merriam-
       webster.com/dictionary/obscene (last visited Jan. 17, 2013). The defendant does not argue
       that under the ordinary dictionary definition the alterations to the MySpace page were not
       obscene. He arguably, therefore, conceded this point. Even absent any concession, the photo

                                                -10-
       and the commentary included on the altered MySpace page were clearly abhorrent to
       morality and virtue and, therefore, “obscene.”

¶ 36                            B. Electronic Harassment: Interrupting
¶ 37        The defendant’s second contention on appeal is that his conviction on count II,
       harassment through electronic communications in violation of section 1-2(a)(2) (720 ILCS
       135/1-2(a)(2) (West 2008)), should be reversed because the statute is unconstitutionally
       vague and overbroad on its face or, alternatively, the evidence was insufficient to prove him
       guilty beyond a reasonable doubt. We will first address the defendant’s argument that the
       statute is void for vagueness. Section 1-2(a)(2) provides that it is unlawful to “[i]nterrupt[ ],
       with the intent to harass, the telephone service or the electronic communication service of
       any person.” Id.
¶ 38        We begin with the presumption that a statute is constitutional, and the burden of
       establishing that it is not must be borne by the party challenging its validity. People v. Law,
       202 Ill. 2d 578, 582-83 (2002). If reasonably possible, we must construe a statute so as to
       affirm its validity and constitutionality. People v. Greco, 204 Ill. 2d 400, 406 (2003).
       Whether a statute is constitutional is a question of law, which we consider de novo. Law, 202
       Ill. 2d at 582.
¶ 39        “A defendant can challenge a statute as unconstitutionally vague on its face or as applied
       to the defendant’s actions.” People v. Molnar, 222 Ill. 2d 495, 524 (2006).
            “A criminal law may be declared unconstitutionally vague for either of two independent
            reasons. First, the statute may fail to provide the kind of notice that would enable a
            person of ordinary intelligence to understand what conduct is prohibited. [Citations.]
            Second, a statute may be declared unconstitutionally vague if it fails to provide explicit
            standards for those who apply it, thus authorizing or even encouraging arbitrary and
            discriminatory enforcement. [Citations.]” Law, 202 Ill. 2d at 582-83.
       The defendant argues that the statute is unconstitutionally vague in both of these ways.
¶ 40        At the outset, we note that, to succeed on a vagueness challenge to a statute that does not
       involve a first amendment right, a party must establish that the statute is vague as applied to
       the conduct for which the party is being prosecuted. People ex rel. Sherman v. Cryns, 203
       Ill. 2d 264, 291 (2003). In other words, a statute that does not impact first amendment rights
       “will not be declared unconstitutionally vague on its face unless it is incapable of any valid
       application.” People v. Izzo, 195 Ill. 2d 109, 112 (2001). In the present case, the statute does
       not affect first amendment rights, as it prohibits conduct rather than speech. Thus, the
       defendant’s argument that the statute is vague on its face necessarily fails because, by arguing
       that the statute is subject to arbitrary enforcement, the defendant thereby concedes that the
       statute can be validly applied in some situations. People v. Winningham, 391 Ill. App. 3d
       476, 481 (2009).
¶ 41        However, assuming that the statute in some way impacts first amendment rights, the
       defendant’s argument that the statute is vague on its face still fails. The defendant first
       contends that the statute is vague in that “no ordinary person could determine what it means
       to ‘interrupt, with the intent to harass, *** the electronic communication service of any

                                                 -11-
       person.’ ” Specifically, the defendant argues that the term “interrupt” is not defined in the
       statute. Nonetheless, the word “interrupt” is within the daily vocabulary of ordinary people.
       Interrupt means “to stop or hinder by breaking in” or “to break the uniformity or continuity
       o f . ” M e r r i a m - W e b s t e r O n l i n e D i c t i o n a r y, h t t p : / / w w w . m e r r i a m -
       webster.com/dictionary/interrupt (last visited Jan. 17, 2013). In construing a statute, courts
       give words their plain and ordinary meanings. In re M.T., 221 Ill. 2d 517, 524 (2006); People
       v. Fabing, 143 Ill. 2d 48, 54 (1991) (absent contrary legislative intent, a court will assume
       the words used in a statute have their ordinary and popularly understood meanings when
       assessing the constitutionality of the statute). The Merriam-Webster Online Dictionary
       contains such plain and ordinary definitions. The use of dictionary definitions to illustrate
       the commonly understood meaning of a term is well accepted. See M.T., 221 Ill. 2d at 535
       (quoting Webster’s Third New International Dictionary in construing the criminal statute at
       issue there). The defendant provides no support for his assertion that the terms “with intent
       to harass” and “the electronic communication service” are unconstitutionally vague, and any
       such argument is therefore forfeited. Ill. S. Ct. R. 341(h)(7) (eff. Sept. 1, 2006); Mikolajczyk
       v. Ford Motor Co., 374 Ill. App. 3d 646, 677 (2007); see also People v. Chatman, 357 Ill.
       App. 3d 695, 703 (2005) (a reviewing court “is not simply a repository in which appellants
       may dump the burden of argument and research”). We therefore reject the defendant’s
       argument that the statute is so vague that a person of ordinary intelligence is left to guess at
       the conduct it proscribes.
¶ 42         The defendant also argues that the statute is subject to arbitrary enforcement. The
       defendant supports this argument by stating that neither the complaint, the State, nor the trial
       court notified him as to how he committed the offense. We acknowledge that a statute so
       vague that it provides no guidelines for law enforcement “may permit ‘a standardless sweep
       [that] allows policemen, prosecutors, and juries to pursue their personal predilections.’ ”
       Kolender v. Lawson, 461 U.S. 352, 358 (1983) (quoting Smith v. Goguen, 415 U.S. 566, 575
       (1974)). Nonetheless, the statute at issue provides sufficient standards so that its application
       does not depend merely on the prosecutor’s or trial court’s personal predilections. The
       provision requires a determination as to whether a defendant interrupted another’s electronic
       communication service, here, a MySpace account, with the intent to harass. This provision
       leaves no discretion to law enforcement. The application of the plain meaning of the statutory
       language in light of the purpose of the statute prevents arbitrary enforcement.
¶ 43         The defendant also argues that the first amendment is implicated because one could
       violate the statute if he were involved in an “instant messaging” political exchange and he
       were “harassingly” interrupting the other person. This is the extent of the defendant’s
       argument that the statute is overbroad. This argument is also without merit. A statute is not
       overbroad if it does not impinge on any first amendment freedoms. People v. Boand, 362 Ill.
       App. 3d 106, 139-40 (2005). As noted above, this statute does not impinge on first
       amendment freedoms, because it prohibits conduct rather than speech. Moreover, the
       defendant’s example of overbreadth is not persuasive. As noted by this court in People v.
       Taylor, 349 Ill. App. 3d 839, 843-44 (2004):
                 “The court’s earlier opinion in People v. Klick, 66 Ill. 2d 269, 274 (1977), confirms
             that ‘harass’ in section 1-1(2) [of the telephone harassment statute] cannot include the

                                                     -12-
           less serious actions the word sometimes implies. *** Evidently, then, if a prohibition on
           a call made with intent to harass is not constitutionally offensive, the level of emotional
           distress or discomfort the caller intended to produce must be substantially greater than
           mere annoyance.
                The Klick court also explicitly noted that the law must not improperly impede speech
           delivering a rebuke or expressing a dispute:
                    ‘We do not suggest that the first amendment gives one the unlimited right to
                annoy another, by speech or otherwise. There are, however, many instances when,
                without breaching the peace, one may communicate with another with the possible
                intention of causing a slight annoyance in order to emphasize an idea or opinion, or
                to prompt a desired course of action that one is legitimately entitled to seek. *** First
                amendment protection is not limited to amiable communications.’ Klick, 66 Ill. 2d
                at 274.”
       Accordingly, the defendant’s argument that the statute impinges on a first amendment right
       to engage in an “instant messaging” political exchange is without merit. The defendant’s
       argument would be successful if “harass” as used in the electronic harassment statute were
       defined to mean an “annoyance.” However, “harass” as used in the electronic harassment
       statute requires much more than an “annoying” interruption. It requires that the interruption
       be made with the intent to produce emotional distress or discomfort substantially greater than
       mere annoyance. Id.; see also People v. Grever, 222 Ill. 2d 321, 331 (2006) (it is a “general
       rule of statutory construction that when the same words appear in different parts of the same
       statute, they should be given the same meaning absent some contextual indication that the
       legislature intended otherwise”). The defendant’s described “instant messaging” political
       exchange does not rise to this level.
¶ 44       Finally, the defendant argues that the evidence was insufficient to convict him.
       Specifically, he argues that there was no evidence that he changed the password and, even
       if he had, it was his MySpace account. We find the defendant’s arguments unpersuasive.
       First, the defendant interrupted the victim’s electronic communication service when he
       removed her original MySpace page and changed the password so she could no longer make
       changes to her own page. There was significant circumstantial evidence that the defendant
       was responsible for these actions. Records showed that a computer from the defendant’s
       home had accessed the victim’s MySpace account, and the defendant had both the motive
       and the knowledge. The victim testified that, after her relationship with the defendant ended,
       they were not on good terms. The victim also testified that the defendant helped her create
       her MySpace page and that only she and the defendant knew the password. Although the
       victim testified that after she and the defendant stopped dating she changed her password,
       the evidence also showed that the victim’s MySpace page had been accessed by a computer
       from the defendant’s home address. At oral argument, defense counsel conceded that the
       account was set up such that every time a password change was made, the defendant was
       notified by email of the new password.
¶ 45       The defendant also argues that it was a shared MySpace account, belonging to both him
       and the victim, so he could not have changed the password “of any person.” However, the


                                                 -13-
       trial court found that the MySpace account belonged to the victim alone and we decline to
       disturb that determination. See Sutherland, 223 Ill. 2d at 242. The defendant also argues that,
       because the webpage was removed within two hours after the victim called and asked him
       to remove it, there was no evidence that he interrupted access to her webpage with the “intent
       to harass.” We find this argument disingenuous. Merely because the page was deleted within
       two hours after the victim complained is no indication that he had not accessed the victim’s
       MySpace page and altered it with the intent to harass the victim.

¶ 46                                C. Unlawful Use of Encryption
¶ 47       The defendant’s final contention on appeal is that his conviction on count IV, unlawful
       use of encryption (720 ILCS 5/16D-5.5(b)(1) (West 2008)), should be reversed because the
       statute is unconstitutional and, alternatively, there was insufficient evidence on which to
       convict him. We agree that there was insufficient evidence to convict the defendant on this
       count and therefore do not reach his constitutional challenges to the encryption statute.
       Exelon Corp. v. Department of Revenue, 234 Ill. 2d 266, 286 (2009) (constitutional issues
       should be considered only when a case may not be resolved on nonconstitutional grounds).
¶ 48       The encryption statute provides, in relevant part:
                “(b) A person shall not knowingly use or attempt to use encryption, directly or
           indirectly, to:
                    (1) commit, facilitate, further, or promote any criminal offense[.]” 720 ILCS
                5/16D-5.5(b)(1) (West 2008).
       The encryption statute defines “encryption” as follows:
                “ ‘Encryption’ means the use of any protective or disruptive measure, including,
           without limitation, cryptography, enciphering, encoding, or a computer contaminant, to:
           (1) prevent, impede, delay, or disrupt access to any data, information, image, program,
           signal, or sound; (2) cause or make any data, information, image, program, signal, or
           sound unintelligible or unusable; or (3) prevent, impede, delay, or disrupt the normal
           operation or use of any component, device, equipment, system, or network.” 720 ILCS
           5/16D-5.5(a) (West 2008).
¶ 49       The defendant argues that he was not proved guilty beyond a reasonable doubt of
       unlawful use of encryption. The State argues that, by changing the victim’s password, the
       defendant knowingly used encryption to further the criminal offense as charged in count III.
       To determine whether there was sufficient evidence to support a conviction of unlawful use
       of encryption, we need to consider whether changing the victim’s password could be
       considered “encryption” within the meaning of the statute. We review the interpretation of
       a statute de novo. People v. Beachem, 229 Ill. 2d 237, 243 (2008).
¶ 50       “Encryption” as used in the statute is defined very broadly to include any “protective or
       disruptive measure” that impedes access to data on a computer. Although the statute states
       that it is not limited to “cryptography, enciphering, encoding, or a computer contaminant,”
       any other forms of encryption should take color from those terms. “Cryptography” means the
       enciphering and deciphering of messages in secret code or cipher; “enciphering” means to


                                                -14-
       convert a message into cipher; and “encoding” means to convert from one system of
       communication into another. See Merriam-Webster Online Dictionary, http://www.merriam-
       webster.com/dictionary/ (last visited Jan. 17, 2013). “ ‘Computer contaminant’ means any
       data *** that *** has the capability to: (1) contaminate, corrupt, consume, damage, destroy,
       disrupt, modify, record or transmit *** any other data *** contained in a computer ***
       without the knowledge or consent of the person who owns the data.” 720 ILCS 5/16D-5.5(a)
       (West 2008). “ ‘Computer contaminant’ includes, without limitation: (1) a virus, worm, or
       Trojan horse; *** or (3) any other similar data, [or] information *** that is designed *** to
       prevent, impede, delay, or disrupt the normal operation or use of any component, device,
       equipment, system, or network.” Id.
¶ 51       These four terms inherently include some type of data transformation, manipulation, or
       destruction. Placing a password on a document does not involve any transformation,
       manipulation, or destruction of data. The legislative history shows that Representative
       Crespo stated that “[b]y encryption we mean altering a file using a secret code to prevent law
       enforcement from tracking down the person sending the file from the computer. The [statute]
       basically provides a tool for law enforcement to go after criminals who hide behind
       computers and encryption to commit their crimes.” See 95th Ill. Gen. Assem., House
       Proceedings, May 25, 2007, at 50-51 (statements of Representative Crespo). In this case,
       changing the password did not alter a file or prevent law enforcement from tracking down
       the defendant. Accordingly, we hold that, under the circumstances in the present case,
       changing the password was not “encryption” within the meaning of the encryption statute.
       We therefore reverse the defendant’s conviction of unlawful use of encryption.

¶ 52                                   III. CONCLUSION
¶ 53       For the foregoing reasons, we affirm the defendant’s convictions on counts II and III, of
       harassment through electronic communications, but reverse his conviction on count IV, of
       unlawful use of encryption.

¶ 54      Affirmed in part and reversed in part.




                                               -15-
