Jillian Kerry, a Scio Township official, faces felony charges under Michigan’s computer crime and electronic communications statutes. The core problem is statutory: the publicly described conduct does not clearly match the legal elements those statutes require. The charges emerged during a period of active political conflict and more than $103,000 in township legal spending, raising structural questions about how criminal law is being applied here. All claims are allegations; the case has not been adjudicated.
A Case That Does Not Sit Right
Most criminal cases are straightforward on paper. The statute says one thing. The conduct lines up. The charge follows logically from both.
This is not one of those cases. In fact, I would go so far as to say that something is very jacked up here.
In Scio Township, Michigan, felony charges filed against Jillian Kerry raise far more than legal questions. They inspire head-scratching, mind-boggling ones: about how statutes are applied, about the timing of enforcement, and about what happens when criminal law intersects with active political conflict. Because when you look a little closer, the issue is not only what happened. It is whether the law being invoked actually fits.
According to multiple reports, the conduct at issue is far less dramatic than the charges suggest. On November 15, 2023, Kerry attempted to log in to a community-shared computer for a Zoom Meeting.
What she did not know was that former Supervisor William Hathaway had left himself logged into Office365, with emails sitting in the Outbox. Those emails did exactly what outbox emails are designed to do. They sent.
You read that right. The entire incident appears to stem from Will Hathaway’s already-authenticated Outlook session left open on a shared device, raising questions about internal data security practices rather than clear evidence of unauthorized system intrusion.
The Charges and the Statutory Problem
That sequence, a standard system function triggered by an already-authenticated session, is now the basis for two felony charges carrying potential exposure of up to six years: using a computer to commit a crime under MCL 752.797, and interfering with electronic communications under MCL 750.540.
These offenses, typically used in cases involving unauthorized system access, involve disruption of communications infrastructure, and manipulation or interception of digital systems. But those statutes carry incredibly specific requirements, and that is where the case immediately begins to falter, leaving one to wonder what exactly Washtenaw County Sheriff’s Department and the Prosecutor’s Office are thinking, let alone what they are hoping to achieve out of all of this.
MCL 750.540 targets conduct like cutting or interrupting communications, making unauthorized connections, and interfering with transmission systems. That implies something concrete: a blockage, a disruption, an impairment that can be documented. If communications continued normally and no system was impaired, the legal theory becomes difficult to sustain without stretching the statute well beyond its established use.
MCL 752.797 is not your typical standalone offense. It usually functions as a multiplier applied on top of an underlying crime, used for plea bargaining pressure. If the underlying interference theory is legally ambiguous or insufficient, the computer crime charge should logically inherit that same vulnerability. Unfortunately, it does not.
As written, MCL 752.797 allows for a conviction even where the underlying conduct may not clearly fit the statute’s intended purpose, highlighting a significant structural weakness in Michigan’s legislative framework. A jury can find a person guilty of using a computer to commit a crime without finding them guilty of the initial underlying charge.
Context Matters Here
Like all weird cases, this one did not emerge in a vacuum. At the time the charged events allegedly occurred, Scio Township was experiencing substantial internal conflict. That overlap is concerning, not because it establishes improper motive, but because it creates conditions where enforcement actions are structurally harder to read as isolated from the broader conflict.
It is also worth noting that the township has spent over $103,000 in defending Jillian Kerry against Hathaway’s poor computer hygiene. Clutch is awaiting investigation costs and case cost figures from the Washtenaw County Sheriff’s Department and Prosecuting Attorney’s Office.
Undoubtedly, this is a significant amount of taxpayer money spent on both sides of a situation rooted in a basic operational security failure, namely, Will Hathaway’s negligence in leaving his authenticated email sessions open.
All of this invites a painfully obvious question about priorities. Those same resources could have been directed toward baseline cybersecurity training to prevent avoidable incidents like this from escalating.
Or, that same amount could have processed dozens of sexual assault cases, funded hundreds of hours of victim advocacy, or implemented the kind of basic system controls that prevent incidents like this from happening in the first place.
In public institutions, perception is not a secondary concern. When enforcement occurs during active governance conflict, the legal theory needs to be precise enough to withstand that scrutiny on its own terms. An elastic theory applied in a contested environment does not just affect the defendant. It affects the institution’s credibility.
The court record reinforces that something more than routine adjudication is happening here. Multiple preliminary examination transcripts, a motion to quash the bindover, attempts to file expanded legal arguments, and a judicial reassignment are not procedural noise. A motion to quash is a direct challenge to whether the case clears the legal threshold to proceed at all, even if the prosecution’s facts are accepted as true. All of this aligns with the core problem: this is a faulty dispute sitting on bad statutory fit, not just flawed factual interpretation.
Three Ways Overextension Shows Up
The Kerry case illustrates a recurring pattern in how Sheriff’s Departments and Prosecutor’s Offices are playing fast and loose with cyber crime charges. Too often, computer crime statutes are stretched, contorted in ways that anyone paying attention would naturally ask, “what the hell is going on here?”
Laws written for system disruption and infrastructure interference begin absorbing conduct that may not involve any disruption at all. The statute’s language expands in application without formal amendment, which means the boundary only becomes visible when challenged in court.
Secondary charges, particularly dependent ones like MCL 752.797, amplify criminal exposure without resolving the underlying legal ambiguity. The defendant faces elevated stakes while the foundational theory remains unresolved.
When enforcement actions occur during active governance disputes, public institutions absorb the credibility cost of imprecise legal theories. The question stops being only about guilt or innocence and becomes a question about whether the law is being applied as written.
Why This Matters Beyond Scio Township
The Kerry case is not only a story about one defendant or one township. It illustrates a broader vulnerability in how felony-level computer crime statutes can be deployed. If these statutes can be applied without clear evidence of system interference or unauthorized access, their operative boundaries become unclear. Unclear boundaries produce inconsistent enforcement, unpredictable defendant exposure, and institutional credibility costs that accrue quietly until a case like this forces the question into the open.
Michigan’s computer crime framework was built for identifiable technical misconduct: intrusions, interceptions, disruptions. Cases that stretch those categories without meeting their core elements do not strengthen the framework. They erode it.
The law does not just need to be enforced. It needs to be applied in a way that holds under scrutiny, especially when the environment surrounding a case is already under strain.
Racking, Stacking, and the AG Race
These charging decisions carry broader implications beyond a single case. Washtenaw County Prosecutor Eli Savit, whose office is responsible for pushing these charges, is currently a candidate in Michigan’s Attorney General race. A case centered on accountability and transparency. That context matters and should give one pause because when felony charges are pursued based on conduct that appears to stem from another official’s very poor digital security practices, it raises legitimate questions about judgment, proportionality, and stewardship of public resources. Taxpayer-funded prosecutions are not a neutral exercise when the underlying theory itself is under strain.
The Question That Remains
This case ultimately reduces to a single, unavoidable question: does the alleged conduct actually meet the statutory elements of interference and computer crime under Michigan law, or is the statute being stretched to accommodate the situation?
The political context, the spending, and the governance conflict all sit around that question. They do not answer it, of course, but they do raise the stakes for getting the answer right.
Sources
Rita Williams, When Local Politics Meets Criminal Law: The Jillian Kerry Case and Michigan’s Expanding Computer Crime Theory, Clutch Justice (Apr. 6, 2026), https://clutchjustice.com/jillian-kerry-scio-township-computer-crime-analysis/.
Williams, R. (2026, April 6). When local politics meets criminal law: The Jillian Kerry case and Michigan’s expanding computer crime theory. Clutch Justice. https://clutchjustice.com/jillian-kerry-scio-township-computer-crime-analysis/
Williams, Rita. “When Local Politics Meets Criminal Law: The Jillian Kerry Case and Michigan’s Expanding Computer Crime Theory.” Clutch Justice, 6 Apr. 2026, clutchjustice.com/jillian-kerry-scio-township-computer-crime-analysis/.
Williams, Rita. “When Local Politics Meets Criminal Law: The Jillian Kerry Case and Michigan’s Expanding Computer Crime Theory.” Clutch Justice, April 6, 2026. https://clutchjustice.com/jillian-kerry-scio-township-computer-crime-analysis/.