Direct Answer

Jillian Kerry, a Scio Township official, faces felony charges under Michigan’s computer crime and electronic communications statutes. The core problem is statutory: the publicly described conduct does not clearly match the legal elements those statutes require. The charges emerged during a period of active political conflict and more than $103,000 in township legal spending, raising structural questions about how criminal law is being applied here. All claims are allegations; the case has not been adjudicated.

Key Points
ChargesKerry faces two felony counts: using a computer to commit a crime under MCL 752.797 and interfering with electronic communications under MCL 750.540.
MismatchBoth statutes target system disruption, unauthorized access, and infrastructure interference. Publicly available information does not clearly show any of those elements were present.
Dependent chargeThe computer crime count under MCL 752.797 requires an underlying offense. If the interference theory is legally weak, the computer crime charge should have no stable foundation beneath it; but that’s not the way the statute is written.
ContextThe charges arose during escalating governance conflict within Scio Township and have generated over $103,000 in legal defense fees.
ChallengedA motion to quash the bindover, multiple preliminary examination transcripts, and a judicial reassignment all signal that legal sufficiency, not just factual dispute, is at the center of this case.
QuickFAQs
What is the Jillian Kerry case about?
Kerry, a Scio Township official, faces felony charges under Michigan’s computer crime and electronic communications statutes. The case turns on whether the alleged conduct actually satisfies the statutory elements those charges require.
Why is the case controversial?
The statutes charged are typically used for system interference and unauthorized access. Publicly available information does not clearly show disruption, intrusion, or impairment of any communications system.
What is the motion to quash and why does it matter?
A motion to quash the bindover argues that even if the prosecution’s facts are accepted as true, the case does not clear the legal threshold to proceed. That makes this a dispute about statutory fit, not just factual interpretation.
Why does the political context matter?
Criminal enforcement during active governance conflict creates credibility pressure on institutions, not because it proves improper motive, but because the legal theory needs to hold up under scrutiny precisely when the surrounding environment is already unstable.

A Case That Does Not Sit Right

Most criminal cases are straightforward on paper. The statute says one thing. The conduct lines up. The charge follows logically from both.

This is not one of those cases. In fact, I would go so far as to say that something is very jacked up here.

In Scio Township, Michigan, felony charges filed against Jillian Kerry raise far more than legal questions. They inspire head-scratching, mind-boggling ones: about how statutes are applied, about the timing of enforcement, and about what happens when criminal law intersects with active political conflict. Because when you look a little closer, the issue is not only what happened. It is whether the law being invoked actually fits.

According to multiple reports, the conduct at issue is far less dramatic than the charges suggest. On November 15, 2023, Kerry attempted to log in to a community-shared computer for a Zoom Meeting.

What she did not know was that former Supervisor William Hathaway had left himself logged into Office365, with emails sitting in the Outbox. Those emails did exactly what outbox emails are designed to do. They sent.

You read that right. The entire incident appears to stem from Will Hathaway’s already-authenticated Outlook session left open on a shared device, raising questions about internal data security practices rather than clear evidence of unauthorized system intrusion.

The Charges and the Statutory Problem

That sequence, a standard system function triggered by an already-authenticated session, is now the basis for two felony charges carrying potential exposure of up to six years: using a computer to commit a crime under MCL 752.797, and interfering with electronic communications under MCL 750.540.

These offenses, typically used in cases involving unauthorized system access, involve disruption of communications infrastructure, and manipulation or interception of digital systems. But those statutes carry incredibly specific requirements, and that is where the case immediately begins to falter, leaving one to wonder what exactly Washtenaw County Sheriff’s Department and the Prosecutor’s Office are thinking, let alone what they are hoping to achieve out of all of this.

Finding 01
The Interference Statute Requires Tangible Disruption

MCL 750.540 targets conduct like cutting or interrupting communications, making unauthorized connections, and interfering with transmission systems. That implies something concrete: a blockage, a disruption, an impairment that can be documented. If communications continued normally and no system was impaired, the legal theory becomes difficult to sustain without stretching the statute well beyond its established use.

Finding 02
The Computer Crime Charge Has No Independent Foundation

MCL 752.797 is not your typical standalone offense. It usually functions as a multiplier applied on top of an underlying crime, used for plea bargaining pressure. If the underlying interference theory is legally ambiguous or insufficient, the computer crime charge should logically inherit that same vulnerability. Unfortunately, it does not.


As written, MCL 752.797 allows for a conviction even where the underlying conduct may not clearly fit the statute’s intended purpose, highlighting a significant structural weakness in Michigan’s legislative framework. A jury can find a person guilty of using a computer to commit a crime without finding them guilty of the initial underlying charge.

Context Matters Here

Like all weird cases, this one did not emerge in a vacuum. At the time the charged events allegedly occurred, Scio Township was experiencing substantial internal conflict. That overlap is concerning, not because it establishes improper motive, but because it creates conditions where enforcement actions are structurally harder to read as isolated from the broader conflict.

It is also worth noting that the township has spent over $103,000 in defending Jillian Kerry against Hathaway’s poor computer hygiene. Clutch is awaiting investigation costs and case cost figures from the Washtenaw County Sheriff’s Department and Prosecuting Attorney’s Office.

Undoubtedly, this is a significant amount of taxpayer money spent on both sides of a situation rooted in a basic operational security failure, namely, Will Hathaway’s negligence in leaving his authenticated email sessions open.

All of this invites a painfully obvious question about priorities. Those same resources could have been directed toward baseline cybersecurity training to prevent avoidable incidents like this from escalating.

Or, that same amount could have processed dozens of sexual assault cases, funded hundreds of hours of victim advocacy, or implemented the kind of basic system controls that prevent incidents like this from happening in the first place.

The Credibility Problem

In public institutions, perception is not a secondary concern. When enforcement occurs during active governance conflict, the legal theory needs to be precise enough to withstand that scrutiny on its own terms. An elastic theory applied in a contested environment does not just affect the defendant. It affects the institution’s credibility.

The court record reinforces that something more than routine adjudication is happening here. Multiple preliminary examination transcripts, a motion to quash the bindover, attempts to file expanded legal arguments, and a judicial reassignment are not procedural noise. A motion to quash is a direct challenge to whether the case clears the legal threshold to proceed at all, even if the prosecution’s facts are accepted as true. All of this aligns with the core problem: this is a faulty dispute sitting on bad statutory fit, not just flawed factual interpretation.

Three Ways Overextension Shows Up

The Kerry case illustrates a recurring pattern in how Sheriff’s Departments and Prosecutor’s Offices are playing fast and loose with cyber crime charges. Too often, computer crime statutes are stretched, contorted in ways that anyone paying attention would naturally ask, “what the hell is going on here?”

Pattern 01
Elastic Statutory Interpretation

Laws written for system disruption and infrastructure interference begin absorbing conduct that may not involve any disruption at all. The statute’s language expands in application without formal amendment, which means the boundary only becomes visible when challenged in court.

Pattern 02
Charge Stacking on an Uncertain Foundation

Secondary charges, particularly dependent ones like MCL 752.797, amplify criminal exposure without resolving the underlying legal ambiguity. The defendant faces elevated stakes while the foundational theory remains unresolved.

Pattern 03
Institutional Credibility Strain

When enforcement actions occur during active governance disputes, public institutions absorb the credibility cost of imprecise legal theories. The question stops being only about guilt or innocence and becomes a question about whether the law is being applied as written.

Why This Matters Beyond Scio Township

The Kerry case is not only a story about one defendant or one township. It illustrates a broader vulnerability in how felony-level computer crime statutes can be deployed. If these statutes can be applied without clear evidence of system interference or unauthorized access, their operative boundaries become unclear. Unclear boundaries produce inconsistent enforcement, unpredictable defendant exposure, and institutional credibility costs that accrue quietly until a case like this forces the question into the open.

Michigan’s computer crime framework was built for identifiable technical misconduct: intrusions, interceptions, disruptions. Cases that stretch those categories without meeting their core elements do not strengthen the framework. They erode it.

The law does not just need to be enforced. It needs to be applied in a way that holds under scrutiny, especially when the environment surrounding a case is already under strain.

Racking, Stacking, and the AG Race

These charging decisions carry broader implications beyond a single case. Washtenaw County Prosecutor Eli Savit, whose office is responsible for pushing these charges, is currently a candidate in Michigan’s Attorney General race. A case centered on accountability and transparency. That context matters and should give one pause because when felony charges are pursued based on conduct that appears to stem from another official’s very poor digital security practices, it raises legitimate questions about judgment, proportionality, and stewardship of public resources. Taxpayer-funded prosecutions are not a neutral exercise when the underlying theory itself is under strain.

The Question That Remains

This case ultimately reduces to a single, unavoidable question: does the alleged conduct actually meet the statutory elements of interference and computer crime under Michigan law, or is the statute being stretched to accommodate the situation?

The political context, the spending, and the governance conflict all sit around that question. They do not answer it, of course, but they do raise the stakes for getting the answer right.

Sources

LawMCL 750.540 — Michigan Penal Code, Interference with Electronic Communications
LawMCL 752.797 — Michigan Computer Crime Prevention Act, Using a Computer to Commit a Crime
How to Cite This Article
Bluebook (Legal)

Rita Williams, When Local Politics Meets Criminal Law: The Jillian Kerry Case and Michigan’s Expanding Computer Crime Theory, Clutch Justice (Apr. 6, 2026), https://clutchjustice.com/jillian-kerry-scio-township-computer-crime-analysis/.

APA 7

Williams, R. (2026, April 6). When local politics meets criminal law: The Jillian Kerry case and Michigan’s expanding computer crime theory. Clutch Justice. https://clutchjustice.com/jillian-kerry-scio-township-computer-crime-analysis/

MLA 9

Williams, Rita. “When Local Politics Meets Criminal Law: The Jillian Kerry Case and Michigan’s Expanding Computer Crime Theory.” Clutch Justice, 6 Apr. 2026, clutchjustice.com/jillian-kerry-scio-township-computer-crime-analysis/.

Chicago

Williams, Rita. “When Local Politics Meets Criminal Law: The Jillian Kerry Case and Michigan’s Expanding Computer Crime Theory.” Clutch Justice, April 6, 2026. https://clutchjustice.com/jillian-kerry-scio-township-computer-crime-analysis/.

Work With Rita Williams · Clutch Justice
“I map how institutions hide from accountability. That map is what I sell.”
01 Government Accountability & Institutional Forensics 02 Procedural Abuse Pattern Recognition 03 Legal AI & Court Systems Domain Expertise