Copy Link
Add to Bookmark
Report

SURFPUNK Technical Journal 074

  

Date: Mon, 5 Apr 93 00:28:59 PDT
Reply-To: <surfpunk@osc.versant.com>
Return-Path: <cocot@osc.versant.com>
Message-ID: <surfpunk-0074@SURFPUNK.Technical.Journal>
Mime-Version: 1.0
Content-Type: text/plain
From: surfpunk@osc.versant.com (vaqvivqhny cnegl cynvagvss navznyf)
To: surfpunk@osc.versant.com (SURFPUNK Technical Journal)
Subject: [surfpunk-0074] OPINION: SGJ vs USSS

# A "hacker" is an individual who accesses
# another's computer system without authority.
#
# -- Sam Sparks United States District Judge


Sam Sparks settles it. Thanks to Mike Godwin <mnemonic@eff.org>
for spreading it around. It had three linefeeds in funny places;
removing them is all I did to it. strick
________________________________________________________________________
________________________________________________________________________


UNITED STATES DISTRICT COURT
WESTERN DISTRICT OF TEXAS
AUSTIN DIVISION




STEVE JACKSON GAMES
INCORPORATED, et al.,
Plaintiffs,


v.


UNITED STATES SECRET SERVICE, UNITED STATES OF AMERICA, et al., Defendants




_Opinion_


I. Facts


The issues remaining at trial in this lawsuit involves the Plaintiffs
Steve Jackson Games, Incorporated, Steve Jackson, Elizabeth McCoy, Walter
Milliken, and Steffan O'Sullivan's causes of action against the United
States Secret Service and the United States of America pursuant to three
statutes, "Private Protection Act", 42 U.S.C. 2000aa _et seq_.; "Wire and
Electronic Communications Interception and Interception of Oral
Communication' Act, 18 U.S.C. 2510, et seq.; and "
Stored Wire and
Electronic Communications and Transactional Records Access" Act, 18 U.S.C
2701, _et seq_. All other issues and parties have been withdrawn by
agreement of these remaining parties.


The individual party plaintiffs are residents of the states of Texas and
New Hampshire, and the corporate plaintiff is a Texas corporation with its
principal place of business in Austin, Texas.


The Plaintiff Steve Jackson started Steve Jackson Games in 1980 and
subsequently incorporated his business. Steve Jackson Games, Incorporated,
publishes books, magazines, box games, and related products F1. More than
50 percent of the corporation's revenues are derived from its
publications. In addition, Steve Jackson Games, Incorporated, beginning in
the mid-1980s and continuing through this litigation, operated from one of
its computers an electronic bulletin board system called Illuminati. This
bulletin board posts information to the inquiring public about Steve
Jackson Games' products and activities; provides a medium for receiving
and passing on information from the corporation's employees, writers,
customers, and its game enthusiasts; and, finally, affords its users
electronic mail whereby, with the use of selected passwords, its users can
send and receive electronic mail (E-mail) in both public and private
modes. In February of 1990, there were 365 users of the Illuminati
bulletin board.


Steve Jackson was both the owner and employee of Steve Jackson Games,
Incorporated, and authored many of its publications; he used both
Illuminati's public and private programs for electronic mail and his use
ranged from business records of the corporation, contracts with his
writers, communication with his writers regarding articles which were
intended to be published by the corporation, to private communications
with his business associates and friends. Elizabeth McCoy's use of the
Illuminati bulletin board involved her participation as a game player, her
critiques as to the games and publications of the corporation, and her
private communications with associates and friends. William Milliken's use
of the Illuminati bulletin board was apparently limited to private
communicates to associates and friends. Steffan O'Sullivan's use of the
Illuminati bulletin board included writings for publication by Steve
Jackson Games, Inc., his business dealings with the corporation, and
public and private communications with associates and friends.


Importantly, prior to March l, 1990, and at all other times, there has
never been any basis for suspicion that any of the Plaintiffs have engaged
in any criminal activity, violated any law, or attempted to communicate,
publish, or store any illegally obtained information or otherwise provide
access to any illegally obtained information or to solicit any information
which was to be used illegally.


In October of 1988, Henry Kluepfel, Director of Network Security
Technology (an affiliate Bell Company), was advised a sensitive,
proprietary computer document of Bell South relating to Bell's "
911
program" had been made available to the public on a computer bulletin
board in Illinois. Kluepfel reported this information to Bell South and
requested instructions, but received no response. In April of 1989,
Kluepfel confirmed the 911 Bell document was available on the Illinois
computer bulletin board and learned the document was additionally
available without any proprietary notice on at least another computer
bulletin board and had been or was being published in a computer bulletin
board newsletter in edited form. In July of 1989, Kluepfel was finally
instructed by Bell South to report the "
intrusion of its computer
network to the Secret Service and that the document taken was "sensitive"
and "proprietary. Kluepfel had previously worked with the Secret Service
and was known as an expert and reliable informant on computer "
hacking."
F2 Thereafter, Kluepfel met Assistant U. S. Attorney William Cook in
Chicago and thereafter communicated with Cook and Secret Service Agent Tim
Foley. Agent Foley was in charge of this particular investigation.


Around February 6, l990, Kluepfel learned that the 911 document was
available on a computer billboard entitled "
Phoenix" which was operated by
Loyd Blankenship in Austin, Texas. Kluepfel "
downloaded" the document to
put in readable form and then advised these facts to the Secret Service.
Prior to February 26, 1990, Kluepfel learned that Blankenship not only
operated the Phoenix bulletin board, but he was a user of the Illinois
bulletin board wherein the 911 document was first disclosed, was an
employee of Steve Jackson Games, Inc., and a user of the Steve Jackson
Games, Inc.'s bulletin board "
Illuminati." Kluepfel's investigation also
determined that Blankenship was a 'co-sysop"
of the Illuminati bulletin
board, which means that he had the ability to review anything on the
Illuminati bulletin board and, importantly, maybe able to delete anything
on the system. Blankenship's bulletin board Phoenix had published "hacker"
information and had solicited "hacker" information relating to passwords,
ostensibly to be analyzed in some type of decryption scheme. By February
26, 1990, Kluepfel determined that the Phoenix bulletin board was no
longer accessible as he could not "dial" or "log into" it. He reported
this to Agent Foley. While Kluepfel advised Agent Foley that Blankenship
was an employee of Steve Jackson Games, Inc., and was a user and co-sysop
of Illuminati, Kluepfel never had any information whereby he was
suspicious of any criminal activity by any of the Plaintiffs in this
cause. Kluepfel was, and is, knowledgeable in the operation of computers,
computer bulletin boards, the publishing of materials and document by
computers, the communications through computer bulletin boards (both
public and private communications), and could have "logged" into the
Illuminati bulletin board at any time and reviewed all of the information
on the bulletin board except for the private communications referred to by
the Plaintiffs as electronic communications or electronic mail, but did
not do so. Kluepfel had legitimate concerns, both about the 911 document
stolen from Bell South and the possibility of a decryption system which
could utilize passwords in rapid fashion and could result in intrusions of
computer systems, including those of the Bell System.


In February of 1990, Agent Foley was also knowledgeable about computer
bulletin boards and he too could have "logged" into Illuminati, become a
user and reviewed all public communications on the bulletin board, but did
not do so.


By February 28, 1990, when the search warrant affidavit was executed,
Agent Foley had received information from reliable sources (Kluepfel,
Williams, Spain, Kibbler, Coutorie, and Niedorf, and possibly others F3)
there had been an unlawful intrusion on the Bell South computer program,
the 911 Bell South document was a sensitive and proprietary document, and
that computer hackers were attempting to utilize a decryption procedure
whereby unlawful intrusions could be made to computer programs including
the Defense Department, and these hackers were soliciting passwords so
that the decryption procedure could become operational. In addition, Agent
Foley was advised Loyd Blankenship had operated his Phoenix bulletin board
from his home, had published the 911 Bell South document in edited form,
and had published and communicated that a decryption strategy was
available and other "hackers" should submit selective passwords to
finalize the decryption scheme for intrusions into computer systems by
using a rapid deployment of passwords. Agent Foley was also advised that
Blankenship was an employee of Steve Jackson Games and had access to the
Illuminati bulletin board as a user and a co-sysop and he may well (and in
fact did) have the ability to delete any documents or information in the
Steve Jackson Games computers and Illuminati bulletin board. The only
information Agent Foley had regarding Steve Jackson Games, Inc. and Steve
Jackson was that he thought this was a company that put out games, but he
also reviewed a printout of Illuminati on February 25, 1990, which read,
"Greetings, Mortal! You have entered the secret computer system of the
Illuminati, the on-line home of the world's oldest and largest secret
conspiracy. 5124474449300/1200/2400BAUD fronted by Steve Jackson Games,
Incorporated. Fnord."
The evidence in this case strongly suggests Agent
Foley, without any further investigation, misconstrued this information to
believe the Illuminati bulletin board was similar in purpose to
Blankenship's Phoenix bulletin board, which provided information to and
was used by "hackers." Agent Foley believed, in good faith, at the time of
the execution of his affidavit on February 28, 1990, there was probable
cause to believe Blankenship had the 911 Bell South document and
information relating to the decryption scheme stored in his computer at
home or perhaps in computers, disks, or in the Illuminati bulletin board
at his place of employment at Steve Jackson Games, Inc.; that these
materials were involved in criminal activities; and that Blankenship had
the ability to delete any information stored on any of these computers
and/or disks.


Unfortunately, although he was an attorney and expressly represented this
fact in his affidavit, Agent Foley was not aware of the Privacy Protection
Act, 42 U.S.C. 2000aa _et seq._, and he conducted no investigation about
Steve Jackson Games, Incorporated, although a reasonable investigation of
only several hours would have revealed Steve Jackson Games, Inc. was, in
fact, a legitimate publisher of information to the public and Mr. Jackson
would have cooperated in the investigation. Agent Foley did not know the
individual Plaintiffs but did know they were users of Illuminati as he had
a list of all users prior to February 28, 1990. Agent Foley did know and
understand the Illuminati bulletin board would have users and probably
would have stored private electronic communications between users.
Notwithstanding the failure of any investigation regarding Steve Jackson
Games, Agent Foley and Assistant U. S. Attorney Cook intended to seize and
review all of the information and documents in any computer accessible to
Blankenship, regardless of what other incidental information would be
seized. These intentions were expressly stated in their application for a
search warrant and the warrant itself. F4


Foley's affidavit, executed on February 28, 1990, was sufficient under the
law for the issuance of a search warrant by the United States Magistrate
Judge. The Court does not find from a preponderance of the evidence that
the admitted errors in Foley's affidavit were intentional and so material
to make the affidavit and issuance of the warrant legally improper. _See,
Franks v. Delaware_, 438 U.S. 154, 98 S.Ct. 2674 (1978). The factual
errors in the affidavit include the Bell 911 document was a computer
program; the Bell 911 document was engineered at a cost of $79,449; the
Bell 911 document had been "slightly" edited; articles in _Phrack_ were
described as "hacker tutorials;" the Bell 911 document published in Phrack
contained a proprietary notice; Blankenship was a computer programmer for
Steve Jackson Games, Inc.; Blankenship's alias "Mentor" was listed as an
Illuminati bulletin board user; Coutorie, prior to February 28, 1990,
provided Foley with information on Steve Jackson Games, Inc.; and that
Kluepfel had "logged" into Illuminati. The affidavit and warrant
preparation was simply sloppy and not carefully done. Therefore, the Court
denies the Plaintiff's contentions relating to the alleged improprieties
involved in the issuance of the search warrant.


On March 1, 1990, Agents Foley and Golden executed the search warrant. At
the time of the execution, each agent had available computer experts who
had been flown to Austin to advise and review the stored information in
the computers, the bulletin boards, and disks seized. These computer
experts certainly had the ability to review the stored information and,
importantly, to copy all information contained in the computers and disks
within hours.


During the search of Steve Jackson Games and the seizure of the three
computers, over 300 computer disks, and other materials, Agent Golden was
orally advised by a Steve Jackson Games, Inc. Employee that Steve Jackson
Games, Inc. was in the publishing business. Unfortunately, Agent Golden,
like Foley, was unaware of the Privacy Protection Act and apparently
attached no significance to this information. The evidence is undisputed
that Assistant U. S. Attorney Cook would have stopped the search at the
time of this notification had he been contacted.


By March 2, 1990, Agent Foley knew Steve Jackson Games, Inc. was in the
publishing business and the seizure included documents intended for
publication to the public, including a book and other forms of
information. He also knew or had the ability to learn the seizure of the
Illuminati bulletin board included private and public electronic
communications and E-mail. By March 2, 1990, Agent Foley knew that Steve
Jackson Games, Incorporated, and its attorneys in Dallas and Austin, were
requesting the immediate return of the properties and information seized,
that transcripts of publications and the back-up materials had been
seized, and that the seizure of the documents, including business records
of Steve Jackson Games, Inc., and their back-up was certain to
economically damage Steve Jackson Games, Inc. While Agent Foley had a
legitimate concern there might be some type of program designed to delete
the materials, documents, or stored information he was seeking, he admits
there was no valid reason why all information seized could not have been
duplicated and returned to Steve Jackson Games _within a period of hours
and no more than eight days_ from the seizure. In fact, it was months
(late June 1990) before the majority of the seized materials was returned.
Agent Foley simply was unaware of the law and erroneously believed he had
substantial criminal information which obviously was not present, as to
date, no arrests or criminal charges have ever been filed against anyone,
including Blankenship.


In addition, Agent Foley must have known his seizure of computers,
printers, disks and other materials and his refusal to provide copies
represented a risk of substantial harm to Steve Jackson Games, Inc. --
under circumstances where he had no reason to believe the corporation or
its owner was involved in criminal activity.


The Secret Service denies that its personnel or its delegates read the
private electronic communications stored in the seized materials and
specifically allege that this information was reviewed by use of key
search words only. Additionally, the Secret Service denies the deletion of
any information seized with two exceptions of sensitive" or "illegal"
information, the deletion of which was consented to by Steve Jackson.
However, the preponderance of the evidence, including common sense F5,
establishes that the Secret Service personnel or its delegates did read
all electronic communications seized and did delete certain information
and communications in addition to the two documents admitted deleted. The
deletions by the Secret Service, other than the two documents consented to
by Steve Jackson, were done without consent and cannot be justified.


By March 2, 1990, Agent Foley, Agent Golden, and the Secret Service, if
aware of the Privacy Protection Act, would have known that they had, by a
search warrant, seized work products of materials from a person or entity
reasonably believed to have a purpose to disseminate to the public a
"
book" or "similar form of public communication."


The failure of the Secret Service after March 1, 1990, to -- promptly --
return the seized products of Steve Jackson Games, Incorporated cannot be
justified and unquestionably caused economic damage to the corporation.


By March 1, 1990, Steve Jackson Games, Incorporated was apparently
recovering from acute financial problems and suffering severe cash flow
problems. The seizure of the work product and delays of publication,
whether by three weeks or several months, directly impacted on Steve
Jackson Games, Incorporated. Eight employees were terminated because they
could not be paid as revenues from sales came in much later than expected.
However, it is also clear from a preponderance of the evidence that after
the calendar year 1990, the publicity surrounding this seizure and the
nature of the products sold by Steve Jackson Games, Incorporated had the
effect of increasing, not decreasing, sales. In fact, Steve Jackson Games,
Incorporated developed a specific game for sale based upon the March 1,
1990, seizure. The Court declines to find from a preponderance of the
evidence there was any economic damage to Steve Jackson Games,
Incorporated after the calendar year 1990 as a result of the seizure of
March 1, 1990. F6


As a result of the seizure of March 1, 1990, and the retention of the
equipment and documents seized, Steve Jackson Games, Incorporated
sustained out-of-pocket expenses of $8,781.00. The personnel at this
corporation had to regroup, rewrite, and duplicate substantial prior
efforts to publish the book _Gurps Cyberpunk_ and other documents stored
in the computers and the Illuminati bulletin board, explain to their
clientele and users of the bulletin board the difficulties of their
continuing business to maintain their clientele, to purchase or lease
substitute equipment and supplies, to re-establish the bulletin board, and
to get the business of Steve Jackson Games, Inc. back in order. The Court
has reviewed the evidence regarding annual sales and net income of Steve
Jackson Games, Incorporated for 1990 and the years before and after and
finds from a preponderance of the evidence there was a 6 percent loss of
sales in 1990 due to the seizure and related problems. The evidence was
undisputed that there was a 42 percent profit on sales of publications of
Steve Jackson Games, Incorporated. Thus, Steve Jackson Games, Incorporated
sustained damages in loss of sales in 1990 of $100,617.00 for a loss of
profit of $42,259.00 as a direct and proximate result of the seizure of
March 1, 1990, and the retention of the documents seized. After 1990, the
net sales of Steve Jackson Games, Incorporated continued to increase
annually in a traditional proportion as the sales had been increasing from
1988. Thus, from a preponderance of the evidence, the loss of $42,259.00
is consistent with the net income figures of Steve Jackson Games,
Incorporated in the years immediately following and preceding 1990.


Regarding damages to Steve Jackson, personally, his own testimony is that
by 1990 he was becoming more active in the management of Steve Jackson
Games, Incorporated, and spending less time in creative pursuits such as
writing. Steve Jackson Games, Incorporated was in such financial condition
that Chapter 11 proceedings in bankruptcy were contemplated. Thereafter,
the testimony clearly established that Steve Jackson Games reasserted
himself in management and was spending substantial time managing the
corporation. The Court declines to find from a preponderance of the
evidence that Steve Jackson personally sustained any compensatory damages
as a result of the conduct of the United States Secret Service.


Elizabeth McCoy, Walter Milliken and Steffan O'Sullivan also allege
compensatory damages. These Plaintiffs all had stored electronic
communications, or E-mail, on the Illuminati bulletin board at the time of
seizure. All three of these Plaintiffs testified that they had public and
private communications in storage at the time of the seizure. Steve
Jackson, Elizabeth McCoy, Walter Milliken and Steffan O'Sullivan all
testified that following June of 1990 some of their stored electronic
communications, or E-mail, had been deleted. It is clear, as hereinafter
set out, that the conduct of the United States Secret Service violated two
of the three statutes which the causes of action of the Plaintiffs are
based and, therefore, there are statutory damages involved, but the Court
declines to find from a preponderance of the evidence that any of the
individual Plaintiffs sustained any compensatory damages.


II.


a.


PRIVACY PROTECTION ACT


(First Amendment Privacy Protection)


42 U.S.C. 2000aa et seq.


The United States Secret Service, by Agent Foley and Assistant United
States Attorney Cox, sought and obtained an order from a United States
Magistrate Judge to _search_ for and _seize_ and thereafter _read_ the
information stored and contained in "
computer hardware (including, but not
limited to, central processing unit(s) monitors, memory devices, modem(s),
programming equipment, communication equipment, disks, and printers) and
computer software (including, but not limited to) memory disks, floppy
disks, storage media) and written material and documents relating to the
use of the computer system (including network access files), documentation
relating to the attacking of computers and advertising the results of
computer attacks (including telephone numbers and location information),
and financial documents and licensing documentation relative to the
compute programs and equipment at the business known as Steve Jackson
Games which constitute evidence, instrumentalities, and fruits of federal
crimes, including interstate transportation of stolen property (18 U.S.C.
2314) and interstate transportation of computer access information (18
U.S.C. 1030(a)(6)).' See, Warrant Application and Order.


On March 1, 1990, the Secret Service seized the following property on the
premises of Steve Jackson Games, Inc.: Compuadd keyboard; Packard-Bell
monitor; DKT computer; cardboard box containing disks, miscellaneous
papers and circuit boards; Splat Master gun with "Mentor" on barrel;
Hewlett-Packard laser jet printer; BTC keyboard with cover; IBM personal
computer 5150 (disassembled); Seagate Tech hard disk; 2400 modem 1649-1795
with power supply and disk; IBM keyboard; Amdek mode 310A; bulletin board
back-up files (approximately 150); Empac International Corporation XT
computer; "WWIV" users manual; red box of floppy disks; miscellaneous
papers and notes from desk; floppy disk entitled "Phoenix setup." _See_,
Warrant Return.


The evidence establishes the actual information seized, including both the
primary source and back-up materials of the draft of _Gurps Cyberpunk_, a
book intended for immediate publication (within days to weeks), drafts of
magazine and magazine articles to be published, business records of Steve
Jackson Games, Incorporated (including contracts and drafts of articles by
writers of Steve Jackson Games, Incorporated), the Illuminati bulletin
board and its contents (including public announcements, published
newsletter articles submitted to the public for review, public comment on
the articles submitted and electronic mail containing both private and
public communications). Notwithstanding over 300 floppy disks being
seized, the evidence introduced during trial was not clear as to what
additional information was seized during the search warrant execution.
However, the evidence is clear that on March 1, 1990, "work product
materials,"
as defined in 42 U.S.C. 2000aa-7(b), was obtained as well as
materials constituting "documentary materials" as defined in the same
provision. F7


The Privacy Protection Act, 42 U.S.C. 2000aa, dictates: "Notwithstanding
any other law, it shall be unlawful for a government officer or employee,
in connection with the investigation . . . of a criminal offense to search
for or seize any work product materials possessed by a person reasonably
believed to have a purpose to disseminate to the public a newspaper,
broadcast, or other similar form of public communication . . . ."
_See_,
42 U.S.C. Sec. 2000aa(a).


Assuming Agent Foley was knowledgeable of the Privacy Protection Act
(which he was not), neither he nor Assistant United States Attorney Cox
had any information which would lead them to believe that Steve Jackson
Games, Incorporated published books and materials and had a purpose to
disseminate to the public its publications. Their testimony is simply they
thought it a producer of games. As heretofore stated, the Court feels
Agent Foley failed to make a reasonable investigation of Steve Jackson
Games, Incorporated when it was apparent his intention was to take
substantial properties belonging to the corporation, the removal of which
could have a substantial effect on the continuation of business. Agent
Foley, it appears, in his zeal to obtain evidence for the criminal
investigation, simply concluded Steve Jackson Games, Incorporated was
somehow involved in Blankenship's alleged activities because of the
wording of the Illuminati bulletin board menu. In any event, the Court
declines to find from a preponderance of the evidence that on March 1,
1990, Agent Foley or any other employee or agent of the United States had
reason to believe that property seized would be the work product materials
of a person believed to have a purpose to disseminate to the public a
newspaper, book, broadcast or other similar form of public communication.
F8


During the search on March 1, and on March 2, 1990, the Secret Service was
specifically advised of facts that put its employees on notice of probable
violations of the Privacy Protection Act. It is no excuse that Agents
Foley and Golden were not knowledgeable of the law. On March 2, 1990, and
thereafter, the conduct of the United States Secret Service was in
violation of 42 U.S.C. 2000aa _et seq_. It is clear the Secret Service
continued the seizure of property of Steve Jackson Games, Incorporated
including information and documents through late June of 1990. Immediate
arrangements could and should have been made on March 2, 1990, whereby
copies of all information seized could have been made. The government
could and should have requested Steve Jackson as chief operating officer
of the corporation to cooperate and provide the information available
under the law. The Secret Service's refusal to return information and
property requested by Mr. Jackson and his lawyers in Dallas and Austin
constituted a violation of the statute. Regarding any information seized
that would constitute "documentary materials" (whereby the defensive
theory of 42 U.S.C. 2000aa(b)(3) might apply) there would have been no
problem as the property was in the possession of the United States Secret
Service and their experts and Steve Jackson were present to ensure no
destruction, alteration or concealment of information contained therein.
In any event, it is the seizure of the "work product materials" that leads
to the liability of the United States Secret Service and the United States
in this case. Pursuant to 42 U.S.C. 2000aa-6, the Court finds from a
preponderance of the evidence that Steve Jackson Games, Incorporated is
entitled to judgment against the United States Secret Service and the
United States of America for its expenses of $8,781.00 and its economic
damages of $42,259.00. The Court declines to find from a preponderance of
the evidence other damages of Steve Jackson Games, Incorporated or
liability of the United States Secret Service or the United States of
America to any other Plaintiff under the provisions of the Privacy
Protection Act.










b.


WIRE AND ELECTRONIC COMMUNICATIONS INTERCEPTION
AND INTERCEPTION OF ORAL COMMUNICATIONS
18 U.S.C. 2510 et seq.


The Plaintiffs allege the United States Secret Service's conduct also
violated 18 U.S.C. 2510, et seq., as it constituted intentional
interceptions of "electronic communication." They allege the interception
occurred at the time of seizure or, perhaps, at the time of review of the
communication subsequent to the seizure. There is no question the
individual Plaintiffs had private communications stored in Illuminati at
the time of the seizure and the court has found from a preponderance of
the evidence the Secret Service intended not only to seize and read these
communications, but, in fact, did read the communications and thereafter
deleted or destroyed some communications either intentionally or
accidentally. The Defendants contend there is no violation of this
particular statute under the facts of this case because there never was
any unlawful "interception" within the meaning of the statute.
Alternatively, the Defendants contend that the "good faith reliance" on
the search warrant issued by the United States Magistrate Judge is a
complete defense under Section 2520.


The Government relies on the 1976 Fifth Circuit case of the _United States
v. Turk_, 526 F.2d 654 (5th Cir. 1976), _cert denied_, 429 U.S. 823, 97
S.Ct. 74 (1976), and its interpretation of the statutory definition of
"interception." In _Turk_, police officers listened to the contents of a
cassette tape without first obtaining a warrant. The court concluded this
was not an "interception" under 18 U.S.C. Sec. 2510 et seq.


>>Whether the seizure and replaying of the cassette tape by the officers
was also an "interception" depends on the definition to be given "aural
acquisition.' Under one conceivable reading, and 'aural acquisition"
could
be said to occur whenever someone physically hears the contents of a
communication, and thus the use of the tape player by the officers to hear
the previously recorded conversation might fall within the definition set
out above. No explicit limitation of coverage to contemporaneous
"acquisitions" appears in the Act.


>>We believe that a different interpretation -- one which would exclude
from the definition of "intercept" the replaying of a previously recorded
conversation -- has a much firmer basis in the language of Sec. 2510(4)
and in logic, and corresponds more closely to the policies reflected in
the legislative history. The words acquisition... through the use of any
... device" suggest that the central concern is with the activity engaged
in a the time of the oral communication which causes such communication to
be overheard by uninvited listeners. If a person secrets a recorder in a
room and thereby records a conversation between two others, an
"
acquisition" occurs at the time the recording is made. This acquisition
itself might be said to be "
aural" because the contents of the
conversation are preserved in 2 form which permits the later aural
disclosure of the contents. Alternatively, a court facing the issue might
conclude that an "
aural acquisition" is accomplished only when two steps
are completed -- the initial acquisition by the device and the hearing of
the communication by the person or persons responsible for the recording.
Either of these definitions would require participation by the one charged
with an "
interception" in the contemporaneous acquisition of the
communication through the use to the device. The argument that a new and
different aural acquisition"
occurs each time a recording of an oral
communication is replayed is unpersuasive. That would mean that
innumerable "interceptions," and thus violations of the Act, could follow
from a single recording .


_Id._, at 657-658 (footnotes omitted). While the Fifth Circuit authority
relates to the predecessor statute, Congress intended no change in the
existing definition of 'intercept" in amending the statute in 1986. _See_,
S. Rep. No. 541, 99th Cong., 2nd Sess. 13 (1986), _reprinted in_ 1986
U.S.C.C.A.N. 3555, 3567 ("
Section 101(a)(3) of the ELECTRONIC
COMMUNICATIONS PRIVACY ACT amends the definition of the term "intercept"
in current section 2510(4) of electronic communications. The definition of
"intercept" under current law is retained with respect to wire and oral
communications except that the term "or other" is inserted after "aural."
This amendment clarifies that it is illegal to intercept the non-voice
portion of a wire communication."). The Court finds this argument
persuasive when considering the Congressional enactment of the Stored Wire
and Electronic Communications and Transactional Records Access Act, 18
U.S.C. 2701, _et seq_.


The Court declines to find liability for any Plaintiff against the
Defendants pursuant to the Wire and Electronic Communications Interception
and Interception of Oral Communications Act, 18 U.S.C. 2510, et seq., and
specifically holds that the alleged "
interceptions" under the facts of
this case are not 'interceptions contemplated by the Wire and Electronic
Communications Interception and Interception of Oral Communications Act.
It simply has no applicability to the facts of this case.


c.


STORED WIRE AND ELECTRONIC COMMUNICATIONS
AND TRANSACTIONAL RECORDS ACCESS
18 U.S.C. Sec. 2701 et seq.


Prior to February 28, 1990, Agent Foley, Assistant United States Attorney
Cox, and the computer consultants working with them were cognizant of
public computer bulletin boards and the use of electronic communications
and E-mail through them. Each of the persons involved in this
investigation, including Agent Foley, had the knowledge and opportunity to
log into the Illuminati bulletin board, review its menu and user lists,
obtain passwords, and thereafter review all information available to the
public. In fact, Agent Foley erroneously thought Kluepfel had done this
when a printout of Illuminati documents dated February 25, 1990, was
recieved. When Foley applied for the search warrant on February 28, 1990,
he knew the Illuminati bulletin board provided services to the public
whereby its users could store public and private electronic
communications. While Foley admits no knowledge of the Privacy Protection
Act and its provisions protecting publishers of information 'o the public,
he testified he was knowledgeable regarding the Wire and Electronic
Communications Interception and Interception of Oral Communications Act.
But, Foley never thought of the law's applicability under the facts of
this case. Steve Jackson Games, Inc., through its Illuminati bulletin
board services, was a "
remote computing service" within the definition of
Section 2711, and, therefore, the only procedure available to the Secret
Service to obtain _"
disclosure"_ of the contents of electronic
communications was to comply with this statute. _See_, 18 U.S.C. 2703.
Agent Foley and the Secret Service, however, wanted more than "
disclosure'
of the contents of the communication. As the search warrant application
evidences, the Secret Service wanted _seizure_ of all information and the
authority to review and read all electronic communications, both public
and private. A court order for such disclosure is only to issue if "there
is a reason to believe the contents of a[n] . . . electronic communication
. . . are relevant to a legitimate law enforcement inquiry."
_See_, 18
U.S.C. Sec. 2703(d). Agent Foley did not advise the United States
Magistrate Judge, by affidavit or otherwise, that the Illuminati bulletin
board contained private electronic communications between users or how the
disclosure of the content of these communications could relate to his
investigation. Foley's only knowledge was that Blankenship had published
part of the 911 document and decryption information in his Phoenix
bulletin board, was employed at Steve Jackson Games, Inc., and could have
the ability to store and delete these alleged unlawful documents in the
computers or Illuminati bulletin board at Steve Jackson Games,
Incorporated. At Agent Foley's specific request, the application and
affidavit for the search warrant were sealed. The evidence establishes the
Plaintiffs were not able to ascertain the reasons for the March 1, 1990
seizure until after the return of most of the property in June of 1990,
and then only by the efforts of the offices of both United States Senators
of the State of Texas. The procedures followed by the Secret Service in
this case virtually eliminated the safeguards contained in the statute.
For example, no Plaintiff was on notice that the search or seizure order
was made pursuant to this statute and that Steve Jackson Games,
Incorporated could move to quash or modify the order or eliminate or
reduce any undue burden on it by reason of the order. _See_, 18 U.S.C.
Sec. 2703(d). The provisions of the statute regarding the preparation of
back-up copies of the documents or information seized were never utilized
or available. _See_, 18 U.S.C. Sec. 2704. Agent Foley stated his concern
was to prevent the destruction of the documents' content and for the
Secret Service to take the time necessary to carefully review all of the
information seized. He feared Blankenship could possibly delete the
incriminating documents or could have programmed destruction in some
manner. Notwithstanding that any alteration or destruction by Blankenship,
Steve Jackson, or anyone else would constitute a criminal offense under
this statute, Foley and the Secret Service seized -- not just obtained
disclosure of the content -- all of the electronic communications stored
in the Illuminati bulletin board involving the Plaintiffs in this case.
This conduct exceeded the Government's authority under the statute.


The Government Defendants contend there is no liability for alleged
violation of the statute as Foley and the Secret Service had a "good
faith"
reliance on the February 28, 1990, court order/search warrant. The
Court declines to find this defense by a preponderance of the evidence in
this case.


Steve Jackson Games, Incorporated, as the provider and each individual
Plaintiffs as either subscribers or customers were "aggrieved" by the
conduct of the Secret Service in the violation of this statute. While the
Court declines to find from a preponderance of the credible evidence the
compensatory damages sought by each Plaintiff, the Court will assess the
statutory damages of $1,000.00 for each Plaintiff.


III. SUMMARY


This is a complex case. It is still not clear how sensitive and/or
proprietary the 911 document. was (2nd is) or how genuinely harmful the
potential decryption scheme may have been or if either were discovered by
the Secret Service in the information seized on March 1, 1990. The fact
that no criminal charges have ever been filed and the investigation
remains "on going" is, of course, not conclusive.


The complexity of this case results from the Secret Service's insufficient
investigation and its lack of knowledge of the specific laws that could
apply to their conduct on February 28, 1990 and thereafter. It appears
obvious neither the government employees no- the Plaintiffs or their
lawyers contemplated the statute upon which this case is brought back in
February, March, April, May or June of 1990. But this does not provide
assistance to the defense of the case. The Secret Service and its
personnel are the entities that citizens, like each of the Plaintiffs,
rely upon and look to protect their rights and properties. The Secret
Service conduct resulted in the seizure of property, products, business
records, business documents, and electronic communications of a
corporation and four individual citizens that the statutes were intended
to protect.


It may well be, as the Government Defendants contend, these statutes
relied upon by the Plaintiffs should not apply to the facts of this case,
as these holdings may result in the government having great difficulties
in obtaining information or computer documents -representing illegal
activities. But this Court cannot amend or rewrite the statutes involved.
The Secret Service must go to the Congress for relief. Until that time,
this Court recommends better education, investigation and strict
compliance with the statutes as written.


The Plaintiffs are ordered to submit application for attorney's fees and
costs with appropriate supporting affidavits within ten (10) days of the
date of this order. The Defendants will have ten days thereafter to file
their responses.


SIGNED this the 12 day of March, 1993.


Sam Sparks United States District Judge



[Footnotes]


1 While the content of these publications are not similar to those of
daily newspapers, news magazines, or other publications usually thought of
by this Court as disseminating information to the public, these products
come within the literal language of the Privacy Protection Act.


2 A "hacker" is an individual who accesses another's computer system
without authority.


3 Kluepfel, Williams, Spain and Kibbler are employees of Bell South;
Coutorie is a University of Texas Systems investigator assigned to
investigate computer hacking; and Niedorf is a hacker involved in the
Illinois bulletin board system.


4 The Court does fault Agent Foley and the Secret Service on the failure
to make any investigation of Steve Jackson Games, Inc. prior to March 1,
1990, and to contact Steve Jackson in an attempt to enlist his cooperation
and obtain information from him as there was never any basis to suspect
Steve Jackson or Steve Jackson Games, Inc. of any criminal activity, and
there could be no questions the seizure of computers, disks, and bulletin
board and all information thereon, including all back-up materials would
have an adverse effect (including completely stopping all activities) on
the business of Steve Jackson Games, Inc. and the users of Illuminati
bulletin board.


5 The application and the search warrant itself was worded by Foley and
Cook so that all information would be "read" by the Secret Service.


6 The Court finds the testimony of Joanne Midwikis, an accountant who
testified on behalf of Steve Jackson Games, Inc. and Steve Jackson, on
damages suffered by Steve Jackson Games, Inc. and Steve Jackson was not
credible.


7 If the Secret Service, in the performance of executing Court order, had
only obtained and taken the 911 document or alleged decryption materials,
application of the definitions of "documentary materials" and "work
product materials"
would logically result in no violation of the statute
under the circumstances of this case. It was the seizing all documents and
information and, thereafter, the failure to promptly return the
information seized which leads to violation of the statute.


8 The legislative history to the Privacy Protection Act states:


...the Committee recognized a problem for the law enforcement officer, who
seeking to comply with the statute, might be uncertain whether the
materials he sought were work product or nonwork product and that they
were intended for publication. Therefore, in the interests of allowing for
some objective measure for judgment by the office, the Committee has
provided that the work product must be possessed by someone "reasonably
believed"
to have a purpose to communicate to the public.


S. Rep. No. 874, 96th Cong., 2nd Sess., 10 (1980), _reprinted in_ 1980
U.S.C.C.A.N. 3950, 3957. As the Court has stated, Agent Foley with only a
few hours of investigation would have "reasonably believed" Steve Jackson
Games, Incorporated had "a purpose to communicate to the public."
Therefore, under an objective standard, assuming a reasonable
investigation, Agent Foley and the Secret Service violated the statute on
March 1, 1990. However, Agent Foley was not aware of the Privacy
Protection Act and was therefore not "seeking to comply" with its
requirements. Consequently, the Court found on March 1, 1990 neither Agent
Foley or any other employee or agent of the United States "reasonably
believed"
the materials seized were work product or Steve Jackson Games,
Incorporated had a "purpose to disseminate to the public."

________________________________________________________________________
________________________________________________________________________

The SURFPUNK Technical Journal is a dangerous multinational hacker zine
originating near BARRNET in the fashionable western arm of the northern
California matrix. Quantum Californians appear in one of two states,
spin surf or spin punk. Undetected, we are both, or might be neither.
________________________________________________________________________

Send postings to <surfpunk@osc.versant.com>, subscription requests
to <surfpunk-request@osc.versant.com>. MIME encouraged.
Reasonably believed to be communicating to the public.
________________________________________________________________________
________________________________________________________________________












Friday 19-Mar-93 11:34:16 from kablooey to snit
sq /%phen/ {aw}
PHENACAINE
PHENACAINES
PHENACETIN
PHENACETINS
PHENACITE
PHENACITES
PHENAKITE
PHENAKITES
PHENANTHRENE
PHENANTHRENES
PHENATE
PHENATES
PHENAZIN chemical compound
PHENAZINE
PHENAZINES
PHENAZINS [phenazin] (chemical compound)
PHENELZINE
PHENELZINES
PHENETIC pert. to a type of classificatory system
PHENETICIST
PHENETICISTS
PHENETICS
PHENETIDINE
PHENETIDINES
PHENETOL volatile liquid
PHENETOLE
PHENETOLES
PHENETOLS [phenetol] (volatile liquid)
PHENFORMIN
PHENFORMINS
PHENIX phoenix
PHENIXES [phenix] (phoenix)
PHENMETRAZINE
PHENMETRAZINES
PHENOBARBITAL
PHENOBARBITONE
PHENOBARBITONES
PHENOCAIN
PHENOCAINS
PHENOCOPIES
PHENOCOPY
PHENOCRYST
PHENOCRYSTIC
PHENOCRYSTS
PHENOL caustic compound
PHENOLATE
PHENOLATES
PHENOLIC synthetic resin
PHENOLICS [phenolic] (synthetic resin)
PHENOLOGICAL
PHENOLOGICALLY
PHENOLOGIES
PHENOLOGY
PHENOLPHTHALEIN
PHENOLS [phenol] (caustic compound)
PHENOM person of extraordinary ability or promise
PHENOMENA
PHENOMENAL
PHENOMENALISM
PHENOMENALISMS
PHENOMENALIST
PHENOMENALISTIC
PHENOMENALISTS
PHENOMENALLY
PHENOMENOLOGIES
PHENOMENOLOGIST
PHENOMENOLOGY
PHENOMENON
PHENOMS [phenom] (person of extraordinary ability or promise)
PHENOTHIAZINE
PHENOTHIAZINES
PHENOTYPE
PHENOTYPES
PHENOTYPIC
PHENOTYPICAL
PHENOTYPICALLY
PHENOXIDE
PHENOXIDES
PHENOXY
PHENTOLAMINE
PHENTOLAMINES
PHENYL univalent chemical radical
PHENYLALANINE
PHENYLALANINES
PHENYLBUTAZONE
PHENYLBUTAZONES
PHENYLENE
PHENYLENES
PHENYLEPHRINE
PHENYLEPHRINES
PHENYLIC [phenyl] (univalent chemical radical)
PHENYLKETONURIA
PHENYLKETONURIAS
PHENYLS
PHENYLTHIOUREA
PHENYLTHIOUREAS


D,R,S,<CR>,? - >

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT