950 lines
49 KiB
Plaintext
950 lines
49 KiB
Plaintext
|
|
|||
|
|
|||
|
Computer underground Digest Thu Mar 25 1993 Volume 5 : Issue 22
|
|||
|
ISSN 1004-042X
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Ralph Sims / Jyrki Kuoppala
|
|||
|
Ian Dickinson
|
|||
|
Copy Eater: Etaion Shrdlu, Senior
|
|||
|
|
|||
|
CONTENTS, #5.22 (Mar 25 1993)
|
|||
|
File 1--Judge Spark's Decision in Steve Jackson Games Suit
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
|
|||
|
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
|
|||
|
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
|
|||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|||
|
the PC Telecom forum under "computing newsletters;"
|
|||
|
On Delphi in the General Discussion database of the Internet SIG;
|
|||
|
on the PC-EXEC BBS at (414) 789-4210;
|
|||
|
in Europe from the ComNet in Luxembourg BBS (++352) 466893;
|
|||
|
|
|||
|
ANONYMOUS FTP SITES:
|
|||
|
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
|
|||
|
uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
|
|||
|
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
|||
|
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
|||
|
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
|||
|
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
|||
|
|
|||
|
Back issues also may be obtained through mailservers at:
|
|||
|
mailserv@batpad.lgb.ca.us or server@blackwlf.mese.com
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Some authors do copyright their material, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Thu, 25 Mar 93 19:22:49 PST
|
|||
|
From: Anonymous@well.sf.ca.us
|
|||
|
Subject: File 1--Judge Spark's Decision in Steve Jackson Games Suit
|
|||
|
|
|||
|
ALTHOUGH THIS IS A PUBLIC DOCUMENT-IF YOU POST THIS OPINION
|
|||
|
PLEASE RETAIN THIS CREDIT:FIRST BBS POSTING-FLETC-INFONET
|
|||
|
KFM M-SYSOP- 3-24-93 9:32PM- THANKS
|
|||
|
|
|||
|
UNITED STATES DISTRICT COURT
|
|||
|
WESTERN DISTRICT OF TEXAS
|
|||
|
AUSTIN DIVISION
|
|||
|
|
|||
|
STEVE JACKSON GAMES *s
|
|||
|
INCORPORATED, et al., *s
|
|||
|
Plaintiffs, *s
|
|||
|
*s
|
|||
|
V. *s NO. A 91 CA 346 SS
|
|||
|
*s
|
|||
|
UNITED STATES SECRET SERVICE, *s
|
|||
|
UNITED STATES OF AMERICA, et al., *s
|
|||
|
Defendants *s
|
|||
|
|
|||
|
Opinion
|
|||
|
|
|||
|
I. Facts
|
|||
|
|
|||
|
The issues remaining at trial in this lawsuit involves the
|
|||
|
Plaintiffs Steve Jackson Games, Incorporated, Steve Jackson,
|
|||
|
Elizabeth McCoy, Walter Milliken, and Steffan O'Sullivan's causes
|
|||
|
of action against the United States Secret Service and the United
|
|||
|
States of America pursuant to three statutes, "Private Protection
|
|||
|
Act",42 U.S.C. 2000aa et seq.;"Wire and Electronic Communications
|
|||
|
Interception and Interception of Oral Communication" Act, 18
|
|||
|
U.S.C. 2510, et seq.; and "Stored Wire and Electronic
|
|||
|
Communications and Transactional Records Access" Act, 18 U.S.C
|
|||
|
2701, et seq. All other issues and parties have been withdrawn by
|
|||
|
agreement of these remaining parties.
|
|||
|
|
|||
|
The individual party plaintiffs are residents of the states
|
|||
|
of Texas and New Hampshire, and the corporate plaintiff is a
|
|||
|
Texas corporation with its principal place of business in Austin,
|
|||
|
Texas.
|
|||
|
|
|||
|
The Plaintiff Steve Jackson started Steve Jackson Games in
|
|||
|
1980 and subsequently incorporated his business. Steve Jackson
|
|||
|
Games, Incorporated, publishes books, magazines, box games, and
|
|||
|
%related products'. More than 50 percent of the corporation's
|
|||
|
revenues are derived from its publications. In addition, Steve
|
|||
|
Jackson Games, Incorporated, beginning in the mid-1980s and
|
|||
|
continuing through this litigation, operated from one of its
|
|||
|
computers an electronic bulletin board system called Illuminati.
|
|||
|
This bulletin board posts information to the inquiring public about
|
|||
|
Steve Jackson Games' products and activities; provides a medium for
|
|||
|
receiving and passing on information from the corporation's
|
|||
|
employees, writers, customers, and its game enthusiasts; and,
|
|||
|
finally, affords its users electronic mail whereby, with the use of
|
|||
|
selected passwords, its users can send and receive electronic mail
|
|||
|
(E-mail) in both public and private modes. In February of 1990,
|
|||
|
there were 365 users of the Illuminati bulletin board.
|
|||
|
|
|||
|
Steve Jackson was both the owner and employee of Steve Jackson
|
|||
|
Games, Incorporated, and authored many of its publications; he used
|
|||
|
both Illuminati's public and private programs for electronic mail
|
|||
|
and his use ranged from business records of the corporation,
|
|||
|
contracts with his writers, communication with his writers
|
|||
|
regarding articles which were intended to be published by the
|
|||
|
corporation, to private communications with his business associates
|
|||
|
and friends. Elizabeth McCoy's use of the Illuminati bulletin board
|
|||
|
involved her participation as a game player, her critiques as to
|
|||
|
the games and publications of the corporation, and her private
|
|||
|
|
|||
|
|
|||
|
'While the content of these publications are not similar to
|
|||
|
those of daily newspapers, news magazines, or other publications
|
|||
|
usually thought of by this Court as disseminating information to
|
|||
|
the public, these products come within the literal language of the
|
|||
|
Privacy Protection Act.
|
|||
|
%communications with associates and friends. William Milliken's use
|
|||
|
of the Illuminati bulletin board was apparently limited to private
|
|||
|
communicates to associates and friends. Steffan O'Sullivan's use of
|
|||
|
the Illuminati bulletin board included writings for publication by
|
|||
|
Steve Jackson Games, Inc. , his business dealings with the
|
|||
|
corporation, and public and private communications with associates
|
|||
|
and friends.
|
|||
|
|
|||
|
Importantly, prior to March 1, 1990, and at all other times,
|
|||
|
there has never been any basis for suspicion that any of the
|
|||
|
Plaintiffs have engaged in any criminal activity, violated any law,
|
|||
|
or attempted to communicate, publish, or store any illegally
|
|||
|
obtained information or otherwise provide access to any illegally
|
|||
|
obtained information or to solicit any information which was to be
|
|||
|
used illegally.
|
|||
|
|
|||
|
In October of 1988, Henry Kluepfel, Director of Network
|
|||
|
Security Technology (an affiliate Bell Company) , was advised a
|
|||
|
sensitive, proprietary computer document of Bell South relating to
|
|||
|
Bell's "911 program" had been made available to the public on a
|
|||
|
computer bulletin board in Illinois. Kluepfel reported this
|
|||
|
information to Bell South and requested instructions, but received
|
|||
|
no response. In April of 1989, Kluepfel confirmed the 911 Bell
|
|||
|
document was available on the Illinois computer bulletin board and
|
|||
|
learned the document was additionally available without any
|
|||
|
proprietary notice on at least another computer bulletin board and
|
|||
|
had been or was being published in a computer bulletin board
|
|||
|
newsletter in edited form. In July of 1989, Kluepfel was finally
|
|||
|
|
|||
|
|
|||
|
- 3 -
|
|||
|
%instructed by Bell South to report the "intrusion" of its computer
|
|||
|
network to the Secret Service and that the document taken was
|
|||
|
"sensitive" and "proprietary. " Kluepfel had previously worked with
|
|||
|
the Secret Service and was known as an expert and reliable
|
|||
|
informant on computer "hacking. , 2 Thereafter, Kluepfel met
|
|||
|
Assistant U. S. Attorney William Cook in Chicago and thereafter
|
|||
|
communicated with Cook and Secret Service Agent Tim Foley. Agent
|
|||
|
Foley was in charge of this particular investigation.
|
|||
|
|
|||
|
Around February 6, 1990, Kluepfel learned that the 911
|
|||
|
document was available on a computer billboard entitled "Phoenix"
|
|||
|
which was operated by Loyd Blankenship in Austin, Texas. Kluepfel
|
|||
|
"downloaded" the document to put in readable form and then advised
|
|||
|
these facts to the Secret Service. Prior to February 26, 1990,
|
|||
|
Kluepfel learned that Blankenship not only operated the Phoenix
|
|||
|
bulletin board, but he was a user of the Illinois bulletin board
|
|||
|
wherein the 911 document was first disclosed, was an employee of
|
|||
|
Steve Jackson Games, Inc., and a user of the Steve Jackson Games,
|
|||
|
Inc.'s bulletin board "Illuminati." Kluepfel's investigation also
|
|||
|
determined that Blankenship was a "co-sysop" of the Illuminati
|
|||
|
bulletin board, which means that he had the ability to review
|
|||
|
anything on the Illuminati bulletin board and, importantly, maybe
|
|||
|
able to delete anything on the system. Blankenship's bulletin
|
|||
|
board Phoenix had published "hacker" information and had solicited
|
|||
|
"hacker" information relating to passwords, ostensibly to be
|
|||
|
|
|||
|
|
|||
|
2 "hacker" is an individual who accesses another's computer
|
|||
|
system without authority.
|
|||
|
%analyzed in some type of decryption scheme. By February 26, 1990,
|
|||
|
Kluepfel determined that the Phoenix bulletin board was no longer
|
|||
|
accessible as he could not dial, or "log into" it. He reported this
|
|||
|
to Agent Foley. While Kluepfel advised Agent Foley that Blankenship
|
|||
|
was an employee of Steve Jackson Games, Inc., and was a user and
|
|||
|
co-sysop of Illuminati, Kluepfel never had any information whereby
|
|||
|
he was suspicious of any criminal activity by any of the Plaintiffs
|
|||
|
in this cause. Kluepfel was, and is, knowledgeable in the operation
|
|||
|
of computers, computer bulletin boards, the publishing of materials
|
|||
|
and document by computers, the communications through computer
|
|||
|
bulletin boards (both public and private communications), and could
|
|||
|
have 'logged" into the Illuminati bulletin board at any time and
|
|||
|
reviewed all of the information on the bulletin board except for
|
|||
|
the private communications referred to by the Plaintiffs as
|
|||
|
electronic communications or electronic mail, but did not do so.
|
|||
|
Kluepfel had legitimate concerns, both about the 911 document
|
|||
|
stolen from Bell South and the possibility of a decryption system
|
|||
|
which could utilize passwords in rapid fashion and could result in
|
|||
|
intrusions of computer systems, including those of the Bell System.
|
|||
|
|
|||
|
In February of 1990, Agent Foley was also knowledgeable about
|
|||
|
computer bulletin boards and he too could have "logged" into
|
|||
|
Illuminati, become a user and reviewed all public communications on
|
|||
|
the bulletin board, but did not do so.
|
|||
|
|
|||
|
By February 28, 1990, when the search warrant affidavit was
|
|||
|
executed, Agent Foley had received information from reliable
|
|||
|
|
|||
|
|
|||
|
- 5 -
|
|||
|
%sources (Kluepfel, Williams, Spain, Kibbler, Coutorie, and Niedorf
|
|||
|
, and possibly others') there had been an unlawful intrusion on the
|
|||
|
Bell South computer program, the 911 Bell South document was a
|
|||
|
sensitive and proprietary document, and that computer hackers were
|
|||
|
attempting to utilize a decryption procedure whereby unlawful
|
|||
|
intrusions could be made to computer programs including the Defense
|
|||
|
Department, and these hackers were soliciting passwords so that the
|
|||
|
decryption procedure could become operational. In addition, Agent
|
|||
|
Foley was advised Loyd Blankenship had operated his Phoenix
|
|||
|
bulletin board from his home, had published the 911 Bell South
|
|||
|
document in edited form, and had published and communicated that a
|
|||
|
decryption strategy was available and other "hackers" should submit
|
|||
|
selective passwords to finalize the decryption scheme for
|
|||
|
intrusions into computer systems by using a rapid deployment of
|
|||
|
passwords. Agent Foley was also advised that Blankenship was an
|
|||
|
employee of Steve Jackson Games and had access to the Illuminatie
|
|||
|
bulletin board as a user and a co-sysop and he may well (and in
|
|||
|
fact did) have the ability to delete any documents or information
|
|||
|
in the Steve Jackson Games computers and Illuminatie bulletin
|
|||
|
board. The only information Agent Foley had regarding Steve Jackson
|
|||
|
Games, Inc. and Steve Jackson was that he thought this was a
|
|||
|
company that put out games, but he also reviewed a printout of
|
|||
|
Illuminati on February 25, 1990, which read, "Greetings, Mortal!
|
|||
|
You have
|
|||
|
|
|||
|
|
|||
|
3 'Kluepfel, Williams, Spain and Kibbler are employees of Bell
|
|||
|
South; Coutorie is a University of Texas Systems investigator
|
|||
|
assigned to investigate computer hacking; and Niedorf is a hacker
|
|||
|
involved in the Illinois bulletin board system.
|
|||
|
%entered the secret computer system of the Illuminati, the on-line
|
|||
|
home of the world's oldest and largest secret conspiracy.
|
|||
|
5124474449300/1200/2400BAUD fronted by Steve Jackson Games,
|
|||
|
Incorporated. Fnord. " The evidence in this case strongly suggests
|
|||
|
Agent Foley, without any further investigation, misconstrued this
|
|||
|
information to believe the Illuminati bulletin board was similar in
|
|||
|
purpose to Blankenship's Phoenix bulletin board, which provided
|
|||
|
information to and was used by "hackers." Agent Foley believed, in
|
|||
|
good faith, at the time of the execution of his affidavit on
|
|||
|
February 28, 1990, there was probable cause to believe Blankenship
|
|||
|
had the 911 Bell South document and information relating to the
|
|||
|
decryption scheme stored in his computer at home or perhaps in
|
|||
|
computers, disks, or in the Illuminati bulletin board at his place
|
|||
|
of employment at Steve Jackson Games, Inc.; that these materials
|
|||
|
were involved in criminal activities; and that Blankenship had the
|
|||
|
ability to delete any information stored on any of these computers
|
|||
|
and/or disks.
|
|||
|
|
|||
|
Unfortunately, although he was an attorney and expressly
|
|||
|
represented this fact in his affidavit, Agent Foley was not aware
|
|||
|
of the Privacy Protection Act, 42 U.S.C. 2000aa et seq., and he
|
|||
|
conducted no investigation about Steve Jackson Games, Incorporated,
|
|||
|
although a reasonable investigation of only several hours would
|
|||
|
have revealed Steve Jackson Games, Inc. was, in fact, a legitimate
|
|||
|
publisher of information to the public and Mr. Jackson would have
|
|||
|
cooperated in the investigation. Agent Foley did not know the
|
|||
|
individual Plaintiffs but did know they were users of Illuminati as
|
|||
|
|
|||
|
- 7 -
|
|||
|
%he had a list of all users prior to February 28, 1990. Agent Foley
|
|||
|
did know and understand the Illuminati bulletin board would have
|
|||
|
users and probably would have stored private electronic
|
|||
|
communications between users. Notwithstanding the failure of any
|
|||
|
investigation regarding Steve Jackson Games, Agent Foley and
|
|||
|
Assistant U. S. Attorney Cook intended to seize and review all of
|
|||
|
the information and documents in any computer accessible to
|
|||
|
Blankenship, regardless of what other incidental information would
|
|||
|
be seized. These intentions were expressly stated in their
|
|||
|
application for a search warrant and the warrant itself.' Foley's
|
|||
|
affidavit, executed on February 28, 1990, was sufficient under the
|
|||
|
law for the issuance of a search warrant by the United States
|
|||
|
Magistrate Judge. The Court does not find from a preponderance of
|
|||
|
the evidence that the admitted errors in Foley's affidavit were
|
|||
|
intentional and so material to make the affidavit and issuance of
|
|||
|
the warrant legally improper. See, Franks v. Delaware, 438 U.S.
|
|||
|
154, 98 S.Ct. 2674 (1978). The factual errors in the affidavit
|
|||
|
include the Bell 911 document was a computer program; the Bell 911
|
|||
|
document was engineered at a cost of $79,449; the Bell 911 document
|
|||
|
had been 'slightly" edited; articles in
|
|||
|
|
|||
|
4 The Court does fault Agent Foley and the Secret Service on
|
|||
|
the failure to make any investigation of Steve Jackson Games,
|
|||
|
Inc. prior to March 1, 1990, and to contact Steve Jackson in
|
|||
|
an attempt to enlist his cooperation and obtain information
|
|||
|
from him as there was never any basis to suspect Steve Jackson
|
|||
|
or Steve Jackson Games, Inc. of any criminal activity, and
|
|||
|
there could be no questions the seizure of computers, disks,
|
|||
|
and bulletin board and all information thereon, including all
|
|||
|
back-up materials would have an adverse effect (including
|
|||
|
completely stopping all activities) on the business of Steve
|
|||
|
Jackson Games, Inc. and the users of Illuminati bulletin
|
|||
|
board.
|
|||
|
%Phrack were described as "hacker tutorials;" the Bell 911 document
|
|||
|
published in Phrack contained a proprietary notice; Blankenship was
|
|||
|
a computer programmer for Steve Jackson Games, Inc.; Blankenship's
|
|||
|
alias "Mentor" was listed as an Illuminati bulletin board user;
|
|||
|
|
|||
|
Coutorie, prior to February 28, 1990, provided Foley with
|
|||
|
information on Steve Jackson Games, Inc.; and that Kluepfel had
|
|||
|
"logged" into Illuminati. The affidavit and warrant preparation was
|
|||
|
simply sloppy and not carefully done. Therefore, the Court denies
|
|||
|
the Plaintiff's contentions relating to the alleged improprieties
|
|||
|
involved in the issuance of the search warrant.
|
|||
|
|
|||
|
On March 1, 1990, Agents Foley and Golden executed the
|
|||
|
search
|
|||
|
|
|||
|
warrant. At the time of the execution, each agent had available
|
|||
|
|
|||
|
computer experts who had been flown to Austin to advise and
|
|||
|
review
|
|||
|
|
|||
|
the stored information in the computers, the bulletin boards, and
|
|||
|
disks seized. These computer experts certainly had the ability to
|
|||
|
review the stored information and, importantly, to copy all
|
|||
|
information contained in the computers and disks within hours.
|
|||
|
|
|||
|
During the search of Steve Jackson Games and the seizure of
|
|||
|
the three computers, over 300 computer disks, and other materials,
|
|||
|
Agent Golden was orally advised by a Steve Jackson Games, Inc.
|
|||
|
Employee that Steve Jackson Games, Inc. was in the publishing
|
|||
|
business. Unfortunately, Agent Golden, like Foley, was unaware of
|
|||
|
the Privacy Protection Act and apparently attached no significance
|
|||
|
to this information. The evidence is undisputed that Assistant U.
|
|||
|
|
|||
|
S. Attorney Cook would have stopped the search at the time of this
|
|||
|
notification had he been contacted.
|
|||
|
|
|||
|
- 9 -
|
|||
|
% By March 2, 1990, Agent Foley knew Steve Jackson Games, Inc.
|
|||
|
was in the publishing business and the seizure included documents
|
|||
|
intended for publication to the public, including a book and other
|
|||
|
forms of information. He also knew or had the ability to learn the
|
|||
|
seizure of the Illuminati bulletin board included private and
|
|||
|
public electronic communications and E-mail. By March 2, 1990,
|
|||
|
Agent Foley knew that Steve Jackson Games, Incorporated, and its
|
|||
|
attorneys in Dallas and Austin, were requesting the immediate
|
|||
|
return of the properties and information seized, that transcripts
|
|||
|
of publications and the back-up materials had been seized, and that
|
|||
|
the seizure of the documents, including business records of Steve
|
|||
|
Jackson Games, Inc., and their back-up was certain to economically
|
|||
|
damage Steve Jackson Games, Inc. While Agent Foley had a legitimate
|
|||
|
concern there might be some type of program designed to delete the
|
|||
|
materials, documents, or stored information he was seeking, he
|
|||
|
admits there was no valid reason why all information seized could
|
|||
|
not have been duplicated and returned to Steve Jackson Games within
|
|||
|
a period of hours and no more than eight days from the seizure. In
|
|||
|
fact, it was months (late June 1990) before the majority of the
|
|||
|
seized materials was returned. Agent Foley simply was unaware of
|
|||
|
the law and erroneously believed he had substantial criminal
|
|||
|
information which obviously was not present, as to date, no arrests
|
|||
|
or criminal charges have ever been filed against anyone, including
|
|||
|
Blankenship.
|
|||
|
|
|||
|
In addition, Agent Foley must have known his seizure of
|
|||
|
computers, printers, disks and other materials and his refusal to
|
|||
|
|
|||
|
|
|||
|
- 10 -
|
|||
|
%provide copies represented a risk of substantial harm to Steve
|
|||
|
Jackson Games, Inc. -- under circumstances where he had no reason
|
|||
|
to believe the corporation or its owner was involved in criminal
|
|||
|
activity.
|
|||
|
|
|||
|
The Secret Service denies that its personnel or its delegates
|
|||
|
read the private electronic communications stored in the seized
|
|||
|
materials and specifically allege that this information was
|
|||
|
reviewed by use of key search words only. Additionally, the Secret
|
|||
|
Service denies the deletion of any information seized with two
|
|||
|
exceptions of "sensitive" or "illegal" information, the deletion of
|
|||
|
which was consented to by Steve Jackson. However, the
|
|||
|
preponderance of the evidence, including common sense 5,
|
|||
|
establishes that the Secret Service personnel or its delegates did
|
|||
|
read all electronic communications seized and did delete certain
|
|||
|
information and communications in addition to the two documents
|
|||
|
admitted deleted. The deletions by the Secret Service, other than
|
|||
|
the two documents consented to by Steve Jackson, were done without
|
|||
|
consent and cannot be justified.
|
|||
|
|
|||
|
By March 2, 1990, Agent Foley, Agent Golden, and the Secret
|
|||
|
Service, if aware of the Privacy Protection Act, would have known
|
|||
|
that they had, by a search warrant, seized work products of
|
|||
|
materials from a person or entity reasonably believed to have a
|
|||
|
purpose to disseminate to the public a"book" or "similar form of
|
|||
|
public communication."
|
|||
|
|
|||
|
'The application and the search warrant itself was worded by
|
|||
|
Foley and Cook so that all information would be "read" by the
|
|||
|
Secret Service.
|
|||
|
|
|||
|
- 11 -
|
|||
|
% The failure of the Secret Service after March 1, 1990, to --
|
|||
|
promptly -- return the seized products of Steve Jackson Games,
|
|||
|
Incorporated cannot be justified and unquestionably caused economic
|
|||
|
damage to the corporation.
|
|||
|
|
|||
|
By March 1, 1990, Steve Jackson Games, Incorporated was
|
|||
|
apparently recovering from acute financial problems and suffering
|
|||
|
severe cash flow problems. The seizure of the work product and
|
|||
|
delays of publication, whether by three weeks or several months,
|
|||
|
directly impacted on Steve Jackson Games, Incorporated. Eight
|
|||
|
employees were terminated because they could not be paid as
|
|||
|
revenues from sales came in much later than expected. However, it
|
|||
|
is also clear from a preponderance of the evidence that after the
|
|||
|
calendar year 1990, the publicity surrounding this seizure and the
|
|||
|
nature of the products sold by Steve Jackson Games, Incorporated
|
|||
|
had the effect of increasing, not decreasing, sales. In fact, Steve
|
|||
|
Jackson Games, Incorporated developed a specific game for sale
|
|||
|
based upon the March 1, 1990, seizure. The Court declines to find
|
|||
|
from a preponderance of the evidence there was any economic damage
|
|||
|
to Steve Jackson Games, Incorporated after the calendar year 1990
|
|||
|
as a result of the seizure of March 1, 1990.'
|
|||
|
|
|||
|
As a result of the seizure of March 1, 1990, and the retention
|
|||
|
of the equipment and documents seized, Steve Jackson Games,
|
|||
|
Incorporated sustained out-of-pocket expenses of $8,781.00. The
|
|||
|
|
|||
|
|
|||
|
6 The Court finds the testimony of Joanne Midwikis, an
|
|||
|
accountant who testified on behalf of Steve Jackson Games, Inc. and
|
|||
|
Steve Jackson, on damages suffered by Steve Jackson Games, Inc. and
|
|||
|
Steve Jackson was not credible.
|
|||
|
|
|||
|
- 12 -
|
|||
|
%personnel at this corporation had to regroup, rewrite, and
|
|||
|
duplicate substantial prior efforts to publish the book Gurps
|
|||
|
Cyberpunk and other documents stored in the computers and the
|
|||
|
Illuminati bulletin board, explain to their clientele and users of
|
|||
|
the bulletin board the difficulties of their continuing business to
|
|||
|
maintain their clientele, to purchase or lease substitute equipment
|
|||
|
and supplies, to re-establish the bulletin board, and to get the
|
|||
|
business of Steve Jackson Games, Inc. back in order. The Court has
|
|||
|
reviewed the evidence regarding annual sales and net income of
|
|||
|
Steve Jackson Games, Incorporated for 1990 and the years before and
|
|||
|
after and finds from a preponderance of the evidence there was a 6
|
|||
|
percent loss of sales in 1990 due to the seizure and related
|
|||
|
problems. The evidence was undisputed that there was a 42 percent
|
|||
|
profit on sales of publications of Steve Jackson Games,
|
|||
|
Incorporated. Thus, Steve Jackson Games, Incorporated sustained
|
|||
|
|
|||
|
damages in loss of sales in 1990 of $100,617.00 for a loss of
|
|||
|
profit of $42,259.00 as a direct and proximate result of the
|
|||
|
seizure of March 1, 1990, and the retention of the documents
|
|||
|
seized. After 1990, the net sales of Steve Jackson Games,
|
|||
|
Incorporated continued to increase annually in a traditional
|
|||
|
proportion as the sales had been increasing from 1988. Thus, from
|
|||
|
a preponderance of the evidence, the loss of $42,259.00 is
|
|||
|
inconsistent with the net income figures of Steve Jackson Games,
|
|||
|
Incorporated in the years immediately following and preceding
|
|||
|
1990.
|
|||
|
|
|||
|
Regarding damages to Steve Jackson, personally, his own
|
|||
|
testimony is that by 1990 he was becoming more active in the
|
|||
|
|
|||
|
|
|||
|
- 13 -
|
|||
|
%management of Steve Jackson Games, Incorporated, and spending less
|
|||
|
time in creative pursuits such as writing. Steve Jackson Games,
|
|||
|
Incorporated was in such financial condition that Chapter 11
|
|||
|
proceedings in bankruptcy were contemplated. Thereafter, the
|
|||
|
testimony clearly established that Steve Jackson Games reasserted
|
|||
|
himself in management and was spending substantial time managing
|
|||
|
the corporation. The Court declines to find from a preponderance of
|
|||
|
the evidence that Steve Jackson personally sustained any
|
|||
|
compensatory damages as a result of the conduct of the United
|
|||
|
States Secret Service.
|
|||
|
|
|||
|
Elizabeth McCoy, Walter Milliken and Steffan O'Sullivan also
|
|||
|
allege compensatory damages. These Plaintiffs all had stored
|
|||
|
electronic communications, or E-mail, on the Illuminati bulletin
|
|||
|
board at the time of seizure. All three of these Plaintiffs
|
|||
|
testified that they had public and private communications in
|
|||
|
storage at the time of the seizure. Steve Jackson, Elizabeth McCoy,
|
|||
|
Walter Milliken and Steffan O'Sullivan all testified that
|
|||
|
following June of 1990 some of their stored electronic
|
|||
|
communications, or E-mail, had been deleted. It is clear, as
|
|||
|
hereinafter set out, that the conduct of the United States Secret
|
|||
|
Service violated two of the three statutes which the causes of
|
|||
|
action of the Plaintiffs are based and, therefore, there are
|
|||
|
statutory damages involved, but the Court declines to find from a
|
|||
|
preponderance of the evidence that any of the individual Plaintiffs
|
|||
|
sustained any compensatory damages.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 14 -
|
|||
|
% ii.
|
|||
|
|
|||
|
a.
|
|||
|
|
|||
|
PRIVACY PROTECTION ACT
|
|||
|
(First Amendment Privacy Protection)
|
|||
|
42 U.S.C. 2000aa et seq.
|
|||
|
|
|||
|
The United States Secret Service, by Agent Foley and Assistant
|
|||
|
United States Attorney Cox, sought and obtained an order from a
|
|||
|
United States Magistrate Judge to search for and seize and
|
|||
|
thereafter read the information stored and contained in "computer
|
|||
|
hardware (including, but not limited to, central processing unit(s)
|
|||
|
monitors, memory devices, modem(s), programming equipment,
|
|||
|
communication equipment, disks, and printers) and computer software
|
|||
|
(including, but not limited to) memory disks, floppy disks, storage
|
|||
|
media) and written material and documents relating to the use of
|
|||
|
the computer system (including network access files) ,
|
|||
|
documentation relating to the attacking of computers and
|
|||
|
advertising the results of computer attacks (including telephone
|
|||
|
numbers and location information), and financial documents and
|
|||
|
licensing documentation relative to the compute programs and
|
|||
|
equipment at the business known as Steve Jackson Games which
|
|||
|
constitute evidence, instrumentalities, and fruits of federal
|
|||
|
crimes, including interstate transportation of stolen property (18
|
|||
|
U.S.C. 2314) and interstate transportation of computer access
|
|||
|
information (18 U.S.C. 1030(a)(6))." See, Warrant Application and
|
|||
|
Order.
|
|||
|
|
|||
|
On March 1, 1990, the Secret Service seized the following
|
|||
|
property on the premises of Steve Jackson Games, Inc.: Compuadd
|
|||
|
keyboard; Packard-Bell monitor; DKT computer; cardboard box
|
|||
|
containing disks, miscellaneous papers and circuit boards; Splat
|
|||
|
%Master gun with "Mentor" on barrel; Hewlett-Packard laser jet
|
|||
|
printer; BTC keyboard with cover; IBM personal computer 5150
|
|||
|
(disassembled); Seagate Tech hard disk; 2400 modem 1649-1795 with
|
|||
|
Dower supply and disk; IBM keyboard; Amdek mode[l] 31OA; bulletin
|
|||
|
board back-up files (approximately 150); Empac International
|
|||
|
Corporation XT computer; "WWIV" users manual; red box of floppy
|
|||
|
disks; miscellaneous papers and notes from desk; floppy disk
|
|||
|
entitled "Phoenix setup." See, Warrant Return.
|
|||
|
|
|||
|
The evidence establishes the actual information seized,
|
|||
|
including both the primary source and back-up materials of the
|
|||
|
draft of Gurps Cyberpunk, a book intended for immediate publication
|
|||
|
(within days to weeks) , drafts of magazine and magazine articles
|
|||
|
to be published, business records of Steve Jackson Games,
|
|||
|
Incorporated (including contracts and drafts of articles by writers
|
|||
|
of Steve Jackson Games, Incorporated), the Illuminati bulletin
|
|||
|
board and its contents (including public announcements, published
|
|||
|
newsletter articles submitted to the public for review, public
|
|||
|
comment on the articles submitted and electronic mail containing
|
|||
|
both private and public communications) . Notwithstanding over 300
|
|||
|
floppy disks being seized, the evidence introduced during trial was
|
|||
|
not clear as to what additional information was seized during the
|
|||
|
search warrant execution. However, the evidence is clear that on
|
|||
|
March 1, 1990, "work product materials, " as defined in 42 U.S.C.
|
|||
|
2000aa-7 (b), was
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 16 -
|
|||
|
%obtained as well as materials constituting "documentary materials"
|
|||
|
as defined in the same provision.'
|
|||
|
|
|||
|
The Privacy Protection Act, 42 U.S.C. 2000aa, dictates:
|
|||
|
"Notwithstanding any other law, it shall be unlawful for a
|
|||
|
government officer or employee, in connection with the
|
|||
|
investigation . . . of a criminal offense to search for or seize
|
|||
|
any work product materials possessed by a person reasonably
|
|||
|
believed to have a purpose to disseminate to the public a
|
|||
|
newspaper, broadcast, or other similar form of public communication
|
|||
|
. . ." See, 42 U.S.C. [sec] 2000aa(a).
|
|||
|
|
|||
|
Assuming Agent Foley was knowledgeable of the Privacy
|
|||
|
Protection Act (which he was not), neither he nor Assistant United
|
|||
|
States Attorney Cox had any information which would lead them to
|
|||
|
believe that Steve Jackson Games, Incorporated published books and
|
|||
|
materials and had a purpose to disseminate to the public its
|
|||
|
publications. Their testimony is simply they thought it a producer
|
|||
|
of games. As heretofore stated, the Court feels Agent Foley failed
|
|||
|
to make a reasonable investigation of Steve Jackson Games,
|
|||
|
Incorporated when it was apparent his intention was to take
|
|||
|
substantial properties belonging to the corporation, the removal of
|
|||
|
which could have a substantial effect on the continuation of
|
|||
|
|
|||
|
|
|||
|
|
|||
|
7 If the Secret Service, in the performance of executing Court
|
|||
|
order, had only obtained and taken the 911 document or alleged
|
|||
|
decryption materials, application of the definitions of
|
|||
|
"documentary materials" and "work product materials" would
|
|||
|
logically result in no violation of the statute under the
|
|||
|
circumstances of this case. It was the seizing all documents and
|
|||
|
information and, thereafter, the failure to promptly return the
|
|||
|
information seized which leads to violation of the statute.
|
|||
|
|
|||
|
- 17 -
|
|||
|
%business. Agent Foley, it appears, in his zeal to obtain evidence
|
|||
|
for the criminal investigation, simply concluded Steve Jackson
|
|||
|
Games, Incorporated was somehow involved in Blankenship's alleged
|
|||
|
activities because of the wording of the Illuminati bulletin board
|
|||
|
menu. In any event, the Court declines to find from a preponderance
|
|||
|
of the evidence that on March 1, 1990, Agent Foley or any other
|
|||
|
employee or agent of the United States had reason to believe that
|
|||
|
property seized would be the work product materials of a person
|
|||
|
believed to have a purpose to disseminate to the public a
|
|||
|
newspaper, book, broadcast or other similar form of public
|
|||
|
communication.'8
|
|||
|
|
|||
|
8 'The legislative history to the Privacy Protection Act states:
|
|||
|
|
|||
|
...the Committee recognized a problem for the law en-
|
|||
|
forcement officer, who seeking to comply with the
|
|||
|
statute, might be uncertain whether the materials he
|
|||
|
sought were work product or nonwork product and that they
|
|||
|
were intended for publication. Therefore, in the
|
|||
|
interests of allowing for some objective measure for
|
|||
|
judgment by the office, the Committee has provided that
|
|||
|
the work product must be possessed by someone "reasonably
|
|||
|
believed" to have a purpose to communicate to the public.
|
|||
|
|
|||
|
S. Rep. No. 874, 96th Cong., 2nd Sess., 10 (1980), reprinted in
|
|||
|
1980 U.S.C.C.A.N. 3950, 3957. As the Court has stated, Agent Foley
|
|||
|
with only a few hours of investigation would have "reasonably
|
|||
|
believed" Steve Jackson Games, Incorporated had "a purpose to
|
|||
|
communicate to the public." Therefore, under an objective standard,
|
|||
|
assuming a reasonable investigation, Agent Foley and the Secret
|
|||
|
Service violated the statute on March 1, 1990. However, Agent Foley
|
|||
|
was not aware of the Privacy Protection Act and was therefore not
|
|||
|
"seeking to comply" with its requirements. Consequently, the Court
|
|||
|
found on March 1, 1990 neither Agent Foley nor any other employee
|
|||
|
or agent of the United States "reasonably believed" the materials
|
|||
|
seized were work product or Steve Jackson Games, Incorporated had
|
|||
|
a "purpose to disseminate to the public."
|
|||
|
|
|||
|
- 18 -
|
|||
|
% During the search on March 1, and on March 2, 1990, the Secret
|
|||
|
Service was specifically advised of facts that put its employees on
|
|||
|
notice of probable violations of the Privacy Protection Act. It is
|
|||
|
no excuse that Agents Foley and Golden were not knowledgeable of
|
|||
|
the law. On March 2, 1990, and thereafter, the conduct of the
|
|||
|
United States Secret Service was in violation of 42 U.S.C. 2000aa
|
|||
|
et seq. It is clear the Secret Service continued the seizure of
|
|||
|
property of Steve Jackson Games, Incorporated including information
|
|||
|
and documents through late June of 1990. Immediate arrangements
|
|||
|
could and should have been made on March 2, 1990, whereby copies of
|
|||
|
all information seized could have been made. The government could
|
|||
|
and should have requested Steve Jackson as chief operating officer
|
|||
|
of the corporation to cooperate and provide the information
|
|||
|
available under the law. The Secret Service's refusal to return
|
|||
|
information and property requested by Mr. Jackson and his lawyers
|
|||
|
in Dallas and Austin constituted a violation of the statute.
|
|||
|
Regarding any information seized that would constitute 'documentary
|
|||
|
materials" (whereby the defensive theory of 42 U.S.C. 2000aa(b) (3)
|
|||
|
might apply) there would have been no problem as the property was
|
|||
|
in the possession of the United States Secret Service and their
|
|||
|
experts and Steve Jackson were present to ensure no destruction,
|
|||
|
alteration or concealment of information contained therein. In any
|
|||
|
event, it is the seizure of the "work product materials" that leads
|
|||
|
to the liability of the United States Secret Service and the United
|
|||
|
States in this case. Pursuant to 42 U.S.C. 2000aa-6, the Court
|
|||
|
finds from a preponderance of the evidence that Steve Jackson
|
|||
|
|
|||
|
- 19 -
|
|||
|
%Games, Incorporated is entitled to judgement against the United
|
|||
|
States Secret Service and the United States of America for its
|
|||
|
expenses of $8,781.00 and its economic damages of $42,259.00. The
|
|||
|
Court declines to find from a preponderance of the evidence other
|
|||
|
damages of Steve Jackson Games, Incorporated or liability of the
|
|||
|
United States Secret Service or the United States of America to any
|
|||
|
other Plaintiff under the provisions of the Privacy Protection Act.
|
|||
|
|
|||
|
b.
|
|||
|
|
|||
|
WIRE AND ELECTRONIC COMMUNICATIONS INTERCEPTION
|
|||
|
AND INTERCEPTION OF ORAL COMMUNICATIONS
|
|||
|
18 U.S.C. 2510 et seq.
|
|||
|
|
|||
|
The Plaintiff s allege the United States Secret Service " s
|
|||
|
conduct also violated 18 U.S.C. 2510, et seq., as it constituted
|
|||
|
intentional interceptions of "electronic communication. " They
|
|||
|
allege the interception occurred at the time of seizure or,
|
|||
|
perhaps, at the time of review of the communication subsequent to
|
|||
|
the seizure. There is no question the individual Plaintiffs had
|
|||
|
private communications stored in Illuminati at the time of the
|
|||
|
seizure and the court has found from a preponderance of the
|
|||
|
evidence the Secret Service intended not only to seize and read
|
|||
|
these communications, but, in fact, did read the communications and
|
|||
|
thereafter deleted or destroyed some communications either
|
|||
|
intentionally or accidentally. The Defendants contend there is no
|
|||
|
violation of this particular statute under the facts of this case
|
|||
|
because there never was any unlawful "interception" within the
|
|||
|
meaning of the statute. Alternatively, the Defendants contend that
|
|||
|
the "good faith reliance" on the search warrant issued by the
|
|||
|
|
|||
|
|
|||
|
- 20 -
|
|||
|
%United States Magistrate Judge is a complete defense under Section
|
|||
|
2520 .
|
|||
|
|
|||
|
The Government relies on the 1976 Fifth Circuit case of the
|
|||
|
|
|||
|
United States v. Turk, 526 F.2d 654 (5th Cir. 1976), cert denied,
|
|||
|
429 U.S. 823, 97 S.Ct. 74 (1976), and its interpretation of the
|
|||
|
statutory definition of "interception." In Turk, police officers
|
|||
|
listened to the contents of a cassette tape without first obtaining
|
|||
|
a warrant. The court concluded this was not an "interception" under
|
|||
|
18 U.S.C. [sec] 2510 et seq.
|
|||
|
|
|||
|
Whether the seizure and replaying of the cassette tape by the
|
|||
|
officers was also an "interception" depends on the definition
|
|||
|
to be given "aural acquisition." Under one conceivable
|
|||
|
reading, and "aural acquisition" could be said to occur
|
|||
|
whenever someone physically hears the contents of a
|
|||
|
communication, and thus the use of the tape player by the
|
|||
|
officers to hear the previously recorded conversation might
|
|||
|
fall within the definition set out above. No explicit
|
|||
|
limitation of coverage to contemporaneous "acquisitions"
|
|||
|
appears in the Act.
|
|||
|
We believe that a different interpretation -- one which
|
|||
|
would exclude from the definition of "intercept" the replaying
|
|||
|
of a previously recorded conversation -- has a much firmer
|
|||
|
basis in the language of S 2510(4) and in logic, and
|
|||
|
corresponds more closely to the policies reflected in the
|
|||
|
legislative history. The words "acquisition... through the use
|
|||
|
of any ... device" suggest that the central concern is with
|
|||
|
the activity engaged in a the time of the oral communication
|
|||
|
which causes such communication to be overheard by uninvited
|
|||
|
listeners. If a person secrets a recorder in a room and
|
|||
|
thereby records a conversation between two others, an
|
|||
|
"acquisition" occurs at the time the recording is made. This
|
|||
|
acquisition itself might be said to be "aural" because the
|
|||
|
contents of the conversation are preserved in a form which
|
|||
|
permits the later aural disclosure of the contents.
|
|||
|
Alternatively, a court facing the issue might conclude that an
|
|||
|
"aural acquisition" is accomplished only when two steps are
|
|||
|
completed -- the initial acquisition by the device and the
|
|||
|
hearing of the communication by the person or persons
|
|||
|
responsible for the recording. Either of these definitions
|
|||
|
would require participation by the one charged with an
|
|||
|
"interception" in the contemporaneous acquisition of the
|
|||
|
communication through the use to the device. The argument that
|
|||
|
a new and different "aural acquisition" occurs each time a
|
|||
|
recording of an oral
|
|||
|
% communication is replayed is unpersuasive. That would mean
|
|||
|
that innumerable "interceptions," and thus violations of the
|
|||
|
Act, could follow from a single recording.
|
|||
|
|
|||
|
Id., at 657-658 (footnotes omitted). While the Fifth Circuit
|
|||
|
authority relates to the predecessor statute, Congress intended no
|
|||
|
change in the existing definition of "intercept" in amending the
|
|||
|
statute in 1986. See, S. Rep. No. 541, 99th Cong., 2nd Sess. 13
|
|||
|
(1986), reprinted in 1986 U.S.C.C.A.N. 3555, 3567 ("Section
|
|||
|
101(a)(3) of the ELECTRONIC COMMUNICATIONS PRIVACY ACT amends the
|
|||
|
definition of the term "intercept" in current section 2510(4) of
|
|||
|
title 18 to cover electronic communications. The definition of
|
|||
|
"intercept" under current law is retained with respect to wire and
|
|||
|
oral communications except that the term "or other" is inserted
|
|||
|
after "aural." This amendment clarifies that it is illegal to
|
|||
|
intercept the non-voice portion of a wire communication."). The
|
|||
|
Court finds this argument persuasive when considering the
|
|||
|
Congressional enactment of the Stored Wire and Electronic
|
|||
|
Communications and Transactional Records Access Act, 18 U.S.C.
|
|||
|
2701, et seq.
|
|||
|
|
|||
|
The Court declines to find liability for any Plaintiff against
|
|||
|
the Defendants pursuant to the Wire and Electronic Communications
|
|||
|
Interception and Interception of Oral Communications Act, 18
|
|||
|
U.S.C.2510, et seq., and specifically holds that the alleged
|
|||
|
"interceptions" under the facts of this case are not
|
|||
|
"interceptions"contemplated by the wire and Electronic
|
|||
|
Communications Interception and Interception of Oral Communications
|
|||
|
Act. It simply has no applicability to the facts of this case.
|
|||
|
|
|||
|
- 22-
|
|||
|
% c.
|
|||
|
|
|||
|
STORED WIRE AND ELECTRONIC COMMUNICATIONS
|
|||
|
AND TRANSACTIONAL RECORDS ACCESS
|
|||
|
18 U.S.C. [sec] 2701 et seq.
|
|||
|
|
|||
|
Prior to February 28, 1990, Agent Foley, Assistant United
|
|||
|
States Attorney Cox, and the computer consultants working with them
|
|||
|
were cognizant of public computer bulletin boards and the use of
|
|||
|
electronic communications and E-mail through them. Each of the
|
|||
|
persons involved in this investigation, including Agent Foley, had
|
|||
|
the knowledge and opportunity to log into the Illuminati bulletin
|
|||
|
board, review its menu and user lists, obtain passwords, and
|
|||
|
thereafter review all information available to the public. In fact,
|
|||
|
Agent Foley erroneously thought Kluepfel had done this when a
|
|||
|
printout of Illuminati documents dated February 25, 1990, was
|
|||
|
received. When Foley applied for the search warrant on February 28,
|
|||
|
1990, he knew the Illuminati bulletin board provided services to
|
|||
|
the public whereby its users could store public and private
|
|||
|
electronic communications. While Foley admits no knowledge of the
|
|||
|
Privacy Protection Act and its provisions protecting publishers of
|
|||
|
information to the public, he testified he was knowledgeable
|
|||
|
regarding the Wire and Electronic Communications Interception and
|
|||
|
Interception of Oral Communications Act. But, Foley never thought
|
|||
|
of the law's applicability under the facts of this case. Steve
|
|||
|
Jackson Games, Inc., through its Illuminati bulletin board
|
|||
|
services, was a "remote computing service" within the definition of
|
|||
|
Section 2711, and, therefore, the only procedure available to the
|
|||
|
Secret Service to obtain "disclosure" of the contents of electronic
|
|||
|
|
|||
|
|
|||
|
- 23 -
|
|||
|
%communications was to comply with this statute. See, 18 U.S.C. 2
|
|||
|
7 0 3 . Agent Foley and the Secret Service, however, wanted more
|
|||
|
than "disclosure" of the contents of the communication. As the
|
|||
|
search warrant application evidences, the Secret Service wanted
|
|||
|
seizure of all information and the authority to review and read all
|
|||
|
electronic communications, both public and private. A court order
|
|||
|
for such disclosure is only to issue if "there is a reason to
|
|||
|
believe the contents of a[n] . . . electronic communication . are
|
|||
|
relevant to a legitimate law enforcement inquiry." See, 18 U.S.C.
|
|||
|
S 2703(d). Agent Foley did not advise the United States Magistrate
|
|||
|
Judge, by affidavit or otherwise, that the Illuminati bulletin
|
|||
|
board contained private electronic communications between users or
|
|||
|
how the disclosure of the content of these communications could
|
|||
|
relate to his investigation. Foley's only knowledge was that
|
|||
|
Blankenship had published part of the 911 document and decryption
|
|||
|
information in his Phoenix bulletin board, was employed at Steve
|
|||
|
Jackson Games, Inc. , and could have the ability to store and
|
|||
|
delete these alleged unlawful documents in the computers or
|
|||
|
Illuminati bulletin board at Steve Jackson Games, Incorporated. At
|
|||
|
Agent Foley's specific request, the application and affidavit for
|
|||
|
the search warrant were sealed. The
|
|||
|
evidence establishes the Plaintiffs were not able to ascertain the
|
|||
|
reasons for the March 1, 1990 seizure until after the return of
|
|||
|
most of the property in June of 1990, and then only by the efforts
|
|||
|
of the offices of both United States Senators of the State of
|
|||
|
Texas. The procedures followed by the Secret Service in this case
|
|||
|
virtually eliminated the safeguards
|
|||
|
|
|||
|
- 24 -
|
|||
|
%contained in the statute. For example, no Plaintiff was on notice
|
|||
|
that the search or seizure order was made pursuant to this statute
|
|||
|
and that Steve Jackson Games, Incorporated could move to quash or
|
|||
|
modify the order or eliminate or reduce any undue burden on it by
|
|||
|
reason of the order. See, 18 U.S.C. [sec] 2703(d). The provisions
|
|||
|
of the statute regarding the preparation of back-up copies of the
|
|||
|
documents or information seized were never utilized or available.
|
|||
|
See, 18 U.S.C. [sec] 2704. Agent Foley stated his concern was to
|
|||
|
prevent the destruction of the documents' content and for the
|
|||
|
Secret Service to take the time necessary to carefully review all
|
|||
|
of the information seized. He feared Blankenship could possibly
|
|||
|
delete the incriminating documents or could have programmed
|
|||
|
destruction in some manner. Notwithstanding that any alteration or
|
|||
|
destruction by Blankenship, Steve Jackson, or anyone else would
|
|||
|
constitute a criminal offense under this statute, Foley and the
|
|||
|
Secret Service seized -- not just obtained disclosure of the
|
|||
|
content -- all of the electronic communications stored in the
|
|||
|
Illuminati bulletin board involving the Plaintiffs in this case.
|
|||
|
This conduct exceeded the Government's authority under the statute.
|
|||
|
|
|||
|
The Government Defendants contend there is no liability for
|
|||
|
alleged violation of the statute as Foley and the Secret Service
|
|||
|
had a "good faith" reliance on the February 28, 1990, court
|
|||
|
order/search warrant. The Court declines to find this defense by a
|
|||
|
preponderance of the evidence in this case.
|
|||
|
|
|||
|
Steve Jackson Games, Incorporated, as the provider and each
|
|||
|
individual Plaintiffs as either subscribers or customers were
|
|||
|
|
|||
|
|
|||
|
- 25 -
|
|||
|
%"aggrieved" by the conduct of the Secret Service in the violation
|
|||
|
of this statute. While the Court declines to find from a
|
|||
|
preponderance of the credible evidence the compensatory damages
|
|||
|
sought by each Plaintiff, the Court will assess the statutory
|
|||
|
damages of $1,000.00 for each Plaintiff.
|
|||
|
|
|||
|
III. SUMMARY
|
|||
|
|
|||
|
This is a complex case. It is still not clear how sensitive
|
|||
|
and/or proprietary the 911 document was (and is) or how genuinely
|
|||
|
harmful the potential decryption scheme may have been or if either
|
|||
|
were discovered by the Secret Service in the information seized on
|
|||
|
March 1, 1990. The fact that no criminal charges have ever been
|
|||
|
filed and the investigation remains "on going" is, of course, not
|
|||
|
conclusive.
|
|||
|
|
|||
|
The complexity of this case results from the Secret Service's
|
|||
|
insufficient investigation and its lack of knowledge of the
|
|||
|
specific laws that could apply to their conduct on February 28,
|
|||
|
1990 and thereafter. It appears obvious neither the government
|
|||
|
employees nor the Plaintiffs or their lawyers contemplated the
|
|||
|
statute upon which this case is brought back in February, March,
|
|||
|
April, May or June of 1990. But this does not provide assistance to
|
|||
|
the defense of the case. The Secret Service and its personnel are
|
|||
|
the entities that citizens, like each of the Plaintiffs, rely upon
|
|||
|
and look to protect their rights and properties. The Secret Service
|
|||
|
conduct resulted in the seizure of property, products, business
|
|||
|
records, business documents, and electronic communications
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 26 -
|
|||
|
%of a corporation and f our individual citizens that the statutes
|
|||
|
were intended to protect.
|
|||
|
|
|||
|
It may well be, as the Government Defendants contend, these
|
|||
|
statutes relied upon by the Plaintiff s should not apply to the
|
|||
|
facts of this case, as these holdings may result in the government
|
|||
|
having great difficulties in obtaining information or computer
|
|||
|
documents representing illegal activities. But this Court cannot
|
|||
|
amend or rewrite the statutes involved. The Secret Service must go
|
|||
|
to the Congress for relief. Until that time, this Court recommends
|
|||
|
better education, investigation and strict compliance with the
|
|||
|
statutes as written.
|
|||
|
|
|||
|
The Plaintiffs are ordered to submit application for
|
|||
|
attorney's fees and costs with appropriate supporting affidavits
|
|||
|
within ten (10) days of the date of this order. The Defendants will
|
|||
|
have ten days thereafter to file their responses.
|
|||
|
|
|||
|
|
|||
|
SIGNED this the s/12 day of March, 1993.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Sam Sparks United States District Judge
|
|||
|
|
|||
|
|
|||
|
|
|||
|
-27-
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #5.22
|
|||
|
************************************
|
|||
|
|
|||
|
|
|||
|
|