144 lines
7.7 KiB
Plaintext
144 lines
7.7 KiB
Plaintext
|
||
UNITED STATES DISTRICT COURT
|
||
WESTERN DISTRICT OF TEXAS
|
||
AUSTIN DIVISION
|
||
|
||
STEVE JACKSON GAMES
|
||
INCORPORATED, et al.,
|
||
Plaintiffs,
|
||
v.
|
||
|
||
UNITED STATES SECRET SERVICE, UNITED STATES OF AMERICA, et al., Defendan
|
||
|
||
_Opinion_
|
||
|
||
|
||
I. Facts
|
||
|
||
|
||
The issues remaining at trial in this lawsuit involves the Plaintiffs
|
||
Steve Jackson Games, Incorporated, Steve Jackson, Elizabeth McCoy, Walte
|
||
Milliken, and Steffan O'Sullivan's causes of action against the United
|
||
States Secret Service and the United States of America pursuant to three
|
||
statutes, "Private Protection Act", 42 U.S.C. 2000aa _et seq_.; "Wire an
|
||
Electronic Communications Interception and Interception of Oral
|
||
Communication' Act, 18 U.S.C. 2510, et seq.; and "Stored Wire and
|
||
Electronic Communications and Transactional Records Access" Act, 18 U.S.
|
||
2701, _et seq_. All other issues and parties have been withdrawn by
|
||
agreement of these remaining parties.
|
||
|
||
|
||
The individual party plaintiffs are residents of the states of Texas and
|
||
New Hampshire, and the corporate plaintiff is a Texas corporation with i
|
||
principal place of business in Austin, Texas.
|
||
|
||
|
||
The Plaintiff Steve Jackson started Steve Jackson Games in 1980 and
|
||
subsequently incorporated his business. Steve Jackson Games, Incorporate
|
||
publishes books, magazines, box games, and related products F1. More tha
|
||
50 percent of the corporation's revenues are derived from its
|
||
publications. In addition, Steve Jackson Games, Incorporated, beginning
|
||
the mid-1980s and continuing through this litigation, operated from one
|
||
its computers an electronic bulletin board system called Illuminati. Thi
|
||
bulletin board posts information to the inquiring public about Steve
|
||
Jackson Games' products and activities; provides a medium for receiving
|
||
and passing on information from the corporation's employees, writers,
|
||
customers, and its game enthusiasts; and, finally, affords its users
|
||
electronic mail whereby, with the use of selected passwords, its users c
|
||
send and receive electronic mail (E-mail) in both public and private
|
||
modes. In February of 1990, there were 365 users of the Illuminati
|
||
bulletin board.
|
||
|
||
|
||
Steve Jackson was both the owner and employee of Steve Jackson Games,
|
||
Incorporated, and authored many of its publications; he used both
|
||
Illuminati's public and private programs for electronic mail and his use
|
||
ranged from business records of the corporation, contracts with his
|
||
writers, communication with his writers regarding articles which were
|
||
intended to be published by the corporation, to private communications
|
||
with his business associates and friends. Elizabeth McCoy's use of the
|
||
Illuminati bulletin board involved her participation as a game player, h
|
||
critiques as to the games and publications of the corporation, and her
|
||
private communications with associates and friends. William Milliken's u
|
||
of the Illuminati bulletin board was apparently limited to private
|
||
communicates to associates and friends. Steffan O'Sullivan's use of the
|
||
Illuminati bulletin board included writings for publication by Steve
|
||
Jackson Games, Inc., his business dealings with the corporation, and
|
||
public and private communications with associates and friends.
|
||
|
||
|
||
Importantly, prior to March l, 1990, and at all other times, there has
|
||
never been any basis for suspicion that any of the Plaintiffs have engag
|
||
in any criminal activity, violated any law, or attempted to communicate,
|
||
publish, or store any illegally obtained information or otherwise provid
|
||
access to any illegally obtained information or to solicit any informati
|
||
which was to be used illegally.
|
||
|
||
|
||
In October of 1988, Henry Kluepfel, Director of Network Security
|
||
Technology (an affiliate Bell Company), was advised a sensitive,
|
||
proprietary computer document of Bell South relating to Bell's "911
|
||
program" had been made available to the public on a computer bulletin
|
||
board in Illinois. Kluepfel reported this information to Bell South and
|
||
requested instructions, but received no response. In April of 1989,
|
||
Kluepfel confirmed the 911 Bell document was available on the Illinois
|
||
computer bulletin board and learned the document was additionally
|
||
available without any proprietary notice on at least another computer
|
||
bulletin board and had been or was being published in a computer bulleti
|
||
board newsletter in edited form. In July of 1989, Kluepfel was finally
|
||
instructed by Bell South to report the "intrusion of its computer
|
||
network to the Secret Service and that the document taken was "sensitive
|
||
and "proprietary. Kluepfel had previously worked with the Secret Service
|
||
and was known as an expert and reliable informant on computer "hacking."
|
||
F2 Thereafter, Kluepfel met Assistant U. S. Attorney William Cook in
|
||
Chicago and thereafter communicated with Cook and Secret Service Agent T
|
||
Foley. Agent Foley was in charge of this particular investigation.
|
||
|
||
|
||
Around February 6, l990, Kluepfel learned that the 911 document was
|
||
available on a computer billboard entitled "Phoenix" which was operated
|
||
Loyd Blankenship in Austin, Texas. Kluepfel "downloaded" the document to
|
||
put in readable form and then advised these facts to the Secret Service.
|
||
Prior to February 26, 1990, Kluepfel learned that Blankenship not only
|
||
operated the Phoenix bulletin board, but he was a user of the Illinois
|
||
bulletin board wherein the 911 document was first disclosed, was an
|
||
employee of Steve Jackson Games, Inc., and a user of the Steve Jackson
|
||
Games, Inc.'s bulletin board "Illuminati." Kluepfel's investigation also
|
||
determined that Blankenship was a 'co-sysop" of the Illuminati bulletin
|
||
board, which means that he had the ability to review anything on the
|
||
Illuminati bulletin board and, importantly, maybe able to delete anythin
|
||
on the system. Blankenship's bulletin board Phoenix had published "hacke
|
||
information and had solicited "hacker" information relating to passwords
|
||
ostensibly to be analyzed in some type of decryption scheme. By February
|
||
26, 1990, Kluepfel determined that the Phoenix bulletin board was no
|
||
longer accessible as he could not "dial" or "log into" it. He reported
|
||
this to Agent Foley. While Kluepfel advised Agent Foley that Blankenship
|
||
was an employee of Steve Jackson Games, Inc., and was a user and co-syso
|
||
of Illuminati, Kluepfel never had any information whereby he was
|
||
suspicious of any criminal activity by any of the Plaintiffs in this
|
||
cause. Kluepfel was, and is, knowledgeable in the operation of computers
|
||
computer bulletin boards, the publishing of materials and document by
|
||
computers, the communications through computer bulletin boards (both
|
||
public and private communications), and could have "logged" into the
|
||
Illuminati bulletin board at any time and reviewed all of the informatio
|
||
on the bulletin board except for the private communications referred to
|
||
the Plaintiffs as electronic communications or electronic mail, but did
|
||
not do so. Kluepfel had legitimate concerns, both about the 911 document
|
||
stolen from Bell South and the possibility of a decryption system which
|
||
could utilize passwords in rapid fashion and could result in intrusions
|
||
computer systems, including those of the Bell System.
|
||
|
||
|
||
In February of 1990, Agent Foley was also knowledgeable about computer
|
||
bulletin boards and he too could have "logged" into Illuminati, become a
|
||
user and reviewed all public communications on the bulletin board, but d
|
||
not do so.
|
||
|
||
|
||
By February 28, 1990, when the search warrant affidavit was executed,
|
||
Agent Foley had received information from reliable sources (Kluepfel,
|
||
Williams, Spain, Kibbler, Coutorie, and Niedorf, and possibly others F3)
|
||
there had been an unlawful intrusion on the Bell South computer program,
|
||
the 911 Bell South document was a sensitive and proprietary document, an
|
||
|
||
|