964 lines
47 KiB
Plaintext
964 lines
47 KiB
Plaintext
Date: Mon, 5 Apr 93 00:28:59 PDT
|
|
Reply-To: <surfpunk@osc.versant.com>
|
|
Return-Path: <cocot@osc.versant.com>
|
|
Message-ID: <surfpunk-0074@SURFPUNK.Technical.Journal>
|
|
Mime-Version: 1.0
|
|
Content-Type: text/plain
|
|
From: surfpunk@osc.versant.com (vaqvivqhny cnegl cynvagvss navznyf)
|
|
To: surfpunk@osc.versant.com (SURFPUNK Technical Journal)
|
|
Subject: [surfpunk-0074] OPINION: SGJ vs USSS
|
|
|
|
# A "hacker" is an individual who accesses
|
|
# another's computer system without authority.
|
|
#
|
|
# -- Sam Sparks United States District Judge
|
|
|
|
|
|
Sam Sparks settles it. Thanks to Mike Godwin <mnemonic@eff.org>
|
|
for spreading it around. It had three linefeeds in funny places;
|
|
removing them is all I did to it. strick
|
|
________________________________________________________________________
|
|
________________________________________________________________________
|
|
|
|
|
|
UNITED STATES DISTRICT COURT
|
|
WESTERN DISTRICT OF TEXAS
|
|
AUSTIN DIVISION
|
|
|
|
|
|
|
|
|
|
STEVE JACKSON GAMES
|
|
INCORPORATED, et al.,
|
|
Plaintiffs,
|
|
|
|
|
|
v.
|
|
|
|
|
|
UNITED STATES SECRET SERVICE, UNITED STATES OF AMERICA, et al., Defendants
|
|
|
|
|
|
|
|
|
|
_Opinion_
|
|
|
|
|
|
I. Facts
|
|
|
|
|
|
The issues remaining at trial in this lawsuit involves the Plaintiffs
|
|
Steve Jackson Games, Incorporated, Steve Jackson, Elizabeth McCoy, Walter
|
|
Milliken, and Steffan O'Sullivan's causes of action against the United
|
|
States Secret Service and the United States of America pursuant to three
|
|
statutes, "Private Protection Act", 42 U.S.C. 2000aa _et seq_.; "Wire and
|
|
Electronic Communications Interception and Interception of Oral
|
|
Communication' Act, 18 U.S.C. 2510, et seq.; and "Stored Wire and
|
|
Electronic Communications and Transactional Records Access" Act, 18 U.S.C
|
|
2701, _et seq_. All other issues and parties have been withdrawn by
|
|
agreement of these remaining parties.
|
|
|
|
|
|
The individual party plaintiffs are residents of the states of Texas and
|
|
New Hampshire, and the corporate plaintiff is a Texas corporation with its
|
|
principal place of business in Austin, Texas.
|
|
|
|
|
|
The Plaintiff Steve Jackson started Steve Jackson Games in 1980 and
|
|
subsequently incorporated his business. Steve Jackson Games, Incorporated,
|
|
publishes books, magazines, box games, and related products F1. More than
|
|
50 percent of the corporation's revenues are derived from its
|
|
publications. In addition, Steve Jackson Games, Incorporated, beginning in
|
|
the mid-1980s and continuing through this litigation, operated from one of
|
|
its computers an electronic bulletin board system called Illuminati. This
|
|
bulletin board posts information to the inquiring public about Steve
|
|
Jackson Games' products and activities; provides a medium for receiving
|
|
and passing on information from the corporation's employees, writers,
|
|
customers, and its game enthusiasts; and, finally, affords its users
|
|
electronic mail whereby, with the use of selected passwords, its users can
|
|
send and receive electronic mail (E-mail) in both public and private
|
|
modes. In February of 1990, there were 365 users of the Illuminati
|
|
bulletin board.
|
|
|
|
|
|
Steve Jackson was both the owner and employee of Steve Jackson Games,
|
|
Incorporated, and authored many of its publications; he used both
|
|
Illuminati's public and private programs for electronic mail and his use
|
|
ranged from business records of the corporation, contracts with his
|
|
writers, communication with his writers regarding articles which were
|
|
intended to be published by the corporation, to private communications
|
|
with his business associates and friends. Elizabeth McCoy's use of the
|
|
Illuminati bulletin board involved her participation as a game player, her
|
|
critiques as to the games and publications of the corporation, and her
|
|
private communications with associates and friends. William Milliken's use
|
|
of the Illuminati bulletin board was apparently limited to private
|
|
communicates to associates and friends. Steffan O'Sullivan's use of the
|
|
Illuminati bulletin board included writings for publication by Steve
|
|
Jackson Games, Inc., his business dealings with the corporation, and
|
|
public and private communications with associates and friends.
|
|
|
|
|
|
Importantly, prior to March l, 1990, and at all other times, there has
|
|
never been any basis for suspicion that any of the Plaintiffs have engaged
|
|
in any criminal activity, violated any law, or attempted to communicate,
|
|
publish, or store any illegally obtained information or otherwise provide
|
|
access to any illegally obtained information or to solicit any information
|
|
which was to be used illegally.
|
|
|
|
|
|
In October of 1988, Henry Kluepfel, Director of Network Security
|
|
Technology (an affiliate Bell Company), was advised a sensitive,
|
|
proprietary computer document of Bell South relating to Bell's "911
|
|
program" had been made available to the public on a computer bulletin
|
|
board in Illinois. Kluepfel reported this information to Bell South and
|
|
requested instructions, but received no response. In April of 1989,
|
|
Kluepfel confirmed the 911 Bell document was available on the Illinois
|
|
computer bulletin board and learned the document was additionally
|
|
available without any proprietary notice on at least another computer
|
|
bulletin board and had been or was being published in a computer bulletin
|
|
board newsletter in edited form. In July of 1989, Kluepfel was finally
|
|
instructed by Bell South to report the "intrusion of its computer
|
|
network to the Secret Service and that the document taken was "sensitive"
|
|
and "proprietary. Kluepfel had previously worked with the Secret Service
|
|
and was known as an expert and reliable informant on computer "hacking."
|
|
F2 Thereafter, Kluepfel met Assistant U. S. Attorney William Cook in
|
|
Chicago and thereafter communicated with Cook and Secret Service Agent Tim
|
|
Foley. Agent Foley was in charge of this particular investigation.
|
|
|
|
|
|
Around February 6, l990, Kluepfel learned that the 911 document was
|
|
available on a computer billboard entitled "Phoenix" which was operated by
|
|
Loyd Blankenship in Austin, Texas. Kluepfel "downloaded" the document to
|
|
put in readable form and then advised these facts to the Secret Service.
|
|
Prior to February 26, 1990, Kluepfel learned that Blankenship not only
|
|
operated the Phoenix bulletin board, but he was a user of the Illinois
|
|
bulletin board wherein the 911 document was first disclosed, was an
|
|
employee of Steve Jackson Games, Inc., and a user of the Steve Jackson
|
|
Games, Inc.'s bulletin board "Illuminati." Kluepfel's investigation also
|
|
determined that Blankenship was a 'co-sysop" of the Illuminati bulletin
|
|
board, which means that he had the ability to review anything on the
|
|
Illuminati bulletin board and, importantly, maybe able to delete anything
|
|
on the system. Blankenship's bulletin board Phoenix had published "hacker"
|
|
information and had solicited "hacker" information relating to passwords,
|
|
ostensibly to be analyzed in some type of decryption scheme. By February
|
|
26, 1990, Kluepfel determined that the Phoenix bulletin board was no
|
|
longer accessible as he could not "dial" or "log into" it. He reported
|
|
this to Agent Foley. While Kluepfel advised Agent Foley that Blankenship
|
|
was an employee of Steve Jackson Games, Inc., and was a user and co-sysop
|
|
of Illuminati, Kluepfel never had any information whereby he was
|
|
suspicious of any criminal activity by any of the Plaintiffs in this
|
|
cause. Kluepfel was, and is, knowledgeable in the operation of computers,
|
|
computer bulletin boards, the publishing of materials and document by
|
|
computers, the communications through computer bulletin boards (both
|
|
public and private communications), and could have "logged" into the
|
|
Illuminati bulletin board at any time and reviewed all of the information
|
|
on the bulletin board except for the private communications referred to by
|
|
the Plaintiffs as electronic communications or electronic mail, but did
|
|
not do so. Kluepfel had legitimate concerns, both about the 911 document
|
|
stolen from Bell South and the possibility of a decryption system which
|
|
could utilize passwords in rapid fashion and could result in intrusions of
|
|
computer systems, including those of the Bell System.
|
|
|
|
|
|
In February of 1990, Agent Foley was also knowledgeable about computer
|
|
bulletin boards and he too could have "logged" into Illuminati, become a
|
|
user and reviewed all public communications on the bulletin board, but did
|
|
not do so.
|
|
|
|
|
|
By February 28, 1990, when the search warrant affidavit was executed,
|
|
Agent Foley had received information from reliable sources (Kluepfel,
|
|
Williams, Spain, Kibbler, Coutorie, and Niedorf, and possibly others F3)
|
|
there had been an unlawful intrusion on the Bell South computer program,
|
|
the 911 Bell South document was a sensitive and proprietary document, and
|
|
that computer hackers were attempting to utilize a decryption procedure
|
|
whereby unlawful intrusions could be made to computer programs including
|
|
the Defense Department, and these hackers were soliciting passwords so
|
|
that the decryption procedure could become operational. In addition, Agent
|
|
Foley was advised Loyd Blankenship had operated his Phoenix bulletin board
|
|
from his home, had published the 911 Bell South document in edited form,
|
|
and had published and communicated that a decryption strategy was
|
|
available and other "hackers" should submit selective passwords to
|
|
finalize the decryption scheme for intrusions into computer systems by
|
|
using a rapid deployment of passwords. Agent Foley was also advised that
|
|
Blankenship was an employee of Steve Jackson Games and had access to the
|
|
Illuminati bulletin board as a user and a co-sysop and he may well (and in
|
|
fact did) have the ability to delete any documents or information in the
|
|
Steve Jackson Games computers and Illuminati bulletin board. The only
|
|
information Agent Foley had regarding Steve Jackson Games, Inc. and Steve
|
|
Jackson was that he thought this was a company that put out games, but he
|
|
also reviewed a printout of Illuminati on February 25, 1990, which read,
|
|
"Greetings, Mortal! You have entered the secret computer system of the
|
|
Illuminati, the on-line home of the world's oldest and largest secret
|
|
conspiracy. 5124474449300/1200/2400BAUD fronted by Steve Jackson Games,
|
|
Incorporated. Fnord." The evidence in this case strongly suggests Agent
|
|
Foley, without any further investigation, misconstrued this information to
|
|
believe the Illuminati bulletin board was similar in purpose to
|
|
Blankenship's Phoenix bulletin board, which provided information to and
|
|
was used by "hackers." Agent Foley believed, in good faith, at the time of
|
|
the execution of his affidavit on February 28, 1990, there was probable
|
|
cause to believe Blankenship had the 911 Bell South document and
|
|
information relating to the decryption scheme stored in his computer at
|
|
home or perhaps in computers, disks, or in the Illuminati bulletin board
|
|
at his place of employment at Steve Jackson Games, Inc.; that these
|
|
materials were involved in criminal activities; and that Blankenship had
|
|
the ability to delete any information stored on any of these computers
|
|
and/or disks.
|
|
|
|
|
|
Unfortunately, although he was an attorney and expressly represented this
|
|
fact in his affidavit, Agent Foley was not aware of the Privacy Protection
|
|
Act, 42 U.S.C. 2000aa _et seq._, and he conducted no investigation about
|
|
Steve Jackson Games, Incorporated, although a reasonable investigation of
|
|
only several hours would have revealed Steve Jackson Games, Inc. was, in
|
|
fact, a legitimate publisher of information to the public and Mr. Jackson
|
|
would have cooperated in the investigation. Agent Foley did not know the
|
|
individual Plaintiffs but did know they were users of Illuminati as he had
|
|
a list of all users prior to February 28, 1990. Agent Foley did know and
|
|
understand the Illuminati bulletin board would have users and probably
|
|
would have stored private electronic communications between users.
|
|
Notwithstanding the failure of any investigation regarding Steve Jackson
|
|
Games, Agent Foley and Assistant U. S. Attorney Cook intended to seize and
|
|
review all of the information and documents in any computer accessible to
|
|
Blankenship, regardless of what other incidental information would be
|
|
seized. These intentions were expressly stated in their application for a
|
|
search warrant and the warrant itself. F4
|
|
|
|
|
|
Foley's affidavit, executed on February 28, 1990, was sufficient under the
|
|
law for the issuance of a search warrant by the United States Magistrate
|
|
Judge. The Court does not find from a preponderance of the evidence that
|
|
the admitted errors in Foley's affidavit were intentional and so material
|
|
to make the affidavit and issuance of the warrant legally improper. _See,
|
|
Franks v. Delaware_, 438 U.S. 154, 98 S.Ct. 2674 (1978). The factual
|
|
errors in the affidavit include the Bell 911 document was a computer
|
|
program; the Bell 911 document was engineered at a cost of $79,449; the
|
|
Bell 911 document had been "slightly" edited; articles in _Phrack_ were
|
|
described as "hacker tutorials;" the Bell 911 document published in Phrack
|
|
contained a proprietary notice; Blankenship was a computer programmer for
|
|
Steve Jackson Games, Inc.; Blankenship's alias "Mentor" was listed as an
|
|
Illuminati bulletin board user; Coutorie, prior to February 28, 1990,
|
|
provided Foley with information on Steve Jackson Games, Inc.; and that
|
|
Kluepfel had "logged" into Illuminati. The affidavit and warrant
|
|
preparation was simply sloppy and not carefully done. Therefore, the Court
|
|
denies the Plaintiff's contentions relating to the alleged improprieties
|
|
involved in the issuance of the search warrant.
|
|
|
|
|
|
On March 1, 1990, Agents Foley and Golden executed the search warrant. At
|
|
the time of the execution, each agent had available computer experts who
|
|
had been flown to Austin to advise and review the stored information in
|
|
the computers, the bulletin boards, and disks seized. These computer
|
|
experts certainly had the ability to review the stored information and,
|
|
importantly, to copy all information contained in the computers and disks
|
|
within hours.
|
|
|
|
|
|
During the search of Steve Jackson Games and the seizure of the three
|
|
computers, over 300 computer disks, and other materials, Agent Golden was
|
|
orally advised by a Steve Jackson Games, Inc. Employee that Steve Jackson
|
|
Games, Inc. was in the publishing business. Unfortunately, Agent Golden,
|
|
like Foley, was unaware of the Privacy Protection Act and apparently
|
|
attached no significance to this information. The evidence is undisputed
|
|
that Assistant U. S. Attorney Cook would have stopped the search at the
|
|
time of this notification had he been contacted.
|
|
|
|
|
|
By March 2, 1990, Agent Foley knew Steve Jackson Games, Inc. was in the
|
|
publishing business and the seizure included documents intended for
|
|
publication to the public, including a book and other forms of
|
|
information. He also knew or had the ability to learn the seizure of the
|
|
Illuminati bulletin board included private and public electronic
|
|
communications and E-mail. By March 2, 1990, Agent Foley knew that Steve
|
|
Jackson Games, Incorporated, and its attorneys in Dallas and Austin, were
|
|
requesting the immediate return of the properties and information seized,
|
|
that transcripts of publications and the back-up materials had been
|
|
seized, and that the seizure of the documents, including business records
|
|
of Steve Jackson Games, Inc., and their back-up was certain to
|
|
economically damage Steve Jackson Games, Inc. While Agent Foley had a
|
|
legitimate concern there might be some type of program designed to delete
|
|
the materials, documents, or stored information he was seeking, he admits
|
|
there was no valid reason why all information seized could not have been
|
|
duplicated and returned to Steve Jackson Games _within a period of hours
|
|
and no more than eight days_ from the seizure. In fact, it was months
|
|
(late June 1990) before the majority of the seized materials was returned.
|
|
Agent Foley simply was unaware of the law and erroneously believed he had
|
|
substantial criminal information which obviously was not present, as to
|
|
date, no arrests or criminal charges have ever been filed against anyone,
|
|
including Blankenship.
|
|
|
|
|
|
In addition, Agent Foley must have known his seizure of computers,
|
|
printers, disks and other materials and his refusal to provide copies
|
|
represented a risk of substantial harm to Steve Jackson Games, Inc. --
|
|
under circumstances where he had no reason to believe the corporation or
|
|
its owner was involved in criminal activity.
|
|
|
|
|
|
The Secret Service denies that its personnel or its delegates read the
|
|
private electronic communications stored in the seized materials and
|
|
specifically allege that this information was reviewed by use of key
|
|
search words only. Additionally, the Secret Service denies the deletion of
|
|
any information seized with two exceptions of sensitive" or "illegal"
|
|
information, the deletion of which was consented to by Steve Jackson.
|
|
However, the preponderance of the evidence, including common sense F5,
|
|
establishes that the Secret Service personnel or its delegates did read
|
|
all electronic communications seized and did delete certain information
|
|
and communications in addition to the two documents admitted deleted. The
|
|
deletions by the Secret Service, other than the two documents consented to
|
|
by Steve Jackson, were done without consent and cannot be justified.
|
|
|
|
|
|
By March 2, 1990, Agent Foley, Agent Golden, and the Secret Service, if
|
|
aware of the Privacy Protection Act, would have known that they had, by a
|
|
search warrant, seized work products of materials from a person or entity
|
|
reasonably believed to have a purpose to disseminate to the public a
|
|
"book" or "similar form of public communication."
|
|
|
|
|
|
The failure of the Secret Service after March 1, 1990, to -- promptly --
|
|
return the seized products of Steve Jackson Games, Incorporated cannot be
|
|
justified and unquestionably caused economic damage to the corporation.
|
|
|
|
|
|
By March 1, 1990, Steve Jackson Games, Incorporated was apparently
|
|
recovering from acute financial problems and suffering severe cash flow
|
|
problems. The seizure of the work product and delays of publication,
|
|
whether by three weeks or several months, directly impacted on Steve
|
|
Jackson Games, Incorporated. Eight employees were terminated because they
|
|
could not be paid as revenues from sales came in much later than expected.
|
|
However, it is also clear from a preponderance of the evidence that after
|
|
the calendar year 1990, the publicity surrounding this seizure and the
|
|
nature of the products sold by Steve Jackson Games, Incorporated had the
|
|
effect of increasing, not decreasing, sales. In fact, Steve Jackson Games,
|
|
Incorporated developed a specific game for sale based upon the March 1,
|
|
1990, seizure. The Court declines to find from a preponderance of the
|
|
evidence there was any economic damage to Steve Jackson Games,
|
|
Incorporated after the calendar year 1990 as a result of the seizure of
|
|
March 1, 1990. F6
|
|
|
|
|
|
As a result of the seizure of March 1, 1990, and the retention of the
|
|
equipment and documents seized, Steve Jackson Games, Incorporated
|
|
sustained out-of-pocket expenses of $8,781.00. The personnel at this
|
|
corporation had to regroup, rewrite, and duplicate substantial prior
|
|
efforts to publish the book _Gurps Cyberpunk_ and other documents stored
|
|
in the computers and the Illuminati bulletin board, explain to their
|
|
clientele and users of the bulletin board the difficulties of their
|
|
continuing business to maintain their clientele, to purchase or lease
|
|
substitute equipment and supplies, to re-establish the bulletin board, and
|
|
to get the business of Steve Jackson Games, Inc. back in order. The Court
|
|
has reviewed the evidence regarding annual sales and net income of Steve
|
|
Jackson Games, Incorporated for 1990 and the years before and after and
|
|
finds from a preponderance of the evidence there was a 6 percent loss of
|
|
sales in 1990 due to the seizure and related problems. The evidence was
|
|
undisputed that there was a 42 percent profit on sales of publications of
|
|
Steve Jackson Games, Incorporated. Thus, Steve Jackson Games, Incorporated
|
|
sustained damages in loss of sales in 1990 of $100,617.00 for a loss of
|
|
profit of $42,259.00 as a direct and proximate result of the seizure of
|
|
March 1, 1990, and the retention of the documents seized. After 1990, the
|
|
net sales of Steve Jackson Games, Incorporated continued to increase
|
|
annually in a traditional proportion as the sales had been increasing from
|
|
1988. Thus, from a preponderance of the evidence, the loss of $42,259.00
|
|
is consistent with the net income figures of Steve Jackson Games,
|
|
Incorporated in the years immediately following and preceding 1990.
|
|
|
|
|
|
Regarding damages to Steve Jackson, personally, his own testimony is that
|
|
by 1990 he was becoming more active in the management of Steve Jackson
|
|
Games, Incorporated, and spending less time in creative pursuits such as
|
|
writing. Steve Jackson Games, Incorporated was in such financial condition
|
|
that Chapter 11 proceedings in bankruptcy were contemplated. Thereafter,
|
|
the testimony clearly established that Steve Jackson Games reasserted
|
|
himself in management and was spending substantial time managing the
|
|
corporation. The Court declines to find from a preponderance of the
|
|
evidence that Steve Jackson personally sustained any compensatory damages
|
|
as a result of the conduct of the United States Secret Service.
|
|
|
|
|
|
Elizabeth McCoy, Walter Milliken and Steffan O'Sullivan also allege
|
|
compensatory damages. These Plaintiffs all had stored electronic
|
|
communications, or E-mail, on the Illuminati bulletin board at the time of
|
|
seizure. All three of these Plaintiffs testified that they had public and
|
|
private communications in storage at the time of the seizure. Steve
|
|
Jackson, Elizabeth McCoy, Walter Milliken and Steffan O'Sullivan all
|
|
testified that following June of 1990 some of their stored electronic
|
|
communications, or E-mail, had been deleted. It is clear, as hereinafter
|
|
set out, that the conduct of the United States Secret Service violated two
|
|
of the three statutes which the causes of action of the Plaintiffs are
|
|
based and, therefore, there are statutory damages involved, but the Court
|
|
declines to find from a preponderance of the evidence that any of the
|
|
individual Plaintiffs sustained any compensatory damages.
|
|
|
|
|
|
II.
|
|
|
|
|
|
a.
|
|
|
|
|
|
PRIVACY PROTECTION ACT
|
|
|
|
|
|
(First Amendment Privacy Protection)
|
|
|
|
|
|
42 U.S.C. 2000aa et seq.
|
|
|
|
|
|
The United States Secret Service, by Agent Foley and Assistant United
|
|
States Attorney Cox, sought and obtained an order from a United States
|
|
Magistrate Judge to _search_ for and _seize_ and thereafter _read_ the
|
|
information stored and contained in "computer hardware (including, but not
|
|
limited to, central processing unit(s) monitors, memory devices, modem(s),
|
|
programming equipment, communication equipment, disks, and printers) and
|
|
computer software (including, but not limited to) memory disks, floppy
|
|
disks, storage media) and written material and documents relating to the
|
|
use of the computer system (including network access files), documentation
|
|
relating to the attacking of computers and advertising the results of
|
|
computer attacks (including telephone numbers and location information),
|
|
and financial documents and licensing documentation relative to the
|
|
compute programs and equipment at the business known as Steve Jackson
|
|
Games which constitute evidence, instrumentalities, and fruits of federal
|
|
crimes, including interstate transportation of stolen property (18 U.S.C.
|
|
2314) and interstate transportation of computer access information (18
|
|
U.S.C. 1030(a)(6)).' See, Warrant Application and Order.
|
|
|
|
|
|
On March 1, 1990, the Secret Service seized the following property on the
|
|
premises of Steve Jackson Games, Inc.: Compuadd keyboard; Packard-Bell
|
|
monitor; DKT computer; cardboard box containing disks, miscellaneous
|
|
papers and circuit boards; Splat Master gun with "Mentor" on barrel;
|
|
Hewlett-Packard laser jet printer; BTC keyboard with cover; IBM personal
|
|
computer 5150 (disassembled); Seagate Tech hard disk; 2400 modem 1649-1795
|
|
with power supply and disk; IBM keyboard; Amdek mode 310A; bulletin board
|
|
back-up files (approximately 150); Empac International Corporation XT
|
|
computer; "WWIV" users manual; red box of floppy disks; miscellaneous
|
|
papers and notes from desk; floppy disk entitled "Phoenix setup." _See_,
|
|
Warrant Return.
|
|
|
|
|
|
The evidence establishes the actual information seized, including both the
|
|
primary source and back-up materials of the draft of _Gurps Cyberpunk_, a
|
|
book intended for immediate publication (within days to weeks), drafts of
|
|
magazine and magazine articles to be published, business records of Steve
|
|
Jackson Games, Incorporated (including contracts and drafts of articles by
|
|
writers of Steve Jackson Games, Incorporated), the Illuminati bulletin
|
|
board and its contents (including public announcements, published
|
|
newsletter articles submitted to the public for review, public comment on
|
|
the articles submitted and electronic mail containing both private and
|
|
public communications). Notwithstanding over 300 floppy disks being
|
|
seized, the evidence introduced during trial was not clear as to what
|
|
additional information was seized during the search warrant execution.
|
|
However, the evidence is clear that on March 1, 1990, "work product
|
|
materials," as defined in 42 U.S.C. 2000aa-7(b), was obtained as well as
|
|
materials constituting "documentary materials" as defined in the same
|
|
provision. F7
|
|
|
|
|
|
The Privacy Protection Act, 42 U.S.C. 2000aa, dictates: "Notwithstanding
|
|
any other law, it shall be unlawful for a government officer or employee,
|
|
in connection with the investigation . . . of a criminal offense to search
|
|
for or seize any work product materials possessed by a person reasonably
|
|
believed to have a purpose to disseminate to the public a newspaper,
|
|
broadcast, or other similar form of public communication . . . ." _See_,
|
|
42 U.S.C. Sec. 2000aa(a).
|
|
|
|
|
|
Assuming Agent Foley was knowledgeable of the Privacy Protection Act
|
|
(which he was not), neither he nor Assistant United States Attorney Cox
|
|
had any information which would lead them to believe that Steve Jackson
|
|
Games, Incorporated published books and materials and had a purpose to
|
|
disseminate to the public its publications. Their testimony is simply they
|
|
thought it a producer of games. As heretofore stated, the Court feels
|
|
Agent Foley failed to make a reasonable investigation of Steve Jackson
|
|
Games, Incorporated when it was apparent his intention was to take
|
|
substantial properties belonging to the corporation, the removal of which
|
|
could have a substantial effect on the continuation of business. Agent
|
|
Foley, it appears, in his zeal to obtain evidence for the criminal
|
|
investigation, simply concluded Steve Jackson Games, Incorporated was
|
|
somehow involved in Blankenship's alleged activities because of the
|
|
wording of the Illuminati bulletin board menu. In any event, the Court
|
|
declines to find from a preponderance of the evidence that on March 1,
|
|
1990, Agent Foley or any other employee or agent of the United States had
|
|
reason to believe that property seized would be the work product materials
|
|
of a person believed to have a purpose to disseminate to the public a
|
|
newspaper, book, broadcast or other similar form of public communication.
|
|
F8
|
|
|
|
|
|
During the search on March 1, and on March 2, 1990, the Secret Service was
|
|
specifically advised of facts that put its employees on notice of probable
|
|
violations of the Privacy Protection Act. It is no excuse that Agents
|
|
Foley and Golden were not knowledgeable of the law. On March 2, 1990, and
|
|
thereafter, the conduct of the United States Secret Service was in
|
|
violation of 42 U.S.C. 2000aa _et seq_. It is clear the Secret Service
|
|
continued the seizure of property of Steve Jackson Games, Incorporated
|
|
including information and documents through late June of 1990. Immediate
|
|
arrangements could and should have been made on March 2, 1990, whereby
|
|
copies of all information seized could have been made. The government
|
|
could and should have requested Steve Jackson as chief operating officer
|
|
of the corporation to cooperate and provide the information available
|
|
under the law. The Secret Service's refusal to return information and
|
|
property requested by Mr. Jackson and his lawyers in Dallas and Austin
|
|
constituted a violation of the statute. Regarding any information seized
|
|
that would constitute "documentary materials" (whereby the defensive
|
|
theory of 42 U.S.C. 2000aa(b)(3) might apply) there would have been no
|
|
problem as the property was in the possession of the United States Secret
|
|
Service and their experts and Steve Jackson were present to ensure no
|
|
destruction, alteration or concealment of information contained therein.
|
|
In any event, it is the seizure of the "work product materials" that leads
|
|
to the liability of the United States Secret Service and the United States
|
|
in this case. Pursuant to 42 U.S.C. 2000aa-6, the Court finds from a
|
|
preponderance of the evidence that Steve Jackson Games, Incorporated is
|
|
entitled to judgment against the United States Secret Service and the
|
|
United States of America for its expenses of $8,781.00 and its economic
|
|
damages of $42,259.00. The Court declines to find from a preponderance of
|
|
the evidence other damages of Steve Jackson Games, Incorporated or
|
|
liability of the United States Secret Service or the United States of
|
|
America to any other Plaintiff under the provisions of the Privacy
|
|
Protection Act.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
b.
|
|
|
|
|
|
WIRE AND ELECTRONIC COMMUNICATIONS INTERCEPTION
|
|
AND INTERCEPTION OF ORAL COMMUNICATIONS
|
|
18 U.S.C. 2510 et seq.
|
|
|
|
|
|
The Plaintiffs allege the United States Secret Service's conduct also
|
|
violated 18 U.S.C. 2510, et seq., as it constituted intentional
|
|
interceptions of "electronic communication." They allege the interception
|
|
occurred at the time of seizure or, perhaps, at the time of review of the
|
|
communication subsequent to the seizure. There is no question the
|
|
individual Plaintiffs had private communications stored in Illuminati at
|
|
the time of the seizure and the court has found from a preponderance of
|
|
the evidence the Secret Service intended not only to seize and read these
|
|
communications, but, in fact, did read the communications and thereafter
|
|
deleted or destroyed some communications either intentionally or
|
|
accidentally. The Defendants contend there is no violation of this
|
|
particular statute under the facts of this case because there never was
|
|
any unlawful "interception" within the meaning of the statute.
|
|
Alternatively, the Defendants contend that the "good faith reliance" on
|
|
the search warrant issued by the United States Magistrate Judge is a
|
|
complete defense under Section 2520.
|
|
|
|
|
|
The Government relies on the 1976 Fifth Circuit case of the _United States
|
|
v. Turk_, 526 F.2d 654 (5th Cir. 1976), _cert denied_, 429 U.S. 823, 97
|
|
S.Ct. 74 (1976), and its interpretation of the statutory definition of
|
|
"interception." In _Turk_, police officers listened to the contents of a
|
|
cassette tape without first obtaining a warrant. The court concluded this
|
|
was not an "interception" under 18 U.S.C. Sec. 2510 et seq.
|
|
|
|
|
|
>>Whether the seizure and replaying of the cassette tape by the officers
|
|
was also an "interception" depends on the definition to be given "aural
|
|
acquisition.' Under one conceivable reading, and 'aural acquisition" could
|
|
be said to occur whenever someone physically hears the contents of a
|
|
communication, and thus the use of the tape player by the officers to hear
|
|
the previously recorded conversation might fall within the definition set
|
|
out above. No explicit limitation of coverage to contemporaneous
|
|
"acquisitions" appears in the Act.
|
|
|
|
|
|
>>We believe that a different interpretation -- one which would exclude
|
|
from the definition of "intercept" the replaying of a previously recorded
|
|
conversation -- has a much firmer basis in the language of Sec. 2510(4)
|
|
and in logic, and corresponds more closely to the policies reflected in
|
|
the legislative history. The words acquisition... through the use of any
|
|
... device" suggest that the central concern is with the activity engaged
|
|
in a the time of the oral communication which causes such communication to
|
|
be overheard by uninvited listeners. If a person secrets a recorder in a
|
|
room and thereby records a conversation between two others, an
|
|
"acquisition" occurs at the time the recording is made. This acquisition
|
|
itself might be said to be "aural" because the contents of the
|
|
conversation are preserved in 2 form which permits the later aural
|
|
disclosure of the contents. Alternatively, a court facing the issue might
|
|
conclude that an "aural acquisition" is accomplished only when two steps
|
|
are completed -- the initial acquisition by the device and the hearing of
|
|
the communication by the person or persons responsible for the recording.
|
|
Either of these definitions would require participation by the one charged
|
|
with an "interception" in the contemporaneous acquisition of the
|
|
communication through the use to the device. The argument that a new and
|
|
different aural acquisition" occurs each time a recording of an oral
|
|
communication is replayed is unpersuasive. That would mean that
|
|
innumerable "interceptions," and thus violations of the Act, could follow
|
|
from a single recording .
|
|
|
|
|
|
_Id._, at 657-658 (footnotes omitted). While the Fifth Circuit authority
|
|
relates to the predecessor statute, Congress intended no change in the
|
|
existing definition of 'intercept" in amending the statute in 1986. _See_,
|
|
S. Rep. No. 541, 99th Cong., 2nd Sess. 13 (1986), _reprinted in_ 1986
|
|
U.S.C.C.A.N. 3555, 3567 ("Section 101(a)(3) of the ELECTRONIC
|
|
COMMUNICATIONS PRIVACY ACT amends the definition of the term "intercept"
|
|
in current section 2510(4) of electronic communications. The definition of
|
|
"intercept" under current law is retained with respect to wire and oral
|
|
communications except that the term "or other" is inserted after "aural."
|
|
This amendment clarifies that it is illegal to intercept the non-voice
|
|
portion of a wire communication."). The Court finds this argument
|
|
persuasive when considering the Congressional enactment of the Stored Wire
|
|
and Electronic Communications and Transactional Records Access Act, 18
|
|
U.S.C. 2701, _et seq_.
|
|
|
|
|
|
The Court declines to find liability for any Plaintiff against the
|
|
Defendants pursuant to the Wire and Electronic Communications Interception
|
|
and Interception of Oral Communications Act, 18 U.S.C. 2510, et seq., and
|
|
specifically holds that the alleged "interceptions" under the facts of
|
|
this case are not 'interceptions contemplated by the Wire and Electronic
|
|
Communications Interception and Interception of Oral Communications Act.
|
|
It simply has no applicability to the facts of this case.
|
|
|
|
|
|
c.
|
|
|
|
|
|
STORED WIRE AND ELECTRONIC COMMUNICATIONS
|
|
AND TRANSACTIONAL RECORDS ACCESS
|
|
18 U.S.C. Sec. 2701 et seq.
|
|
|
|
|
|
Prior to February 28, 1990, Agent Foley, Assistant United States Attorney
|
|
Cox, and the computer consultants working with them were cognizant of
|
|
public computer bulletin boards and the use of electronic communications
|
|
and E-mail through them. Each of the persons involved in this
|
|
investigation, including Agent Foley, had the knowledge and opportunity to
|
|
log into the Illuminati bulletin board, review its menu and user lists,
|
|
obtain passwords, and thereafter review all information available to the
|
|
public. In fact, Agent Foley erroneously thought Kluepfel had done this
|
|
when a printout of Illuminati documents dated February 25, 1990, was
|
|
recieved. When Foley applied for the search warrant on February 28, 1990,
|
|
he knew the Illuminati bulletin board provided services to the public
|
|
whereby its users could store public and private electronic
|
|
communications. While Foley admits no knowledge of the Privacy Protection
|
|
Act and its provisions protecting publishers of information 'o the public,
|
|
he testified he was knowledgeable regarding the Wire and Electronic
|
|
Communications Interception and Interception of Oral Communications Act.
|
|
But, Foley never thought of the law's applicability under the facts of
|
|
this case. Steve Jackson Games, Inc., through its Illuminati bulletin
|
|
board services, was a "remote computing service" within the definition of
|
|
Section 2711, and, therefore, the only procedure available to the Secret
|
|
Service to obtain _"disclosure"_ of the contents of electronic
|
|
communications was to comply with this statute. _See_, 18 U.S.C. 2703.
|
|
Agent Foley and the Secret Service, however, wanted more than "disclosure'
|
|
of the contents of the communication. As the search warrant application
|
|
evidences, the Secret Service wanted _seizure_ of all information and the
|
|
authority to review and read all electronic communications, both public
|
|
and private. A court order for such disclosure is only to issue if "there
|
|
is a reason to believe the contents of a[n] . . . electronic communication
|
|
. . . are relevant to a legitimate law enforcement inquiry." _See_, 18
|
|
U.S.C. Sec. 2703(d). Agent Foley did not advise the United States
|
|
Magistrate Judge, by affidavit or otherwise, that the Illuminati bulletin
|
|
board contained private electronic communications between users or how the
|
|
disclosure of the content of these communications could relate to his
|
|
investigation. Foley's only knowledge was that Blankenship had published
|
|
part of the 911 document and decryption information in his Phoenix
|
|
bulletin board, was employed at Steve Jackson Games, Inc., and could have
|
|
the ability to store and delete these alleged unlawful documents in the
|
|
computers or Illuminati bulletin board at Steve Jackson Games,
|
|
Incorporated. At Agent Foley's specific request, the application and
|
|
affidavit for the search warrant were sealed. The evidence establishes the
|
|
Plaintiffs were not able to ascertain the reasons for the March 1, 1990
|
|
seizure until after the return of most of the property in June of 1990,
|
|
and then only by the efforts of the offices of both United States Senators
|
|
of the State of Texas. The procedures followed by the Secret Service in
|
|
this case virtually eliminated the safeguards contained in the statute.
|
|
For example, no Plaintiff was on notice that the search or seizure order
|
|
was made pursuant to this statute and that Steve Jackson Games,
|
|
Incorporated could move to quash or modify the order or eliminate or
|
|
reduce any undue burden on it by reason of the order. _See_, 18 U.S.C.
|
|
Sec. 2703(d). The provisions of the statute regarding the preparation of
|
|
back-up copies of the documents or information seized were never utilized
|
|
or available. _See_, 18 U.S.C. Sec. 2704. Agent Foley stated his concern
|
|
was to prevent the destruction of the documents' content and for the
|
|
Secret Service to take the time necessary to carefully review all of the
|
|
information seized. He feared Blankenship could possibly delete the
|
|
incriminating documents or could have programmed destruction in some
|
|
manner. Notwithstanding that any alteration or destruction by Blankenship,
|
|
Steve Jackson, or anyone else would constitute a criminal offense under
|
|
this statute, Foley and the Secret Service seized -- not just obtained
|
|
disclosure of the content -- all of the electronic communications stored
|
|
in the Illuminati bulletin board involving the Plaintiffs in this case.
|
|
This conduct exceeded the Government's authority under the statute.
|
|
|
|
|
|
The Government Defendants contend there is no liability for alleged
|
|
violation of the statute as Foley and the Secret Service had a "good
|
|
faith" reliance on the February 28, 1990, court order/search warrant. The
|
|
Court declines to find this defense by a preponderance of the evidence in
|
|
this case.
|
|
|
|
|
|
Steve Jackson Games, Incorporated, as the provider and each individual
|
|
Plaintiffs as either subscribers or customers were "aggrieved" by the
|
|
conduct of the Secret Service in the violation of this statute. While the
|
|
Court declines to find from a preponderance of the credible evidence the
|
|
compensatory damages sought by each Plaintiff, the Court will assess the
|
|
statutory damages of $1,000.00 for each Plaintiff.
|
|
|
|
|
|
III. SUMMARY
|
|
|
|
|
|
This is a complex case. It is still not clear how sensitive and/or
|
|
proprietary the 911 document. was (2nd is) or how genuinely harmful the
|
|
potential decryption scheme may have been or if either were discovered by
|
|
the Secret Service in the information seized on March 1, 1990. The fact
|
|
that no criminal charges have ever been filed and the investigation
|
|
remains "on going" is, of course, not conclusive.
|
|
|
|
|
|
The complexity of this case results from the Secret Service's insufficient
|
|
investigation and its lack of knowledge of the specific laws that could
|
|
apply to their conduct on February 28, 1990 and thereafter. It appears
|
|
obvious neither the government employees no- the Plaintiffs or their
|
|
lawyers contemplated the statute upon which this case is brought back in
|
|
February, March, April, May or June of 1990. But this does not provide
|
|
assistance to the defense of the case. The Secret Service and its
|
|
personnel are the entities that citizens, like each of the Plaintiffs,
|
|
rely upon and look to protect their rights and properties. The Secret
|
|
Service conduct resulted in the seizure of property, products, business
|
|
records, business documents, and electronic communications of a
|
|
corporation and four individual citizens that the statutes were intended
|
|
to protect.
|
|
|
|
|
|
It may well be, as the Government Defendants contend, these statutes
|
|
relied upon by the Plaintiffs should not apply to the facts of this case,
|
|
as these holdings may result in the government having great difficulties
|
|
in obtaining information or computer documents -representing illegal
|
|
activities. But this Court cannot amend or rewrite the statutes involved.
|
|
The Secret Service must go to the Congress for relief. Until that time,
|
|
this Court recommends better education, investigation and strict
|
|
compliance with the statutes as written.
|
|
|
|
|
|
The Plaintiffs are ordered to submit application for attorney's fees and
|
|
costs with appropriate supporting affidavits within ten (10) days of the
|
|
date of this order. The Defendants will have ten days thereafter to file
|
|
their responses.
|
|
|
|
|
|
SIGNED this the 12 day of March, 1993.
|
|
|
|
|
|
Sam Sparks United States District Judge
|
|
|
|
|
|
|
|
[Footnotes]
|
|
|
|
|
|
1 While the content of these publications are not similar to those of
|
|
daily newspapers, news magazines, or other publications usually thought of
|
|
by this Court as disseminating information to the public, these products
|
|
come within the literal language of the Privacy Protection Act.
|
|
|
|
|
|
2 A "hacker" is an individual who accesses another's computer system
|
|
without authority.
|
|
|
|
|
|
3 Kluepfel, Williams, Spain and Kibbler are employees of Bell South;
|
|
Coutorie is a University of Texas Systems investigator assigned to
|
|
investigate computer hacking; and Niedorf is a hacker involved in the
|
|
Illinois bulletin board system.
|
|
|
|
|
|
4 The Court does fault Agent Foley and the Secret Service on the failure
|
|
to make any investigation of Steve Jackson Games, Inc. prior to March 1,
|
|
1990, and to contact Steve Jackson in an attempt to enlist his cooperation
|
|
and obtain information from him as there was never any basis to suspect
|
|
Steve Jackson or Steve Jackson Games, Inc. of any criminal activity, and
|
|
there could be no questions the seizure of computers, disks, and bulletin
|
|
board and all information thereon, including all back-up materials would
|
|
have an adverse effect (including completely stopping all activities) on
|
|
the business of Steve Jackson Games, Inc. and the users of Illuminati
|
|
bulletin board.
|
|
|
|
|
|
5 The application and the search warrant itself was worded by Foley and
|
|
Cook so that all information would be "read" by the Secret Service.
|
|
|
|
|
|
6 The Court finds the testimony of Joanne Midwikis, an accountant who
|
|
testified on behalf of Steve Jackson Games, Inc. and Steve Jackson, on
|
|
damages suffered by Steve Jackson Games, Inc. and Steve Jackson was not
|
|
credible.
|
|
|
|
|
|
7 If the Secret Service, in the performance of executing Court order, had
|
|
only obtained and taken the 911 document or alleged decryption materials,
|
|
application of the definitions of "documentary materials" and "work
|
|
product materials" would logically result in no violation of the statute
|
|
under the circumstances of this case. It was the seizing all documents and
|
|
information and, thereafter, the failure to promptly return the
|
|
information seized which leads to violation of the statute.
|
|
|
|
|
|
8 The legislative history to the Privacy Protection Act states:
|
|
|
|
|
|
...the Committee recognized a problem for the law enforcement officer, who
|
|
seeking to comply with the statute, might be uncertain whether the
|
|
materials he sought were work product or nonwork product and that they
|
|
were intended for publication. Therefore, in the interests of allowing for
|
|
some objective measure for judgment by the office, the Committee has
|
|
provided that the work product must be possessed by someone "reasonably
|
|
believed" to have a purpose to communicate to the public.
|
|
|
|
|
|
S. Rep. No. 874, 96th Cong., 2nd Sess., 10 (1980), _reprinted in_ 1980
|
|
U.S.C.C.A.N. 3950, 3957. As the Court has stated, Agent Foley with only a
|
|
few hours of investigation would have "reasonably believed" Steve Jackson
|
|
Games, Incorporated had "a purpose to communicate to the public."
|
|
Therefore, under an objective standard, assuming a reasonable
|
|
investigation, Agent Foley and the Secret Service violated the statute on
|
|
March 1, 1990. However, Agent Foley was not aware of the Privacy
|
|
Protection Act and was therefore not "seeking to comply" with its
|
|
requirements. Consequently, the Court found on March 1, 1990 neither Agent
|
|
Foley or any other employee or agent of the United States "reasonably
|
|
believed" the materials seized were work product or Steve Jackson Games,
|
|
Incorporated had a "purpose to disseminate to the public."
|
|
|
|
________________________________________________________________________
|
|
________________________________________________________________________
|
|
|
|
The SURFPUNK Technical Journal is a dangerous multinational hacker zine
|
|
originating near BARRNET in the fashionable western arm of the northern
|
|
California matrix. Quantum Californians appear in one of two states,
|
|
spin surf or spin punk. Undetected, we are both, or might be neither.
|
|
________________________________________________________________________
|
|
|
|
Send postings to <surfpunk@osc.versant.com>, subscription requests
|
|
to <surfpunk-request@osc.versant.com>. MIME encouraged.
|
|
Reasonably believed to be communicating to the public.
|
|
________________________________________________________________________
|
|
________________________________________________________________________
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Friday 19-Mar-93 11:34:16 from kablooey to snit
|
|
sq /%phen/ {aw}
|
|
PHENACAINE
|
|
PHENACAINES
|
|
PHENACETIN
|
|
PHENACETINS
|
|
PHENACITE
|
|
PHENACITES
|
|
PHENAKITE
|
|
PHENAKITES
|
|
PHENANTHRENE
|
|
PHENANTHRENES
|
|
PHENATE
|
|
PHENATES
|
|
PHENAZIN chemical compound
|
|
PHENAZINE
|
|
PHENAZINES
|
|
PHENAZINS [phenazin] (chemical compound)
|
|
PHENELZINE
|
|
PHENELZINES
|
|
PHENETIC pert. to a type of classificatory system
|
|
PHENETICIST
|
|
PHENETICISTS
|
|
PHENETICS
|
|
PHENETIDINE
|
|
PHENETIDINES
|
|
PHENETOL volatile liquid
|
|
PHENETOLE
|
|
PHENETOLES
|
|
PHENETOLS [phenetol] (volatile liquid)
|
|
PHENFORMIN
|
|
PHENFORMINS
|
|
PHENIX phoenix
|
|
PHENIXES [phenix] (phoenix)
|
|
PHENMETRAZINE
|
|
PHENMETRAZINES
|
|
PHENOBARBITAL
|
|
PHENOBARBITONE
|
|
PHENOBARBITONES
|
|
PHENOCAIN
|
|
PHENOCAINS
|
|
PHENOCOPIES
|
|
PHENOCOPY
|
|
PHENOCRYST
|
|
PHENOCRYSTIC
|
|
PHENOCRYSTS
|
|
PHENOL caustic compound
|
|
PHENOLATE
|
|
PHENOLATES
|
|
PHENOLIC synthetic resin
|
|
PHENOLICS [phenolic] (synthetic resin)
|
|
PHENOLOGICAL
|
|
PHENOLOGICALLY
|
|
PHENOLOGIES
|
|
PHENOLOGY
|
|
PHENOLPHTHALEIN
|
|
PHENOLS [phenol] (caustic compound)
|
|
PHENOM person of extraordinary ability or promise
|
|
PHENOMENA
|
|
PHENOMENAL
|
|
PHENOMENALISM
|
|
PHENOMENALISMS
|
|
PHENOMENALIST
|
|
PHENOMENALISTIC
|
|
PHENOMENALISTS
|
|
PHENOMENALLY
|
|
PHENOMENOLOGIES
|
|
PHENOMENOLOGIST
|
|
PHENOMENOLOGY
|
|
PHENOMENON
|
|
PHENOMS [phenom] (person of extraordinary ability or promise)
|
|
PHENOTHIAZINE
|
|
PHENOTHIAZINES
|
|
PHENOTYPE
|
|
PHENOTYPES
|
|
PHENOTYPIC
|
|
PHENOTYPICAL
|
|
PHENOTYPICALLY
|
|
PHENOXIDE
|
|
PHENOXIDES
|
|
PHENOXY
|
|
PHENTOLAMINE
|
|
PHENTOLAMINES
|
|
PHENYL univalent chemical radical
|
|
PHENYLALANINE
|
|
PHENYLALANINES
|
|
PHENYLBUTAZONE
|
|
PHENYLBUTAZONES
|
|
PHENYLENE
|
|
PHENYLENES
|
|
PHENYLEPHRINE
|
|
PHENYLEPHRINES
|
|
PHENYLIC [phenyl] (univalent chemical radical)
|
|
PHENYLKETONURIA
|
|
PHENYLKETONURIAS
|
|
PHENYLS
|
|
PHENYLTHIOUREA
|
|
PHENYLTHIOUREAS
|
|
|
|
|
|
D,R,S,<CR>,? - >
|
|
|