Computer Underground Digest 25.3.1993

Für alle, die gerne mal in den alten Geschichten schwelgen, veröffentliche ich hier einmal ein paar Ausgaben des Computer underground Digest – ein ständiger und auch interessanter Begleiter im letzten Jahrhundert :-)

Thu Mar 25 1993 Volume 5 : Issue 22
ISSN 1004-042X

Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Copy Eater: Etaion Shrdlu, Senior
CONTENTS, #5.22 (Mar 25 1993)
File 1–Judge Spark’s Decision in Steve Jackson Games Suit
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under „computing newsletters;“
On Delphi in the General Discussion database of the Internet SIG;
on the PC-EXEC BBS at (414) 789-4210;
in Europe from the ComNet in Luxembourg BBS (++352) 466893;
ANONYMOUS FTP SITES:
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
halcyon.com( 202.135.191.2) in /pub/mirror/cud
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
ftp.warwick.ac.uk in pub/cud (United Kingdom)
Back issues also may be obtained through mailservers at:
mailserv@batpad.lgb.ca.us or server@blackwlf.mese.com
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Some authors do copyright their material, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
———————————————————————-
Date: Thu, 25 Mar 93 19:22:49 PST
From: Anonymous@well.sf.ca.us
Subject: File 1–Judge Spark’s Decision in Steve Jackson Games Suit
ALTHOUGH THIS IS A PUBLIC DOCUMENT-IF YOU POST THIS OPINION
PLEASE RETAIN THIS CREDIT:FIRST BBS POSTING-FLETC-INFONET
KFM M-SYSOP- 3-24-93 9:32PM- THANKS
UNITED STATES DISTRICT COURT
WESTERN DISTRICT OF TEXAS
AUSTIN DIVISION
STEVE JACKSON GAMES *s
INCORPORATED, et al., *s
Plaintiffs, *s
*s
V. *s NO. A 91 CA 346 SS
*s
UNITED STATES SECRET SERVICE, *s
UNITED STATES OF AMERICA, et al., *s
Defendants *s
Opinion
I. Facts
The issues remaining at trial in this lawsuit involves the
Plaintiffs Steve Jackson Games, Incorporated, Steve Jackson,
Elizabeth McCoy, Walter Milliken, and Steffan O’Sullivan’s causes
of action against the United States Secret Service and the United
States of America pursuant to three statutes, „Private Protection
Act“,42 U.S.C. 2000aa et seq.;“Wire and Electronic Communications
Interception and Interception of Oral Communication“ Act, 18
U.S.C. 2510, et seq.; and „Stored Wire and Electronic
Communications and Transactional Records Access“ Act, 18 U.S.C
2701, et seq. All other issues and parties have been withdrawn by
agreement of these remaining parties.
The individual party plaintiffs are residents of the states
of Texas and New Hampshire, and the corporate plaintiff is a
Texas corporation with its principal place of business in Austin,
Texas.
The Plaintiff Steve Jackson started Steve Jackson Games in
1980 and subsequently incorporated his business. Steve Jackson
Games, Incorporated, publishes books, magazines, box games, and
%related products‘. More than 50 percent of the corporation’s
revenues are derived from its publications. In addition, Steve
Jackson Games, Incorporated, beginning in the mid-1980s and
continuing through this litigation, operated from one of its
computers an electronic bulletin board system called Illuminati.
This bulletin board posts information to the inquiring public about
Steve Jackson Games‘ products and activities; provides a medium for
receiving and passing on information from the corporation’s
employees, writers, customers, and its game enthusiasts; and,
finally, affords its users electronic mail whereby, with the use of
selected passwords, its users can send and receive electronic mail
(E-mail) in both public and private modes. In February of 1990,
there were 365 users of the Illuminati bulletin board.
Steve Jackson was both the owner and employee of Steve Jackson
Games, Incorporated, and authored many of its publications; he used
both Illuminati’s public and private programs for electronic mail
and his use ranged from business records of the corporation,
contracts with his writers, communication with his writers
regarding articles which were intended to be published by the
corporation, to private communications with his business associates
and friends. Elizabeth McCoy’s use of the Illuminati bulletin board
involved her participation as a game player, her critiques as to
the games and publications of the corporation, and her private
‚While the content of these publications are not similar to
those of daily newspapers, news magazines, or other publications
usually thought of by this Court as disseminating information to
the public, these products come within the literal language of the
Privacy Protection Act.
%communications with associates and friends. William Milliken’s use
of the Illuminati bulletin board was apparently limited to private
communicates to associates and friends. Steffan O’Sullivan’s use of
the Illuminati bulletin board included writings for publication by
Steve Jackson Games, Inc. , his business dealings with the
corporation, and public and private communications with associates
and friends.
Importantly, prior to March 1, 1990, and at all other times,
there has never been any basis for suspicion that any of the
Plaintiffs have engaged in any criminal activity, violated any law,
or attempted to communicate, publish, or store any illegally
obtained information or otherwise provide access to any illegally
obtained information or to solicit any information which was to be
used illegally.
In October of 1988, Henry Kluepfel, Director of Network
Security Technology (an affiliate Bell Company) , was advised a
sensitive, proprietary computer document of Bell South relating to
Bell’s „911 program“ had been made available to the public on a
computer bulletin board in Illinois. Kluepfel reported this
information to Bell South and requested instructions, but received
no response. In April of 1989, Kluepfel confirmed the 911 Bell
document was available on the Illinois computer bulletin board and
learned the document was additionally available without any
proprietary notice on at least another computer bulletin board and
had been or was being published in a computer bulletin board
newsletter in edited form. In July of 1989, Kluepfel was finally
– 3 –
%instructed by Bell South to report the „intrusion“ of its computer
network to the Secret Service and that the document taken was
„sensitive“ and „proprietary. “ Kluepfel had previously worked with
the Secret Service and was known as an expert and reliable
informant on computer „hacking. , 2 Thereafter, Kluepfel met
Assistant U. S. Attorney William Cook in Chicago and thereafter
communicated with Cook and Secret Service Agent Tim Foley. Agent
Foley was in charge of this particular investigation.
Around February 6, 1990, Kluepfel learned that the 911
document was available on a computer billboard entitled „Phoenix“
which was operated by Loyd Blankenship in Austin, Texas. Kluepfel
„downloaded“ the document to put in readable form and then advised
these facts to the Secret Service. Prior to February 26, 1990,
Kluepfel learned that Blankenship not only operated the Phoenix
bulletin board, but he was a user of the Illinois bulletin board
wherein the 911 document was first disclosed, was an employee of
Steve Jackson Games, Inc., and a user of the Steve Jackson Games,
Inc.’s bulletin board „Illuminati.“ Kluepfel’s investigation also
determined that Blankenship was a „co-sysop“ of the Illuminati
bulletin board, which means that he had the ability to review
anything on the Illuminati bulletin board and, importantly, maybe
able to delete anything on the system. Blankenship’s bulletin
board Phoenix had published „hacker“ information and had solicited
„hacker“ information relating to passwords, ostensibly to be
2 „hacker“ is an individual who accesses another’s computer
system without authority.
%analyzed in some type of decryption scheme. By February 26, 1990,
Kluepfel determined that the Phoenix bulletin board was no longer
accessible as he could not dial, or „log into“ it. He reported this
to Agent Foley. While Kluepfel advised Agent Foley that Blankenship
was an employee of Steve Jackson Games, Inc., and was a user and
co-sysop of Illuminati, Kluepfel never had any information whereby
he was suspicious of any criminal activity by any of the Plaintiffs
in this cause. Kluepfel was, and is, knowledgeable in the operation
of computers, computer bulletin boards, the publishing of materials
and document by computers, the communications through computer
bulletin boards (both public and private communications), and could
have ‚logged“ into the Illuminati bulletin board at any time and
reviewed all of the information on the bulletin board except for
the private communications referred to by the Plaintiffs as
electronic communications or electronic mail, but did not do so.
Kluepfel had legitimate concerns, both about the 911 document
stolen from Bell South and the possibility of a decryption system
which could utilize passwords in rapid fashion and could result in
intrusions of computer systems, including those of the Bell System.
In February of 1990, Agent Foley was also knowledgeable about
computer bulletin boards and he too could have „logged“ into
Illuminati, become a user and reviewed all public communications on
the bulletin board, but did not do so.
By February 28, 1990, when the search warrant affidavit was
executed, Agent Foley had received information from reliable
– 5 –
%sources (Kluepfel, Williams, Spain, Kibbler, Coutorie, and Niedorf
, and possibly others‘) there had been an unlawful intrusion on the
Bell South computer program, the 911 Bell South document was a
sensitive and proprietary document, and that computer hackers were
attempting to utilize a decryption procedure whereby unlawful
intrusions could be made to computer programs including the Defense
Department, and these hackers were soliciting passwords so that the
decryption procedure could become operational. In addition, Agent
Foley was advised Loyd Blankenship had operated his Phoenix
bulletin board from his home, had published the 911 Bell South
document in edited form, and had published and communicated that a
decryption strategy was available and other „hackers“ should submit
selective passwords to finalize the decryption scheme for
intrusions into computer systems by using a rapid deployment of
passwords. Agent Foley was also advised that Blankenship was an
employee of Steve Jackson Games and had access to the Illuminatie
bulletin board as a user and a co-sysop and he may well (and in
fact did) have the ability to delete any documents or information
in the Steve Jackson Games computers and Illuminatie bulletin
board. The only information Agent Foley had regarding Steve Jackson
Games, Inc. and Steve Jackson was that he thought this was a
company that put out games, but he also reviewed a printout of
Illuminati on February 25, 1990, which read, „Greetings, Mortal!
You have
3 ‚Kluepfel, Williams, Spain and Kibbler are employees of Bell
South; Coutorie is a University of Texas Systems investigator
assigned to investigate computer hacking; and Niedorf is a hacker
involved in the Illinois bulletin board system.
%entered the secret computer system of the Illuminati, the on-line
home of the world’s oldest and largest secret conspiracy.
5124474449300/1200/2400BAUD fronted by Steve Jackson Games,
Incorporated. Fnord. “ The evidence in this case strongly suggests
Agent Foley, without any further investigation, misconstrued this
information to believe the Illuminati bulletin board was similar in
purpose to Blankenship’s Phoenix bulletin board, which provided
information to and was used by „hackers.“ Agent Foley believed, in
good faith, at the time of the execution of his affidavit on
February 28, 1990, there was probable cause to believe Blankenship
had the 911 Bell South document and information relating to the
decryption scheme stored in his computer at home or perhaps in
computers, disks, or in the Illuminati bulletin board at his place
of employment at Steve Jackson Games, Inc.; that these materials
were involved in criminal activities; and that Blankenship had the
ability to delete any information stored on any of these computers
and/or disks.
Unfortunately, although he was an attorney and expressly
represented this fact in his affidavit, Agent Foley was not aware
of the Privacy Protection Act, 42 U.S.C. 2000aa et seq., and he
conducted no investigation about Steve Jackson Games, Incorporated,
although a reasonable investigation of only several hours would
have revealed Steve Jackson Games, Inc. was, in fact, a legitimate
publisher of information to the public and Mr. Jackson would have
cooperated in the investigation. Agent Foley did not know the
individual Plaintiffs but did know they were users of Illuminati as
– 7 –
%he had a list of all users prior to February 28, 1990. Agent Foley
did know and understand the Illuminati bulletin board would have
users and probably would have stored private electronic
communications between users. Notwithstanding the failure of any
investigation regarding Steve Jackson Games, Agent Foley and
Assistant U. S. Attorney Cook intended to seize and review all of
the information and documents in any computer accessible to
Blankenship, regardless of what other incidental information would
be seized. These intentions were expressly stated in their
application for a search warrant and the warrant itself.‘ Foley’s
affidavit, executed on February 28, 1990, was sufficient under the
law for the issuance of a search warrant by the United States
Magistrate Judge. The Court does not find from a preponderance of
the evidence that the admitted errors in Foley’s affidavit were
intentional and so material to make the affidavit and issuance of
the warrant legally improper. See, Franks v. Delaware, 438 U.S.
154, 98 S.Ct. 2674 (1978). The factual errors in the affidavit
include the Bell 911 document was a computer program; the Bell 911
document was engineered at a cost of $79,449; the Bell 911 document
had been ’slightly“ edited; articles in
4 The Court does fault Agent Foley and the Secret Service on
the failure to make any investigation of Steve Jackson Games,
Inc. prior to March 1, 1990, and to contact Steve Jackson in
an attempt to enlist his cooperation and obtain information
from him as there was never any basis to suspect Steve Jackson
or Steve Jackson Games, Inc. of any criminal activity, and
there could be no questions the seizure of computers, disks,
and bulletin board and all information thereon, including all
back-up materials would have an adverse effect (including
completely stopping all activities) on the business of Steve
Jackson Games, Inc. and the users of Illuminati bulletin
board.
%Phrack were described as „hacker tutorials;“ the Bell 911 document
published in Phrack contained a proprietary notice; Blankenship was
a computer programmer for Steve Jackson Games, Inc.; Blankenship’s
alias „Mentor“ was listed as an Illuminati bulletin board user;
Coutorie, prior to February 28, 1990, provided Foley with
information on Steve Jackson Games, Inc.; and that Kluepfel had
„logged“ into Illuminati. The affidavit and warrant preparation was
simply sloppy and not carefully done. Therefore, the Court denies
the Plaintiff’s contentions relating to the alleged improprieties
involved in the issuance of the search warrant.
On March 1, 1990, Agents Foley and Golden executed the
search
warrant. At the time of the execution, each agent had available
computer experts who had been flown to Austin to advise and
review
the stored information in the computers, the bulletin boards, and
disks seized. These computer experts certainly had the ability to
review the stored information and, importantly, to copy all
information contained in the computers and disks within hours.
During the search of Steve Jackson Games and the seizure of
the three computers, over 300 computer disks, and other materials,
Agent Golden was orally advised by a Steve Jackson Games, Inc.
Employee that Steve Jackson Games, Inc. was in the publishing
business. Unfortunately, Agent Golden, like Foley, was unaware of
the Privacy Protection Act and apparently attached no significance
to this information. The evidence is undisputed that Assistant U.
S. Attorney Cook would have stopped the search at the time of this
notification had he been contacted.
– 9 –
% By March 2, 1990, Agent Foley knew Steve Jackson Games, Inc.
was in the publishing business and the seizure included documents
intended for publication to the public, including a book and other
forms of information. He also knew or had the ability to learn the
seizure of the Illuminati bulletin board included private and
public electronic communications and E-mail. By March 2, 1990,
Agent Foley knew that Steve Jackson Games, Incorporated, and its
attorneys in Dallas and Austin, were requesting the immediate
return of the properties and information seized, that transcripts
of publications and the back-up materials had been seized, and that
the seizure of the documents, including business records of Steve
Jackson Games, Inc., and their back-up was certain to economically
damage Steve Jackson Games, Inc. While Agent Foley had a legitimate
concern there might be some type of program designed to delete the
materials, documents, or stored information he was seeking, he
admits there was no valid reason why all information seized could
not have been duplicated and returned to Steve Jackson Games within
a period of hours and no more than eight days from the seizure. In
fact, it was months (late June 1990) before the majority of the
seized materials was returned. Agent Foley simply was unaware of
the law and erroneously believed he had substantial criminal
information which obviously was not present, as to date, no arrests
or criminal charges have ever been filed against anyone, including
Blankenship.
In addition, Agent Foley must have known his seizure of
computers, printers, disks and other materials and his refusal to
– 10 –
%provide copies represented a risk of substantial harm to Steve
Jackson Games, Inc. — under circumstances where he had no reason
to believe the corporation or its owner was involved in criminal
activity.
The Secret Service denies that its personnel or its delegates
read the private electronic communications stored in the seized
materials and specifically allege that this information was
reviewed by use of key search words only. Additionally, the Secret
Service denies the deletion of any information seized with two
exceptions of „sensitive“ or „illegal“ information, the deletion of
which was consented to by Steve Jackson. However, the
preponderance of the evidence, including common sense 5,
establishes that the Secret Service personnel or its delegates did
read all electronic communications seized and did delete certain
information and communications in addition to the two documents
admitted deleted. The deletions by the Secret Service, other than
the two documents consented to by Steve Jackson, were done without
consent and cannot be justified.
By March 2, 1990, Agent Foley, Agent Golden, and the Secret
Service, if aware of the Privacy Protection Act, would have known
that they had, by a search warrant, seized work products of
materials from a person or entity reasonably believed to have a
purpose to disseminate to the public a“book“ or „similar form of
public communication.“
‚The application and the search warrant itself was worded by
Foley and Cook so that all information would be „read“ by the
Secret Service.
– 11 –
% The failure of the Secret Service after March 1, 1990, to —
promptly — return the seized products of Steve Jackson Games,
Incorporated cannot be justified and unquestionably caused economic
damage to the corporation.
By March 1, 1990, Steve Jackson Games, Incorporated was
apparently recovering from acute financial problems and suffering
severe cash flow problems. The seizure of the work product and
delays of publication, whether by three weeks or several months,
directly impacted on Steve Jackson Games, Incorporated. Eight
employees were terminated because they could not be paid as
revenues from sales came in much later than expected. However, it
is also clear from a preponderance of the evidence that after the
calendar year 1990, the publicity surrounding this seizure and the
nature of the products sold by Steve Jackson Games, Incorporated
had the effect of increasing, not decreasing, sales. In fact, Steve
Jackson Games, Incorporated developed a specific game for sale
based upon the March 1, 1990, seizure. The Court declines to find
from a preponderance of the evidence there was any economic damage
to Steve Jackson Games, Incorporated after the calendar year 1990
as a result of the seizure of March 1, 1990.‘
As a result of the seizure of March 1, 1990, and the retention
of the equipment and documents seized, Steve Jackson Games,
Incorporated sustained out-of-pocket expenses of $8,781.00. The
6 The Court finds the testimony of Joanne Midwikis, an
accountant who testified on behalf of Steve Jackson Games, Inc. and
Steve Jackson, on damages suffered by Steve Jackson Games, Inc. and
Steve Jackson was not credible.
– 12 –
%personnel at this corporation had to regroup, rewrite, and
duplicate substantial prior efforts to publish the book Gurps
Cyberpunk and other documents stored in the computers and the
Illuminati bulletin board, explain to their clientele and users of
the bulletin board the difficulties of their continuing business to
maintain their clientele, to purchase or lease substitute equipment
and supplies, to re-establish the bulletin board, and to get the
business of Steve Jackson Games, Inc. back in order. The Court has
reviewed the evidence regarding annual sales and net income of
Steve Jackson Games, Incorporated for 1990 and the years before and
after and finds from a preponderance of the evidence there was a 6
percent loss of sales in 1990 due to the seizure and related
problems. The evidence was undisputed that there was a 42 percent
profit on sales of publications of Steve Jackson Games,
Incorporated. Thus, Steve Jackson Games, Incorporated sustained
damages in loss of sales in 1990 of $100,617.00 for a loss of
profit of $42,259.00 as a direct and proximate result of the
seizure of March 1, 1990, and the retention of the documents
seized. After 1990, the net sales of Steve Jackson Games,
Incorporated continued to increase annually in a traditional
proportion as the sales had been increasing from 1988. Thus, from
a preponderance of the evidence, the loss of $42,259.00 is
inconsistent with the net income figures of Steve Jackson Games,
Incorporated in the years immediately following and preceding
1990.
Regarding damages to Steve Jackson, personally, his own
testimony is that by 1990 he was becoming more active in the
– 13 –
%management of Steve Jackson Games, Incorporated, and spending less
time in creative pursuits such as writing. Steve Jackson Games,
Incorporated was in such financial condition that Chapter 11
proceedings in bankruptcy were contemplated. Thereafter, the
testimony clearly established that Steve Jackson Games reasserted
himself in management and was spending substantial time managing
the corporation. The Court declines to find from a preponderance of
the evidence that Steve Jackson personally sustained any
compensatory damages as a result of the conduct of the United
States Secret Service.
Elizabeth McCoy, Walter Milliken and Steffan O’Sullivan also
allege compensatory damages. These Plaintiffs all had stored
electronic communications, or E-mail, on the Illuminati bulletin
board at the time of seizure. All three of these Plaintiffs
testified that they had public and private communications in
storage at the time of the seizure. Steve Jackson, Elizabeth McCoy,
Walter Milliken and Steffan O’Sullivan all testified that
following June of 1990 some of their stored electronic
communications, or E-mail, had been deleted. It is clear, as
hereinafter set out, that the conduct of the United States Secret
Service violated two of the three statutes which the causes of
action of the Plaintiffs are based and, therefore, there are
statutory damages involved, but the Court declines to find from a
preponderance of the evidence that any of the individual Plaintiffs
sustained any compensatory damages.
– 14 –
% ii.
a.
PRIVACY PROTECTION ACT
(First Amendment Privacy Protection)
42 U.S.C. 2000aa et seq.
The United States Secret Service, by Agent Foley and Assistant
United States Attorney Cox, sought and obtained an order from a
United States Magistrate Judge to search for and seize and
thereafter read the information stored and contained in „computer
hardware (including, but not limited to, central processing unit(s)
monitors, memory devices, modem(s), programming equipment,
communication equipment, disks, and printers) and computer software
(including, but not limited to) memory disks, floppy disks, storage
media) and written material and documents relating to the use of
the computer system (including network access files) ,
documentation relating to the attacking of computers and
advertising the results of computer attacks (including telephone
numbers and location information), and financial documents and
licensing documentation relative to the compute programs and
equipment at the business known as Steve Jackson Games which
constitute evidence, instrumentalities, and fruits of federal
crimes, including interstate transportation of stolen property (18
U.S.C. 2314) and interstate transportation of computer access
information (18 U.S.C. 1030(a)(6)).“ See, Warrant Application and
Order.
On March 1, 1990, the Secret Service seized the following
property on the premises of Steve Jackson Games, Inc.: Compuadd
keyboard; Packard-Bell monitor; DKT computer; cardboard box
containing disks, miscellaneous papers and circuit boards; Splat
%Master gun with „Mentor“ on barrel; Hewlett-Packard laser jet
printer; BTC keyboard with cover; IBM personal computer 5150
(disassembled); Seagate Tech hard disk; 2400 modem 1649-1795 with
Dower supply and disk; IBM keyboard; Amdek mode[l] 31OA; bulletin
board back-up files (approximately 150); Empac International
Corporation XT computer; „WWIV“ users manual; red box of floppy
disks; miscellaneous papers and notes from desk; floppy disk
entitled „Phoenix setup.“ See, Warrant Return.
The evidence establishes the actual information seized,
including both the primary source and back-up materials of the
draft of Gurps Cyberpunk, a book intended for immediate publication
(within days to weeks) , drafts of magazine and magazine articles
to be published, business records of Steve Jackson Games,
Incorporated (including contracts and drafts of articles by writers
of Steve Jackson Games, Incorporated), the Illuminati bulletin
board and its contents (including public announcements, published
newsletter articles submitted to the public for review, public
comment on the articles submitted and electronic mail containing
both private and public communications) . Notwithstanding over 300
floppy disks being seized, the evidence introduced during trial was
not clear as to what additional information was seized during the
search warrant execution. However, the evidence is clear that on
March 1, 1990, „work product materials, “ as defined in 42 U.S.C.
2000aa-7 (b), was
– 16 –
%obtained as well as materials constituting „documentary materials“
as defined in the same provision.‘
The Privacy Protection Act, 42 U.S.C. 2000aa, dictates:
„Notwithstanding any other law, it shall be unlawful for a
government officer or employee, in connection with the
investigation . . . of a criminal offense to search for or seize
any work product materials possessed by a person reasonably
believed to have a purpose to disseminate to the public a
newspaper, broadcast, or other similar form of public communication
. . .“ See, 42 U.S.C. [sec] 2000aa(a).
Assuming Agent Foley was knowledgeable of the Privacy
Protection Act (which he was not), neither he nor Assistant United
States Attorney Cox had any information which would lead them to
believe that Steve Jackson Games, Incorporated published books and
materials and had a purpose to disseminate to the public its
publications. Their testimony is simply they thought it a producer
of games. As heretofore stated, the Court feels Agent Foley failed
to make a reasonable investigation of Steve Jackson Games,
Incorporated when it was apparent his intention was to take
substantial properties belonging to the corporation, the removal of
which could have a substantial effect on the continuation of
7 If the Secret Service, in the performance of executing Court
order, had only obtained and taken the 911 document or alleged
decryption materials, application of the definitions of
„documentary materials“ and „work product materials“ would
logically result in no violation of the statute under the
circumstances of this case. It was the seizing all documents and
information and, thereafter, the failure to promptly return the
information seized which leads to violation of the statute.
– 17 –
%business. Agent Foley, it appears, in his zeal to obtain evidence
for the criminal investigation, simply concluded Steve Jackson
Games, Incorporated was somehow involved in Blankenship’s alleged
activities because of the wording of the Illuminati bulletin board
menu. In any event, the Court declines to find from a preponderance
of the evidence that on March 1, 1990, Agent Foley or any other
employee or agent of the United States had reason to believe that
property seized would be the work product materials of a person
believed to have a purpose to disseminate to the public a
newspaper, book, broadcast or other similar form of public
communication.’8
8 ‚The legislative history to the Privacy Protection Act states:
…the Committee recognized a problem for the law en-
forcement officer, who seeking to comply with the
statute, might be uncertain whether the materials he
sought were work product or nonwork product and that they
were intended for publication. Therefore, in the
interests of allowing for some objective measure for
judgment by the office, the Committee has provided that
the work product must be possessed by someone „reasonably
believed“ to have a purpose to communicate to the public.
S. Rep. No. 874, 96th Cong., 2nd Sess., 10 (1980), reprinted in
1980 U.S.C.C.A.N. 3950, 3957. As the Court has stated, Agent Foley
with only a few hours of investigation would have „reasonably
believed“ Steve Jackson Games, Incorporated had „a purpose to
communicate to the public.“ Therefore, under an objective standard,
assuming a reasonable investigation, Agent Foley and the Secret
Service violated the statute on March 1, 1990. However, Agent Foley
was not aware of the Privacy Protection Act and was therefore not
„seeking to comply“ with its requirements. Consequently, the Court
found on March 1, 1990 neither Agent Foley nor any other employee
or agent of the United States „reasonably believed“ the materials
seized were work product or Steve Jackson Games, Incorporated had
a „purpose to disseminate to the public.“
– 18 –
% During the search on March 1, and on March 2, 1990, the Secret
Service was specifically advised of facts that put its employees on
notice of probable violations of the Privacy Protection Act. It is
no excuse that Agents Foley and Golden were not knowledgeable of
the law. On March 2, 1990, and thereafter, the conduct of the
United States Secret Service was in violation of 42 U.S.C. 2000aa
et seq. It is clear the Secret Service continued the seizure of
property of Steve Jackson Games, Incorporated including information
and documents through late June of 1990. Immediate arrangements
could and should have been made on March 2, 1990, whereby copies of
all information seized could have been made. The government could
and should have requested Steve Jackson as chief operating officer
of the corporation to cooperate and provide the information
available under the law. The Secret Service’s refusal to return
information and property requested by Mr. Jackson and his lawyers
in Dallas and Austin constituted a violation of the statute.
Regarding any information seized that would constitute ‚documentary
materials“ (whereby the defensive theory of 42 U.S.C. 2000aa(b) (3)
might apply) there would have been no problem as the property was
in the possession of the United States Secret Service and their
experts and Steve Jackson were present to ensure no destruction,
alteration or concealment of information contained therein. In any
event, it is the seizure of the „work product materials“ that leads
to the liability of the United States Secret Service and the United
States in this case. Pursuant to 42 U.S.C. 2000aa-6, the Court
finds from a preponderance of the evidence that Steve Jackson
– 19 –
%Games, Incorporated is entitled to judgement against the United
States Secret Service and the United States of America for its
expenses of $8,781.00 and its economic damages of $42,259.00. The
Court declines to find from a preponderance of the evidence other
damages of Steve Jackson Games, Incorporated or liability of the
United States Secret Service or the United States of America to any
other Plaintiff under the provisions of the Privacy Protection Act.
b.
WIRE AND ELECTRONIC COMMUNICATIONS INTERCEPTION
AND INTERCEPTION OF ORAL COMMUNICATIONS
18 U.S.C. 2510 et seq.
The Plaintiff s allege the United States Secret Service “ s
conduct also violated 18 U.S.C. 2510, et seq., as it constituted
intentional interceptions of „electronic communication. “ They
allege the interception occurred at the time of seizure or,
perhaps, at the time of review of the communication subsequent to
the seizure. There is no question the individual Plaintiffs had
private communications stored in Illuminati at the time of the
seizure and the court has found from a preponderance of the
evidence the Secret Service intended not only to seize and read
these communications, but, in fact, did read the communications and
thereafter deleted or destroyed some communications either
intentionally or accidentally. The Defendants contend there is no
violation of this particular statute under the facts of this case
because there never was any unlawful „interception“ within the
meaning of the statute. Alternatively, the Defendants contend that
the „good faith reliance“ on the search warrant issued by the
– 20 –
%United States Magistrate Judge is a complete defense under Section
2520 .
The Government relies on the 1976 Fifth Circuit case of the
United States v. Turk, 526 F.2d 654 (5th Cir. 1976), cert denied,
429 U.S. 823, 97 S.Ct. 74 (1976), and its interpretation of the
statutory definition of „interception.“ In Turk, police officers
listened to the contents of a cassette tape without first obtaining
a warrant. The court concluded this was not an „interception“ under
18 U.S.C. [sec] 2510 et seq.
Whether the seizure and replaying of the cassette tape by the
officers was also an „interception“ depends on the definition
to be given „aural acquisition.“ Under one conceivable
reading, and „aural acquisition“ could be said to occur
whenever someone physically hears the contents of a
communication, and thus the use of the tape player by the
officers to hear the previously recorded conversation might
fall within the definition set out above. No explicit
limitation of coverage to contemporaneous „acquisitions“
appears in the Act.
We believe that a different interpretation — one which
would exclude from the definition of „intercept“ the replaying
of a previously recorded conversation — has a much firmer
basis in the language of S 2510(4) and in logic, and
corresponds more closely to the policies reflected in the
legislative history. The words „acquisition… through the use
of any … device“ suggest that the central concern is with
the activity engaged in a the time of the oral communication
which causes such communication to be overheard by uninvited
listeners. If a person secrets a recorder in a room and
thereby records a conversation between two others, an
„acquisition“ occurs at the time the recording is made. This
acquisition itself might be said to be „aural“ because the
contents of the conversation are preserved in a form which
permits the later aural disclosure of the contents.
Alternatively, a court facing the issue might conclude that an
„aural acquisition“ is accomplished only when two steps are
completed — the initial acquisition by the device and the
hearing of the communication by the person or persons
responsible for the recording. Either of these definitions
would require participation by the one charged with an
„interception“ in the contemporaneous acquisition of the
communication through the use to the device. The argument that
a new and different „aural acquisition“ occurs each time a
recording of an oral
% communication is replayed is unpersuasive. That would mean
that innumerable „interceptions,“ and thus violations of the
Act, could follow from a single recording.
Id., at 657-658 (footnotes omitted). While the Fifth Circuit
authority relates to the predecessor statute, Congress intended no
change in the existing definition of „intercept“ in amending the
statute in 1986. See, S. Rep. No. 541, 99th Cong., 2nd Sess. 13
(1986), reprinted in 1986 U.S.C.C.A.N. 3555, 3567 („Section
101(a)(3) of the ELECTRONIC COMMUNICATIONS PRIVACY ACT amends the
definition of the term „intercept“ in current section 2510(4) of
title 18 to cover electronic communications. The definition of
„intercept“ under current law is retained with respect to wire and
oral communications except that the term „or other“ is inserted
after „aural.“ This amendment clarifies that it is illegal to
intercept the non-voice portion of a wire communication.“). The
Court finds this argument persuasive when considering the
Congressional enactment of the Stored Wire and Electronic
Communications and Transactional Records Access Act, 18 U.S.C.
2701, et seq.
The Court declines to find liability for any Plaintiff against
the Defendants pursuant to the Wire and Electronic Communications
Interception and Interception of Oral Communications Act, 18
U.S.C.2510, et seq., and specifically holds that the alleged
„interceptions“ under the facts of this case are not
„interceptions“contemplated by the wire and Electronic
Communications Interception and Interception of Oral Communications
Act. It simply has no applicability to the facts of this case.
– 22-
% c.
STORED WIRE AND ELECTRONIC COMMUNICATIONS
AND TRANSACTIONAL RECORDS ACCESS
18 U.S.C. [sec] 2701 et seq.
Prior to February 28, 1990, Agent Foley, Assistant United
States Attorney Cox, and the computer consultants working with them
were cognizant of public computer bulletin boards and the use of
electronic communications and E-mail through them. Each of the
persons involved in this investigation, including Agent Foley, had
the knowledge and opportunity to log into the Illuminati bulletin
board, review its menu and user lists, obtain passwords, and
thereafter review all information available to the public. In fact,
Agent Foley erroneously thought Kluepfel had done this when a
printout of Illuminati documents dated February 25, 1990, was
received. When Foley applied for the search warrant on February 28,
1990, he knew the Illuminati bulletin board provided services to
the public whereby its users could store public and private
electronic communications. While Foley admits no knowledge of the
Privacy Protection Act and its provisions protecting publishers of
information to the public, he testified he was knowledgeable
regarding the Wire and Electronic Communications Interception and
Interception of Oral Communications Act. But, Foley never thought
of the law’s applicability under the facts of this case. Steve
Jackson Games, Inc., through its Illuminati bulletin board
services, was a „remote computing service“ within the definition of
Section 2711, and, therefore, the only procedure available to the
Secret Service to obtain „disclosure“ of the contents of electronic
– 23 –
%communications was to comply with this statute. See, 18 U.S.C. 2
7 0 3 . Agent Foley and the Secret Service, however, wanted more
than „disclosure“ of the contents of the communication. As the
search warrant application evidences, the Secret Service wanted
seizure of all information and the authority to review and read all
electronic communications, both public and private. A court order
for such disclosure is only to issue if „there is a reason to
believe the contents of a[n] . . . electronic communication . are
relevant to a legitimate law enforcement inquiry.“ See, 18 U.S.C.
S 2703(d). Agent Foley did not advise the United States Magistrate
Judge, by affidavit or otherwise, that the Illuminati bulletin
board contained private electronic communications between users or
how the disclosure of the content of these communications could
relate to his investigation. Foley’s only knowledge was that
Blankenship had published part of the 911 document and decryption
information in his Phoenix bulletin board, was employed at Steve
Jackson Games, Inc. , and could have the ability to store and
delete these alleged unlawful documents in the computers or
Illuminati bulletin board at Steve Jackson Games, Incorporated. At
Agent Foley’s specific request, the application and affidavit for
the search warrant were sealed. The
evidence establishes the Plaintiffs were not able to ascertain the
reasons for the March 1, 1990 seizure until after the return of
most of the property in June of 1990, and then only by the efforts
of the offices of both United States Senators of the State of
Texas. The procedures followed by the Secret Service in this case
virtually eliminated the safeguards
– 24 –
%contained in the statute. For example, no Plaintiff was on notice
that the search or seizure order was made pursuant to this statute
and that Steve Jackson Games, Incorporated could move to quash or
modify the order or eliminate or reduce any undue burden on it by
reason of the order. See, 18 U.S.C. [sec] 2703(d). The provisions
of the statute regarding the preparation of back-up copies of the
documents or information seized were never utilized or available.
See, 18 U.S.C. [sec] 2704. Agent Foley stated his concern was to
prevent the destruction of the documents‘ content and for the
Secret Service to take the time necessary to carefully review all
of the information seized. He feared Blankenship could possibly
delete the incriminating documents or could have programmed
destruction in some manner. Notwithstanding that any alteration or
destruction by Blankenship, Steve Jackson, or anyone else would
constitute a criminal offense under this statute, Foley and the
Secret Service seized — not just obtained disclosure of the
content — all of the electronic communications stored in the
Illuminati bulletin board involving the Plaintiffs in this case.
This conduct exceeded the Government’s authority under the statute.
The Government Defendants contend there is no liability for
alleged violation of the statute as Foley and the Secret Service
had a „good faith“ reliance on the February 28, 1990, court
order/search warrant. The Court declines to find this defense by a
preponderance of the evidence in this case.
Steve Jackson Games, Incorporated, as the provider and each
individual Plaintiffs as either subscribers or customers were
– 25 –
%“aggrieved“ by the conduct of the Secret Service in the violation
of this statute. While the Court declines to find from a
preponderance of the credible evidence the compensatory damages
sought by each Plaintiff, the Court will assess the statutory
damages of $1,000.00 for each Plaintiff.
III. SUMMARY
This is a complex case. It is still not clear how sensitive
and/or proprietary the 911 document was (and is) or how genuinely
harmful the potential decryption scheme may have been or if either
were discovered by the Secret Service in the information seized on
March 1, 1990. The fact that no criminal charges have ever been
filed and the investigation remains „on going“ is, of course, not
conclusive.
The complexity of this case results from the Secret Service’s
insufficient investigation and its lack of knowledge of the
specific laws that could apply to their conduct on February 28,
1990 and thereafter. It appears obvious neither the government
employees nor the Plaintiffs or their lawyers contemplated the
statute upon which this case is brought back in February, March,
April, May or June of 1990. But this does not provide assistance to
the defense of the case. The Secret Service and its personnel are
the entities that citizens, like each of the Plaintiffs, rely upon
and look to protect their rights and properties. The Secret Service
conduct resulted in the seizure of property, products, business
records, business documents, and electronic communications
– 26 –
%of a corporation and f our individual citizens that the statutes
were intended to protect.
It may well be, as the Government Defendants contend, these
statutes relied upon by the Plaintiff s should not apply to the
facts of this case, as these holdings may result in the government
having great difficulties in obtaining information or computer
documents representing illegal activities. But this Court cannot
amend or rewrite the statutes involved. The Secret Service must go
to the Congress for relief. Until that time, this Court recommends
better education, investigation and strict compliance with the
statutes as written.
The Plaintiffs are ordered to submit application for
attorney’s fees and costs with appropriate supporting affidavits
within ten (10) days of the date of this order. The Defendants will
have ten days thereafter to file their responses.
SIGNED this the s/12 day of March, 1993.
Sam Sparks United States District Judge
-27-
——————————
End of Computer Underground Digest #5.22
************************************
have fun,
Jürgen

Jürgen

Ich bin Jürgen und als glücklicher Familienpapa und arbeite als Mediendesigner in Wiesmoor und entdecke mit unserer kleinen Familie die Welt. Was uns wichtig erscheint, müssen wir hier in unserem Blog niederschreiben. Abonniere uns, damit du immer auf dem Laufenden bleibst: Wir posten Fotos auf Instagram und haben dem Podcast nun auch einen Kanal unter Friesenzeit dort eingerichtet :-) Bis bald! PS: 'Nakieken' ist übrigens Plattdeutsch und bedeutet soviel wie "genauer hinsehen" und genau das ist Programm hier im Blog.

Schreibe einen Kommentar

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

Diese Website verwendet Akismet, um Spam zu reduzieren. Erfahre mehr darüber, wie deine Kommentardaten verarbeitet werden.