Computer underground Digest Thu Mar 25 1993 Volume 5 : Issue 22 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Archivist: Brendan Kehoe Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Copy Eater: Etaion Shrdlu, Senior CONTENTS, #5.22 (Mar 25 1993) File 1--Judge Spark's Decision in Steve Jackson Games Suit Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115. Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on the PC-EXEC BBS at (414) 789-4210; in Europe from the ComNet in Luxembourg BBS (++352) 466893; ANONYMOUS FTP SITES: UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud halcyon.com( 202.135.191.2) in /pub/mirror/cud AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD. EUROPE: nic.funet.fi in pub/doc/cud. (Finland) ftp.warwick.ac.uk in pub/cud (United Kingdom) Back issues also may be obtained through mailservers at: mailserv@batpad.lgb.ca.us or server@blackwlf.mese.com COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Some authors do copyright their material, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ---------------------------------------------------------------------- Date: Thu, 25 Mar 93 19:22:49 PST From: Anonymous@well.sf.ca.us Subject: File 1--Judge Spark's Decision in Steve Jackson Games Suit ALTHOUGH THIS IS A PUBLIC DOCUMENT-IF YOU POST THIS OPINION PLEASE RETAIN THIS CREDIT:FIRST BBS POSTING-FLETC-INFONET KFM M-SYSOP- 3-24-93 9:32PM- THANKS UNITED STATES DISTRICT COURT WESTERN DISTRICT OF TEXAS AUSTIN DIVISION STEVE JACKSON GAMES *s INCORPORATED, et al., *s Plaintiffs, *s *s V. *s NO. A 91 CA 346 SS *s UNITED STATES SECRET SERVICE, *s UNITED STATES OF AMERICA, et al., *s Defendants *s Opinion I. Facts The issues remaining at trial in this lawsuit involves the Plaintiffs Steve Jackson Games, Incorporated, Steve Jackson, Elizabeth McCoy, Walter Milliken, and Steffan O'Sullivan's causes of action against the United States Secret Service and the United States of America pursuant to three statutes, "Private Protection Act",42 U.S.C. 2000aa et seq.;"Wire and Electronic Communications Interception and Interception of Oral Communication" Act, 18 U.S.C. 2510, et seq.; and "Stored Wire and Electronic Communications and Transactional Records Access" Act, 18 U.S.C 2701, et seq. All other issues and parties have been withdrawn by agreement of these remaining parties. The individual party plaintiffs are residents of the states of Texas and New Hampshire, and the corporate plaintiff is a Texas corporation with its principal place of business in Austin, Texas. The Plaintiff Steve Jackson started Steve Jackson Games in 1980 and subsequently incorporated his business. Steve Jackson Games, Incorporated, publishes books, magazines, box games, and %related products'. More than 50 percent of the corporation's revenues are derived from its publications. In addition, Steve Jackson Games, Incorporated, beginning in the mid-1980s and continuing through this litigation, operated from one of its computers an electronic bulletin board system called Illuminati. This bulletin board posts information to the inquiring public about Steve Jackson Games' products and activities; provides a medium for receiving and passing on information from the corporation's employees, writers, customers, and its game enthusiasts; and, finally, affords its users electronic mail whereby, with the use of selected passwords, its users can send and receive electronic mail (E-mail) in both public and private modes. In February of 1990, there were 365 users of the Illuminati bulletin board. Steve Jackson was both the owner and employee of Steve Jackson Games, Incorporated, and authored many of its publications; he used both Illuminati's public and private programs for electronic mail and his use ranged from business records of the corporation, contracts with his writers, communication with his writers regarding articles which were intended to be published by the corporation, to private communications with his business associates and friends. Elizabeth McCoy's use of the Illuminati bulletin board involved her participation as a game player, her critiques as to the games and publications of the corporation, and her private 'While the content of these publications are not similar to those of daily newspapers, news magazines, or other publications usually thought of by this Court as disseminating information to the public, these products come within the literal language of the Privacy Protection Act. %communications with associates and friends. William Milliken's use of the Illuminati bulletin board was apparently limited to private communicates to associates and friends. Steffan O'Sullivan's use of the Illuminati bulletin board included writings for publication by Steve Jackson Games, Inc. , his business dealings with the corporation, and public and private communications with associates and friends. Importantly, prior to March 1, 1990, and at all other times, there has never been any basis for suspicion that any of the Plaintiffs have engaged in any criminal activity, violated any law, or attempted to communicate, publish, or store any illegally obtained information or otherwise provide access to any illegally obtained information or to solicit any information which was to be used illegally. In October of 1988, Henry Kluepfel, Director of Network Security Technology (an affiliate Bell Company) , was advised a sensitive, proprietary computer document of Bell South relating to Bell's "911 program" had been made available to the public on a computer bulletin board in Illinois. Kluepfel reported this information to Bell South and requested instructions, but received no response. In April of 1989, Kluepfel confirmed the 911 Bell document was available on the Illinois computer bulletin board and learned the document was additionally available without any proprietary notice on at least another computer bulletin board and had been or was being published in a computer bulletin board newsletter in edited form. In July of 1989, Kluepfel was finally - 3 - %instructed by Bell South to report the "intrusion" of its computer network to the Secret Service and that the document taken was "sensitive" and "proprietary. " Kluepfel had previously worked with the Secret Service and was known as an expert and reliable informant on computer "hacking. , 2 Thereafter, Kluepfel met Assistant U. S. Attorney William Cook in Chicago and thereafter communicated with Cook and Secret Service Agent Tim Foley. Agent Foley was in charge of this particular investigation. Around February 6, 1990, Kluepfel learned that the 911 document was available on a computer billboard entitled "Phoenix" which was operated by Loyd Blankenship in Austin, Texas. Kluepfel "downloaded" the document to put in readable form and then advised these facts to the Secret Service. Prior to February 26, 1990, Kluepfel learned that Blankenship not only operated the Phoenix bulletin board, but he was a user of the Illinois bulletin board wherein the 911 document was first disclosed, was an employee of Steve Jackson Games, Inc., and a user of the Steve Jackson Games, Inc.'s bulletin board "Illuminati." Kluepfel's investigation also determined that Blankenship was a "co-sysop" of the Illuminati bulletin board, which means that he had the ability to review anything on the Illuminati bulletin board and, importantly, maybe able to delete anything on the system. Blankenship's bulletin board Phoenix had published "hacker" information and had solicited "hacker" information relating to passwords, ostensibly to be 2 "hacker" is an individual who accesses another's computer system without authority. %analyzed in some type of decryption scheme. By February 26, 1990, Kluepfel determined that the Phoenix bulletin board was no longer accessible as he could not dial, or "log into" it. He reported this to Agent Foley. While Kluepfel advised Agent Foley that Blankenship was an employee of Steve Jackson Games, Inc., and was a user and co-sysop of Illuminati, Kluepfel never had any information whereby he was suspicious of any criminal activity by any of the Plaintiffs in this cause. Kluepfel was, and is, knowledgeable in the operation of computers, computer bulletin boards, the publishing of materials and document by computers, the communications through computer bulletin boards (both public and private communications), and could have 'logged" into the Illuminati bulletin board at any time and reviewed all of the information on the bulletin board except for the private communications referred to by the Plaintiffs as electronic communications or electronic mail, but did not do so. Kluepfel had legitimate concerns, both about the 911 document stolen from Bell South and the possibility of a decryption system which could utilize passwords in rapid fashion and could result in intrusions of computer systems, including those of the Bell System. In February of 1990, Agent Foley was also knowledgeable about computer bulletin boards and he too could have "logged" into Illuminati, become a user and reviewed all public communications on the bulletin board, but did not do so. By February 28, 1990, when the search warrant affidavit was executed, Agent Foley had received information from reliable - 5 - %sources (Kluepfel, Williams, Spain, Kibbler, Coutorie, and Niedorf , and possibly others') there had been an unlawful intrusion on the Bell South computer program, the 911 Bell South document was a sensitive and proprietary document, and that computer hackers were attempting to utilize a decryption procedure whereby unlawful intrusions could be made to computer programs including the Defense Department, and these hackers were soliciting passwords so that the decryption procedure could become operational. In addition, Agent Foley was advised Loyd Blankenship had operated his Phoenix bulletin board from his home, had published the 911 Bell South document in edited form, and had published and communicated that a decryption strategy was available and other "hackers" should submit selective passwords to finalize the decryption scheme for intrusions into computer systems by using a rapid deployment of passwords. Agent Foley was also advised that Blankenship was an employee of Steve Jackson Games and had access to the Illuminatie bulletin board as a user and a co-sysop and he may well (and in fact did) have the ability to delete any documents or information in the Steve Jackson Games computers and Illuminatie bulletin board. The only information Agent Foley had regarding Steve Jackson Games, Inc. and Steve Jackson was that he thought this was a company that put out games, but he also reviewed a printout of Illuminati on February 25, 1990, which read, "Greetings, Mortal! You have 3 'Kluepfel, Williams, Spain and Kibbler are employees of Bell South; Coutorie is a University of Texas Systems investigator assigned to investigate computer hacking; and Niedorf is a hacker involved in the Illinois bulletin board system. %entered the secret computer system of the Illuminati, the on-line home of the world's oldest and largest secret conspiracy. 5124474449300/1200/2400BAUD fronted by Steve Jackson Games, Incorporated. Fnord. " The evidence in this case strongly suggests Agent Foley, without any further investigation, misconstrued this information to believe the Illuminati bulletin board was similar in purpose to Blankenship's Phoenix bulletin board, which provided information to and was used by "hackers." Agent Foley believed, in good faith, at the time of the execution of his affidavit on February 28, 1990, there was probable cause to believe Blankenship had the 911 Bell South document and information relating to the decryption scheme stored in his computer at home or perhaps in computers, disks, or in the Illuminati bulletin board at his place of employment at Steve Jackson Games, Inc.; that these materials were involved in criminal activities; and that Blankenship had the ability to delete any information stored on any of these computers and/or disks. Unfortunately, although he was an attorney and expressly represented this fact in his affidavit, Agent Foley was not aware of the Privacy Protection Act, 42 U.S.C. 2000aa et seq., and he conducted no investigation about Steve Jackson Games, Incorporated, although a reasonable investigation of only several hours would have revealed Steve Jackson Games, Inc. was, in fact, a legitimate publisher of information to the public and Mr. Jackson would have cooperated in the investigation. Agent Foley did not know the individual Plaintiffs but did know they were users of Illuminati as - 7 - %he had a list of all users prior to February 28, 1990. Agent Foley did know and understand the Illuminati bulletin board would have users and probably would have stored private electronic communications between users. Notwithstanding the failure of any investigation regarding Steve Jackson Games, Agent Foley and Assistant U. S. Attorney Cook intended to seize and review all of the information and documents in any computer accessible to Blankenship, regardless of what other incidental information would be seized. These intentions were expressly stated in their application for a search warrant and the warrant itself.' Foley's affidavit, executed on February 28, 1990, was sufficient under the law for the issuance of a search warrant by the United States Magistrate Judge. The Court does not find from a preponderance of the evidence that the admitted errors in Foley's affidavit were intentional and so material to make the affidavit and issuance of the warrant legally improper. See, Franks v. Delaware, 438 U.S. 154, 98 S.Ct. 2674 (1978). The factual errors in the affidavit include the Bell 911 document was a computer program; the Bell 911 document was engineered at a cost of $79,449; the Bell 911 document had been 'slightly" edited; articles in 4 The Court does fault Agent Foley and the Secret Service on the failure to make any investigation of Steve Jackson Games, Inc. prior to March 1, 1990, and to contact Steve Jackson in an attempt to enlist his cooperation and obtain information from him as there was never any basis to suspect Steve Jackson or Steve Jackson Games, Inc. of any criminal activity, and there could be no questions the seizure of computers, disks, and bulletin board and all information thereon, including all back-up materials would have an adverse effect (including completely stopping all activities) on the business of Steve Jackson Games, Inc. and the users of Illuminati bulletin board. %Phrack were described as "hacker tutorials;" the Bell 911 document published in Phrack contained a proprietary notice; Blankenship was a computer programmer for Steve Jackson Games, Inc.; Blankenship's alias "Mentor" was listed as an Illuminati bulletin board user; Coutorie, prior to February 28, 1990, provided Foley with information on Steve Jackson Games, Inc.; and that Kluepfel had "logged" into Illuminati. The affidavit and warrant preparation was simply sloppy and not carefully done. Therefore, the Court denies the Plaintiff's contentions relating to the alleged improprieties involved in the issuance of the search warrant. On March 1, 1990, Agents Foley and Golden executed the search warrant. At the time of the execution, each agent had available computer experts who had been flown to Austin to advise and review the stored information in the computers, the bulletin boards, and disks seized. These computer experts certainly had the ability to review the stored information and, importantly, to copy all information contained in the computers and disks within hours. During the search of Steve Jackson Games and the seizure of the three computers, over 300 computer disks, and other materials, Agent Golden was orally advised by a Steve Jackson Games, Inc. Employee that Steve Jackson Games, Inc. was in the publishing business. Unfortunately, Agent Golden, like Foley, was unaware of the Privacy Protection Act and apparently attached no significance to this information. The evidence is undisputed that Assistant U. S. Attorney Cook would have stopped the search at the time of this notification had he been contacted. - 9 - % By March 2, 1990, Agent Foley knew Steve Jackson Games, Inc. was in the publishing business and the seizure included documents intended for publication to the public, including a book and other forms of information. He also knew or had the ability to learn the seizure of the Illuminati bulletin board included private and public electronic communications and E-mail. By March 2, 1990, Agent Foley knew that Steve Jackson Games, Incorporated, and its attorneys in Dallas and Austin, were requesting the immediate return of the properties and information seized, that transcripts of publications and the back-up materials had been seized, and that the seizure of the documents, including business records of Steve Jackson Games, Inc., and their back-up was certain to economically damage Steve Jackson Games, Inc. While Agent Foley had a legitimate concern there might be some type of program designed to delete the materials, documents, or stored information he was seeking, he admits there was no valid reason why all information seized could not have been duplicated and returned to Steve Jackson Games within a period of hours and no more than eight days from the seizure. In fact, it was months (late June 1990) before the majority of the seized materials was returned. Agent Foley simply was unaware of the law and erroneously believed he had substantial criminal information which obviously was not present, as to date, no arrests or criminal charges have ever been filed against anyone, including Blankenship. In addition, Agent Foley must have known his seizure of computers, printers, disks and other materials and his refusal to - 10 - %provide copies represented a risk of substantial harm to Steve Jackson Games, Inc. -- under circumstances where he had no reason to believe the corporation or its owner was involved in criminal activity. The Secret Service denies that its personnel or its delegates read the private electronic communications stored in the seized materials and specifically allege that this information was reviewed by use of key search words only. Additionally, the Secret Service denies the deletion of any information seized with two exceptions of "sensitive" or "illegal" information, the deletion of which was consented to by Steve Jackson. However, the preponderance of the evidence, including common sense 5, establishes that the Secret Service personnel or its delegates did read all electronic communications seized and did delete certain information and communications in addition to the two documents admitted deleted. The deletions by the Secret Service, other than the two documents consented to by Steve Jackson, were done without consent and cannot be justified. By March 2, 1990, Agent Foley, Agent Golden, and the Secret Service, if aware of the Privacy Protection Act, would have known that they had, by a search warrant, seized work products of materials from a person or entity reasonably believed to have a purpose to disseminate to the public a"book" or "similar form of public communication." 'The application and the search warrant itself was worded by Foley and Cook so that all information would be "read" by the Secret Service. - 11 - % The failure of the Secret Service after March 1, 1990, to -- promptly -- return the seized products of Steve Jackson Games, Incorporated cannot be justified and unquestionably caused economic damage to the corporation. By March 1, 1990, Steve Jackson Games, Incorporated was apparently recovering from acute financial problems and suffering severe cash flow problems. The seizure of the work product and delays of publication, whether by three weeks or several months, directly impacted on Steve Jackson Games, Incorporated. Eight employees were terminated because they could not be paid as revenues from sales came in much later than expected. However, it is also clear from a preponderance of the evidence that after the calendar year 1990, the publicity surrounding this seizure and the nature of the products sold by Steve Jackson Games, Incorporated had the effect of increasing, not decreasing, sales. In fact, Steve Jackson Games, Incorporated developed a specific game for sale based upon the March 1, 1990, seizure. The Court declines to find from a preponderance of the evidence there was any economic damage to Steve Jackson Games, Incorporated after the calendar year 1990 as a result of the seizure of March 1, 1990.' As a result of the seizure of March 1, 1990, and the retention of the equipment and documents seized, Steve Jackson Games, Incorporated sustained out-of-pocket expenses of $8,781.00. The 6 The Court finds the testimony of Joanne Midwikis, an accountant who testified on behalf of Steve Jackson Games, Inc. and Steve Jackson, on damages suffered by Steve Jackson Games, Inc. and Steve Jackson was not credible. - 12 - %personnel at this corporation had to regroup, rewrite, and duplicate substantial prior efforts to publish the book Gurps Cyberpunk and other documents stored in the computers and the Illuminati bulletin board, explain to their clientele and users of the bulletin board the difficulties of their continuing business to maintain their clientele, to purchase or lease substitute equipment and supplies, to re-establish the bulletin board, and to get the business of Steve Jackson Games, Inc. back in order. The Court has reviewed the evidence regarding annual sales and net income of Steve Jackson Games, Incorporated for 1990 and the years before and after and finds from a preponderance of the evidence there was a 6 percent loss of sales in 1990 due to the seizure and related problems. The evidence was undisputed that there was a 42 percent profit on sales of publications of Steve Jackson Games, Incorporated. Thus, Steve Jackson Games, Incorporated sustained damages in loss of sales in 1990 of $100,617.00 for a loss of profit of $42,259.00 as a direct and proximate result of the seizure of March 1, 1990, and the retention of the documents seized. After 1990, the net sales of Steve Jackson Games, Incorporated continued to increase annually in a traditional proportion as the sales had been increasing from 1988. Thus, from a preponderance of the evidence, the loss of $42,259.00 is inconsistent with the net income figures of Steve Jackson Games, Incorporated in the years immediately following and preceding 1990. Regarding damages to Steve Jackson, personally, his own testimony is that by 1990 he was becoming more active in the - 13 - %management of Steve Jackson Games, Incorporated, and spending less time in creative pursuits such as writing. Steve Jackson Games, Incorporated was in such financial condition that Chapter 11 proceedings in bankruptcy were contemplated. Thereafter, the testimony clearly established that Steve Jackson Games reasserted himself in management and was spending substantial time managing the corporation. The Court declines to find from a preponderance of the evidence that Steve Jackson personally sustained any compensatory damages as a result of the conduct of the United States Secret Service. Elizabeth McCoy, Walter Milliken and Steffan O'Sullivan also allege compensatory damages. These Plaintiffs all had stored electronic communications, or E-mail, on the Illuminati bulletin board at the time of seizure. All three of these Plaintiffs testified that they had public and private communications in storage at the time of the seizure. Steve Jackson, Elizabeth McCoy, Walter Milliken and Steffan O'Sullivan all testified that following June of 1990 some of their stored electronic communications, or E-mail, had been deleted. It is clear, as hereinafter set out, that the conduct of the United States Secret Service violated two of the three statutes which the causes of action of the Plaintiffs are based and, therefore, there are statutory damages involved, but the Court declines to find from a preponderance of the evidence that any of the individual Plaintiffs sustained any compensatory damages. - 14 - % ii. a. PRIVACY PROTECTION ACT (First Amendment Privacy Protection) 42 U.S.C. 2000aa et seq. The United States Secret Service, by Agent Foley and Assistant United States Attorney Cox, sought and obtained an order from a United States Magistrate Judge to search for and seize and thereafter read the information stored and contained in "computer hardware (including, but not limited to, central processing unit(s) monitors, memory devices, modem(s), programming equipment, communication equipment, disks, and printers) and computer software (including, but not limited to) memory disks, floppy disks, storage media) and written material and documents relating to the use of the computer system (including network access files) , documentation relating to the attacking of computers and advertising the results of computer attacks (including telephone numbers and location information), and financial documents and licensing documentation relative to the compute programs and equipment at the business known as Steve Jackson Games which constitute evidence, instrumentalities, and fruits of federal crimes, including interstate transportation of stolen property (18 U.S.C. 2314) and interstate transportation of computer access information (18 U.S.C. 1030(a)(6))." See, Warrant Application and Order. On March 1, 1990, the Secret Service seized the following property on the premises of Steve Jackson Games, Inc.: Compuadd keyboard; Packard-Bell monitor; DKT computer; cardboard box containing disks, miscellaneous papers and circuit boards; Splat %Master gun with "Mentor" on barrel; Hewlett-Packard laser jet printer; BTC keyboard with cover; IBM personal computer 5150 (disassembled); Seagate Tech hard disk; 2400 modem 1649-1795 with Dower supply and disk; IBM keyboard; Amdek mode[l] 31OA; bulletin board back-up files (approximately 150); Empac International Corporation XT computer; "WWIV" users manual; red box of floppy disks; miscellaneous papers and notes from desk; floppy disk entitled "Phoenix setup." See, Warrant Return. The evidence establishes the actual information seized, including both the primary source and back-up materials of the draft of Gurps Cyberpunk, a book intended for immediate publication (within days to weeks) , drafts of magazine and magazine articles to be published, business records of Steve Jackson Games, Incorporated (including contracts and drafts of articles by writers of Steve Jackson Games, Incorporated), the Illuminati bulletin board and its contents (including public announcements, published newsletter articles submitted to the public for review, public comment on the articles submitted and electronic mail containing both private and public communications) . Notwithstanding over 300 floppy disks being seized, the evidence introduced during trial was not clear as to what additional information was seized during the search warrant execution. However, the evidence is clear that on March 1, 1990, "work product materials, " as defined in 42 U.S.C. 2000aa-7 (b), was - 16 - %obtained as well as materials constituting "documentary materials" as defined in the same provision.' The Privacy Protection Act, 42 U.S.C. 2000aa, dictates: "Notwithstanding any other law, it shall be unlawful for a government officer or employee, in connection with the investigation . . . of a criminal offense to search for or seize any work product materials possessed by a person reasonably believed to have a purpose to disseminate to the public a newspaper, broadcast, or other similar form of public communication . . ." See, 42 U.S.C. [sec] 2000aa(a). Assuming Agent Foley was knowledgeable of the Privacy Protection Act (which he was not), neither he nor Assistant United States Attorney Cox had any information which would lead them to believe that Steve Jackson Games, Incorporated published books and materials and had a purpose to disseminate to the public its publications. Their testimony is simply they thought it a producer of games. As heretofore stated, the Court feels Agent Foley failed to make a reasonable investigation of Steve Jackson Games, Incorporated when it was apparent his intention was to take substantial properties belonging to the corporation, the removal of which could have a substantial effect on the continuation of 7 If the Secret Service, in the performance of executing Court order, had only obtained and taken the 911 document or alleged decryption materials, application of the definitions of "documentary materials" and "work product materials" would logically result in no violation of the statute under the circumstances of this case. It was the seizing all documents and information and, thereafter, the failure to promptly return the information seized which leads to violation of the statute. - 17 - %business. Agent Foley, it appears, in his zeal to obtain evidence for the criminal investigation, simply concluded Steve Jackson Games, Incorporated was somehow involved in Blankenship's alleged activities because of the wording of the Illuminati bulletin board menu. In any event, the Court declines to find from a preponderance of the evidence that on March 1, 1990, Agent Foley or any other employee or agent of the United States had reason to believe that property seized would be the work product materials of a person believed to have a purpose to disseminate to the public a newspaper, book, broadcast or other similar form of public communication.'8 8 'The legislative history to the Privacy Protection Act states: ...the Committee recognized a problem for the law en- forcement officer, who seeking to comply with the statute, might be uncertain whether the materials he sought were work product or nonwork product and that they were intended for publication. Therefore, in the interests of allowing for some objective measure for judgment by the office, the Committee has provided that the work product must be possessed by someone "reasonably believed" to have a purpose to communicate to the public. S. Rep. No. 874, 96th Cong., 2nd Sess., 10 (1980), reprinted in 1980 U.S.C.C.A.N. 3950, 3957. As the Court has stated, Agent Foley with only a few hours of investigation would have "reasonably believed" Steve Jackson Games, Incorporated had "a purpose to communicate to the public." Therefore, under an objective standard, assuming a reasonable investigation, Agent Foley and the Secret Service violated the statute on March 1, 1990. However, Agent Foley was not aware of the Privacy Protection Act and was therefore not "seeking to comply" with its requirements. Consequently, the Court found on March 1, 1990 neither Agent Foley nor any other employee or agent of the United States "reasonably believed" the materials seized were work product or Steve Jackson Games, Incorporated had a "purpose to disseminate to the public." - 18 - % During the search on March 1, and on March 2, 1990, the Secret Service was specifically advised of facts that put its employees on notice of probable violations of the Privacy Protection Act. It is no excuse that Agents Foley and Golden were not knowledgeable of the law. On March 2, 1990, and thereafter, the conduct of the United States Secret Service was in violation of 42 U.S.C. 2000aa et seq. It is clear the Secret Service continued the seizure of property of Steve Jackson Games, Incorporated including information and documents through late June of 1990. Immediate arrangements could and should have been made on March 2, 1990, whereby copies of all information seized could have been made. The government could and should have requested Steve Jackson as chief operating officer of the corporation to cooperate and provide the information available under the law. The Secret Service's refusal to return information and property requested by Mr. Jackson and his lawyers in Dallas and Austin constituted a violation of the statute. Regarding any information seized that would constitute 'documentary materials" (whereby the defensive theory of 42 U.S.C. 2000aa(b) (3) might apply) there would have been no problem as the property was in the possession of the United States Secret Service and their experts and Steve Jackson were present to ensure no destruction, alteration or concealment of information contained therein. In any event, it is the seizure of the "work product materials" that leads to the liability of the United States Secret Service and the United States in this case. Pursuant to 42 U.S.C. 2000aa-6, the Court finds from a preponderance of the evidence that Steve Jackson - 19 - %Games, Incorporated is entitled to judgement against the United States Secret Service and the United States of America for its expenses of $8,781.00 and its economic damages of $42,259.00. The Court declines to find from a preponderance of the evidence other damages of Steve Jackson Games, Incorporated or liability of the United States Secret Service or the United States of America to any other Plaintiff under the provisions of the Privacy Protection Act. b. WIRE AND ELECTRONIC COMMUNICATIONS INTERCEPTION AND INTERCEPTION OF ORAL COMMUNICATIONS 18 U.S.C. 2510 et seq. The Plaintiff s allege the United States Secret Service " s conduct also violated 18 U.S.C. 2510, et seq., as it constituted intentional interceptions of "electronic communication. " They allege the interception occurred at the time of seizure or, perhaps, at the time of review of the communication subsequent to the seizure. There is no question the individual Plaintiffs had private communications stored in Illuminati at the time of the seizure and the court has found from a preponderance of the evidence the Secret Service intended not only to seize and read these communications, but, in fact, did read the communications and thereafter deleted or destroyed some communications either intentionally or accidentally. The Defendants contend there is no violation of this particular statute under the facts of this case because there never was any unlawful "interception" within the meaning of the statute. Alternatively, the Defendants contend that the "good faith reliance" on the search warrant issued by the - 20 - %United States Magistrate Judge is a complete defense under Section 2520 . The Government relies on the 1976 Fifth Circuit case of the United States v. Turk, 526 F.2d 654 (5th Cir. 1976), cert denied, 429 U.S. 823, 97 S.Ct. 74 (1976), and its interpretation of the statutory definition of "interception." In Turk, police officers listened to the contents of a cassette tape without first obtaining a warrant. The court concluded this was not an "interception" under 18 U.S.C. [sec] 2510 et seq. Whether the seizure and replaying of the cassette tape by the officers was also an "interception" depends on the definition to be given "aural acquisition." Under one conceivable reading, and "aural acquisition" could be said to occur whenever someone physically hears the contents of a communication, and thus the use of the tape player by the officers to hear the previously recorded conversation might fall within the definition set out above. No explicit limitation of coverage to contemporaneous "acquisitions" appears in the Act. We believe that a different interpretation -- one which would exclude from the definition of "intercept" the replaying of a previously recorded conversation -- has a much firmer basis in the language of S 2510(4) and in logic, and corresponds more closely to the policies reflected in the legislative history. The words "acquisition... through the use of any ... device" suggest that the central concern is with the activity engaged in a the time of the oral communication which causes such communication to be overheard by uninvited listeners. If a person secrets a recorder in a room and thereby records a conversation between two others, an "acquisition" occurs at the time the recording is made. This acquisition itself might be said to be "aural" because the contents of the conversation are preserved in a form which permits the later aural disclosure of the contents. Alternatively, a court facing the issue might conclude that an "aural acquisition" is accomplished only when two steps are completed -- the initial acquisition by the device and the hearing of the communication by the person or persons responsible for the recording. Either of these definitions would require participation by the one charged with an "interception" in the contemporaneous acquisition of the communication through the use to the device. The argument that a new and different "aural acquisition" occurs each time a recording of an oral % communication is replayed is unpersuasive. That would mean that innumerable "interceptions," and thus violations of the Act, could follow from a single recording. Id., at 657-658 (footnotes omitted). While the Fifth Circuit authority relates to the predecessor statute, Congress intended no change in the existing definition of "intercept" in amending the statute in 1986. See, S. Rep. No. 541, 99th Cong., 2nd Sess. 13 (1986), reprinted in 1986 U.S.C.C.A.N. 3555, 3567 ("Section 101(a)(3) of the ELECTRONIC COMMUNICATIONS PRIVACY ACT amends the definition of the term "intercept" in current section 2510(4) of title 18 to cover electronic communications. The definition of "intercept" under current law is retained with respect to wire and oral communications except that the term "or other" is inserted after "aural." This amendment clarifies that it is illegal to intercept the non-voice portion of a wire communication."). The Court finds this argument persuasive when considering the Congressional enactment of the Stored Wire and Electronic Communications and Transactional Records Access Act, 18 U.S.C. 2701, et seq. The Court declines to find liability for any Plaintiff against the Defendants pursuant to the Wire and Electronic Communications Interception and Interception of Oral Communications Act, 18 U.S.C.2510, et seq., and specifically holds that the alleged "interceptions" under the facts of this case are not "interceptions"contemplated by the wire and Electronic Communications Interception and Interception of Oral Communications Act. It simply has no applicability to the facts of this case. - 22- % c. STORED WIRE AND ELECTRONIC COMMUNICATIONS AND TRANSACTIONAL RECORDS ACCESS 18 U.S.C. [sec] 2701 et seq. Prior to February 28, 1990, Agent Foley, Assistant United States Attorney Cox, and the computer consultants working with them were cognizant of public computer bulletin boards and the use of electronic communications and E-mail through them. Each of the persons involved in this investigation, including Agent Foley, had the knowledge and opportunity to log into the Illuminati bulletin board, review its menu and user lists, obtain passwords, and thereafter review all information available to the public. In fact, Agent Foley erroneously thought Kluepfel had done this when a printout of Illuminati documents dated February 25, 1990, was received. When Foley applied for the search warrant on February 28, 1990, he knew the Illuminati bulletin board provided services to the public whereby its users could store public and private electronic communications. While Foley admits no knowledge of the Privacy Protection Act and its provisions protecting publishers of information to the public, he testified he was knowledgeable regarding the Wire and Electronic Communications Interception and Interception of Oral Communications Act. But, Foley never thought of the law's applicability under the facts of this case. Steve Jackson Games, Inc., through its Illuminati bulletin board services, was a "remote computing service" within the definition of Section 2711, and, therefore, the only procedure available to the Secret Service to obtain "disclosure" of the contents of electronic - 23 - %communications was to comply with this statute. See, 18 U.S.C. 2 7 0 3 . Agent Foley and the Secret Service, however, wanted more than "disclosure" of the contents of the communication. As the search warrant application evidences, the Secret Service wanted seizure of all information and the authority to review and read all electronic communications, both public and private. A court order for such disclosure is only to issue if "there is a reason to believe the contents of a[n] . . . electronic communication . are relevant to a legitimate law enforcement inquiry." See, 18 U.S.C. S 2703(d). Agent Foley did not advise the United States Magistrate Judge, by affidavit or otherwise, that the Illuminati bulletin board contained private electronic communications between users or how the disclosure of the content of these communications could relate to his investigation. Foley's only knowledge was that Blankenship had published part of the 911 document and decryption information in his Phoenix bulletin board, was employed at Steve Jackson Games, Inc. , and could have the ability to store and delete these alleged unlawful documents in the computers or Illuminati bulletin board at Steve Jackson Games, Incorporated. At Agent Foley's specific request, the application and affidavit for the search warrant were sealed. The evidence establishes the Plaintiffs were not able to ascertain the reasons for the March 1, 1990 seizure until after the return of most of the property in June of 1990, and then only by the efforts of the offices of both United States Senators of the State of Texas. The procedures followed by the Secret Service in this case virtually eliminated the safeguards - 24 - %contained in the statute. For example, no Plaintiff was on notice that the search or seizure order was made pursuant to this statute and that Steve Jackson Games, Incorporated could move to quash or modify the order or eliminate or reduce any undue burden on it by reason of the order. See, 18 U.S.C. [sec] 2703(d). The provisions of the statute regarding the preparation of back-up copies of the documents or information seized were never utilized or available. See, 18 U.S.C. [sec] 2704. Agent Foley stated his concern was to prevent the destruction of the documents' content and for the Secret Service to take the time necessary to carefully review all of the information seized. He feared Blankenship could possibly delete the incriminating documents or could have programmed destruction in some manner. Notwithstanding that any alteration or destruction by Blankenship, Steve Jackson, or anyone else would constitute a criminal offense under this statute, Foley and the Secret Service seized -- not just obtained disclosure of the content -- all of the electronic communications stored in the Illuminati bulletin board involving the Plaintiffs in this case. This conduct exceeded the Government's authority under the statute. The Government Defendants contend there is no liability for alleged violation of the statute as Foley and the Secret Service had a "good faith" reliance on the February 28, 1990, court order/search warrant. The Court declines to find this defense by a preponderance of the evidence in this case. Steve Jackson Games, Incorporated, as the provider and each individual Plaintiffs as either subscribers or customers were - 25 - %"aggrieved" by the conduct of the Secret Service in the violation of this statute. While the Court declines to find from a preponderance of the credible evidence the compensatory damages sought by each Plaintiff, the Court will assess the statutory damages of $1,000.00 for each Plaintiff. III. SUMMARY This is a complex case. It is still not clear how sensitive and/or proprietary the 911 document was (and is) or how genuinely harmful the potential decryption scheme may have been or if either were discovered by the Secret Service in the information seized on March 1, 1990. The fact that no criminal charges have ever been filed and the investigation remains "on going" is, of course, not conclusive. The complexity of this case results from the Secret Service's insufficient investigation and its lack of knowledge of the specific laws that could apply to their conduct on February 28, 1990 and thereafter. It appears obvious neither the government employees nor the Plaintiffs or their lawyers contemplated the statute upon which this case is brought back in February, March, April, May or June of 1990. But this does not provide assistance to the defense of the case. The Secret Service and its personnel are the entities that citizens, like each of the Plaintiffs, rely upon and look to protect their rights and properties. The Secret Service conduct resulted in the seizure of property, products, business records, business documents, and electronic communications - 26 - %of a corporation and f our individual citizens that the statutes were intended to protect. It may well be, as the Government Defendants contend, these statutes relied upon by the Plaintiff s should not apply to the facts of this case, as these holdings may result in the government having great difficulties in obtaining information or computer documents representing illegal activities. But this Court cannot amend or rewrite the statutes involved. The Secret Service must go to the Congress for relief. Until that time, this Court recommends better education, investigation and strict compliance with the statutes as written. The Plaintiffs are ordered to submit application for attorney's fees and costs with appropriate supporting affidavits within ten (10) days of the date of this order. The Defendants will have ten days thereafter to file their responses. SIGNED this the s/12 day of March, 1993. Sam Sparks United States District Judge -27- ------------------------------ End of Computer Underground Digest #5.22 ************************************