⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 sj-dec~1.txt

📁 黑客培训教程
💻 TXT
📖 第 1 页 / 共 4 页
字号:
     reading, and "aural acquisition" could be said to occur     whenever someone physically hears the contents of a     communication, and thus the use of the tape player by the     officers to hear the previously recorded conversation might     fall within the definition set out above. No explicit     limitation of coverage to contemporaneous "acquisitions"     appears in the Act.          We believe that a different interpretation -- one which     would exclude from the definition of "intercept" the replaying     of a previously recorded conversation -- has a much firmer     basis in the language of S 2510(4) and in logic, and     corresponds more closely to the policies reflected in the     legislative history. The words "acquisition... through the use     of any ... device" suggest that the central concern is with     the activity engaged in a the time of the oral communication     which causes such communication to be overheard by uninvited     listeners. If a person secrets a recorder in a room and     thereby records a conversation between two others, an     "acquisition" occurs at the time the recording is made. This     acquisition itself might be said to be "aural" because the     contents of the conversation are preserved in a form which     permits the later aural disclosure of the contents.     Alternatively, a court facing the issue might conclude that an     "aural acquisition" is accomplished only when two steps are     completed -- the initial acquisition by the device and the     hearing of the communication by the person or persons     responsible for the recording. Either of these definitions     would require participation by the one charged with an     "interception" in the contemporaneous acquisition of the     communication through the use to the device. The argument that     a new and different "aural acquisition" occurs each time a     recording of an oral     communication is replayed is unpersuasive. That would mean     that innumerable "interceptions," and thus violations of the     Act, could follow from a single recording.Id., at 657-658 (footnotes omitted). While the Fifth Circuitauthority relates to the predecessor statute, Congress intended nochange in the existing definition of "intercept" in amending thestatute in 1986. See, S. Rep. No. 541, 99th Cong., 2nd Sess. 13(1986), reprinted in 1986 U.S.C.C.A.N. 3555, 3567 ("Section101(a)(3) of the ELECTRONIC COMMUNICATIONS PRIVACY ACT amends thedefinition of the term "intercept" in current section 2510(4) oftitle 18 to cover electronic communications. The definition of"intercept" under current law is retained with respect to wire andoral communications except that the term "or other" is insertedafter "aural." This amendment clarifies that it is illegal tointercept the non-voice portion of a wire communication."). TheCourt finds this argument persuasive when considering theCongressional enactment of the Stored Wire and ElectronicCommunications and Transactional Records Access Act, 18 U.S.C.2701, et seq.     The Court declines to find liability for any Plaintiff againstthe Defendants pursuant to the Wire and Electronic CommunicationsInterception and Interception of Oral Communications Act, 18U.S.C.2510, et seq., and specifically holds that the alleged"interceptions" under the facts of this case are not"interceptions"contemplated by the wire and ElectronicCommunications Interception and Interception of Oral CommunicationsAct. It simply has no applicability to the facts of this case.                              - 22-                               c.            STORED WIRE AND ELECTRONIC COMMUNICATIONS                AND TRANSACTIONAL RECORDS ACCESS                  18 U.S.C. [sec] 2701 et seq.     Prior to February 28, 1990, Agent Foley, Assistant UnitedStates Attorney Cox, and the computer consultants working with themwere cognizant of public computer bulletin boards and the use ofelectronic communications and E-mail through them. Each of thepersons involved in this investigation, including Agent Foley, hadthe knowledge and opportunity to log into the Illuminati bulletinboard, review its menu and user lists, obtain passwords, andthereafter review all information available to the public. In fact,Agent Foley erroneously thought Kluepfel had done this when aprintout of Illuminati documents dated February 25, 1990, wasreceived. When Foley applied for the search warrant on February 28,1990, he knew the Illuminati bulletin board provided services tothe public whereby its users could store public and privateelectronic communications. While Foley admits no knowledge of thePrivacy Protection Act and its provisions protecting publishers ofinformation to the public, he testified he was knowledgeableregarding the Wire and Electronic Communications Interception andInterception of Oral Communications Act. But, Foley never thoughtof the law's applicability under the facts of this case. SteveJackson Games, Inc., through its Illuminati bulletin boardservices, was a "remote computing service" within the definition ofSection 2711, and, therefore, the only procedure available to theSecret Service to obtain "disclosure" of the contents of electronic          - 23 -communications was to comply with this statute. See,  18 U.S.C. 27 0 3 . Agent Foley and the Secret Service, however, wanted morethan "disclosure" of the contents of the communication. As thesearch warrant application evidences, the Secret Service wantedseizure of all information and the authority to review and read allelectronic communications, both public and private. A court orderfor such disclosure is only to issue if "there is a reason tobelieve the contents of a[n] . . . electronic communication . arerelevant to a legitimate law enforcement inquiry." See, 18 U.S.C.S 2703(d). Agent Foley did not advise the United States MagistrateJudge, by affidavit or otherwise, that the Illuminati bulletinboard contained private electronic communications between users orhow the disclosure of the content of these communications couldrelate to his investigation. Foley's only knowledge was thatBlankenship had published part of the 911 document and decryptioninformation in his Phoenix bulletin board, was employed at SteveJackson Games, Inc. , and could have the ability to store anddelete these alleged unlawful documents in the computers orIlluminati bulletin board at Steve Jackson Games, Incorporated. AtAgent Foley's specific request, the application and affidavit forthe search warrant were sealed.                            Theevidence establishes the Plaintiffs were not able to ascertain thereasons for the March 1, 1990 seizure until after the return ofmost of the property in June of 1990, and then only by the effortsof the offices of both United States Senators of the State ofTexas. The procedures followed by the Secret Service in this casevirtually eliminated the safeguards     - 24 -contained in the statute. For example, no Plaintiff was on noticethat the search or seizure order was made pursuant to this statuteand that Steve Jackson Games, Incorporated could move to quash ormodify the order or eliminate or reduce any undue burden on it byreason of the order. See, 18 U.S.C. [sec] 2703(d). The provisionsof the statute regarding the preparation of back-up copies of thedocuments or information seized were never utilized or available.See, 18 U.S.C. [sec] 2704. Agent Foley stated his concern was toprevent the destruction of the documents' content and for theSecret Service to take the time necessary to carefully review allof the information seized. He feared Blankenship could possiblydelete the incriminating documents or could have programmeddestruction in some manner. Notwithstanding that any alteration ordestruction by Blankenship, Steve Jackson, or anyone else wouldconstitute a criminal offense under this statute, Foley and theSecret Service seized -- not just obtained disclosure of thecontent -- all of the electronic communications stored in theIlluminati bulletin board involving the Plaintiffs in this case.This conduct exceeded the Government's authority under the statute.     The Government Defendants contend there is no liability foralleged violation of the statute as Foley and the Secret Servicehad a "good faith" reliance on the February 28, 1990, courtorder/search warrant. The Court declines to find this defense by apreponderance of the evidence in this case.     Steve Jackson Games, Incorporated, as the provider and eachindividual Plaintiffs as either subscribers or customers were          - 25 -"aggrieved" by the conduct of the Secret Service in the violationof this statute.  While the Court declines to find from apreponderance of the credible evidence the compensatory damagessought by each Plaintiff, the Court will assess the statutorydamages of $1,000.00 for each Plaintiff.                          III. SUMMARY     This is a complex case. It is still not clear how sensitiveand/or proprietary the 911 document was (and is) or how genuinelyharmful the potential decryption scheme may have been or if eitherwere discovered by the Secret Service in the information seized onMarch 1, 1990. The fact that no criminal charges have ever beenfiled and the investigation remains "on going" is, of course, notconclusive.     The complexity of this case results from the Secret Service'sinsufficient investigation and its lack of knowledge of thespecific laws that could apply to their conduct on February 28,1990 and thereafter. It appears obvious neither the governmentemployees nor the Plaintiffs or their lawyers contemplated thestatute upon which this case is brought back in February, March,April, May or June of 1990. But this does not provide assistance tothe defense of the case. The Secret Service and its personnel arethe entities that citizens, like each of the Plaintiffs, rely uponand look to protect their rights and properties. The Secret Serviceconduct resulted in the seizure of property, products, businessrecords, business documents, and electronic communications          - 26 -of a corporation and f our individual citizens that the statuteswere intended to protect.     It may well be, as the Government Defendants contend, thesestatutes relied upon by the Plaintiff s should not apply to thefacts of this case, as these holdings may result in the governmenthaving great difficulties in obtaining information or computerdocuments representing illegal activities. But this Court cannotamend or rewrite the statutes involved. The Secret Service must goto the Congress for relief. Until that time, this Court recommendsbetter education, investigation and strict compliance with thestatutes as written.     The Plaintiffs are ordered to submit application forattorney's fees and costs with appropriate supporting affidavitswithin ten (10) days of the date of this order. The Defendants willhave ten days thereafter to file their responses.     SIGNED this the s/12  day of March, 1993.          Sam Sparks United States District Judge                              -27-

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -