📄 riggs_~1.txt
字号:
CASE COMMENT -------------- UNITED STATES v. RIGGS: JACKING INTO THE NET WITH THE ILLINOIS DISTRICT COURT -by Jay Wood*********************************************************************The following article is a candidate for publication in the RutgersComputer and Technology Law Journal, therefore it is (c) copyright1992 by the author. You may re-post this file freely (as long asyou don't make any changes), but you may not publish the text or asubstantial portion thereof in any form (i.e., print it up and sellit, include it in your newsletter, etc.). If you mention this article,you must mention that it is a candidate for publication in the RutgersComputer and Technology Law Journal (for the 1992-93 academic year);if you wish to quote from or reproduce a substantial part of thearticle, please contact me.Comments on the text are extremely welcome.-Jay Wood InterNet: jwood@andromeda.rutgers.edu CompuServe: 70540,1252 AOL: JayW9********************************************************************** (FOOTNOTES ARE AT END OF TEXT)I. INTRODUCTION The rapid pace of technological innovation has given manycreative individuals the ability to work mischief withoutviolating any statutes. The range of possible "offenses" oftenexceeds the imagination of the legislature. Prosecutors and courtswho are faced with these individuals must make a difficult choice:they must either let these "criminals" go free, or attempt tostretch existing laws to cover the (purportedly) culpable conduct.Efforts to avoid this dilemma have frequently focused oncriminalizing activities at the periphery of the undesirableconduct. Some legislatures have approached the problem (in thearea of narcotics) with so-called "designer drug" laws.\1\ A UnitedStates District Court presented its solution to the problem in thearea of "computer crime" in the case of United States v. Riggs.\2\ The facts of the case are deceptively simple. Robert Riggs wasa computer enthusiast (a "hacker") who was able to gain access toa computer that was owned and operated by the Bell South telephonecompany. He accomplished this feat from his home, using a personalcomputer and a modem to connect with the Bell South computer overordinary telephone lines.\3\ His access, although unauthorized, wentundetected by the phone company, and he was able to find and copya text file detailing the operations and maintenance of BellSouth's Emergency 911 response system to a disk in his home.\4\ While pursuing his interest in computer and communicationtechnology, Riggs had become acquainted with Craig Neidorf, anamateur journalist whose magazine "Phrack"\5\ was distributed bymodem to computer and telecommunications hobbyists through aninformal network of computer bulletin boards.\6\ Riggs and Neidorfagreed that the Emergency 911 information would be of interest toPhrack's readers, and made plans to include it in an upcomingissue.\7\ So that the document could be readied for publication,Riggs uploaded (transferred) a copy of the text file from his homein Georgia to a bulletin board system in Illinois, enablingNeidorf to retrieve it in his home in Missouri.\8\ Neidorf edited thereport to remove features that would identify it's source, andsent the edited document (via telephone) to the Illinois BBS forRiggs' approval.\9\ At some point during this transaction, the operator of theIllinois bulletin board became concerned that potentiallysensitive information was being exchanged through his equipment.Fearing that this might subject him to some sort of liability, henotified the appropriate authorities.\10\ As a reward for hisdiligence, his computer was confiscated by the Secret Service andhis bulletin board was shut down.\11\ Neidorf and Riggs were located,and the instant prosecution began. The pair was charged with wire fraud,\12\ InterstateTransportation of Stolen Property,\13\ and one violation of theComputer Fraud and Abuse Act.\14\ Robert Riggs plead guilty to thecharge of wire fraud, on the basis of his activities in gainingthe unauthorized access to Bell South's computer.\15\ Craig Neidorfchallenged the validity of the charges against him, and moved thatthey be dismissed.\16\ His challenge cited several grounds fordismissal, relying principally on the contention that he could notbe charged under the National Stolen Property Act when nothingtangible had ever been removed from Bell South's possession, andnothing tangible had moved in interstate commerce.\17\ Based on itsreading (by analogy) of the relevant precedents,\18\ the court foundthat the indictment was valid and denied Neidorf's motions fordismissal.\19\ Although the charges were dropped only a few days intothe trial (when it became apparent that the document in questionwas neither very secret nor very valuable),\20\ the Riggs court'sholdings (that the National Stolen Property Act and wire fraudstatutes can apply to the computerized acquisition anddissemination of text information) remain good law and are likelyto be persuasive to other judges as they attempt to map out thecontours of criminal sanctions for computer activity.II. BACKGROUND For their efforts in making the Bell South documents availableto the world, Robert Riggs and Craig Neidorf were charged withviolating the Computer Fraud and Abuse Act of 1986,\21\ the NationalStolen Property Act,\22\ and the wire fraud statute.\23\ No previouscase had ever applied these statutes to a purely electronictransaction of the sort engaged in here. The closest analogies thecourt was able to find in the area of electronic communicationswere those dealing with the wire transfer of illegally acquiredfunds.\24\ Another sstrain of cases on which the court relied forguidance related to the theft of trade secret information.\25\ Thetrade secret cases are similar in that the value of the itemstolen is frequently negligible (often nothing more than a sheetof paper), although the value of the information may be quitesignificant. In addition to these parallels, the court drew support from itsunderstanding of the legislative intent behind the statutes underwhich Riggs and Neidorf were charged, and the appropriateconstruction that implies.\26\ A proper understanding of the historyand purpose of these acts is therefore required in order toeffectively evaluate the court's decision.A. The Computer Fraud and Abuse Act of 1986 The Computer Fraud and Abuse Act of 1986\27\ is an amended versionof a 1984 statute entitled the Counterfeit Access Device andComputer Fraud and Abuse Act of 1984.\28\ The 1984 Act was intendedto protect consumer credit records and computers in which thegovernment had an interest, and proscribed the unauthorized accessor use of a computer operated by or on behalf of the government ofthe United States.\29\ The amendment was occasioned by the greatvolume of criticism which the 1984 Act received, both for itsnarrowness and for what was perceived as poor drafting.\30\ Harshcriticism was leveled at the 1984 Act for its failure to define anumber of key terms, such as "access," "authorization," and"use."\31\ It was also strongly suggested by the Justice Departmentand the National District Attorney's Association that a fraudoffense (modelled after the federal mail and wire fraud statutes)be included in any amendment to the Act.\32\ This was attributable toa belief that existing statutes were insufficiently adaptable tomany computer-related crimes,\33\ as well as to concerns, similar tothose which motivated the passage of the National Stolen PropertyAct, that jurisdictional problems would prove insurmountable forstates that are attempting to address these problems through locallegislation.\34\ The 1986 Act attempted to address these concerns by definingsome of its more ambiguous terms and expanding the scope of theprohibited activities.\35\ Congress refused, however, to include thefraud offense urged by the District Attorneys\36\ or to fullyfederalize computer-related crime.\37\ The most important change inthe 1986 Act, as it relates to Riggs, is the addition of aprovision prohibiting the trafficking in computer passwords.\38\ Thissection of the statute, intended to address the perceived problemof computer hackers trading passwords over "pirate bulletinboards,"\39\ directly implicated the questions that arose in applyingthe National Stolen Property Act to Riggs. In other words, doesthe electronic transmission of information to individuals in otherstates constitute interstate commerce? Apparently, by passing thisAct, Congress intended to answer that question in the affirmative.B. The National Stolen Property Act The National Stolen Property Act (or NSPA) finds its origin inthe National Motor Vehicle Theft Act,\40\ a 1919 law designed to fillthe jurisdictional gap that is created when a criminal takes astolen car to another state for its ultimate disposal.\41\ Because anautomobile is a valuable thing that is uniquely suited for removalto another jurisdiction,\42\ it was felt that special federallegislation (based on the commerce clause power) was needed to aidthe states in what are otherwise essentially local efforts at lawenforcement.\43\ Demonstrating their continued concern that "criminals havemade full use of the improved methods of transportation andcommunication, and have taken advantage of the limitedjurisdiction possessed by State authorities in pursuing fugitivecriminals,"\44\ Congress extended the NMVTA in 1934 to includeproperty other than vehicles. The National Stolen Property Act\45\prohibited the transportation in interstate commerce of "anygoods, wares, merchandise, securities or money, of the value of$5,000 or more, knowing the same to have been stolen, converted ortaken by fraud."\46\ The statute has been successfully applied in several cases tocriminalize the wire transfer of stolen funds.\47\ The statute hasalso been applied in cases where the bulk of the value of thestolen property comes from its status as a trade secret (e.g.,stolen geophysical maps, the intrinsic value of which (the paperand ink) is negligible).\48\ No court, however, had ever held thatsection 2314 was applicable when nothing tangible had been takenfrom the possession of the "crime victim." Indeed, the Court ofAppeals for the Second Circuit noted that "where no tangibleobjects were ever taken or transported, a court would be hardpressed to conclude that 'goods' had been stolen and transportedwithin the meaning of 2314"\49\ and suggested that "the statutewould presumably not extend to the case where a carefully guardedsecret formula was memorized, carried away in the recesses of athievish mind and placed in writing only after a boundary had beencrossed."\50\ Such a case had never reached the bar, and the Riggscourt appears to have been unconvinced by the Second Circuit'sreasoning.C. Wire Fraud As the NMVTA begat the NSPA, the laws prohibiting fraudsthrough the mail grew to produce the wire fraud statutes.\51\ Theoriginal impetus for the mail fraud legislation appears to havebeen the fear that the increased accessibility of remote andinnocent country dwellers (resulting from the efficient nationalmail routes) would dramatically multiply the opportunities forunscrupulous inhabitants of large cities to prey upon them.\52\ Asthe technology of communication advanced, however, the mail was nolonger the most efficient means of contacting remote citizens. Thenumber of activities that the legislature wished to proscribeincreased, and the wire fraud statute\53\ was born. Somewhere in the process, the rationale for the prohibitionsseemed to change. Although the mail fraud statutes were originallyjustified as a way to prevent "thieves, forgers, and rapscallionsgenerally"\54\ from exploiting the "innocent people of the country,"\55\the prohibitions against using the interstate wire system forfraudulent purposes are generally accepted for reasons similar tothose underlying the NSPA. Criminals, it is argued, have made suchexcellent use of the advances in technology that "new lawenforcement tools" are required to combat their increasinglysophisticated crime. As a result, the statute requires a veryminimal use of the wire system to become applicable.\56\ The primaryimportance of the use of interstate wires is that it provides amechanism (through the commerce clause) for the Federal governmentto gain jurisdiction over the offense. Wire communication hasnever been held to be an integral part of the offense itself.\57\Of course, the government may not simply rest after showingthat a defendant used the interstate wire system. If theirapplication of the statute is to be successful, the prosecutionmust demonstrate that the use of the wires was in furtherance of ascheme to defraud.\58\ However, that requirement has never been verydemanding. Fraud, defined broadly, includes "anything calculatedto deceive,"\59\ and the term has been construed quite liberally inthe context of mail and wire fraud statutes.\60\III. ANALYSIS The Riggs court approached the issues in this casesequentially, addressing the application of each statute in turnas they were listed in the indictment. In the interest of clarityand consistency, the discussion below will be arranged in the samemanner.A. Wire Fraud In Neidorf's motion for the dismissal of the charges againsthim, he argued that the wire fraud claim was defective because itfailed to allege the existence an actual scheme to defraud.\61\ Theallegations that Neidorf received and later transferred a computertext file did not show proof of a scheme to defraud, he argued,and in the absence of a fiduciary relationship between himself andBell South, Neidorf could not be held to have violated any of thetelephone company's intangible rights.\62\ Furthermore, Neidorfclaimed, his role in the situation was more akin to that of an"innocent tippee" in a securities case than to that of acoconspirator.\63\ This argument, if accepted, would mean that theonly relevant question should have been whether or not he had aduty to disclose the proprietary information which he had (throughno wrongdoing of his own) come into possession of.\64\ Not surprisingly, considering the broad sweep of section 1343,the court gave little credence to either of these arguments.Neidorf's role in formulating a plan to publish the E911 document,and his efforts at editing it to disguise its source, werethemselves acts taken in furtherance of a scheme to defraud,according to the court.\65\ This scheme, as described by the court,was the plan "to steal the E911 text file from Bell South and todistribute it to others via the PHRACK newsletter."\66\ The fraudwas nothing more than a "wronging [of] one in his propertyrights."\67\ The wrong in this case, apparently, was thedissemination of proprietary information without it's ownersconsent. In rejecting Neidorf's arguments, the court held that the fraudstatute did not require a fiduciary relationship between Neidorf
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -