📄 riggs_~1.txt
字号:
and Bell South, in part because the wrong that was alleged was nota violation of an intangible right.\68\ The opinion noted that a wirefraud charge based solely upon the deprivation of an intangibleright would not stand, even if a fiduciary relationship could bedemonstrated.\69\ However, the court found, "valuable, confidentialinformation is 'property,' the deprivation of which can form thebasis of a wire fraud charge under 1343."\70\ Since all of therights in and value of a piece of proprietary information arisefrom its confidentiality, and Riggs' and Neidorf's activities hadindisputably deprived Bell South of that confidentiality, theiractions presumably constituted deprivation.\71\ In a final blow, the Court rejected Neidorf's contention thathis role was like that of an innocent tippee. They did this on thegrounds that Neidorf had been completely aware of Riggs'activities from their inception, and had agreed to help concealthe theft. This concealment, if effective, would have made thefraud complete.\72\ In order to qualify himself as an innocenttippee, Neidorf would have had to acquire the information legally.Since his activities constitute participation in the "theft," hewas held not to have done so.\73\B. The National Stolen Property Act The prosecution's application of the National Stolen PropertyAct to Neidorf's activities led the court further into unchartedwaters. Neidorf contended, among other things, that thegovernment's interpretation of section 2314 was faulty becauseelectronic impulses, which were all that he had actually caused tocross state lines, did not fit within the definition of "goods,wares, or merchandise" as set forth in the statute.\74\ Relying on ananalogy to the wire transfer of illegally obtained money, thecourt rejected this argument.\75\ Several cases, notably UnitedStates v. Gilboe,\76\ have held that section 2314 applies to theelectronic transfer of stolen money, since the "[e]lectronicsignals in this context are the means by which funds aretransported. The beginning of the transaction is money in oneaccount and the ending is money in another."\77\ Similarly, "theinformation in the E911 text file was accessible at Neidorf'scomputer terminal in Missouri before he transferred it, and theinformation was also accessible at the Lockport, Illinois computerbulletin board after Neidorf transferred it."\78\ The manner in whichthe transmission occurred does not affect the result. The more important question, according to the court, is whetheror not the information is a "good, ware, or merchandise" forpurposes of the statute.\79\ Citing several cases holding thatinformation fixed in a tangible medium can constitute a "good" forsection 2314 purposes,\80\ the court reasoned that if the informationhad been contained on a floppy disk, or was printed out byNeidorf, and the disk or printout had been transported to anotherstate, the NSPA would apply because the disk or paper wouldclearly be "good."\81\ There was no reason to hold differently, theyconcluded, merely because in this case the information stayedinside the computer.\82\ The Riggs court continued by specifically declining to holdthat tangibility was a requirement of the "goods, wares, ormerchandise" language in the National Stolen Property Act.\83\ As analternative, they found that a text file would be sufficientlytangible to meet such a requirement if it were imposed, since thiskind of information is easily accessible to anyone who "simplypresse[s] the right buttons on their computer."\84\ An additional barrier to applying the NSPA against CraigNeidorf is the Act's requirement that the transferred goods havein fact been stolen. Relying on Dowling v. United States,\85\ Neidorfargued that the thing he had transferred, like an illegalrecording, was nothing more than an image of the thing to whichthe ownership attached, and not that thing itself. The necessaryconclusion is that Neidorf had merely infringed upon the ownersrights to control the reproduction of the information, which isnot the same thing as theft or conversion.\86\ The court rejected the metaphysical subtleties of thisargument, distinguishing the instant case from Dowling on thegrounds that "[t]he owner of confidential, proprietary businessinformation, in contrast [to the holder of a copyright], possessessomething which has clearly been recognized as an item ofproperty."\87\ Although Congress has specifically legislated on thesubject of copyrights, and thereby precluded the application ofsection 2314 to copyright infringement, there has been no similarruling regarding proprietary information. Therefore, theyconclude, section 2314 may properly be applied.\88\C. The Computer Fraud and Abuse Act "In his final gasp,"\89\ Neidorf attempted to argue that theComputer Fraud and Abuse Act, like the Copyright Act in Dowling,precludes the application of other statutes against actions thatfall under its jurisdiction.\90\ The rationale for this is that theCongress, by passing the CFAA, has indicated its intent to fullyaddress computer-related crime. Based on its inability to findsupport for this contention in the legislative record, andNeidorf's failure to provide any, the court dismissed thisargument as well.\91\IV. EVALUATION The court's analysis of the issues raised by Riggs, although inmany respects quite astute, contains several questionableassertions. Chiefly these are attributable to the court's failureto adequately understand the dimensions of the computerized worldin which Riggs and Neidorf were acting, and the ways in which thecomputerization mattered. Other problems resulted from theirfailure to consider how relatively minor variations in the factsmight have caused them to come to a radically differentconclusion. It is not surprising in a case like Riggs, which wasone of first impression, and involved a number of dramatic andemotionally charged issues, that there are areas in which thearguments (especially those from analogy) are weaker than onemight like. The discussion below will attempt to address theseconcerns, again in the order in which they were addressed by thecourt.A. Wire Fraud It is difficult to find fault with the court's reasoning withrespect to the wire fraud charge. Given the broad scope ofoffenses to which the statute has been held to apply,\92\ the courthad precedent on its side when it held that Neidorf's efforts infurtherance of the publication of the E911 document weresufficient to constitute the elements of the fraud part of theoffense.\93\ Neidorf's most favorable argument on this issue focusedon the fact that Bell South not only suffered no monetary loss,but was at no point deprived of the use or possession of any ofits property.\94\ The contents of Bell South's computer storagesystem were exactly the same after Riggs' unauthorized entry and"theft" as they had been before he got in.\95\ This is why the phonecompany did not detect the "theft" on their own: their use of theinformation was in no way impaired by the fact that it had beencopied by Riggs. Unfortunately for Neidorf, no less an authority than theSupreme Court has held that this line of argument must fail. InCarpenter v. United States,\96\ a reporter for the Wall StreetJournal's influential "Heard on the Street" column entered into ascheme with several stockbrokers in which he would provide themwith information that was scheduled for publication in the columnprior to the date it appeared in print.\97\ This sharing of pre-publication information was a violation of the newspaper'sofficial policy and practice.\98\ When they received these "insidertips," the brokers would buy and sell stocks in such a way thatthey were able to (and did) profit from the effects that thecolumn had on the stock market.\99\ These profits were shared withthe reporter.\100\ R. Foster Winans (the reporter) was convicted of wire fraud,and appealed the conviction on the grounds that neither he nor hiscohorts had obtained money or property from the journal.\101\ Winansfurther argued that his activities had not interfered with theJournal's use of its property (the information).\102\ The SupremeCourt ruled against him, holding that the conviction withstoodthese objections since the fraud part of the statute required onlya "wronging [of] one in his property right[s]."\103\ The violation ofthe confidentiality of The Journal's information met thisstandard.\104\ Although this decision would seem to lend support to thecourt's conclusion in the Riggs case, the situations aredistinguishable in at least one important respect. While the"theft" of information at issue in Carpenter resulted in nofinancial loss to the Wall Street Journal, it did result in gainto the takers.\105\ This contrasts dramatically with Riggs, in whichthere was not only no identifiable loss, there was no identifiablegain, to any party.\106\ There is, consequently, some difficulty withusing the precedents the court cites to support the contentionthat Neidorf's and Riggs' actions constituted fraud.\107\ Since thisdifficulty lies with ambiguities in the definition of "fraud," itis not possible to say with any degree of certainty that the courtwas either right or wrong: the ambiguity remains unresolved.However, it would seem to be prudent in such a situation forcourt's to err on the side of caution, restricting theirinterpretation of ambiguous terminology to its clear andundisputed meaning and allowing the legislature the opportunity toexpand these definitions by statute if they so desire.B. National Stolen Property Act The greatest tension in the court's reasoning arose from theapplication of the NSPA to the electronic transfer of the E911text file between Neidorf and Riggs. Although there is significantauthority for the contention that the transfer of stolen orfraudulently obtained funds by wire does not avoid the stricturesof section 2314 on the grounds that only "electronic impulses" hadbeen transferred,\108\ it is not entirely clear that the analogybetween the transfer of funds and the transfer of a document willwithstand scrutiny. In the first place, money, whether transferredelectronically or physically, can be in only one place at a time.That this was not the case in Riggs was precisely the point: theE911 document, after having been "transferred" from Georgia toIndiana, still existed in Georgia in precisely the same manner itdid before the "transfer" took place.\109\ Because the transfer inRiggs was different from the transfer of stolen funds, the analogyto other cases that have addressed the "electronic impulses" issuetends to be misleading. Unlike stolen funds, the E911 document wasaccessible from virtually any place in the world. This was trueeven when copies existed only on Bell South's computer. Riggs'ability to acquire a copy without leaving his home\110\ proves thispoint. Because the document, in every case, remained intact in theplace it was "transferred" from, there was nothing actually movedacross state lines. The arguments accepted in the money cases(that although nothing was physical moved, the result was thesame) do not apply to Riggs. When the court speaks of a transferin this situation, what it is actually discussing is the creationof a copy in a distant place (somewhat like a fax). The difficultywhich the court has in discussing this has to do with the abilityof computer files to be infinitely and perfectly reproduced. Thisfundamental difference between computer files and the sorts ofproperty to which the NSPA has previously been held to apply hascaused a significant strain in the court's reasoning.\111\ A further difficulty with the analogy to money transfers is thefact that Riggs concerned the theft of a document rather thanfunds. The electronic impulses involved in the money transferswere relatively unimportant because they were nothing more than ameans for getting the money from one place to another theyrepresented something (the money) which was both tangible andvaluable. In Riggs, electronic impulses (whether stored on amagnetic disk or transmitted over the telephone wires) are the"thing" that is alleged to have been stolen.\112\ The impulses were,therefore, much more than a mode of transportation: they were thevery essence of the thing that was transported. The issue,contrary to what the court says, is precisely "whether electronicimpulses are 'goods, wares, or merchandise' within the meaning of 2314."\113\ The court's lack of clarity on this point was especiallyevident in its discussion of the tangibility requirement.\114\ In aneffort to make a connection between Riggs and prior casesinvolving the theft of trade secrets,\115\ the court argued that "ifthe information in Bell South's E911 text file had been affixed toa floppy disk, or printed out on a computer printer, thenNeidorf's transfer of that information across state lines wouldclearly constitute the transfer of 'goods, wares, or merchandise'within the meaning of 2314."\116\ For support of this assertion thecourt quotes (among other similar cases) United States v.Bottone,\117\ which held that the intermediate use of a photocopymachine between the theft and the interstate transportation wouldnot be sufficient to escape the statute.\118\ The court assumes awaythe important question, however, when they posit the affixation ofthe E911 file to a floppy disk or paper printout. If the computerfile, without having been affixed to a disk or paper, wassufficiently tangible for it to be the sort of property to whichthe NSPA would be applicable,\119\ there is no reason why it shouldnot have been considered sufficiently tangible for purposes of thestatute when it was transported interstate in that form.\120\ Thequestion that remains unaddressed, of course, is whether or notthe file is tangible. The fact that there are tangible mediums towhich the file could have been affixed is not relevant to thisinquiry. Perhaps in recognition of this confusion between medium andmessage, the court reached a tentative holding that tangibilitywas not required by the NSPA.\121\ An imperceptible, but valuable, gaswas used as an example to bolster the argument.\122\ Unfortunately,the example served primarily to illustrate the court'smisapprehension of the word "tangible." Tangible is defined as"corporeal[;] capable of being exactly comprehended[;] real,concrete."\123\ This is not synonymous with perceptible, which means"discernible by the senses or mind."\124\ The gas in the court'sexample may very well be imperceptible to human senses; it doesnot follow that it is intangible. The perceptibility of the gas isabsolutely irrelevant for purposes of determining its tangibility:a gas, discernible or not, is real and concrete, and section 2314would prohibit the theft and interstate transportation of atangible item whether it required tangibility or not. There is,additionally, strong support for the proposition that tangibilityis required: the plain meaning of the term "goods, wares, ormerchandise" demands it.\125\C. Computer Fraud and Abuse Act The court's brisk dismissal of Neidorf's contention that theComputer Fraud and Abuse Act precluded his prosecution under otherstatutes\126\ is somewhat puzzling. There is no particular reason tobelieve that absence of an explicit mention in the record that thelegislature intended to preclude prosecutions under other statutesshould lead to the opposite conclusion. A more forceful argumentagainst the court's conclusion is the lack of applicability ofother statutes to Neidorf's actions. Neidorf was likely correct inhis claim that the CFAA was the only act under which he couldlegitimately have been prosecuted: it is the only statute withwhich he had been charged that explicitly mentions computer
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -