📄 riggs_~1.txt
字号:
related crime.\127\ Since the nature of Neidorf's activities wereinextricably bound up with computer technology, the application ofstatutes which do not comprehend the possibilities of computertechnology would risk stretching their language beyond the pointof credibility. "When interpreting a criminal statute that doesnot explicitly reach the conduct in question, we are reluctant tobase an expansive reading on inferences drawn from subjective andvariable 'understandings.'"\128\ V. CONCLUSION It is often the case that new technology requires newparadigms. Computer technology is no exception. It is not possibleto understand the events alleged in Riggs (or their implications)if we remain mired in (relatively) old-fashioned metaphors likepaper print outs or computer disks. The document transfers thattook place in the Riggs case were entirely virtual:\129\ all of theevents took place in a kind of electronic netherworld that bearsno direct relation to physical space.\130\ The court made much of thefact that the documents were initially available in one state, butlater became available in another.\131\ In virtual terms, however,this is a distinction without a difference. Neidorf and Riggsmight as easily have been next door neighbors or inhabitants ofdifferent planets; they would be unlikely to have known thedifference.\132\ In the world of electronic communications, geographiclocation is all but irrelevant. It is difficult not to wonder if the court would have come outdifferently had Neidorf not saved the file on his own disk, butmerely accessed it and edited it while it remained stored at theLockport BBS or on Riggs' computer. Based upon the court'sjustification for its result, the answer would have to be yes.While information on the BBS was (theoretically) available toanyone, anywhere, who "simply pressed the right buttons on theircomputer,"\133\ it would not have been physically present in atangible form (like a disk or a paper printout) in any place otherthan the computer in Illinois. Although the Riggs court'sreasoning would lead us to conclude that no violation of the NSPAhad taken place in this hypothetical, it is difficult tounderstand why such a distinction should make a difference. When presented with a case like Riggs, in which the real worldhas changed much faster than the law, courts face a difficultdilemma. They must choose between construing the literal languageof the statute in a strict and principled manner, and flexiblyapplying the existing laws to address what they see as culpablebehavior. The latter approach carries with it the all butinevitable risk of deforming the very legal order it seeks touphold. Stretching statutory language to fit fact patterns forwhich it was never designed simply cannot be considered apreferred way of dealing with the law. Although Neidorf's actionsmay have been the sort that we, as a society, wish to prohibit,they were (with the possible exception of the Computer Fraud andAbuse Act) not illegal at the time he performed them. If thejudgement of the legislature is that these sorts of acts should beillegal, they have the power to ensure that they are. To attemptto address these problems through the creative application ofexisting but unrelated statutes, without the benefit oflegislative guidance is very much like judicially creating ex postfacto laws. A concerted effort to educate both the courts and the legislaturesabout the functions of computerized telecommunications and themetaphors appropriate to discussing them would clearly be inorder. Legislators and judges are, after all, human; and theirfears of the unknown may be just as strong as those of the averagecitizen. Although they can, to some extent, be held accountablefor their failure to educate themselves, it is ultimately the jobof those who will be most affected by hasty and ignorantlegislation and precedents to share their experience with thegovernment. Properly carried out, such an effort could ensure thatdecisions like Riggs are, in the future, the exception rather thanthe rule._____________________________________________________ ***FOOTNOTES***_____________________________________________________\1\ "Designer drugs" are chemical compounds which have the same or similarnarcotic effects as illegal drugs, but different chemical structures. Becausethe possession or sale of these chemicals is not prohibited by the lawsagainst, e.g., heroin or cocaine, and because of the practical difficulty ofregularly adding to the schedule of controlled dangerous substances, laws havebeen enacted which automatically include "designer" equivalents to illegaldrugs in the existing anti-narcotics statutes.\2\ 739 F.Supp. 414 (N.D.Ill. 1990). Although Congress has addressed thearea of computer crime with the Computer Fraud and Abuse Act (18 U.S.C.1030), that statute is limited to computers in which consumer creditinformation is stored or in which the Federal government has an interest. U.S.v. Riggs represents a prosecutorial and judicial attempt to combat activitiesthat are essentially computer-related with statutes and precedents that do not(either explicitly or implicitly) comprehend the possibilities of computerizedcommunications.\3\ Riggs, 739 F.Supp. at 417.\4\ Id.\5\ The name comes from combining the words "phreak" and "hack," which arethe terms used for the acts of exploring, respectively, the telephone networkand computer systems.\6\ A computer bulletin board, or BBS, is a software program which runs on acomputer that is connected to one or more telephone lines. The program allowscomputer users with access to modems to phone up the BBS and, among otherthings, access electronic mail, upload and download computer files, and leavemessages for later callers. See, e.g., Jensen, An Electronic Soap Box:Computer Bulletin Boards and the First Amendment, 39 Fed.Com.L.J. 217 (1987).\7\ Riggs, 739 F.Supp. at 417\8\ Id.\9\ Id.\10\ John Perry Barlow, Crime and Puzzlement: In Advance of the Law on theElectronic Frontier; Cyberspace, WHOLE EARTH REV., September 22, 1990, at 44.\11\ Id.\12\ 18 U.S.C. 1343.\13\ 18 U.S.C. 2314.\14\ 18 U.S.C. 1030(a)(6)(A).\15\ Michael Alexander, Hacker Trial Begins in Chicago, COMPUTERWORLD, July30, 1990, at 8; Motions to Dismiss Wire Fraud and Transport of Stolen PropertyClaims For Hacker Publishing Activity Denied, But Charges Dropped, THE COMPUTERLAWYER, September 1990, at 37 [hereinafter Motions to Dismiss].\16\ United States v. Riggs, 739 F.Supp. 414 (N.D.Ill. 1990), and 743F.Supp. 556 (N.D.Ill. 1990).\17\ Riggs, 739 F.Supp. at 420.\18\ The cases cited by the court consist of holdings that the interstate wiretransfer of stolen funds falls within the ambit of the National StolenProperty Act (United States v. Kroh, 896 F.2d 1524 (8th Cir. 1990); UnitedStates v. Goldberg, 830 F.2d 459 (3rd Cir. 1987); United States v. Wright, 791F.2d 133 (10th Cir. 1986); and United States v. Gilboe, 684 F.2d 235 (2nd Cir.1982)) and cases holding that the stolen property may, under somecircumstances, be intellectual property (United States v. Bottone, 365 F.2d389, 393 (2nd Cir. 1966); United States v. Greenwald, 479 F.2d 320 (6th Cir.1973); United States v. Lester, 282 F.2d 750 (3rd Cir. 1960); and UnitedStates v. Seagraves, 265 F.2d 876 (1959)).\19\ 739 F.Supp. at 426; 743 F.Supp. at 562.\20\ Michael Alexander, Dial 1800...for Bellsouth 'Secrets,' COMPUTERWORLD,August 6, 1990, at 8; Craig Bromberg, In Defense of Hackers, N.Y. TIMES MAG.,April 21, 1991, at 44; Motions to Dismiss, supra note 15; Score One for theHackers of America, NEWSWEEK, August 6, 1990, at 48.\21\ 18 U.S.C. 1030(a)(6)(A).\22\ 18 U.S.C. 2314.\23\ 18 U.S.C. 1343.\24\ See note 18, supra.\25\ See note 18, supra.\26\ 739 F.Supp at 421, 423.\27\ 18 U.S.C. 1030.\28\ Pub. L. No. 98173, ch. 21, 98 Stat. 2190 (1984) (codified as amended at 18U.S.C. 1030 (1988)).\29\ Dodd. S. Griffith, Note, The Computer Fraud and Abuse Act of 1986: AMeasured Response to a Growing Problem, 43 VAND. L. REV. 453, 460 (1990);David A. Bender, PREVENTION AND PROSECUTION OF COMPUTER AND HIGH TECHNOLOGY CRIME(MB) 3.05[b].\30\ Griffith, supra note 29, at 466473.\31\ Id. at 470.\32\ Id. at 469.\33\ Griffith, supra note 29, at 469 n.128; 473.\34\ Id. at 472.\35\ Id. at 474.\36\ Id. at 478.\37\ Griffith, supra note 29, at 484.\38\ 18 U.S.C. 1030(a)(6)(A). "(a) Whoever * * * (6) knowingly and with intent to defraud traffics (as defined insection 1029) in any password or similar information through which a computermay be accessed without authorization, if (A) such trafficking affects interstate or foreign commerce * * * shall be punished as provided in subsection (c) of this section."\39\ Griffith, supra note 29, at 481.\40\ 18 U.S.C. 2312.\41\ United States v. Smith, 686 F.2d 234, 24446 (1982).\42\ "The automobile was uniquely suited to felonious taking whether by larceny,embezzlement, or false pretenses. It was a valuable, salable article whichitself supplied the means for speedy escape." Dowling v. United States, 105S.Ct. 3127, 3134 n.12 (1985) (quoting United States v. Turley, 877 S.Ct at400401).\43\ Id. at 313435.\44\ Id. at 3134 n.13 (quoting from the Attorney General in 78 Cong. Rec. 2947(1934)).\45\ 18 U.S.C. 2314. "Whoever transports in interstate or foreign commerce any goods,wares, merchandise, securities or money, of the value of $5,000 or more,knowing the same to have been stolen, converted, or taken by fraud * * * "Shall be fined not more than $10,000 or imprisoned not more thanten years, or both."\46\ Id.\47\ See United States v. Kroh, 896 F.2d 1524 (8th Cir. 1990); United States v.Goldberg, 830 F.2d 459 (3rd Cir. 1987); United States v. Wright, 791 F.2d 133(10th Cir. 1986); United States v. Gilboe, 684 F.2d 235 (2nd Cir. 1982).\48\ United States v. Lester, 282 F.2d 750 (3rd Cir. 1960); United States v.Seagraves, 265 F.2d 876 (1959). See also United States v. Greenwald, 479 F.2d320 (6th Cir. 1973).\49\ United States v. Bottone, 365 F.2d 389, 393 (2nd Cir. 1966).\50\ Id.\51\ The language in 1343 (the wire fraud statute) concerning the elements ofthe offense is the same as that in 1341 (the mail fraud statute). The courtshave, accordingly, construed them to have the same effect.\52\ McNally v. United States, 107 S.Ct. 2875, 287980 (1987) ("The sponsor ofthe recodification stated, in apparent reference to the antifraud provision,that measures were needed 'to prevent the frauds which are mostly gotten up inthe large cities . . . by thieves, forgers, and rapscallions generally, forthe purpose of deceiving and fleecing the innocent people of the country.'").\53\ 18 U.S.C. 1343. "Whoever, having devised or intending to devise any scheme orartifice to defraud, or for obtaining money or property by means of false orfraudulent pretenses, representations, or promises, transmits or causes to betransmitted by means of wire, radio, or television communication in interstateor foreign commerce, any writings, signs, signals, pictures, or sounds for thepurpose of executing such scheme or artifice, shall be fined not more than$1,000 or imprisoned not more than five years, or both."\54\ McNally, 107 S.Ct. at 2879.\55\ Id.\56\ See, e.g., United States v. Condolon, 600 F.2d 7 (C.A.Va. 1979) ("Gravamanof offense of wire fraud is simply the misuse of interstate communicationfacilities"); United States v. Cowart, 595 F.2d 1023 (C.A.Ga. 1979) ("To provewire fraud, government must show scheme, use of interstate communications,such as telephone, and criminal intent to defraud); United States v. Corey,566 F.2d 429 (C.A.N.Y. 1977) ("To prove a violation of this section, it needonly be shown that a defendant was one of the participants in a fraudulentscheme which was furthered by the use of interstate transmission facilities").\57\ See supra note 56.\58\ 18 U.S.C. 1343.\59\ BLACK'S LAW DICT. (6th. ed. 1990).\60\ United States v. Keane, 522 F.2d 534 (7th Cir. 1975) ("A specific
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -