⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 riggs_~1.txt

📁 黑客培训教程
💻 TXT
📖 第 1 页 / 共 4 页
字号:
 violationof state law . . . is not necessary to obtain a conviction for mail fraud").\61\   United States v. Riggs, 739 F.Supp. 414, 418 (N.D. Ill. 1990).\62\   Id. at 41819.\63\   Id. at 419.\64\   Id.\65\   Riggs, 739 F.Supp. at 418.\66\   Id.\67\   Id. (quoting Hammerschmidt v. United States, 265 U.S. 182 (1924)).\68\   Id. at 419.\69\   Riggs, 739 F.Supp. at n.7 (citing McNally v. United States, 483 U.S. 350(1987), for the proposition that "a mail fraud charge must be based on thedeprivation of property[, although] the property which forms the basis for awire fraud or mail fraud charge can be 'intangible' property").\70\   Id. The court cites Carpenter v. United States, 108 S.Ct. 316, 320 (1987)(holding that the publication schedule and contents of the Wall StreetJournal's "Heard on the Street" column is confidential business informationand therefore protected property under  1341) and United States v. Keane, 852F.2d 199, 205 (7th Cir. 1988) (finding protectable property in a city'sconfidential plans for acquiring real estate) as support.\71\   The court does not explicitly draw this conclusion in their opinions,perhaps because the reasoning is somewhat problematic. In the first place, itis difficult to understand precisely how the usual rationale for protection ofproprietary business information (the preservation of competitive advantage)applies in the case of a publicly regulated monopoly such as the telephonecompany. Although it has been suggested that the integrity of the 911 responsesystem may be compromised by the widespread publication of this kind ofinformation, that argument would seem to urge the application of some sort ofquasi-national security interest standard of secrecy rather than theprohibitions of the trade secret law.       It should also be noted that proprietary information does not easily fitinto the category of things of which one can be deprived. It is easy to imaginethat a limited (as in this case) or even broad publication of confidentialinformation would not rob it of all utility in the hands of its originalpossessor. Still, the court's decision seems to suggest that any degree ofdeprivation would be sufficient to trigger the application of section 1343.Although this would be consistent with much of the other wire fraudjurisprudence (e.g., the principle that any use of the wire system issufficient for the statute to apply), there is no indication that the courteven considered this potentially problematic area. As it is easily conceivablethat public knowledge of even the existence of some information could lessenits utility, the court's interpretation of the wire fraud statute would seembound to collide with the First Amendment (if the collision has not, asNeidorf argued, already occurred).\72\   Riggs, 739 F.Supp. at 419.\73\   Id.\74\   Id. at 420.\75\   Id.\76\   684 F.2d 235 (2d Cir. 1982).\77\   Id. at 238.\78\   Riggs, 739 F.Supp. at 420.\79\   Id.\80\   United States v. Greenwald, 479 F.2d 320 (6th Cir. 1973) (documentscontaining chemical formulas); United States v. Bottone, 365 F.2d 389 (2ndCir. 1966) (copies of documents describing the manufacture of a patenteddrug); United States v. Lester, 282 F.2d 750 (3rd Cir. 1960) (copies ofgeophysical maps); and United States v. Seagraves, 265 F.2d 876 (1959) (sameas Lester).\81\   Riggs, 739 F.Supp. at 421.\82\   Id.\83\   Id.\84\   Id. at 422.\85\   105 S. Ct. 3127 (1985). In a prosecution for the sale of bootleg ElvisPresley recordings, the court held that the goods actually shipped (theillegally manufactured records) do not come within the range of section 2314because no physical part of the shipment had been "stolen, converted, or takenby fraud." The court further held that a copyright is not the sort of interestthat is capable of being "stolen, converted, or taken by fraud."\86\   Riggs, 739 F.Supp. at 422.\87\   Id. at 423.\88\   Id.\89\   Id.\90\   Riggs, 739 F.Supp. at 423.\91\   Id. See also Griffith, supra note 29, at 484485\92\   See supra note 56 and related text; see also supra note 60.\93\   Riggs, 739 F.Supp. at 418.\94\   Although the statement of facts does not explicitly state this, it isimplicit both from the nature of computer telecommunications (erasing the filefrom the Bell South computer would have required actions in addition to merelydownloading it) and from Riggs' ability to successfully conceal his access tothe file. See also infra note 109.\95\   See supra note 94.\96\   108 S.Ct. 316 (1987).\97\   Id. at 318-319.\98\   Id. at 319.\99\   Id.\100\   Carpenter, 108 S.Ct. at 319.\101\   Id. at 320-321.\102\   Id.\103\   Id. at 321.\104\   "Petitioners' arguments that they did not interfere with the Journal's useof the information . . . miss the point. * * * Petitioners cannot successfullycontend . . . that a scheme to defraud requires a monetary loss, such asgiving the information to a competitor; it is sufficient that the Journal hasbeen deprived of its exclusive use of the information, for exclusivity is animportant aspect of confidential business information and most privateproperty for that matter."Id. See also note 69, supra.\105\   Id. at 319.\106\   Phrack was an amateur publication. It was (and is) distributed at no chargeto readers. Copies are available for downloading from numerous public andprivate bulletin board systems or from InterNet sites such asftp.cs.widener.edu (in directory /pub/cud/phrack).\107\   This difficulty may not be insurmountable. If fraud signifies nothing morethan "wronging one in his property rights by dishonest methods or schemes,"then the statute would seem to apply to the facts in Riggs. Hammerschmidt v.United States, 44 S.Ct. 511, 512 (1924). However, "the words 'to defraud' . .. usually signify the deprivation of something of value." Id.; see alsoBLACK'S LAW DICT. (6th. ed. 1990). This language indicates that the statuteshould not apply to a case like Riggs where neither loss nor gain (nor, infact, deprivation) is involved. This ambiguity seems to have gone largelyunexplored; it is certainly unresolved, and the Riggs court ignores itentirely.\108\   See, e.g., United States v. Gilboe, 684 F.2d 235 (2d Cir. 1982); UnitedStates v. Kroh, 896 F.2d 1524 (8th Cir. 1990); United States v. Goldberg, 830F.2d 459 (3d Cir. 1987); United States v. Wright, 791 F.2d 133 (10th Cir.1986); United States v. Kenngott, 840 F.2d 375 (7th Cir. 1987).\109\   The term "download" does not imply the deletion of any files. Furthermore,the factual allegations in the case charge only that Riggs transferred thetext file from the Bell South computer system, not that he tampered with thecontents of that system. This is further borne out by the failure of BellSouth to detect Riggs' unauthorized access. See Riggs, 739 F.Supp. at 417; seealso note 94, supra.\110\   Riggs, 739 F.Supp. at 417.\111\   See, e.g., Dowling v. United States, 105 S.Ct. 3127, 3133 (1985) (The NSPA"seems clearly to contemplate a physical identity between the items unlawfullyobtained and those eventually transported").\112\   It will not do to claim that the information is the thing which has beenstolen; the NSPA applies only to "goods, wares, merchandise, securities ormoney" (18 U.S.C.  2314), and this requires tangibility. United States v.Smith, 686 G.2d 234, 240 (1982) ("The phrase goods, wares, or merchandiseconnotes tangible items; something tangible has or possesses physical form.").Accepting, arguendo, the Riggs court's holding that an electronicallytransferred document is a tangible object, this goes no further than to statethat "when proprietary business information is affixed to some tangiblemedium, such as a piece of paper, it constitutes 'goods, wares, ormerchandise' within the meaning of  2314." United States v. Riggs, 739F.Supp. 414, 420 (1990). The tangible medium in this case can be nothing otherthan the computer file.\113\   Riggs, 739 F.Supp. at 420 ("The question this case presents, then, is notwhether electronic impulses are 'goods, wares, or merchandise' within themeaning of  2314, but whether the proprietary information contained in BellSouth's E911 text file constitutes a 'good, ware, or merchandise' within thepurview of the statute.").\114\   Id. at 421.\115\   United States v. Greenwald, 479 F.2d 330 (6th Cir. 1973); United States v.Bottone, 365 F.2d 389 (2nd Cir. 1966); United State v. Lester, 282 F.2d 750(3rd Cir. 1960); United States v. Seagraves, 265 F.2d 876 (1959).\116\   Riggs, 739 F.Supp. at 421.\117\   365 F.2d 389 (2nd Cir. 1966).\118\   Id. at 393.\119\   That is, that it was a good, ware, or merchandise. "Sometimes  the meaningof 'goods' is extended to include all tangible items, as in the phrase 'goodsand services.'" BLACK'S LAW DICT. (6th. ed. 1990). A good cannot, presumably,be an intangible item. See also United States v. Smith, 686 F.2d 234, 240(1982).\120\   In other words, the bare text file (unaffixed to any medium) was what wasstolen, as well as what was transported. The Bottone court was able to come tothe decision it did because something tangible was taken from Lederle, andsomething tangible was transported across the border. Bottone v. UnitedStates, 365 F.2d 389, 393-394 (2nd Cir. 1966). The only issue was that "theintangible information that was the purpose of the theft was transformed andembodied in a different physical object." Id. at 393. The court went to greatpains to emphasize that its conclusions would not apply "where no tangibleobjects were ever taken and transported." Id. This is, however, precisely thesituation in Riggs.\121\   "[T]his court is not entirely convinced that tangibility is an absoluterequirement of 'goods, wares, or merchandise' under  2314." United States v.Riggs, 739 F.Supp. 414, 421 (N.D.Ill. 1990).\122\   Id. at 421.\123\   THE AMERICAN HERITAGE DICTIONARY OF THE ENGLISH LANGUAGE (William Morris, ed.,New College Ed. 1978).\124\   Id.\125\   See supra note 119.\126\   Riggs, 739 F.Supp. at 423.\127\   It remains an open question whether his actions constitute the traffickingin stolen passwords, as prohibited by the CFAA. 18 U.S.C. 1030(a)(6)(A).\128\   Williams v. United States, 102 S.Ct. 3088, 3092 (1982) (quoted in Dowlingv. United States, 105 S.Ct. 3127, 3133-3134 (1985)).\129\   "Existing or resulting in essence or effect though not in actual fact,form, or name." THE AMERICAN HERITAGE DICTIONARY OF THE ENGLISH LANGUAGE (WilliamMorris, ed., New College Ed. 1978). This term is often used to describe the"space" in which computer events take place (viz., virtual reality).\130\   This "place" is often referred to as "cyberspace," a term originally coinedby the writer William Gibson but quickly adopted in the computer world,especially among the hacker subculture. See, e.g., WILLIAM GIBSON, NEUROMANCER(1984).\131\   Riggs, 739 F.Supp. at 420.\132\   In a recent experiment, for example, private computer users were able tosend electronic mail to orbiting space shuttle astronauts through publiclyaccessible networks. See, e.g., Joe Abernathy and Mark Carreau, ElectronicMail Beams Shuttle's Message Home, HOUSTON CHRON., Aug. 5, 1991, at 1A.\133\   Riggs, 739 F.Supp. at 422.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -