AI Case Brief
Generate an AI-powered case brief with:
Estimated cost: $0.001 - $0.003 per brief
Full Opinion
MEMORANDUM ORDER
Over the course of the past decade, advances in technology and growing respect and acceptance for the powers of computers have created a true explosion in the computer industry. Quite naturally, the growth of computer availability and application has spawned a host of new legal issues. This case requires the court to wrestle with some of these novel legal issues which are a product of the marriage between law and computers.
The indictment charges that defendants Robert J. Riggs and Craig Neidorf, through the use of computers, violated the federal wire fraud statute, 18 U.S.C. § 1343, and the federal statute prohibiting interstate transportation of stolen property, 18 U.S.C. § 2314. Neidorf argues that the wire fraud statute and the statute prohibiting interstate transportation of stolen property do not apply to the conduct with which he is charged. Therefore, he has moved to dismiss the charges against him, as set forth in Counts II-IV of the indictment, which are based on those statutes. 1 Neidorf has also filed various other pretrial motions. For the reasons stated herein, Neidorfâs motions are denied.
I. THE INDICTMENT
A. Factual Allegations
In about September 1988, Neidorf and Riggs devised and began implementing a scheme to defraud Bell South Telephone Company (âBell Southâ), which provides telephone services to a nine-state region including Alabama, Georgia, Mississippi, Tennessee, Kentucky, Louisiana, North Carolina, South Carolina, and Florida. The objective of the fraud scheme was to steal Bell Southâs computer text file 2 which con *417 tained information regarding its enhanced 911 (E911) system for handling emergency calls to policy, fire, ambulance, and other emergency services in municipalities. The text file which Riggs and Neidorf planned to steal specifically details the procedures for installation, operation, and maintenance of E911 services in the region in which Bell South operates. Bell South considered this file to contain valuable proprietary information and, therefore, closely guarded the information from being disclosed outside of Bell South and its subsidiaries. Riggs and Neidorf wanted to obtain the E911 text file so it could be printed in a computer newsletter known as âPHRACKâ which Neidorf edited and published.
In about December 1988, Riggs began the execution of the fraud scheme by using his home computer in Decatur, Georgia, to gain unlawful access to Bell Southâs computer system located at its corporate headquarters in Atlanta, Georgia. After gaining access to Bell Southâs system, Riggs âdownloadedâ 3 the text file, which described in detail the operation of the E911 system in Bell Southâs operating region. Riggs then disguised and concealed his unauthorized access to the Bell South system by using account codes of persons with legitimate access to the E911 text file.
Pursuant to the scheme he had devised with Neidorf, Riggs then transferred the stolen computer text file to Neidorf by way of an interstate computer data network. Riggs stored the stolen text file on a computer bulletin board system 4 located in Lockport, Illinois, so as to make the file available to Neidorf. The Lockport bulletin board system was used by computer âhackersâ 5 as a location for exchanging and developing software tools and other information which could be used for unauthorized intrusion into computer systems. Neidorf, a twenty-year-old student at the University of Missouri in Columbia, Missouri, used a computer located at his school to access the Lockport computer bulletin board and thereby receive the Bell South E911 text file from Riggs. At the request of Riggs, Neidorf then edited and retyped the E911 text file in order to conceal the fact that it had been stolen from Bell South. Neidorf then âuploadedâ 6 his revised version of the stolen file back onto the Lockport bulletin board system for Riggsâ review. To complete the scheme, in February 1989, Neidorf published his edited edition of Bell Southâs E911 text file in his PHRACK newsletter.
B. Charges
The current indictment asserts seven counts. Count I charges that Riggs committed wire fraud in violation of 18 U.S.C. § 1343 by transferring the E911 text file from his home computer in Decatur, Georgia to the computer bulletin board system in Lockport, Illinois. Count II charges both Riggs and Neidorf with violating § 1343 by causing the edited E911 file to be transferred from a computer operated by Neidorf in Columbia, Missouri, to the computer bulletin board system in Lock-port, Illinois. Counts III and IV assert that by transferring the E911 text file via *418 an interstate computer network, Riggs and Neidorf violated the National Stolen Property Act, 18 U.S.C. § 2314, which prohibits interstate transfer of stolen property. Finally, Counts V-VII charge Riggs and Nei-dorf with violating § 1030(a)(6)(A) of the Computer Fraud and Abuse Act of 1986, 18 U.S.C. § 1030(a)(6)(A), which prohibits knowingly, and with intent to defraud, trafficking in information through which a computer may be accessed without authorization.
II. DISCUSSION
A. Motion to Dismiss Count II
Neidorf claims that Count II of the indictment is defective because it fails to allege a scheme to defraud, one of the necessary elements for a wire fraud claim under 18 U.S.C. § 1343. See Lombardo v. United States, 865 F.2d 155, 157 (7th Cir.) (holding that the two elements of a wire fraud claim under § 1343 are a scheme to defraud and the use of wire communications in furtherance of the scheme), cert. denied, - U.S.-, 109 S.Ct. 3186, 105 L.Ed.2d 695 (1989). All Count II charges, says Neidorf, is that he received and then transferred a computer text file, not that he participated in any scheme to defraud.
Unsurprisingly, Neidorfâs reading of the indictment is self-servingly narrow. The indictment plainly and clearly charges that Neidorf and Riggs concocted a fraud scheme, the object of which was to steal the E911 text file from Bell South and to distribute it to others via the PHRACK newsletter. The indictment also clearly alleges that both Riggs and Neidorf took action in furtherance of the fraud scheme. Riggs allegedly used fraudulent means to access Bell Southâs computer system and then disguised his unauthorized entry. Neidorf allegedly furthered the scheme by redacting from the E911 text file references to Bell South and other information which would reveal the source of the E911 file, transmitting the redacted file back to the Lockport bulletin board for Riggs review, and publishing the redacted text file in the PHRACK newsletter for othersâ use. Moreover, both Neidorf and Riggs allegedly used coded language, code names, and other deceptive means to avoid the detection of their fraud by law enforcement officials. These allegations sufficiently set forth the existence of a scheme to defraud, as well as Neidorfâs participation in the scheme. See McNally v. United States, 483 U.S. 350, 358, 107 S.Ct. 2875, 2880-81, 97 L.Ed.2d 292 (1987) (where the Court, quoting Hammerschmidt v. United States, 265 U.S. 182, 188, 44 S.Ct. 511, 512, 68 L.Ed. 968 (1924), held that âto defraudâ as used in the mail fraud statute simply means âwronging one in his property rights by dishonest methods or schemesâ usually by âthe deprivation of something of value by trick, deceit, chicane, or overreachingâ); see also Carpenter v. United States, 484 U.S. 19, 108 S.Ct. 316, 320-21, 98 L.Ed.2d 275 (1987) (applying McNally to the wire fraud statute, the Court held that a Wall Street Journal columnist participated in a scheme to defraud chargeable under § 1343 where he executed a plan under which he disclosed confidential financial information to an investor in exchange for a share of the investorâs profits from that information).
Neidorf also argues that Count II is deficient because it fails to allege that he had a fiduciary relationship with Bell South. To support this position, Neidorf relies on cases such as United States v. Richter, 610 F.Supp. 480 (N.D.Ill.1985), and United States v. Dorfman, 532 F.Supp. 1118 (N.D.Ill.1981). In each of those cases, as well as other similar cases cited by Neidorf, the court held that where a wire fraud charge is based on the deprivation of an intangible right, such as the right to honest and fair government or the right to the loyal service of an employee, the government must allege the existence of a fiduciary relationship between the defendant and the alleged victim to state a charge under § 1343.
In the instant case, however, the wire fraud charge is not based on the deprivation of an intangible right. The government charges Riggs and Neidorf with scheming to defraud Bell South out of property&emdash;the confidential information *419 contained in the E911 text file. The indictment specifically alleges that the object of defendantsâ scheme was the E911 text file, which Bell South considered to be valuable, proprietary, information. The law is clear that such valuable, confidential information is âproperty,â the deprivation of which can form the basis of a wire fraud charge under § 1343. See Carpenter, 108 S.Ct. at 320; see also United States v. Keane, 852 F.2d 199, 205 (7th Cir.), cert. denied, â U.S.-, 109 S.Ct. 2109, 104 L.Ed.2d 670 (1989). Therefore, Neidorfâs argument misconstrues the wire fraud charge against him. Cases such as Richter and Dorfman are wholly inapposite. 7
As further support for his argument that fiduciary relationship between himself and Bell South must be alleged to state a wire fraud charge against him, Nei-dorf analogizes his role in the alleged scheme to that of an âinnocent tippeeâ in the securities context, such as the defendants in Dirks v. Securities Exchange Commission, 463 U.S. 646, 103 S.Ct. 3255, 77 L.Ed.2d 911 (1983), and Chiarella v. United States, 445 U.S. 222, 100 S.Ct. 1108, 63 L.Ed.2d 348 (1980). This analogy, however, is fallacious. Those cases involved individuals who come upon information lawfully; the question in each of those cases was whether, once possessing that information, the individual had a duty to disclose it. In the instant case, in contrast, Neidorf is alleged to have planned and participated in the scheme to defraud Bell South. .Although Riggs allegedly was the one who actually stole the E911 text file from Bell Southâs computer system, the government alleges that Neidorf was completely aware of Riggsâ activities and agreed to help Riggs conceal the theft to make the fraud complete. Therefore, in no way can Neidorf be construed as being in a similar situation to the innocent tippees in Dirks and Chiarella, 8 As a result, the court rejects his argument that Count II is defective for failing to allege a fiduciary duty between himself and Bell South. Nei-dorfâs motion to dismiss Count II is accordingly denied.
B. Motion to Dismiss Counts III and IV
Counts III and IV charge Riggs and Nei-dorf with violating 18 U.S.C. § 2314, which provides, in relevant part:
Whoever transports, transmits, or transfers in interstate or foreign commerce any goods, wares, merchandise, securities or money, of the value of $5000 or more, knowing the same to have been stolen, converted or taken by fraud ... [sjhall be fined not more than $10,000 or imprisoned not more than ten years, or both.
The government concedes that charging Neidorf under § 2314 plots a course on uncharted waters. No court has ever held that the electronic transfer of confidential, proprietary business information from one computer to another across state lines constitutes a violation of § 2314. However, no court has addressed the issue. Surprisingly, despite the prevalence of computer-related crime, this is a case of first impression. The government argues that reading § 2314 as covering Neidorfâs conduct in this case is a natural adaptation of the statute to modern society. Conversely, *420 Neidorf contends that his conduct does not fall within the purview of § 2314 and that the government is seeking an unreasonable expansion of the statute. He urges the court to dismiss the charge on two grounds.
Neidorf s first argument is that the government cannot sustain a § 2314 charge in this case because the only thing which he allegedly caused to be transferred across state lines was âelectronic impulses.â Neidorf maintains that under the plain language of the statute, this conduct does not come within the scope of § 2314 since electronic impulses do not constitute âgoods, wares, or merchandise.â
The court is unpersuaded by Neidorfâs disingenuous argument that he merely transferred electronic impulses across state lines. Several courts have upheld § 2314 charges based on the wire transfer of fraudulently obtained money, rejecting the arguments of the defendants in those cases that only electronic impulses, not actual money, crossed state lines. For example, in United States v. Gilboe, 684 F.2d 235 (2d Cir.1982), cert. denied, 459 U.S. 1201, 103 S.Ct. 1185, 75 L.Ed.2d 432 (1983), the court held, in affirming a § 2314 conviction based on the wire transfer of funds:
The question whether [§ 2314] covers electronic transfers of funds appears to be one of first impression, but we do not regard it as a difficult one. Electronic signals in this context are the means by which funds are transported. The beginning of the transaction is money in one account and the ending is money in another. The manner in which the funds were moved does not affect the ability to obtain tangible paper dollars or a bank check from the receiving account. If anything, the means of transfer here were essential to the fraudulent scheme.
Id. at 238. Other circuits have followed the reasoning in Gilboe. See United States v. Kroh, 896 F.2d 1524, 1528-29 (8th Cir.1990); United States v. Goldberg, 830 F.2d 459, 466-67 (3d Cir.1987); United States v. Wright, 791 F.2d 133, 135-37 (10th Cir.1986); see also United States v. Kenngott, 840 F.2d 375, 380 (7th Cir.1987) (citing Gilboe with approval). In all of these cases, the courts held that money was transferred across state lines within the meaning of § 2314 because funds were actually accessible in one account prior to the transfer, and those funds were actually accessible in an out-of-state account after the transfer. The courts refused to accept the superficial characterization of the transfers as the mere transmittal of electronic impulses.
Similarly, in the instant case, Neidorfâs conduct is not properly characterized as the mere transmission of electronic impulses. Through the use of his computer, Neidorf allegedly transferred proprietary business information&emdash;Bell Southâs E911 text file. Like the money in the case dealing with wire transfers of funds, the information in the E911 text file was accessible at Nei-dorf s computer terminal in Missouri before he transferred it, and the information was also accessible at the Lockport, Illinois computer bulletin board after Neidorf transferred it. Therefore, under Gilboe, Kroh, Wright, and Goldberg, the mere fact that the information actually crossed state lines via computer-generated electronic impulses does not defeat a charge under § 2314.
The question this case presents, then, is not whether electronic impulses are âgoods, wares, or merchandiseâ within the meaning of § 2314, but whether the proprietary information contained in Bell Southâs E911 text file constitutes a âgood, ware, or merchandiseâ within the purview of the statute. This court answers that question affirmatively. It is well-settled that when proprietary business information is affixed to some tangible medium, such as a piece of paper, it constitutes âgoods, wares, or merchandiseâ within the meaning of § 2314. See United States v. Greenwald, 479 F.2d 320, 322 (6th Cir.) (documents containing valuable chemical for-mulae are âgoods, wares, or merchandiseâ under § 2314), cert. denied, 414 U.S. 854, 94 S.Ct. 154, 38 L.Ed.2d 104 (1973); United States v. Bottone, 365 F.2d 389, 393 (2d Cir.) (copies of documents describing a manufacturing process of patented drugs *421 constitute a âgoodâ under § 2314), cert. denied, 385 U.S. 974, 87 S.Ct. 514, 17 L.Ed.2d 437 (1966); United States v. Lester, 282 F.2d 750, 754-55 (3d Cir.1960) (copies of geophysical maps identifying oil deposits come within the purview of § 2314), cert. denied, 364 U.S. 937, 81 S.Ct. 385, 5 L.Ed.2d 368 (1961); United States v. Seagraves, 265 F.2d 876 (3d Cir.1959) (same facts as in Lester).
Therefore, in the instant case, if the information in Bell Southâs E911 text file had been affixed to a floppy disk, or printed out on a computer printer, then Neidorfâs transfer of that information across state lines would clearly constitute the transfer of âgoods, wares, or merchandiseâ within the meaning of § 2314. This court sees no reason to hold differently simply because Neidorf stored the information inside computers instead of printing it out on paper. In either case, the information is in a trans-ferrable, accessible, even salable form.
Neidorf argues in his brief that a § 2314 charge cannot survive when the âthingâ actually transferred never takes tangible form. A few courts have apparently adopted this position. 9 For example, in United States v. Smith, 686 F.2d 234 (5th Cir.1982), the court held that a copyright does not fit within the definition of âgoods, wares, or merchandiseâ under § 2314. The court ruled that in order to come within that definition, â[t]he âthingâ or âitemâ must have some sort of tangible existence; it must be in the nature of âpersonal property or chattels.â â Id. at 241. Similarly, in Bottone, supra, where the court held that copies of documents describing a manufacturing process for a patented drug constitute âgoods, wares, or merchandiseâ under § 2314, the court opined:
To be sure, where no tangible objects were ever taken or transported, a court would be hard pressed to conclude that âgoodsâ had been stolen and transported within the meaning of § 2314; the statute would presumably not extend to the case where a carefully guarded secret was memorized, carried away in the recesses of a thievish mind and placed in writing only after a [state] boundary had been crossed.
Nevertheless, this court is not entirely convinced that tangibility is an absolute requirement of âgoods, wares, or merchandiseâ under § 2314. Congress enacted § 2314 to extend the National Motor Vehicle Theft Act to cover all stolen property over a certain value ($5000) which is knowingly transported across state lines. See Dowling v. United States, 473 U.S. 207, 218-20, 105 S.Ct. 3127, 3133-35, 87 L.Ed.2d 152 (1985). In line with this broad congressional intent, courts have liberally construed the term âgoods, wares, or merchandiseâ as âa general and comprehensive designation of such personal property and chattels as are ordinarily the subject of commerce.â See United States v. Whaley, 788 F.2d 581, 582 (9th Cir.) (quoting Seagraves, 265 F.2d at 880), cert. denied, 479 U.S. 962, 107 S.Ct. 458, 93 L.Ed.2d 404 (1986). Reading a tangibility requirement into the definition of âgoods, wares, or merchandiseâ might unduly restrict the scope of § 2314, especially in this modern technological age. For instance, suppose the existence of a valuable gas, used as an anesthetic, which is colorless, odorless, and tasteless â totally imperceptible to the human senses. If this gas is stored in a tank in Indiana, and a trucker hooks up to the tank, releases the valuable gas into a storage tank on his truck, and then takes the gas to Illinois to sell it for a profit, is there no violation of § 2314 simply because the gas is not technically tangible? This court is reluctant to believe that any court would construe § 2314 so narrowly.
In any event, this court need not decide that issue to resolve this case, for even if tangibility is a requirement of âgoods, *422 wares or merchandiseâ under § 2314, in this courtâs opinion the computer-stored business information in this case satisfies that requirement. Although not printed out on paper, a more conventional form of tangibility, the information in Bell Southâs E911 text file was allegedly stored on computer. Thus, by simply pressing a few buttons, Neidorf could recall that information from computer storage and view it on his computer terminal. The information was also accessible to others in the same fashion if they simply pressed the right buttons on their computer. This ability to access the information in viewable form from a reliable storage place differentiates this case from the mere memorization of a formula and makes this case more similar to cases like Greenwald, Bottom, Sea-graves, and Lester, where proprietary information was also stored, but in a more traditional manner&emdash;on paper. The accessibility of the information in readable form from a particular storage place also makes the information tangible, transferable, salable and, in this courtâs opinion, brings it within the definition of âgoods, wares, or merchandiseâ under § 2314.
In order to sustain a charge against Neidorf under § 2314, however, the government cannot simply allege that Nei-dorf transferred âgoods, wares, or merchandiseâ across state boundaries; the government must also allege that Neidorf executed the transfer knowing the goods were âstolen, converted or taken by fraud.â This requirement forms the basis for Nei-dorfâs second challenge to Counts III and IV. Relying on Dowling v. United States, 473 U.S. 207, 105 S.Ct. 3127, 87 L.Ed.2d 152 (1985), Neidorf maintains that the § 2314 charges should be dismissed because the âthingsâ he allegedly transferred are not the type of property which is capable of being âstolen, converted or taken by fraud.â
In Dowling, the government charged the defendant with violating § 2314 by shipping âbootlegâ and âpiratedâ 10 phonorec-ords across state lines. Id. at 212, 105 S.Ct. at 3130-31. The government argued that the shipments came within § 2314 because the phonorecords embodied performances of copyrighted musical compositions which the defendant had no right to distribute. Id. at 214-15, 105 S.Ct. at 3131-32. The Court framed the issue in the case as follows:
Dowling does not contest that he caused the shipment of goods in interstate commerce, or that the shipments had sufficient value to meet the monetary requirement. He argues, instead, that the goods shipped were not âstolen, converted or taken by fraud.â
* * * * * *
We must determine, therefore, whether phonorecords that include the performance of copyrighted musical compositions for the use of which no authorization has been sought or royalties paid are consequently "stolen, converted or taken by fraudâ for purposes of § 2314.
Id. at 214-16, 105 S.Ct. at 3131-32. The Court ruled that while the holder of a copyright possesses certain property rights which are protectible and enforceable under copyright law, he does not own the type of possessory interest in an item of property which may be âstolen, converted or taken by fraud.â Id. at 216-18, 105 S.Ct. at 3132-34. Thus, the Court held that § 2314 does not apply to interstate shipments of âbootlegâ and âpiratedâ phono-records whose unauthorized distribution infringes on valid copyrights. Id. at 228-29, 105 S.Ct. at 3138-39.
Neidorf also cites United States v. Smith, 686 F.2d 234 (5th Cir.1982), to support his argument. Like Dowling, Smith held that copyright infringement is not the equivalent of theft or conversion under § 2314. Id. at 241. The instant case, however, is distinguishable from Dowling and Smith. This case involves the transfer of confidential, proprietary business information, not copyrights. As Dowling and Smith recognized, the copyright holder *423 owns only a bundle of intangible rights which can be infringed, but not stolen or converted. The owner of confidential, proprietary business information, in contrast, possesses something which has clearly been recognized as an item of property. Carpenter, 108 S.Ct. at 320; Keane, 852 F.2d at 205. As such, it is certainly capable of being misappropriated, which, according to the indictment, is exactly what happened to the information in Bell Southâs E911 text file.
In his final gasp, Neidorf points out that in Dowling, the Court based its ruling partly on the fact that Congress passed the Copyright Act to deal exclusively with copyright infringements. The Court reasoned that applying § 2314 to the infringement of copyrights would result in an unnecessary and unwarranted intrusion into an area already governed by the Copyright Act. 473 U.S. at 221-26, 105 S.Ct. at 3135-38. Neidorf makes a similar argument in this case. He notes that Congress has enacted a statute â the Computer Fraud and Abuse Act (âCFAAâ), 18 U.S.C. § 1030 â which is specifically designed to address computer-related crimes, such as unauthorized computer access. Neidorf claims that the enactment of the CFAA precludes a finding that § 2314 reaches his alleged conduct in this ease.
The problem with Neidorfâs argument, however, is that he does not cite, and this court is unable to find, anything in the legislative history of the CFAA which suggests that the statute was intended to be the exclusive law governing computer-related crimes, or that its enactment precludes the application of other criminal statutes to computer-related conduct. Therefore, the court rejects Neidorf s claim that applying § 2314 to the instant case would undermine the Congressional intent behind the CFAA. Similarly, the court rejects Neidorf s bald assertion that the legislative history behind § 2314 supports his argument. Nothing in the legislative history of § 2314 prevents the court from finding that the information in Bell Southâs E911 text file was âstolen, converted or taken by fraudâ as that term is used in § 2314. Accordingly, Neidorfâs motion to dismiss Counts III and IV is denied.
C. Motion to Strike Surplusage and Prejudicial Material
Pursuant to Rule 7(d) of the Federal Rules of Criminal Procedure, Neidorf moves to strike certain words and phrases from the indictment which he claims are unnecessary and prejudicial. He first argues that the terms âhackersâ and âcomputer hackersâ should be stricken because those terms are likely to cause confusion and prejudice. He contends that the government uses those terms in the indictment to lure the jury into predetermining his character and motives.
The court, however, is not convinced that the governmentâs use of the term âhackerâ in this case is unduly prejudicial. The government has specifically defined âhackersâ in the indictment as âindividuals involved with the unauthorized access of computer systems by various means.â This definition is consistent with Websterâs II New Riverside University Dictionary (1984), which defines hacker as follows: âSlang. One who gains unauthorized, usu[ally] non-fraudulent access to anotherâs computer system.â Id. at 557. The term âhackersâ has also been understood to encompass both those who obtain unauthorized access to computer systems and those who simply enjoy using computers and experimenting with their capabilities as âinnocentâ hobbyists. See Staff of the Subcomm. on Transportation, Aviation & Materials of the House Comm, on Science & Technology, 98th Cong., 2d Sess., Report on Computer & Communications Security & Privacy 17 (Comm. Print 1984) (citing the testimony of Donn B. Parker, Senior Management Systems Consultant, SRI International, Computer Research Institute, wherein he stated, âComputer hackers are hobbyists with intense interest in exploring the capabilities of computers and communications and causing these systems to perform to their limits.... Hackers exhibit a spectrum of behavior from benign to malicious.â); see also C. Stoll, The Cuckooâs Egg, at 10 (1989) (âThe word hacker has two very different meanings. The people I *424 knew who called themselves hackers were software wizards who ... knew all the nooks and crannies of the operating sys-tem_ But in common usage, a hacker is someone who breaks into computersâ). However, as pointed out in The Cuckooâs Egg, and as is evident from a review of the modern articles using the term, the definition set forth in the indictment is the one most commonly employed.
The court finds that the use of the term âhackersâ in the indictment does not unduly prejudice Neidorf; it is simply a succinct method of describing the alleged activities of the persons with whom Neidorf was associated during the time period charged in the indictment. The term is both relevant and material, and, contrary to Neidorf s claim that it will cause confusion, the term is likely to be somewhat helpful to the jury in understanding the charges in this case. Thus, the court refuses to strike the term âhackersâ from the indictment. See United States v. Chaverra-Cardona, 667 F.Supp. 609, 611 (N.D.Ill.1987) (information relevant to the charges and helpful to the juryâs understanding of those charges should not be stricken from an indictment).
Neidorf also claims that references to the âLegion of Doom,â a computer hacker group, should be deleted from the indictment. Neidorf, however, allegedly had close ties to the Legion of Doom and disseminated the E911 text file to some of its members. Therefore, references to the Legion of Doom are highly relevant to the charges in this case. Neidorf claims the name âLegion of Doomâ âinvites images of cult worshippers, satanism, terrorism or black magic,â but this is a gross exaggeration of the potential effect of the term. The indictment clearly sets forth the purposes and activities of the group, none of which include the slightest reference to any type of satanism or the like. Thus, there is no reason to strike references to the âLegion of Doom.â
Neidorf further contends that the court should strike the following portions of the indictment: (1) the second sentence of paragraph 8, which reads:
The Lockport [computer bulletin board system] was also used by computer hackers as a location for exchanging and developing software tools for computer intrusion, and for receiving and distributing hacker tutorials and other information.
(2) the underlined words in paragraph 21, which reads:
It was further part of the scheme that the defendants RIGGS and NEIDORF would publish information to other computer hackers which could be used to gain unauthorized access to emergency 911 computer systems in the United States and thereby disrupt or halt 911 service in portions of the United States.
and (3) the underlined parts of paragraph 3, which reads in part:
The E911 Practice was a highly proprietary and closely held computerized text file belonging to the Bell South Telephone Company and stored on the companyâs AIMSX computer in Atlanta, Georgia. The E911 Practice described the computerized control and maintenance of the E911 system and carried warning notices that it was not to be disclosed outside Bell South or any of its subsidiaries except under written agreement.
Each of these allegations, however, are directly relevant to Neidorfâs knowledge of the proprietary, confidential nature of the information in Bell Southâs E911 file and to Neidorfâs motive and ability to aid in the misappropriation of that information. Therefore, those allegations are pertinent to the elements of the offenses charged and are not properly stricken. Neidorf s motion to strike is accordingly denied.
D. Motion For A Santiago Hearing
In order to off