U.S. v. Morris

Decision Date07 March 1991
Docket NumberD,No. 774,774
Citation928 F.2d 504
PartiesUNITED STATES of America, Appellee, v. Robert Tappan MORRIS, Defendant-Appellant. ocket 90-1336.
CourtU.S. Court of Appeals — Second Circuit

Thomas A. Guidoboni, Washington, D.C., for defendant-appellant.

Ellen R. Meltzer, U.S. Dept. of Justice, Washington, D.C. (Frederick J. Scullin, Jr., U.S. Atty., Syracuse, N.Y., Mark D. Rasch, U.S. Dept. of Justice, Washington, D.C., on the brief), for appellee.

Before NEWMAN and WINTER, Circuit Judges, and DALY, District Judge. *

JON O. NEWMAN, Circuit Judge:

This appeal presents two narrow issues of statutory construction concerning a provision Congress recently adopted to strengthen protection against computer crimes. Section 2(d) of the Computer Fraud and Abuse Act of 1986, 18 U.S.C. Sec. 1030(a)(5)(A) (1988), punishes anyone who intentionally accesses without authorization a category of computers known as "[f]ederal interest computers" and damages or prevents authorized use of information in such computers, causing loss of $1,000 or more. The issues raised are (1) whether the Government must prove not only that the defendant intended to access a federal interest computer, but also that the defendant intended to prevent authorized use of the computer's information and thereby cause loss; and (2) what satisfies the statutory requirement of "access without authorization."

These questions are raised on an appeal by Robert Tappan Morris from the May 16, 1990, judgment of the District Court for the Northern District of New York (Howard G. Munson, Judge) convicting him, after a jury trial, of violating 18 U.S.C. Sec. 1030(a)(5)(A). Morris released into INTERNET, a national computer network, a computer program known as a "worm" 1 that spread and multiplied, eventually causing computers at various educational institutions and military sites to "crash" or cease functioning.

We conclude that section 1030(a)(5)(A) does not require the Government to demonstrate that the defendant intentionally prevented authorized use and thereby caused loss. We also find that there was sufficient evidence for the jury to conclude that Morris acted "without authorization" within the meaning of section 1030(a)(5)(A). We therefore affirm.

FACTS

In the fall of 1988, Morris was a first-year graduate student in Cornell University's computer science Ph.D. program. Through undergraduate work at Harvard and in various jobs he had acquired significant computer experience and expertise. When Morris entered Cornell, he was given an account on the computer at the Computer Science Division. This account gave him explicit authorization to use computers at Cornell. Morris engaged in various discussions with fellow graduate students about the security of computer networks and his ability to penetrate it.

In October 1988, Morris began work on a computer program, later known as the INTERNET "worm" or "virus." The goal of this program was to demonstrate the inadequacies of current security measures on computer networks by exploiting the security defects that Morris had discovered. The tactic he selected was release of a worm into network computers. Morris designed the program to spread across a national network of computers after being inserted at one computer location connected to the network. Morris released the worm into INTERNET, which is a group of national networks that connect university, governmental, and military computers around the country. The network permits communication and transfer of information between computers on the network.

Morris sought to program the INTERNET worm to spread widely without drawing attention to itself. The worm was supposed to occupy little computer operation time, and thus not interfere with normal use of the computers. Morris programmed the worm to make it difficult to detect and read, so that other programmers would not be able to "kill" the worm easily.

Morris also wanted to ensure that the worm did not copy itself onto a computer that already had a copy. Multiple copies of the worm on a computer would make the worm easier to detect and would bog down the system and ultimately cause the computer to crash. Therefore, Morris designed the worm to "ask" each computer whether it already had a copy of the worm. If it responded "no," then the worm would copy onto the computer; if it responded "yes," the worm would not duplicate. However, Morris was concerned that other programmers could kill the worm by programming their own computers to falsely respond "yes" to the question. To circumvent this protection, Morris programmed the worm to duplicate itself every seventh time it received a "yes" response. As it turned out, Morris underestimated the number of times a computer would be asked the question, and his one-out-of-seven ratio resulted in far more copying than he had anticipated. The worm was also designed so that it would be killed when a computer was shut down, an event that typically occurs once every week or two. This would have prevented the worm from accumulating on one computer, had Morris correctly estimated the likely rate of reinfection.

Morris identified four ways in which the worm could break into computers on the network:

(1) through a "hole" or "bug" (an error) in SEND MAIL, a computer program that transfers and receives electronic mail on a computer;

(2) through a bug in the "finger demon" program, a program that permits a person to obtain limited information about the users of another computer;

(3) through the "trusted hosts" feature, which permits a user with certain privileges on one computer to have equivalent privileges on another computer without using a password; and

(4) through a program of password guessing, whereby various combinations of letters are tried out in rapid sequence in the hope that one will be an authorized user's password, which is entered to permit whatever level of activity that user is authorized to perform.

On November 2, 1988, Morris released the worm from a computer at the Massachusetts Institute of Technology. MIT was selected to disguise the fact that the worm came from Morris at Cornell. Morris soon discovered that the worm was replicating and reinfecting machines at a much faster rate than he had anticipated. Ultimately, many machines at locations around the country either crashed or became "catatonic." When Morris realized what was happening, he contacted a friend at Harvard to discuss a solution. Eventually, they sent an anonymous message from Harvard over the network, instructing programmers how to kill the worm and prevent reinfection. However, because the network route was clogged, this message did not get through until it was too late. Computers were affected at numerous installations, including leading universities, military sites, and medical research facilities. The estimated cost of dealing with the worm at each installation ranged from $200 to more than $53,000.

Morris was found guilty, following a jury trial, of violating 18 U.S.C. Sec. 1030(a)(5)(A). He was sentenced to three years of probation, 400 hours of community service, a fine of $10,050, and the costs of his supervision.

DISCUSSION
I. The intent requirement in section 1030(a)(5)(A)

Section 1030(a)(5)(A), covers anyone who

(5) intentionally accesses a Federal interest computer without authorization, and by means of one or more instances of such conduct alters, damages, or destroys information in any such Federal interest computer, or prevents authorized use of any such computer or information, and thereby

(A) causes loss to one or more others of a value aggregating $1,000 or more during any one year period; ... [emphasis added].

The District Court concluded that the intent requirement applied only to the accessing and not to the resulting damage.

Judge Munson found recourse to legislative history unnecessary because he considered the statute clear and unambiguous. However, the Court observed that the legislative history supported its reading of section 1030(a)(5)(A).

Morris argues that the Government had to prove not only that he intended the unauthorized access of a federal interest computer, but also that he intended to prevent others from using it, and thus cause a loss. The adverb "intentionally," he contends, modifies both verb phrases of the section. The Government urges that since punctuation sets the "accesses" phrase off from the subsequent "damages" phrase, the provision unambiguously shows that "intentionally" modifies only "accesses." Absent textual ambiguity, the Government asserts that recourse to legislative history is not appropriate. See Burlington N.R. Co. v. Oklahoma Tax Comm'n, 481 U.S. 454, 461, 107 S.Ct. 1855, 1859, 95 L.Ed.2d 404 (1987); Consumer Product Safety Comm'n v. GTE Sylvania, Inc., 447 U.S. 102, 108, 100 S.Ct. 2051, 2056, 64 L.Ed.2d 766 (1980); United States v. Holroyd, 732 F.2d 1122, 1125 (2d Cir.1984).

With some statutes, punctuation has been relied upon to indicate that a phrase set off by commas is independent of the language that followed. See United States v. Ron Pair Enterprises, Inc., 489 U.S. 235, 241, 109 S.Ct. 1026, 1030, 103 L.Ed.2d 290 (1989) (interpreting the Bankruptcy Code). However, we have been advised that punctuation is not necessarily decisive in construing statutes, see Costanzo v. Tillinghast, 287 U.S. 341, 344, 53 S.Ct. 152, 153, 77 L.Ed. 350 (1932), and with many statutes, a mental state adverb adjacent to initial words has been applied to phrases or clauses appearing later in the statute without regard to the punctuation or structure of the statute. See Liparota v. United States, 471 U.S. 419, 426-29, 105 S.Ct. 2084, 2088-90, 85 L.Ed.2d 434 (1985) (interpreting food stamps provision); United States v. Nofziger, 878 F.2d 442, 446-50 (D.C.Cir.) (interpreting government "revolving door" statute), cert. denied, --- U.S. ----, 110 S.Ct. 564, 107 L.Ed.2d 559 (1989); United States v....

To continue reading

Request your trial
46 cases
  • US v. Figueroa, Docket 98-1111.
    • United States
    • United States Courts of Appeals. United States Court of Appeals (2nd Circuit)
    • December 18, 1998
    ...punctuation resolves the question of how much knowledge Congress intended to be sufficient for a conviction.6 See United States v. Morris, 928 F.2d 504, 507 (2d Cir.1991) ("We have been advised that punctuation is not necessarily decisive in construing statutes ... and with many statutes, a......
  • JBCHoldings N.Y., LLC v. Pakter, 12 Civ. 7555(PAE).
    • United States
    • United States District Courts. 2nd Circuit. United States District Courts. 2nd Circuit. Southern District of New York
    • March 20, 2013
    ...Fraud and Abuse Act, 27 Ga. St. U.L.Rev. 379 (2011). 7. The Second Circuit's decision in United States v. Morris is inapposite. 928 F.2d 504 (2d Cir.1991). The defendant there was a graduate student who used his access to a university's computer system to upload malware. The malware then sp......
  • U.S. v. Aleynikov
    • United States
    • United States District Courts. 2nd Circuit. United States District Courts. 2nd Circuit. Southern District of New York
    • September 3, 2010
    ...must be given its ordinary meaning. Santos, 553 U.S. 507, 128 S.Ct. at 2024; Broxmeyer, 616 F.3d at 124-25; see also United States v. Morris, 928 F.2d 504, 511 (2d Cir.1991) (holding that the word "authorization" for purposes of the CFAA is "of common usage, without any technical or ambiguo......
  • U.S. v. George, Docket No. 00-1601.
    • United States
    • United States Courts of Appeals. United States Court of Appeals (2nd Circuit)
    • October 8, 2004
    ...to phrases or clauses appearing later in the statute without regard to the punctuation or structure of the statute." United States v. Morris, 928 F.2d 504, 507 (2d Cir.1991) (citations The government also offers no support for its contention that "by adding [the phrase `contrary to the laws......
  • Request a trial to view additional results
7 books & journal articles
  • Computer crimes.
    • United States
    • American Criminal Law Review Vol. 43 No. 2, March 2006
    • March 22, 2006
    ...hackers attack computers in an attempt to help their victims, by pointing out the holes in their security. E.g., United States v. Morris, 928 F.2d 504, 505 (2d Cir. 1991) (accepting defendant's assertion that releasing pernicious "worm" on Internet demonstrated security (23.) Teenage hacker......
  • Amending the ECPA to enable a culture of cybersecurity research.
    • United States
    • Harvard Journal of Law & Technology Vol. 22 No. 1, September 2008
    • September 22, 2008
    ...including operating systems.... [I]t requires that its 'host' program be run to activate it." Id.; see also United States v. Morris, 928 F.2d 504 (2d Cir. 1991) (upholding conviction of the worm's author under the Computer Fraud and Abuse Act ("CFAA"), 18 U.S.C. § (16.) See Spafford, supra ......
  • The path of E-law: liberty, property, and democracy from the colonies to the Republic of Cyberia.
    • United States
    • Rutgers Computer & Technology Law Journal Vol. 24 No. 1, March 1998
    • March 22, 1998
    ...migrate through computer systems; the latter attach themselves to the operating system and the former do not. See United States v. Morris, 928 F.2d 504, 505 n.1 (2d Cir. (212.) See SLOAN, supra note 201, at 17-18 (intercepting electronic communications between two or more computers). (213.)......
  • Science fiction no more: cyber warfare and the United States.
    • United States
    • Denver Journal of International Law and Policy Vol. 40 No. 4, September 2012
    • September 22, 2012
    ...ESSENTIALS, DEFENDING MOBILE SYSTEMS FROM DATA PIRACY 200 (2002). (35.) Curran et al., supra note 33. (36.) United States v. Morris, 928 F.2d 504, 505 (2d Cir. 1991). The Morris worm on November 2, 1988, was one of the first computer worms distributed via the Internet. According to its crea......
  • Request a trial to view additional results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT