Steve Jackson Games, Inc. v. U.S. Secret Service

Decision Date31 October 1994
Docket NumberNo. 93-8661,93-8661
Citation36 F.3d 457
PartiesSTEVE JACKSON GAMES, INCORPORATED, et al., Plaintiffs-Appellants, v. UNITED STATES SECRET SERVICE, et al., Defendants, United States Secret Service and United States of America, Defendants-Appellees.
CourtU.S. Court of Appeals — Fifth Circuit

Peter D. Kennedy, R. James George, Jr., George, Donaldson & Ford, Austin, TX, for appellants.

Sharon Steele, Washington, DC, for amicus curiae Electronic Frontier Foundation.

Scott McIntosh, Barbara Herwig, U.S. Dept. of Justice, Washington, DC, for appellees.

Appeal from the United States District Court for the Western District of Texas.

Before HIGGINBOTHAM, JONES and BARKSDALE, Circuit Judges.

RHESA HAWKINS BARKSDALE, Circuit Judge:

The narrow issue before us is whether the seizure of a computer, used to operate an electronic bulletin board system, and containing private electronic mail which had been sent to (stored on) the bulletin board, but not read (retrieved) by the intended recipients, constitutes an unlawful intercept under the Federal Wiretap Act, 18 U.S.C. Sec. 2510, et seq., as amended by Title I of the Electronic Communications Privacy Act of 1986, Pub.L. No. 99-508, Title I, 100 Stat. 1848 (1986). We hold that it is not, and therefore AFFIRM.

I.

The district court's findings of fact are not in dispute. See Steve Jackson Games, Inc. v. United States Secret Service, 816 F.Supp. 432 (W.D.Tex.1993). Appellant Steve Jackson Games, Incorporated (SJG), publishes books, magazines, role-playing games, and related products. Starting in the mid-1980s, SJG operated an electronic bulletin board system, called "Illuminati" (BBS), from one of its computers. SJG used the BBS to post public information about its business, games, publications, and the role-playing hobby; to facilitate play-testing of games being developed; and to communicate with its customers and free-lance writers by electronic mail (E-mail).

Central to the issue before us, the BBS also offered customers the ability to send and receive private E-mail. Private E-mail was stored on the BBS computer's hard disk drive temporarily, until the addressees "called" the BBS (using their computers and modems) and read their mail. After reading their E-mail, the recipients could choose to either store it on the BBS computer's hard drive or delete it. In February 1990, there were 365 BBS users. Among other uses, appellants Steve Jackson, Elizabeth McCoy, William Milliken, and Steffan O'Sullivan used the BBS for communication by private E-mail.

In October 1988, Henry Kluepfel, Director of Network Security Technology (an affiliate Bell Company), began investigating the unauthorized duplication and distribution of a computerized text file, containing information about Bell's emergency call system. In July 1989, Kluepfel informed Secret Service Agent Foley and an Assistant United States Attorney in Chicago about the unauthorized distribution. In early February 1990, Kluepfel learned that the document was available on the "Phoenix Project" computer bulletin board, which was operated by Loyd Blankenship in Austin, Texas; that Blankenship was an SJG employee; and that, as a co-systems operator of the BBS, Blankenship had the ability to review and, perhaps, delete any data on the BBS.

On February 28, 1990, Agent Foley applied for a warrant to search SJG's premises and Blankenship's residence for evidence of violations of 18 U.S.C. Secs. 1030 (proscribes interstate transportation of computer access information) and 2314 (proscribes interstate transportation of stolen property). A search warrant for SJG was issued that same day, authorizing the seizure of, inter alia,

[c]omputer hardware ... and computer software ... and ... documents relating to the use of the computer system ..., and financial documents and licensing documentation relative to the computer programs and equipment at ... [SJG] ... which constitute evidence ... of federal crimes.... This warrant is for the seizure of the above described computer and computer data and for the authorization to read information stored and contained on the above described computer and computer data.

The next day, March 1, the warrant was executed by the Secret Service, including Agents Foley and Golden. Among the items seized was the computer which operated the BBS. At the time of the seizure, 162 items of unread, private E-mail were stored on the BBS, including items addressed to the individual appellants. Despite the Secret Service's denial, the district court found that Secret Service personnel or delegates read and deleted the private E-mail stored on the BBS.

Appellants filed suit in May 1991 against, among others, the Secret Service and the United States, claiming, inter alia, violations of the Privacy Protection Act, 42 U.S.C. Sec. 2000aa, et seq. 1 ; the Federal Wiretap Act, as amended by Title I of the Electronic Communications Privacy Act (ECPA), 18 U.S.C. Secs. 2510-2521 (proscribes, inter alia, the intentional interception of electronic communications); and Title II of the ECPA, 18 U.S.C. Secs. 2701-2711 (proscribes, inter alia, intentional access, without authorization, to stored electronic communications). 2

The district court held that the Secret Service violated the Privacy Protection Act, and awarded actual damages of $51,040 to SJG; and that it violated Title II of the ECPA by seizing stored electronic communications without complying with the statutory provisions, and awarded the statutory damages of $1,000 to each of the individual appellants. And, it awarded appellants $195,000 in attorneys' fees and approximately $57,000 in costs. But, it held that the Secret Service did not "intercept" the E-mail in violation of Title I of the ECPA, 18 U.S.C. Sec. 2511(1)(a), because its acquisition of the contents of the electronic communications was not contemporaneous with the transmission of those communications.

II.

As stated, the sole issue is a very narrow one: whether the seizure of a computer on which is stored private E-mail that has been sent to an electronic bulletin board, but not yet read (retrieved) by the recipients, constitutes an "intercept" proscribed by 18 U.S.C. Sec. 2511(1)(a). 3

Section 2511 was enacted in 1968 as part of Title III of the Omnibus Crime Control and Safe Streets Act of 1968, often referred to as the Federal Wiretap Act. Prior to the 1986 amendment by Title I of the ECPA, it covered only wire and oral communications. Title I of the ECPA extended that coverage to electronic communications. 4 In relevant part, Sec. 2511(1)(a) proscribes "intentionally intercept[ing] ... any wire, oral, or electronic communication", unless the intercept is authorized by court order or by other exceptions not relevant here. Section 2520 authorizes, inter alia, persons whose electronic communications are intercepted in violation of Sec. 2511 to bring a civil action against the interceptor for actual damages, or for statutory damages of $10,000 per violation or $100 per day of the violation, whichever is greater. 18 U.S.C. Sec. 2520. 5

The Act defines "intercept" as "the aural or other acquisition of the contents of any wire, electronic, or oral communication through the use of any electronic, mechanical, or other device." 18 U.S.C. Sec. 2510(4). The district court, relying on our court's interpretation of intercept in United States v. Turk, 526 F.2d 654 (5th Cir.), cert. denied, 429 U.S. 823, 97 S.Ct. 74, 50 L.Ed.2d 84 (1976), held that the Secret Service did not intercept the communications, because its acquisition of the contents of those communications was not contemporaneous with their transmission. In Turk, the government seized from a suspect's vehicle an audio tape of a prior conversation between the suspect and Turk. (Restated, when the conversation took place, it was not recorded contemporaneously by the government.) Our court held that replaying the previously recorded conversation was not an "intercept", because an intercept "require[s] participation by the one charged with an 'interception' in the contemporaneous acquisition of the communication through the use of the device". Id. at 658.

Appellants agree with Turk's holding, but contend that it is not applicable, because it "says nothing about government action that both acquires the communication prior to its delivery, and prevents that delivery." (Emphasis by appellants.) Along that line, appellants note correctly that Turk's interpretation of "intercept" predates the ECPA, and assert, in essence, that the information stored on the BBS could still be "intercepted" under the Act, even though it was not in transit. They maintain that to hold otherwise does violence to Congress' purpose in enacting the ECPA, to include providing protection for E-mail and bulletin boards. For the most part, appellants fail to even discuss the pertinent provisions of the Act, much less address their application. Instead, they point simply to Congress' intent in enacting the ECPA and appeal to logic (i.e., to seize something before it is received is to intercept it).

But, obviously, the language of the Act controls. In that regard, appellees counter that "Title II, not Title I, ... governs the seizure of stored electronic communications such as unread e-mail messages", and note that appellants have recovered damages under Title II. Understanding the Act requires understanding and applying its many technical terms as defined by the Act, as well as engaging in painstaking, methodical analysis. As appellees note, the issue is not whether E-mail can be "intercepted"; it can. Instead, at issue is what constitutes an "intercept".

Prior to the 1986 amendment by the ECPA, the Wiretap Act defined "intercept" as the "aural acquisition" of the contents of wire or oral communications through the use of a device. 18 U.S.C. Sec. 2510(4) (1968). The ECPA amended this definition to include the "aural or other acquisition of the contents of ... wire,...

To continue reading

Request your trial
136 cases
  • Facebook, Inc. v. State
    • United States
    • New Jersey Superior Court — Appellate Division
    • April 4, 2022
    ...1039, 1048-49 (11th Cir. 2003) ; Konop v. Hawaiian Airlines, Inc., 302 F.3d 868, 878 (9th Cir. 2002) ; Steve Jackson Games, Inc. v. U.S. Secret Serv., 36 F.3d 457, 461-62 (5th Cir. 1994) ; United States v. Reyes, 922 F. Supp. 818, 836 (S.D.N.Y. 1996). Here, just like we did when we consider......
  • U.S. v. Smith
    • United States
    • U.S. Court of Appeals — Ninth Circuit
    • August 25, 1998
    ...Fifth Circuit observed that the Wiretap Act "is famous (if not infamous) for its lack of clarity," Steve Jackson Games, Inc. v. United States Secret Service, 36 F.3d 457, 462 (5th Cir.1994), it might have put the matter too mildly. Indeed, the intersection of the Wiretap Act (18 U.S.C. §§ 2......
  • Fraser v. Nationwide Mut. Ins. Co.
    • United States
    • U.S. District Court — Eastern District of Pennsylvania
    • March 27, 2001
    ...1055 (9th Cir.1998), cert. denied, 525 U.S. 1071, 119 S.Ct. 804, 142 L.Ed.2d 664 (1999) (citing Steve Jackson Games, Inc. v. United States Secret Service, 36 F.3d 457, 462 (5th Cir.1994)). Courts and scholars have struggled to determine the precise boundaries of and also the intended relati......
  • US v. Reyes
    • United States
    • U.S. District Court — Southern District of New York
    • January 3, 1996
    ...Crime Control and Safe Streets Act of 1968, commonly referred to as the Federal Wiretap Act.18 Steve Jackson Games, Inc. v. United States Secret Service, 36 F.3d 457, 460 (5th Cir. 1994). Title I of the ECPA proscribes "`intentionally intercepting ... any wire, oral, or electronic communica......
  • Request a trial to view additional results
1 firm's commentaries
18 books & journal articles
  • Privacy issues in the workplace
    • United States
    • James Publishing Practical Law Books Texas Employment Law. Volume 1 Part VI. Workplace torts
    • May 5, 2018
    ...and implementing company e-mail policies. d. “Interception” of Stored E-Mail Messages In Steve Jackson Games, Inc. v. U.S. Secret Serv. , 36 F.3d 457 (5th Cir. 1994), the Fifth Circuit held that the Secret Service’s opening, reading and deleting stored e-mail messages before they were retri......
  • Swinging for the fences: how Comprehensive Drug Testing, Inc. missed the ball on digital searches.
    • United States
    • Journal of Criminal Law and Criminology Vol. 100 No. 4, September 2010
    • September 22, 2010
    ...and disks seized; court found no valid reason why information sought could not be copied and equipment returned within hours), aff'd 36 F.3d 457 (5th Cir. (176) United States v. Hunter, 13 F. Supp. 2d 574, 583 (D. Vt. 1998) ("At the very least, the government should copy and return the equi......
  • Table of cases
    • United States
    • James Publishing Practical Law Books Archive Texas Employment Law. Volume 2 - 2016 Part VIII. Selected Litigation Issues
    • July 27, 2016
    ...v. Marathon Oil Co. , 767 S.W.2d 686 (Tex. 1989), §§2:2.D.2, 3:7, 30:5.B.1, 30:5.D.1 Steve Jackson Games, Inc. v. U.S. Secret Serv. , 36 F.3d 457 (5th Cir. 1994), §28:7.C.2.d Stevenson v. Hyre Electric, 505 F.3d 720 (7th Cir. 2007), §25:6.A.1 Stevens v. National Educ. Ctrs., Inc. , 990 S.W.......
  • Privacy Issues in the Workplace
    • United States
    • James Publishing Practical Law Books Archive Texas Employment Law. Volume 2 - 2016 Part VI. Workplace Torts
    • July 27, 2016
    ...and implementing company e-mail policies. d. “Interception” of Stored E-Mail Messages In Steve Jackson Games, Inc. v. U.S. Secret Serv. , 36 F.3d 457 (5th Cir. 1994), the Fifth Circuit held that the Secret Service’s opening, reading and deleting stored e-mail messages before they were retri......
  • Request a trial to view additional results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT