State v. Corcoran

522 N.W.2d 226, 186 Wis. 2d 616, 1994 Wisc. App. LEXIS 954
CourtCourt of Appeals of Wisconsin
DecidedAugust 3, 1994
Docket93-2671-CR
StatusPublished
Cited by9 cases

This text of 522 N.W.2d 226 (State v. Corcoran) is published on Counsel Stack Legal Research, covering Court of Appeals of Wisconsin primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
State v. Corcoran, 522 N.W.2d 226, 186 Wis. 2d 616, 1994 Wisc. App. LEXIS 954 (Wis. Ct. App. 1994).

Opinion

ANDERSON, P.J.

Brian P. Corcoran appeals from a conviction for the felony destruction of computer data belonging to Mueller Consulting Services (MCS) in violation of § 943.70(2)(a)2 and (b)3, Stats. We affirm the judgment of conviction because we conclude that the Federal Copyright Law does not preempt enforcement of the Wisconsin computer crimes act and the statute is not constitutionally defective.

Facts

In the spring of 1987, Corcoran was hired by MCS to write specialized computer software application programs. Corcoran had difficulties in refining the specialized application programs so that they would operate without generating numerous errors. During the summer he became concerned that he might not be paid for his work and surreptitiously inserted two "booby traps" or "Trojan horses" into separate programs that he had written for MCS. 1

*621 Corcoran installed the first "Trojan horse" in six programs. This "Trojan horse" checked the computer's internal clock and when the time on the clock passed 12:00:00 a.m. on August 11, 1987, a command was automatically issued to delete each of the programs from the computer's memory. 2 The files were not physically erased from the hard drive — permanent memory storage — of MCS's computer. The "delete" command had the disk operating system (DOS) perform two functions. 3 First, DOS erased the names of the six files from the directory structure in the file allocation table (FAT). Second, DOS altered the FAT to indicate that the space on the hard drive containing the data of the six files was available for the storage of new data; the entry of new data into thé computer could have overwritten the data in these files after the "delete" command was executed. Because no new data overwrote these six files, MCS was able to completely recover all of the files.

Corcoran's second "Trojan horse" was inserted in a file called PONQTR1.WK1 and was far more destruc *622 tive. 4 Mary Mueller activated this "Trojan horse" when she followed Corcoran's written instructions on how to find a log of his project hours and in so doing inadvertently unleashed a "delete" command. The files deleted included PONQTR2.WK1, that contained 400 store reviews for one customer, and PAYROLL1.WK1. These files could not be recovered because sometime between the activation of Corcoran's "DestroyAH" program and MCS's attempt to recover the files, additional data was entered on the computer that overwrote the disk space previously assigned to PONQTR2.WK1 and PAYROLL 1.WK1. With the assistance of temporary help, MCS was able to reenter all of the data from the 400 store reviews.

Mueller testified that MCS incurred expenses of almost $4000 to recover from Corcoran's attempts to write useable programs and activation of the two "Trojan horses." In addition, MCS lost one major customer because it was not able to deliver timely reports and a second customer refused to expand MCS's contract.

Procedural History

In 1989, the State filed a criminal complaint alleging that Corcoran did willfully, knowingly and without authorization, destroy computer data and cause damage in an amount greater that $2500 in violation of § 943.70(2)(a)2 and (b)3, STATS. After a preliminary examination, Corcoran filed a motion to dismiss the information, setting forth seven challenges to Wisconsin's computer crimes statute, § 943.70, Stats. He alleged that (1) the federal Copyrights Act, 17 U.S.C. *623 §§ 102, 103, 106 and 301 preempts the State's computer crimes statute; (2) the statute deprived him of his common law and constitutional right to use and dispose of his property, including the right of repossession; (3) the statute is vague; (4) the statute places a prohibitive penalty on his exercise of an exclusive right of distribution of his work product -guaranteed by 17 U.S.C. § 106; (5) the statute impairs his right to contract; (6) the statute violates the constitutional prohibition against involuntary servitude; and (7) the statute violates the equal protection provisions of the United States Constitution.

The trial court denied Corcoran's motion to dismiss. The court held that preemption did not apply to this action, reasoning that the "defense of federal copyright protection is a dependent defense to the State's claim of unauthorized destruction of computer data." Also rejected was Corcoran's theory that the statute unconstitutionally interfered with his exclusive rights to the computer program he wrote. The trial court pointed out that Corcoran was charged with the destruction of data that was owned by MCS and not with destruction of the computer program he wrote. The other issues raised by Corcoran were summarily disposed of by holding that the statute was not vague; the statute did not interfere with any rights granted by the federal Copyrights Act; the statute did not require involuntary servitude; and because the statute applies to any person who destroys computer data not just computer programmers, it does not violate equal protection guarantees.

An amended information was filed in November of 1992 alleging two counts of criminal conduct. 5 Count *624 one alleges that on August 12,1987, Corcoran did "willfully, knowingly and without authorization, destroy data, and did cause damage in an amount greater than $2500, contrary to § 943.70(2)(a)2 and (b)3, Wisconsin Statutes." 6 Count two alleges that between August 1 and August 10, 1987, Corcoran did "willfully, knowingly and without authorization, modify computer program, and did cause damage in an amount greater than $2500, contrary to § 943.70(2)(a)l and (b)3, Wisconsin Statutes." 7 After a jury trial, Corcoran was found guilty of count one and not guilty of count two.

*625 Decision

On appeal, Corcoran's issues can be grouped into two general topics. 8 First, he argues that he is the author of the specialized programs and holds a copyright on both the programs and the data collected by MCS that is inserted into the programs; and therefore, the federal Copyrights Act, 17 U.S.C., preempts enforcement of the Wisconsin computer crimes act (WCCA). Second, he argues that the WCCA is unconstitutional because it impairs the obligation of contract, imposes involuntary servitude, suffers from vagueness, or suffers from overbreadth. We find that all of Corcoran's issues are without substantial merit and affirm his conviction.

I. Copyright Issues

Corcoran was found guilty of count one of the information, destroying computer data, and was acquitted of count two, modifying computer programs.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Corcoran v. Bucher
41 F. App'x 881 (Seventh Circuit, 2002)
State v. Revels
585 N.W.2d 602 (Court of Appeals of Wisconsin, 1998)
Briggs v. State
704 A.2d 904 (Court of Appeals of Maryland, 1998)
Brian P. Corcoran v. Michael Sullivan
112 F.3d 836 (Seventh Circuit, 1997)
State v. Brulport
551 N.W.2d 824 (Court of Appeals of Wisconsin, 1996)
ProCD, Inc. v. Zeidenberg
908 F. Supp. 640 (W.D. Wisconsin, 1996)
State v. Hall
540 N.W.2d 219 (Court of Appeals of Wisconsin, 1995)
Shoreline Park Preservation, Inc. v. Wisconsin Department of Administration
537 N.W.2d 388 (Court of Appeals of Wisconsin, 1995)
State v. Moretto
423 N.W.2d 841 (Wisconsin Supreme Court, 1988)

Cite This Page — Counsel Stack

Bluebook (online)
522 N.W.2d 226, 186 Wis. 2d 616, 1994 Wisc. App. LEXIS 954, Counsel Stack Legal Research, https://law.counselstack.com/opinion/state-v-corcoran-wisctapp-1994.