State v. Schwartz

21 P.3d 1128, 173 Or. App. 301, 2001 Ore. App. LEXIS 484
CourtCourt of Appeals of Oregon
DecidedApril 4, 2001
DocketC940322CR; CA A91702
StatusPublished
Cited by15 cases

This text of 21 P.3d 1128 (State v. Schwartz) is published on Counsel Stack Legal Research, covering Court of Appeals of Oregon primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
State v. Schwartz, 21 P.3d 1128, 173 Or. App. 301, 2001 Ore. App. LEXIS 484 (Or. Ct. App. 2001).

Opinion

*303 DEITS, C. J.

Defendant appeals from a judgment of conviction of three counts of computer crime. ORS 164.377. We reverse the order of restitution, but otherwise we affirm.

Because a jury found defendant guilty, we set out the facts in the light most favorable to the state. State v. Tucker, 315 Or 321, 325, 845 P2d 904 (1993). Defendant worked as an independent contractor for Intel Corporation beginning in the late 1980s. Defendant’s tasks included programming, system maintenance, installing new systems and software, and resolving problems for computer users. In late 1991 or early 1992, defendant began working in Intel’s Supercomputer Systems Division (SSD). SSD creates large computer systems that can cost millions of dollars and are used for applications such as nuclear weapons safety. Intel considers the information stored on its SSD computers to be secret and valuable. Each person using SSD computers must use a unique password in order to gain access to electronic information stored there. Passwords are stored in computer files in an encrypted or coded fashion.

In the spring of 1992, defendant and Poelitz, an Intel systems administrator, had a disagreement about how defendant had handled a problem with SSD’s e-mail system. The problem was ultimately resolved in an alternative manner suggested by Poelitz, which upset defendant and made him believe that any future decisions he made would be overridden. Accordingly, defendant decided to terminate his SSD contract with Intel. As defendant himself put it, he “hadn’t left SSD on the best of terms.” At that time, his personal passwords onto all but one SSD computer were disabled so that defendant would no longer have access to SSD computers. His password onto one SSD computer, Brillig, was inadvertently not disabled.

After defendant stopped working with SSD, he continued to work as an independent contractor with a different division of Intel. In March 1993, Brandewie, an Intel network programmer and systems administrator, noticed that defendant was running a “gate” program on an Intel computer called Mink, which allowed access to Mink from computers *304 outside of Intel. “Gate” programs like the one defendant was running violate Intel security policy, because they breach the “firewall” that Intel has established to prevent access to Intel computers by anyone outside the company. Defendant was using the gate program to use his e-mail account with his publisher and to get access to his Intel e-mail when he was on the road. When Brandewie talked to defendant about his gate program, defendant acknowledged that he knew that allowing external access to Intel computers violated company policy. Even though defendant believed that precautions he had taken made his gate program secure, he agreed to alter his program.

In July 1993, Brandewie noticed that defendant was running another gate program on Mink. This program was similar to the earlier gate program and had the same effect of allowing external access to Intel computers. Defendant protested that changes he had made to the program made it secure, but Brandewie insisted that the program violated company policy. At that point, defendant decided that Mink was useless to him without a gate program, so he asked that his account on that computer be closed. Defendant then moved his gate program onto an Intel computer called Hermeis. Because that computer was too slow for him, defendant finally moved his gate program onto the SSD computer Brillig.

In the fall of 1993, defendant downloaded from the Internet a program called “Crack,” which is a sophisticated password guessing program. Defendant began to run the Crack program on password files on various Intel computers. When defendant ran the Crack program on Brillig, he learned the password for “Ron B.,” one of Brillig’s authorized users. Although he knew he did not have the authority to do so, defendant then used Ron B.’s password to log onto Brillig. From Brillig, he copied the entire SSD password file onto another Intel computer, Wyeth. Once the SSD password file was on Wyeth, defendant ran the Crack program on that file and learned the passwords of more than 35 SSD users, including that of the general manager of SSD. Apparently, defendant believed that, if he could show that SSD’s security had gone downhill since he had left, he could reestablish the respect he had lost when he left SSD. Once he had cracked *305 the SSD passwords, however, defendant realized that, although he had obtained information that would be useful to SSD, he had done so surreptitiously and had “stepped out of my bounds.” Instead of reporting what he had found to anyone at SSD, defendant did nothing and simply stored the information while he went to teach a class in California.

After he returned from California, defendant decided to run the Crack program again on the SSD password file, this time using a new, faster computer called “Snoopy.” Defendant thought that, by running the Crack program on the SSD password file using Snoopy, he would have “the most interesting figures” to report to SSD security personnel. On October 28, 1993, Mark Morrissey, an Intel systems administrator, noticed that defendant was running the Crack program on Snoopy. At that point, Morrissey contacted Richard Cower, an Intel network security specialist, for advice about how to proceed. In investigating defendant’s actions, Morrissey realized that defendant had been running a gate program on the SSD computer Brillig, even though defendant’s access should have been canceled. On October 29, 1993, Cower, Morrissey, and others at Intel decided to contact police.

Defendant was charged with three counts of computer crime, ORS 164.377, 1 and was convicted of all three counts by a jury. He appeals, raising six assignments of error. 2 In his first assignment of error, defendant challenges *306 the trial court’s order denying his motion to suppress evidence of statements defendant made while the police were searching his home. On November 1, 1993, the police searched defendant’s residence pursuant to a search warrant. No incriminating evidence was discovered during the search. However, while the search warrant was being executed, one of the police officers interviewed defendant. Defendant moved to suppress evidence of statements that he made during that interview. Among other things, defendant sought to controvert “the good faith, accuracy and truthfulness of the affiant * * ORS 133.693(1). The trial court denied the motion.

On appeal, defendant advances several grounds in support of his contention that the evidence should have been suppressed. First, defendant challenges the “good faith, accuracy and truthfulness of the affiant” whose statements led to the issuance of the search warrant. See ORS 133.693

Free access — add to your briefcase to read the full text and ask questions with AI

Related

State v. Rossiter
453 P.3d 562 (Court of Appeals of Oregon, 2019)
State v. Nascimento
379 P.3d 484 (Oregon Supreme Court, 2016)
Weldon v. Board of Licensed Professional Counselors & Therapists
337 P.3d 911 (Court of Appeals of Oregon, 2014)
State v. Spears
196 P.3d 1037 (Court of Appeals of Oregon, 2008)
Columbia River Gorge Commission v. Hood River County
152 P.3d 997 (Court of Appeals of Oregon, 2007)
State Ex Rel. Juvenile Department v. O'Farrell
83 P.3d 931 (Court of Appeals of Oregon, 2004)
State v. Bryant
83 P.3d 941 (Court of Appeals of Oregon, 2004)
State v. Hall
50 P.3d 1258 (Court of Appeals of Oregon, 2002)
State v. Dinsmore
49 P.3d 830 (Court of Appeals of Oregon, 2002)
State v. Cardell
41 P.3d 1111 (Court of Appeals of Oregon, 2002)
In re the Marriage of Dillard
39 P.3d 230 (Court of Appeals of Oregon, 2002)
State v. McCloud
34 P.3d 699 (Court of Appeals of Oregon, 2001)
Galloway v. State
781 A.2d 851 (Court of Appeals of Maryland, 2001)

Cite This Page — Counsel Stack

Bluebook (online)
21 P.3d 1128, 173 Or. App. 301, 2001 Ore. App. LEXIS 484, Counsel Stack Legal Research, https://law.counselstack.com/opinion/state-v-schwartz-orctapp-2001.