United States v. Mitra, Rajib K.

CourtCourt of Appeals for the Seventh Circuit
DecidedApril 18, 2005
Docket04-2328
StatusPublished

This text of United States v. Mitra, Rajib K. (United States v. Mitra, Rajib K.) is published on Counsel Stack Legal Research, covering Court of Appeals for the Seventh Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Mitra, Rajib K., (7th Cir. 2005).

Opinion

In the United States Court of Appeals For the Seventh Circuit ____________

No. 04-2328 UNITED STATES OF AMERICA, Plaintiff-Appellee, v. RAJIB K. MITRA, Defendant-Appellant.

____________ Appeal from the United States District Court for the Western District of Wisconsin. No. 03-CR-153-S—John C. Shabaz, Judge. ____________ ARGUED FEBRUARY 16, 2005—DECIDED APRIL 18, 2005 ____________

Before EASTERBROOK, WOOD, and SYKES, Circuit Judges. EASTERBROOK, Circuit Judge. Wisconsin’s capital city uses a computer-based radio system for police, fire, ambulance, and other emergency communications. The Smartnet II, made by Motorola, spreads traffic across 20 frequencies. One is designated for control. A radio unit (mobile or base) uses the control channel to initiate a conversation. Com- puter hardware and software assigns the conversation to an open channel, and it can link multiple roaming units into “talk groups” so that officers in the field can hold joint conversations. This is known as a “trunking system” and 2 No. 04-2328

makes efficient use of radio spectrum, so that 20 channels can support hundreds of users. If the control channel is in- terfered with, however, remote units will show the message “no system” and communication will be impossible. Between January and August 2003 mobile units in Madison encountered occasional puzzling “no signal” condi- tions. On Halloween of that year the “no system” condition spread citywide; a powerful signal had blanketed all of the City’s communications towers and prevented the computer from receiving, on the control channel, data essential to parcel traffic among the other 19 channels. Madison was hosting between 50,000 and 100,000 visitors that day. When disturbances erupted, public safety departments were un- able to coordinate their activities because the radio system was down. Although the City repeatedly switched the control channel for the Smartnet system, a step that temporarily restored service, the interfering signal changed channels too and again blocked the system’s use. On November 11, 2003, the attacker changed tactics. Instead of blocking the sys- tem’s use, he sent signals directing the Smartnet base station to keep channels open, and at the end of each com- munication the attacker appended a sound, such as a woman’s sexual moan. By then the City had used radio direction finders to pin down the source of the intruding signals. Police arrested Rajib Mitra, a student in the University of Wisconsin’s graduate business school. They found the radio hardware and computer gear that he had used to monitor communica- tions over the Smartnet system, analyze how it operated, and send the signals that took control of the system. Mitra, who in 2000 had received a B.S. in computer science from the University, possessed two other credentials for this kind of work: criminal convictions (in 1996 and 1998) for hacking into computers in order to perform malicious mischief. A jury convicted Mitra of two counts of intentional interfer- ence with computer-related systems used in interstate No. 04-2328 3

commerce. See 18 U.S.C. §1030(a)(5). He has been sen- tenced to 96 months’ imprisonment. On appeal he says that his conduct does not violate §1030—and that, if it does, the statute exceeds Congress’s commerce power. Section 1030(a)(5) provides that whoever (A) (i) knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intention- ally causes damage without authorization, to a protected computer; (ii) intentionally accesses a protected com- puter without authorization, and as a result of such conduct, recklessly causes damage; or (iii) intentionally accesses a protected com- puter without authorization, and as a result of such conduct, causes damage; and (B) by conduct described in clause (i), (ii), or (iii) of subparagraph (A), caused (or, in the case of an at- tempted offense, would, if completed, have caused)— (i) loss to 1 or more persons during any 1- year period (and, for purposes of an investi- gation, prosecution, or other proceeding brought by the United States only, loss resulting from a related course of conduct affecting 1 or more other protected comput- ers) aggregating at least $5,000 in value; (ii) the modification or impairment, or po- tential modification or impairment, of the medical examination, diagnosis, treatment, or care of 1 or more individuals; (iii) physical injury to any person; 4 No. 04-2328

(iv) a threat to public health or safety; or (v) damage affecting a computer system used by or for a government entity in furtherance of the administration of justice, national defense, or national security . . . shall be punished as provided in subsection (c) of this section. Subsection (e)(1) defines “computer” as “an electronic, mag- netic, optical, electrochemical, or other high speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device, but such term does not include an automated typewriter or typesetter, a portable hand held calculator, or other similar device”. Subsec- tion (e)(2)(B) defines a “protected computer” to include any computer “used in interstate or foreign commerce or com- munication”. Finally, subsection (e)(8) defines “damage” to mean “any impairment to the integrity or availability of data, a program, a system, or information”. The prosecutor’s theory is that Smartnet II is a “computer” because it contains a chip that performs high- speed processing in response to signals received on the control channel, and as a whole is a “communications facility directly related to or operating in conjunction” with that computer chip. It is a “protected computer” because it is used in “interstate . . . communication”; the frequencies it uses have been allocated by the Federal Communications Commission for police, fire, and other public-health ser- vices. Mitra’s transmissions on Halloween included “infor- mation” that was received by the Smartnet. Data that Mitra sent interfered with the way the computer allocated communications to the other 19 channels and stopped the flow of information among public-safety officers. This led to “damage” by causing a “no system” condition citywide, No. 04-2328 5

impairing the “availability of . . . a system, or information” and creating “a threat to public health or safety” by knock- ing out police, fire, and emergency communications. See §1030(a)(5)(A)(i), (B)(iv). The extraneous sounds tacked onto conversations on November 11 also are “information” sent to the “protected computer,” and produce “damage” because they impair the “integrity” of the official communications. This time subsection §1030(a)(5)(B)(v) is what makes the meddling a crime, because Mitra hacked into a governmen- tal safety-related communications system. Mitra concedes that he is guilty if the statute is parsed as we have done. But he submits that Congress could not have intended the statute to work this way. Mitra did not invade a bank’s system to steal financial information, or erase data on an ex-employer’s system, see United States v. Lloyd, 269 F.3d 228 (3d Cir. 2001), or plaster a corporation’s web site with obscenities that drove away customers, or unleash a worm that slowed and crashed computers across the world, see United States v. Morris, 928 F.2d 504 (2d Cir. 1991), or break into military computers to scramble a flight of interceptors to meet a nonexistent threat, or plant covert programs in computers so that they would send spam without the owners’ knowledge.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Radovich v. National Football League
352 U.S. 445 (Supreme Court, 1957)
Bouie v. City of Columbia
378 U.S. 347 (Supreme Court, 1964)
National Broiler Marketing Ass'n v. United States
436 U.S. 816 (Supreme Court, 1978)
West Virginia University Hospitals, Inc. v. Casey
499 U.S. 83 (Supreme Court, 1991)
United States v. Lopez
514 U.S. 549 (Supreme Court, 1995)
United States v. Morrison
529 U.S. 598 (Supreme Court, 2000)
Rogers v. Tennessee
532 U.S. 451 (Supreme Court, 2001)
United States v. Booker
543 U.S. 220 (Supreme Court, 2004)
United States v. Robert Tappan Morris
928 F.2d 504 (Second Circuit, 1991)
United States v. Timothy Lloyd
269 F.3d 228 (Third Circuit, 2001)

Cite This Page — Counsel Stack

Bluebook (online)
United States v. Mitra, Rajib K., Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-mitra-rajib-k-ca7-2005.