United States District Court Eastern District of Louisiana
United States District Court Eastern District of Louisiana
United States District Court Eastern District of Louisiana
Before the Court is the Defendant’s Motion to Dismiss (Rec. Doc. 16). For the following
reasons, the Defendant’s motion is now GRANTED IN PART AND DENIED IN PART.
I. BACKGROUND
On October 23, 2007, the Plaintiff, a lawyer, initiated this action against the Defendant,
his ex-wife, for punitive damages, attorney fees, injunctive relief, and equitable relief pursuant to
(1) the Federal Wiretap Act, 18 U.S.C. § 2510, et seq.; (2) the Stored Communications Act, 18
U.S.C. § 2701, et seq. (“SCA”); (3) the Computer Fraud and Abuse Act, 18 U.S.C. §
1030(5)(a)(i), et seq.; and (4) the Louisiana Electronic Surveillance Act, La. Rev. Stat. 15:1302,
et seq. The Plaintiff alleges that the Defendant installed a computer virus on his office and
personal computers in order to steal his passwords and gain access to financial information for
According to the Plaintiff, who operates a law firm in Lake Charles, Louisiana, he and
his staff “began to experience considerable difficulties in both their home and office computers.”
Compl. ¶ 6. The Plaintiff alleges that the difficulties included “error messages, slow processing,
and other indicators of technical problems with the operations of the computers.” Id. The
Plaintiff further alleges that he retained the services of Webtronics, a computer repair company,
in order to run diagnostic operations on his computers. The Plaintiff reports that Webtronics
identified “spyware and viruses on two Compaq computers and one Toshiba laptop which were
The Plaintiff claims that, “[u]pon further examination, it became apparent that the
computers in question were infected with an internet ‘Trojan Horse’ virus named ‘Infostealer.’”
Id. ¶ 9. According to the Plaintiff, the Infostealer program is “used to detect and steal passwords
from computers operated by others, and works by gathering the passwords from the
compromised computer and sending them to a remote computer by email or other means.” Id.
The Plaintiff alleges that the Defendant intentionally sent the Infostealer program to him “by
means of various emails and attachments” in order to gain financial information for use in the
On March 24, 2008, the Defendant filed a Motion to Dismiss pursuant to Rule 12(b)(6) of
the Federal Rules of Civil Procedure. The Defendant contends that the Plaintiff’s allegations fail
to state a valid claim under each of the statutes by which the Plaintiff seeks relief. First, the
Defendant argues that sending a computer virus to detect and steal passwords located on a
purposes of the Federal Wiretap Act. Second, the Defendant argues that the Stored
Communications Act does not apply to the instant case because the Plaintiff’s computers are not
Defendant argues that the Computer Fraud and Abuse Act does not apply because the Plaintiff
-2-
only alleges that the Defendant sought to recover passwords and did not intend to “harm” the
Plaintiff’s computer. Finally, the Defendant argues that the Louisiana Electronic Surveillance
Act does not apply because that statute only prohibits the interception of “wire or oral”
communications.
“The district court may not dismiss a complaint under rule 12(b)(6) ‘unless it appears
beyond doubt that the plaintiff can prove no set of facts in support of his claim which would
entitle him to relief.’ “ Lowrey v. Texas A & M Univ. Sys., 117 F.3d 242, 247 (5th Cir.1997)
(quoting Conley v. Gibson, 355 U.S. 41, 45-46 (1957)). The Court must construe the complaint
liberally in favor of the plaintiff, “and all facts pleaded in the complaint must be taken as true.”
Campbell v. Wells Fargo Bank, 781 F.2d 440, 442 (5th Cir.1986). “In order to avoid dismissal
for failure to state a claim, however, a plaintiff must plead specific facts, not mere conclusory
allegations.” Collins v. Morgan Stanley Dean Witter, 224 F.3d 496, 498 (5th Cir.2000) (quoting
Tuchman v. DSC Commc'ns Corp., 14 F.3d 1061, 1067 (5th Cir.1994)). “Factual allegations
must be enough to raise a right to relief above the speculative level, on the assumption that all
the allegations in the complaint are true (even if doubtful in fact).” Bell Atlantic Corp. v.
Twombly, 127 S. Ct 1955, 1965 (2007). The Court will address each of the Defendant’s
arguments in turn.
The Federal Wiretap Act subjects to criminal liability any person who “intentionally
intercepts [or] endeavors to intercept ... any wire, oral or electronic communication,” except as
-3-
otherwise permitted by law. 18 U.S.C. § 2511(1)(a). “Electronic communication” is defined as
“any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature
“Intercept” is defined as “the aural or other acquisition of the contents of any wire, electronic, or
oral communication through the use of any electronic, mechanical, or other device.” 18 U.S.C. §
2510(4). The Wiretap Act provides a civil cause of action for persons whose electronic
In Steve Jackson Games, Inc. v. United States Secret Service, 36 F.3d 457 (5th Cir.
1994), the Fifth Circuit held that the government did not “intercept” electronic communications
by seizing a computer containing unread email messages stored on an electronic bulletin board
system. In examining the scope of the Federal Wiretap Act, the court noted as significant the
fact that Congress had defined wire and electronic communications differently:
Critical to the issue before us is the fact that, unlike the definition of
‘wire communication,’ the definition of ‘electronic communication’
does not include electronic storage of such communications....
Congress’ use of the word ‘transfer’ in the definition of ‘electronic
communication,’ and its omission in that definition of the phrase ‘any
electronic storage of such communication’ ... reflects that Congress
did not intend for ‘intercept’ to apply to ‘electronic communications’
when those communications are in ‘electronic storage.’
Id. at 461-62. As a result, the court held that the e-mail messages stored on the BBS’ computer
hard drive were no longer in transmission and thus could not be “intercepted” within the
Several courts that have since considered the issue have endorsed the Fifth Circuit’s
-4-
with transmission.” United States v. Seiger, 318 F.3d 1039, 1047 (11th Cir. 2003); Konop v.
Hawaiian Airlines, Inc., 302 F.3d 868 (9th Cir. 2001). For example, in Bailey v. Bailey, 2008
WL 324156, *5 (E.D. Mich. 2008), the court granted the defendant’s motion for summary
judgment, holding that the Wiretap Act did not apply to the defendant’s installation of a Trojan
Horse program on his wife’s computer in order to steal her email messages and passwords. In
finding the Wiretap Act inapplicable, the court in Bailey carefully examined the mechanics of the
Trojan Horse program and concluded that the defendant had not “obtain[ed] the emails or
messages contemporaneously with their transmission.” See id.; see also Steiger, 318 F.3d at
1050 (“[T]he evidence shows that the source used a Trojan Horse virus that enabled him to
access and download information stored on Seiger’s personal computer. This conduct, while
Turning to the instant case, the Court finds that the Plaintiff’s claims under the Federal
Wiretap Act cannot be dismissed at this time. The Plaintiff alleges that the Defendant installed a
Trojan Horse program on his computer “to detect and steal passwords ... by gathering the
passwords from the compromised computer and sending them to a remote computer by email or
other means.” Compl. ¶ 9. The Plaintiff further alleges that he used his computers in connection
with his business and that the computers were “connected to the Internet by typical means.” Id.
¶ 5. Assuming that the Plaintiff’s allegations are true, it is reasonable at this time to infer that the
Trojan Horse program may have collected information contemporaneous to its transmission over
the internet. Although the Plaintiff may ultimately face considerable difficulties demonstrating
that the claims should survive summary judgment, it would be premature and speculative for the
-5-
B. The Stored Communications Act
The Stored Communications Act (“SCA”) subjects to criminal liability any person who
18 U.S.C. 2701, et seq. The statute defines an “electronic communication service” as “any
service which provides to users thereof the ability to send or receive wire or electronic
the SCA). “Electronic storage” is defined as “any temporary, intermediate storage of a wire or
electronic communication incidental to the electronic transmission thereof; and [] any storage of
of such communication.” 18 U.S.C. §§ 2510(17)(A), (B). The SCA provides that a civil action
may be brought “by any provider of electronic communication service, subscriber, or other
person aggrieved by a violation ... in which the conduct constituting the violation is engaged in
Courts have interpreted the statute to apply primarily to telephone companies, internet or
e-mail service providers, and bulletin board services. See Steiger, 318 F.3d at 1049; Steve
Jackson Games, 36 F.3d at 462-63; see also In re DoubleClick, Inc. Privacy Litig., 154
F.Supp.2d 497 (S.D.N.Y. 2001) (finding that the SCA did not prohibit websites from
placing‘cookies’ on personal computers because, inter alia, the personal computers at issue were
not “electronic communication service providers.”).1 For example, an online business or retailer
1
In Doubleclick, the court went on to explain that “[e]xamples of providers in the Internet
world would include ISPs such as America Online, Juno and UUNET, as well as, perhaps, the
telecommunications companies whose cables and phone lines carry the traffic.” In re
-6-
may be considered an electronic communication service provider if the business has a website
that offers customers the ability to send messages or communications to third parties. Compare
Kaufman v. Nest Seekers, LLC, 2006 WL 2807177, *6 (S.D.N.Y. 2006) (“An on-line business
which provides its customers, as part of its commercial offerings, the means by which the
customers may engage in private electronic communications with third-parties may constitute a
CyberSource Corp., 166 F. Supp. 2d 1263, 1270 (N.D. Cal 2001) (holding that an online
merchant with a website that only allows customers to send electronic communications directly
to the merchant does not provide electronic communication services within the contemplation of
the SCA).
In United States v. Steiger, the court held that the SCA did not prohibit an anonymous
source from installing a Trojan Horse virus on the defendant’s computer in order to search his
hard drive for evidence of child pornography. 318 F.3d at 1049. The court explained that the
“SCA clearly applies, for example, to information stored with a phone company, Internet Service
Provider (ISP), or electronic bulletin board service (BBS).” Id. In contrast, however, the court
explained that the SCA “does not appear to apply to the source’s hacking into Steiger’s computer
to download images and identifying information stored on his hard drive.” Id. The court found
persuasive the fact that the Defendant had not presented any evidence that his computer
“maintained any ‘electronic communication service’ as defined in 18 U.S.C. § 2510.” Id. The
court noted, however, that “the SCA may apply to the extent the source accessed and retrieved
Doubleclick, 154 F. Supp. 2d at 511 n.20. The court further noted that “the section is
specifically targeted at communications temporarily stored by electronic communications
services incident to their transmission–for example, when an email service stores a message until
the addressee downloads it.” Id. at 512.
-7-
any information stored with Steiger’s internet service provider.” See id.; see also Bailey, 2008
WL 324156, *6 (explaining that protection under the SCA “does not extend to emails and
Turning to the instant case, the Court finds that the Plaintiff’s claims under the SCA
cannot be dismissed at this time because it is unclear to what extent the program may have
Although the Plaintiff does not allege that his personal or office computers were “facilities
through which an electronic communication service is provided,” the computers may qualify as
such because the Plaintiff does allege that he used the computers to run his business. Further,
the Plaintiff alleges that the Defendant transmitted the Trojan Horse program to him via email
and that the program sent information back to the Defendant “by email or other means.” It is
therefore unclear whether the program may have accessed files stored with an electronic service
provider during its transmission of data. Finally, the Plaintiff alleges that the Trojan Horse
program targeted passwords, and it is unclear to the Court whether the targeted passwords were
system passwords saved on the Plaintiff’s hard drive or web-based passwords captured during
transmission over the internet. Although the Plaintiff may face considerable difficulties in
demonstrating that the SCA claim should survive summary judgment, it would be premature and
The Computer Fraud and Abuse Act subjects to criminal liability any person who
-8-
intentionally accesses a protected computer without authorization,
and as a result of such conduct, recklessly causes damage; or
(iii) intentionally accesses a protected computer without
authorization, and as a result of such conduct causes damage.
information.” 18 U.S.C. § 1030(e)(8). “Loss” is defined as “any reasonable cost to any victim,
including the cost of responding to an offense, conducting damage assessment, and restoring the
data, program, system, or information to its condition prior to the offense, and any revenue lost,
U.S.C. § 1030(e)(11). In addition to subjecting any person who violates the statute to criminal
liability, the statute also provides a civil remedy for any person who suffers damage or loss
The Defendant makes two arguments as to why the Plaintiff’s complaint fails to state a
claim under the Computer Fraud and Abuse Act. First, the Defendant argues that the Plaintiff
2
Pursuant to 18 U.S.C. § 1030(g), the statute only provides a civil remedy against a
person whose conduct caused or, if completed, would have caused:
(i) loss to 1 or more persons during any 1-year period ... aggregating
at least $5,000 in value;
(ii) the modification or impairment, or potential modification or
impairment, of the medical examination, diagnosis, treatment, or care
of 1 or more individuals;
(iii) physical injury to any person;
(iv) a threat to public health or safety; or
(v) damage affecting a computer system used by or for a government
entity in furtherance of the administration of justice, national defense,
or national security.
18 U.S.C. §§ 1030(a)(5)(B), 1030(g). If the person’s conduct caused or would have only caused
“loss to 1 or more persons during any 1-year period ... aggregating at least $5,000 in value,” as set
forth in (i), then the statute limits the civil remedy to economic damages. 18 U.S.C. § 1030(g).
-9-
has not established that the computers at issue were “protected” within the contemplation of the
statute. Second, the Defendant argues that the Plaintiff has failed to establish that the Defendant
intentionally caused “damage” to the Plaintiff’s computers. Specifically, the Defendant argues
that a person cannot simultaneously seek to damage a computer and gather passwords from the
The Plaintiff alleges that he and his employees used the computers at issue in connection
with his law firm business. The Plaintiff also claims that the computers were connected to the
internet. As a result, the complaint satisfies the statutory requirement that the computers must at
“protected.” 18 U.S.C. § 1030(e)(2)(B). In addition, the statute does not, as the Defendant
suggests, apply only in the instance that a person intends to render a computer completely
inoperable. Rather, the statute defines “damage” as “any impairment to the integrity or
alleges that his computers presented “error messages, slow processing, and other indicators of
technical problems.” Compl. ¶ 6. Error messages and slow processing constitute impairments to
the integrity or availability of data. Therefore, assuming that all of the Plaintiff’s allegations are
true, it is reasonable to infer that the Defendant may have intended to cause such limited damage
to the computers at issue, even if she did not intend to render them completely inoperable.
Accordingly, the Court finds that the Plaintiff has stated a valid claim under the Computer Fraud
The Louisiana Electronic Surveillance Act makes it unlawful for any person to
-10-
“[w]illfully intercept, endeavor to intercept, or procure any other person to intercept or endeavor
to intercept, any wire or oral communication.” LA. REV. STAT. ANN. § 15:1303(A)(1). Because
the Louisiana Electronic Surveillance Act is modeled after the Federal Wiretap Act, “federal law
is instructive in the areas where the provisional language coincides.” Keller v. Aymond, 98-844,
p. 6 (La. App. 3 Cir. 12/23/98); 722 So. 2d 1224, 1227. Federal law, however, may not be
instructive where the language differs. Importantly, the Louisiana Electronic Surveillance Act,
unlike the Federal Wiretap Act, prohibits only the interception of “wire or oral
communications”–it does not address the interception of “electronic communications.” LA. REV.
STAT. ANN. § 15:1303(A)(1). The Louisiana Legislature included the term “electronic
communications” in the statute several times–and even defined it–but did not expressly prohibit
the interception of such communications in all circumstances. See, e.g., LA. REV. STAT. ANN. §
the scope of the statutory prohibition to the interception of “oral or wire” communications. LA.
In the instant case, the Plaintiff does not allege that the Defendant intercepted oral or wire
communications. The Plaintiff alleges only that the Defendant transmitted a computer virus that
“works by gathering the passwords from the compromised computer and sending them to a
remote computer by email or other means.” Compl. ¶ 9. Although the Plaintiff asserts that
Louisiana courts interpret the Louisiana Electronic Surveillance Act to apply to electronic
communications, the Plaintiff has not provided–and the Court has not identified–a single case
supporting the Plaintiff’s invitation to disregard the plain, express language of the Act.
Accordingly, the Court finds that the Plaintiff has failed to state a claim under the Louisiana
Electronic Surveillance Act and, as a result, the Defendant’s motion to dismiss is granted as to
-11-
that claim.
IV. CONCLUSION
For the reasons listed above, the Defendant’s Motion to Dismiss is GRANTED IN PART
-12-