1997-01-18 - Re: Newt’s phone calls

Header Data

From: Dale Thorn <dthorn@gte.net>
To: “Sarah L. Green” <greens@hiwaay.net>
Message Hash: 808278412734cf6b7d319da4d8c49cf3b511e8c6b0b06a5fd24e67d125871734
Message ID: <32E04936.58DE@gte.net>
Reply To: <Pine.LNX.3.91.970117061357.21132C-100000@osprey.sga.com>
UTC Datetime: 1997-01-18 04:02:50 UTC
Raw Date: Fri, 17 Jan 1997 20:02:50 -0800 (PST)

Raw message

From: Dale Thorn <dthorn@gte.net>
Date: Fri, 17 Jan 1997 20:02:50 -0800 (PST)
To: "Sarah L. Green" <greens@hiwaay.net>
Subject: Re: Newt's phone calls
In-Reply-To: <Pine.LNX.3.91.970117061357.21132C-100000@osprey.sga.com>
Message-ID: <32E04936.58DE@gte.net>
MIME-Version: 1.0
Content-Type: text/plain


Sarah L. Green wrote:
> On Thu, 16 Jan 1997, Phillip M. Hallam-Baker wrote:
> > It was a conference call but over a cellular phone. Martin had hacked
> > his Radio Shack Scanner using a well known technique. He had a radio
> > ham license.

> Actually I'd love to see this go to court & have the law itself
> tossed out.  How many years have the airwaves been free?  Now it is
> illegal to listen on the cellular frequencies.

They're not gonna toss the law out, since the law doesn't really deal
with thought crimes, i.e., hearing something you're not supposed to
hear. The law allows them to prosecute people who deliberately monitor
to collect information which can be used against the people being
monitored, or to take advantage of them (steal trade secrets, etc.).

There's a presumption that the person about to be prosecuted has a
collection of information somewhere (on paper, on disk....) that they
otherwise could not possibly have gotten legally.

I've listened to judges describe something similar, in person - the
use of mailing lists by former employees, usually salespeople, where
the names/addresses and other info on the list might be proprietary.

Lawyers for scumbags love to sue over this one, since it's harder for
a judge to declare bad faith or a frivolous suit against the plaintiff
when the issue is unfair competition instigated by "theft" of a mailing
list.  The rule comes down to whether the info is generally available
legally, or whether it absolutely had to have been gotten illegally.







Thread