The law does not address anything like whether there was damage, harmful intent, whether the data was important, whether the change was meant to be permanent or temporary, whether the modification is reversible or recoverable. These are the factors that contribute to determining whether modification of data is criminal according to Raymond Nimmer in this book I was reading called "The Law of Computer Technology" Without any established limits on what is considered a violation of this law then in theory anything seen as even slightly improper on anything that can be defined as a computer could be considered against the law.
Thinking of examples of unconstitutional law violations is child's play at this point. An example would be like if someone were playing a video game, paused the game, walked out of the room, while out of the room someone took the controller and resumed playing for a little bit before the person came back. This is technically a violation of the law because the data within the memory of that computer aka game system was modified.
Cheating in a game of electronic monopoly is technically a felony under this law.
Looking at Facebook while at the workplace where the work policy states that use of computers for personal use is unauthorized.
Moving someone's mouse pointer on their computer is technically changing the memory of the computer. The coordinates of the mouse pointer have changed within the computer. The active memory in a computer is considered data by definition in Wisconsin laws.
Sending someone a text or an e-mail without their authorization is technically adding data to the storage space of a computer.
Registering a Facebook account while under 13 years of age, making multiple Facebook accounts, or using a different name on a Facebook account violates Facebook's terms of service. This use can be considered unauthorized and criminal for that reason.
The same law was used to punish an 11 year old in Florida
http://portland.indymedia.org/en/2003/02/44628.shtml for changing a couple of his grades on a teacher's laptop that was left open and unlocked leading to a felony charge. Technically a modification of data with intent to defraud.
Or this 8th grader that changed his teacher's wallpaper on his computer resulted in a felony charge
http://www.computerworld.com/article...wallpaper.html
Without limitations on the law things like that happen.
One thing that makes the case important is that I'm saying that me placing harmless posts on an empty public website was my way of peacefully expressing myself. Expressing my frustration with a psychopath without being violent. It was also a form of artistic expression by making my posts random so it looks pretty. It's a freedom of expression case.
“Today, we find an urgent need to protect these freedoms on the digital frontiers of the 21st century...And that’s why we believe it’s critical that its users are assured certain basic freedoms. Freedom of expression is first among them. This freedom is no longer defined solely by whether citizens can go into the town square and criticize their government without fear of retribution. Blogs, emails, social networks, and text messages have opened up new forums for exchanging ideas, and created new targets for censorship.” – Hillary Clinton, 2010
"I think that the more freely information flows, the stronger the society becomes, because then citizens of countries around the world can hold their own governments accountable. They can begin to think for themselves. That generates new ideas. It encourages creativity." – President Obama, 2009
The supreme court came very close to ruling social media posts protected free speech in Elonis v. United States (
http://www.supremecourt.gov/opinions...3-983_7l48.pdf). A guy posted some rap lyrics on his Facebook page which was interpreted as a threat then sentenced to 44 months in prison for it. The charges were dismissed but not for First Amendment issues.
But in State of Wisconsin vs Thomas G. Smith in 2014 (
http://www.scribd.com/doc/283977212/...urt-of-Appeals) it was ruled in my state that social media posts are protected free speech when someone called the cops racist and was arrested and charged for that. His case was dismissed on First Amendment grounds. This is the argument I use to get the law thrown out on First Amendment grounds. He even sued the government afterwards and was awarded a large sum of money for that one.
In Jaynes v. Commonwealth of Virginia (
http://caselaw.findlaw.com/va-suprem...t/1078360.html) a known spammer got his case dismissed and their anti-spam law voided on First Amendment grounds. What I have done could have got me charged with the Communication Decency Act. But this law was ruled unconstitutional by the federal government on First Amendment grounds back in 1997. In People v. Marquan M. (
http://www.nycourts.gov/ctapps/Decis...4-Decision.pdf) a cyber bully law was ruled unconstitutional on First Amendment grounds.
There are facial and applied challenges of vagueness that I'm making too. For one that state does not define what authorization means or modification of data means. People of ordinary intelligence and law enforcement do not realize how complicated this can get. Florida has the same statute as Wisconsin. Their modification of data law was challenged in 1994 in Newberger v State (
http://www.leagle.com/decision/19941...R%20v.%20STATE). They decided not to void the law but ruled that adding data without modifying existing data does not constitute a violation of the statute. (“The state reads section 815.04 too broadly. The record left in the system did not modify the existing data in any way, it merely added additional material.”) A similar case in Davia Campillo GARCIA, Appellant, v. The STATE of Florida (
http://caselaw.findlaw.com/fl-distri...l/1045203.html) (“Here, the evidence showed that no existing data was modified. Garcia caused new information to be entered for the first time into the computer system and an identification card was issued. There was no evidence to establish that anyone modified data which already existed in the computer system.”). What I did was add data without modifying existing data too. My case would get dismissed with this logic.
The fact that I turned off the program the moment I saw a possible effort was being made to stop me is important according to the CRAIGSLIST INC., Plaintiff, v. 3TAPS INC case (
https://casetext.com/case/craigslist-inc-v-3taps-inc) which ruled that access on a public website is authorized until an effort is made to rescind that authorization by placing a technological barrier or sending a cease and desist letter. Even that ruling was considered controversial since an IP ban is not much of a barrier since people's IP's can change all the time. But if we applied that standard to this case then I did not cross that line that would have made this a crime. "Prosecuting Computer Crimes" (
http://www.justice.gov/sites/default...4/ccmanual.pdf ) discusses what authorization means on pages 5-12. They come to the same conclusion about public access rights being authorized until an effort is made to rescind the authorization.
Wisconsin’s computer crime laws make no mention of exceeding authorized use, just unauthorized use. However the federal government and many other states do make a distinction between these two types of accesses. States around the country have had criminal cases of exceeding authorized use in states that have no mention of exceeding authorized use in their statutes which have had their cases dismissed on this very point. GALLAGHER v. STATE (
https://casetext.com/case/gallagher-v-state-14) (“Moreover, appellant points to the legislative history of the federal statute, where the United States Congress specifically expressed that an employee's exceeding authorized access, while technically wrong, does not warrant criminal sanctions because administrative sanctions are more appropriate.”) Briggs v. State (
http://caselaw.findlaw.com/md-court-...s/1208933.html) (“Briggs distinguishes operating a computer system without authorization from exceeding authorized access by using the computer in an improper manner... Briggs's access was not unauthorized under Article 27, § 146, the unauthorized access to computers statute. If the law is to be broadened to include Briggs's conduct, it should be modified by the Legislature, not by this Court.”)
https://www.washingtonpost.com/news/...te-a-deep-dive talks about different main types of authorization. there are 3 types of liability for unauthorized access: code-based, contract-based, and norms-based. The code-based and contract-based versions I'm alright on. I did not bypass any security or violate any terms of use agreement. They would have no choice but to argue that what I did was unauthorized because it was socially unacceptable.
The Wisconsin vs Thomas G. Smith was an example of socially unacceptable behavior that was dismissed. United States v. Drew (
http://www.scribd.com/doc/61217247/U...ew-aug-29-2009) was another example of a social norm violation which was a cyber bully case that led to girl named Megan committing suicide. The judge ruled that it would be unconstitutional to rule an action as unauthorized because of a violation of myspace terms of use agreement. In United States v. Nosal a group of employees used confidential company information to start a competing business. They were convicted at first but won on appeal. It was ruled that violating company policy does not constitute a violation of unauthorized access in computer crime laws. The social norm version of authorization is too murky and dangerous to set a standard on.
What I did was virtually identical to what happened in this Texas case Fidel Salinas v United States (
http://www.wired.com/2014/11/from-44...o-misdemeanor/). Placing junk data on a public website. His charges were dismissed as well.
This law I'm challenging was challenged once before in 1994 in State v. Corcoran (
http://law.justia.com/cases/wisconsi...2671-cr-5.html). He wrote a trojan in his program that deleted some files when he saw he was not going to get paid by an employer. This happened back in 1987 before there was a public internet. They used this definitions of authorization in that case:
The first was "defendant acted without the permission of the person responsible for the computer data or programs." WIS J ICRIMINAL 150 and second was THE RANDOM HOUSE DICTIONARY OF THE ENGLISH LANGUAGE 139 (2d ed. unabr. 1987), where one of the definitions for "authorization" is the "permission or power granted by an authority.". They then rejected his challenge because being the author of a computer program does not make him the authority of the service the program was providing. According to
http://learnersdictionary.com/definition/permission the definition of permission is "the right or ability to do something that is given by someone who has the power to decide if it will be allowed or permitted”. Technically since this guy gave the whole world permission to make accounts and posts on this site then I was authorized then.
Other definitions of authorization could exist that would not make what I did authorized. Traditionally there's something called the rule of Lenity where a court is supposed to rule in my favor when there is ambiguous language.
But I no longer have a lawyer. My previous lawyer was not tech savvy enough to understand what I was saying and mostly dismissive when I tried to bring these arguments up. The facts are too much on my side anyway plus it's still only a misdemeanor.
There's something called the equal protection act which says that people are supposed to be treated equally under the law. But from what my previous lawyer told me, he thinks they decided to charge me probably because of some expunged record in my distant past. Because the law is being used the way it is in a desperate attempt to punish me because there's something about me they don't like is unconstitutional. The laws as they are written currently give the government too much discretionary power. My county has a 100% conviction rate of computer crime charges. They're pretty biased against anyone seen charged with a computer crime it looks like. That's weird that they want to go after hackers so bad now but don't want to reform their computer laws so that people can actually have a fair shot at following the law.
Currently I think the case has violated my 1st, 4th, 5th, 6th, 8th, 9th, and 14th amendment rights. It should be pretty obvious that the law needs to go now. If people want to sign that petition and then maybe the state can fix their neglected laws instead of me having to fight some misdemeanor charge for the next 7 years with my luck :).