Gleick and the HP “Pretexting” Scandal

In 2006-7, officers and/or agents of Hewlett Packard were separately charged under California and federal law for their role in a “pretexting” scandal, a scandal in which an investigator impersonated HP directors and reporters in order to establish responsiblity for leaks of non-public information that appeared to originate from company directors.

Gleick’s impersonation of a Heartland director was a form of “pretexting”, though his alleged forgery and public dissemination of documents go well beyond the HP incident. On the other hand, Gleick’s fraud did not involve public utility records or use U.S. federal identification numbers; as a result, some counts in the HP case do not apply to Gleick, though most do (plus some others).

Most of the limited discussion of Gleick’s conduct has been based on federal law, but state criminal law is very much involved. Hewlett Packard is based in San Francisco and is subject to the same state law as Gleick’s Pacific Institute, located across the bay. In addition, identity theft offences can be charged in the state of the person impersonated.

Once the HP pretexting facts became public, state and federal investigations were quickly launched (as well as congressional hearings.) The dilatory response of authorities in the Gleick case stands in remarkable contrast.

I had noticed the Hewlett Packard case very early on (prior to Gleick’s confession) from googling “pretexting”. I had discussed it with Mosher at length. In addition to HP and the Pacific Institute both being Bay-area institutions, the Hewlett Foundation and the Packard Foundation were both important donors to the Pacific Institute. We concluded that Gleick was probably familiar with the general circumstances of the case from the extensive contemporary news coverage in the Bay area, particularly because the involvement of such an important donor. We concluded that Gleick would thus be familiar with at least the idea of “pretexting” – one of a number of tells that were “consistent” with Gleick, but not “proving” Gleick.

Contemporary timelines on the HP case are available at CNET here, here, here, here.

HP had first tried to pin down corporate leaks in 2005 without success. In January 2006, Patricia Dunn, HP Chair, instigated a second attempt to pin down the source of the corporate leaks. In this attempt, one of the investigators, Bryan Wagner, several layers removed from Dunn, impersonated various HP directors and various news reporters, thereby obtaining telephone records that identified George Keyworth, one of their directors, as the source. Dunn denied condoning or knowing of subsequent illegality and, although she lost her job, charges against her were eventually dropped.

Tom Perkins, the chair of HP’s corporate governance committee, had opposed Dunn’s inquiry. In May, he learned that Dunn had proceeded with the investigation anyway and resigned in protest. In its original SEC filing, HP recorded Perkins’ resignation as due to personal reasons. Perkins formally objected to this and formally objected to the minutes of the meeting at which he resigned. (His correspondence is here.) On Aug 11, Perkins received confirmation from ATT that his personal telephone records had been obtained by an investigator who had impersonated him and on August 18, formally complained once again to HP about their 8-K filing. On Sep 6, HP filed a revised 8-K (reported by CNET here). By this time, the state Attorney General had begun an investigation and had “informally contacted” HP.

The story quickly sparked a feeding frenzy with almost daily statements over the next few weeks from the California state investigators and the company. Five days later (Sep 11), both the U.S. attorney and the House Energy and Commerce Committee announced investigations. Joe Barton stated:

The Committee is troubled by this information, particularly given that it involves HP–one of America’s corporate icons–using pretexting and data brokers to procure the personal telephone records of the members of its Board of Directors and of other individuals without their knowledge or consent

Barton’s statement came about 6 weeks after the hearings of the same committee (and subcommittee) into the hockey stick affair. On Sep 12, Dunn announced plans to resign. The U.S. Attorney’s Office issued a statement as follows:

“The U.S. Attorney’s Office and the FBI in the Northern District of California are investigating the processes employed in an investigation into possible sources of leaks of Hewlett-Packard Company confidential information,

A broader SEC inquiry was announced on Sep 21. On Oct 4, California filed. (Charges here; see discussion below.) On Dec 7, in exchange for a $14.5 million payment to the state, California dropped criminal charges against HP and its officers. The proceeds were supposed to go to “finance a new law enforcement fund to fight violations of privacy and intellectual-property rights.”

On Jan 12, 2007, federal charges were laid against Wagner. Wagner pleaded guilty but his sentencing is still pending five years later (apparently investigations of his higher-ups are still ongoing.)


California Charges

California charges provide a precedent for the form of state charges that potentially apply in the Gleick case. California charges against Dunn and four others were laid under sections 538.5 (Fraudulent Wire Communication), 530.5 (Using personal identifying information of another to obtain credit, goods, or services in another’s name), 502(c)(2) (Wrongful use of computer data) and 182 (Conspiracy). A copy of the affidavit is here.

California section 538.5 does not appear to apply in the Gleick case since an essential element of the offence is obtaining data from a “public utility”, but the elements of the other offences appear to carry over. In addition, the Gleick case appears to meet the elements of state sections 528.5 and 530.

California Section 530.5 (one of the HP state charges) states:

530.5. (a) Every person who willfully obtains personal identifying information, as defined in subdivision (b) of Section 530.55, of another person, and uses that information for any unlawful purpose, including to obtain, or attempt to obtain, credit, goods, services, real property, or medical information without the consent of that person, is guilty of a public offense, and upon conviction therefor, shall be punished by a fine, by imprisonment in a county jail not to exceed one year, or by both a fine and imprisonment, or by imprisonment pursuant to subdivision (h) of Section 1170

Personal identifying information “as defined in subdivision (b) of Section 530.55” is defined very broadly and includes a person’s name (i.e. in the Gleick case, than name of the Heartland director that he impersonated.)

530.55(b) (b) For purposes of this chapter, “personal identifying information” means any name, address, telephone number,….

Section 502(c) (also used in the HP charges) prescribes an offence when computers are used to “wrongfully obtain” data:

(1) Knowingly accesses and without permission alters, damages, deletes, destroys, or otherwise uses any data, computer, computer system, or computer network in order to either (A) devise or execute any scheme or artifice to defraud, deceive, or extort, or (B) wrongfully control or obtain money, property, or data.
(2) Knowingly accesses and without permission takes, copies, or makes use of any data from a computer, computer system, or computer network, or takes or copies any supporting documentation, whether existing or residing internal or external to a computer, computer system, or computer network.

Section 528.5(a) defines an offence for impersonating another person for the purpose of harming or defrauding another person:

a) Notwithstanding any other provision of law, any person who knowingly and without consent credibly impersonates another actual person through or on an Internet Web site or by other electronic means for purposes of harming, intimidating, threatening, or defrauding another person is guilty of a public offense punishable pursuant to subdivision (d).

California section 530 is another impersonation offence in which property is received by the impersonator that is intended for the use of the person impersonated:

Every person who falsely personates another, in either his private or official capacity, and in such assumed character receives any money or property, knowing that it is intended to be delivered to the individual so personated, with intent to convert the same to his own use, or to that of another person, or to deprive the true owner thereof, is punishable in the same manner and to the same extent as for larceny of the money or property so received.

California Section 530.6(a) sets out procedures under which the impersonated Heartland director can initiate an investigation by a report to his local police. (Despite the “federalization” of much crime in the U.S. – certainly relative to Canada-, it appears that US states can work with one another.)

(a) A person who has learned or reasonably suspects that his or her personal identifying information has been unlawfully used by another, as described in subdivision (a) of Section 530.5, may initiate a law enforcement investigation by contacting the local law enforcement agency that has jurisdiction over his or her actual residence or place of business, which shall take a police report of the matter, provide the complainant with a copy of that report, and begin an investigation of the facts. If the suspected crime was committed in a different jurisdiction, the local law enforcement agency may refer the matter to the law enforcement agency where the suspected crime was committed for further investigation of the facts.

Illinois State Law
In addition to California state law, Gleick’s identity theft may give rise to state offences in Illinois, where both Heartland and most of its directors are located.

Illinois Section 16G-15 (Identity theft) states:

(a) A person commits the offense of identity theft when he or she knowingly:
(1) uses any personal identifying information or personal identification document of another person to fraudulently obtain credit, money, goods, services, or other property,

(7) uses any personal identification information or personal identification document of another for the purpose of gaining access to any record of the actions taken, communications made or received, or other activities or transactions of that person, without the prior express permission of that person.

Recall that one of Gleick’s requests was for the re-transmission of the Board package sent to the Heartland director that he was impersonating. The previous email was forwarded to Gleick in its entirety, together with the packages, an event that would seem to fall rather squarely within the Illinois offence.

Illinois Section 16G-35 states that a proper venue for identity theft is the county where the impersonated person resides or has a place of business:

Venue. In addition to any other venues provided for by statute or otherwise, venue for any criminal prosecution or civil recovery action under this Law shall be proper in any county where the person described in the personal identification information or personal identification document in question resides or has their principal place of business.

Once an identity theft has been reported, Illinois Section 16G-30 requires law enforcement to either investigate the matter themselves or to seek the assistance of (California) law enforcement:

Mandating law enforcement agencies to accept and provide reports; judicial factual determination.
(a) A person who has learned or reasonably suspects that his or her personal identifying information has been unlawfully used by another may initiate a law enforcement investigation by contacting the local law enforcement agency that has jurisdiction over his or her actual residence, which shall take a police report of the matter, provide the complainant with a copy of that report, and begin an investigation of the facts or, if the suspected crime was committed in a different jurisdiction, refer the matter to the law enforcement agency where the suspected crime was committed for an investigation of the facts.

Federal Law
Again, the charges against HP investigator Bryan Wagner provide precedent for the sort of liability that Gleick is exposed to. Federal charges against Wagner (see here) included 18 USC 371 (conspiracy); 18 USC 1028 (identity theft [with federal document]) and 18 USC 1343 (wire fraud). Wagner pleaded guilty to both charges though he has not yet been sentenced.

Federal section 1028 appears to require the use of a federal document or identification as an element of the offence. In Wagner’s case, he had used federal Social Security numbers, whereas Gleick simply used the director’s name. It doesn’t appear to me that the elements of federal section 1028 are met in Gleick’s case.

However, 18 USC 1343 does appear to apply to Gleick’s case, as I discussed in an earlier post in connection with Gleick’s obtaining of documents through identity theft, and additionally to Gleick’s dissemination (and likely authorship) of the fake memo, which Gleick falsely attributed to Heartland Institute. Both counts appear to fulful the elements of section 1343 (wire fraud):

Whoever, having devised or intending to devise any scheme or artifice to defraud, or for obtaining money or property by means of false or fraudulent pretenses, representations, or promises, transmits or causes to be transmitted by means of wire, radio, or television communication in interstate or foreign commerce, any writings, signs, signals, pictures, or sounds for the purpose of executing such scheme or artifice, shall be fined under this title or imprisoned not more than 20 years, or both….

Wagner’s conviction under 18 USC 1343 in a pretexting case is a definite and relevant precedent.


Conclusion

The HP pretexting scandal offers an interesting precedent to Gleick’s case. Because Gleick’s case did not involve information from a public utility and did not use U.S. federal identification documents or numbers, some counts do not apply. But a number of offences charged in the HP pretexting appear to carry over with relatively little modification to Gleick’s case and, in addition, the elements of some other offences closely related to the HP offences appear to be satisfied in the Gleick case.

29 Comments

  1. Peter Dunford
    Posted Mar 14, 2012 at 2:44 PM | Permalink

    Forensic and legalistic. Good work Steve. Does the impersonated director know it was him and if so, doesn’t anyone at Heatland read this site?

  2. Posted Mar 14, 2012 at 2:45 PM | Permalink

    Going out on a limb, here… while the California and Illinois cites are good, Heartland might be able to file a federal case in any of the jurisdictions in which the 15 recipients of the Gleick email lived. That gives Heartland a rich opportunity to pick the jurisdiction most open to “politically-incorrect” organizations like their own.

  3. Copner
    Posted Mar 14, 2012 at 2:58 PM | Permalink

    If the victim of impersonation were in a 3rd state, would the laws of that state also potentially apply? As a non-lawyer, it would seem plausible to me that they might.

  4. Posted Mar 14, 2012 at 3:14 PM | Permalink

    Five days later (Sep 11), both the U.S. attorney and the House Energy and Commerce Committee announced investigations…

    That explains why we haven’t heard anything yet about an investigation into Gleick, since it’s only been – oh, forget it.

  5. Bob K.
    Posted Mar 14, 2012 at 3:36 PM | Permalink

    I find it amusing that California law might be a petard upon which Gleick is hoisted. The California liberal-left has long pursued a legalism-on-steriods approach in its never-ending quest for Camelot. Slaughter a horse in California for human consumption? You’re a felon. Send a horse to Montana to be slaughtered for human consumption (there, not here)? You’re a felon. Send a horse to Montana that ends up being slaughtered for human consumption but you didn’t know that was going to happen (but you should have)? You’re a felon. Every now and then a law gets passed that does make sense, but there are so many of them that it’s more a matter of a stopped clock being right twice a day than a fruit of wisdom. This is the bed that the soulmates of Gleick have made for him.

  6. pesadia
    Posted Mar 14, 2012 at 3:57 PM | Permalink

    The silence of the authorities is deafening.It’s almost as inexplicable as Peter Gleick’s confession. Both are baffling.

  7. Steve McIntyre
    Posted Mar 14, 2012 at 4:03 PM | Permalink

    BTW, I’d appreciate it if readers would help me collect the various bloodcurdling requests for prosecution of the Climategate “hacker”. Feel free to post quotes and links on this thread, which I’ll collect later. I have a few already, including some from Mann.

  8. Posted Mar 14, 2012 at 4:20 PM | Permalink

    Best is to look at 360 Org and the like…

    http://350orbust.wordpress.com/2011/11/23/anti-science-hackers-recycle-stolen-emails-prior-to-durban-climate-talks/

    Not bloodcurdling — but “interesting”.

  9. Posted Mar 14, 2012 at 4:25 PM | Permalink

    From here:

    http://www.firstthings.com/blogs/firstthoughts/2009/11/20/climategate-heats-up-global-warming-debate/

    Update: Wesley Smith raises a point that I should have noted earlier. Hacking private email accounts is a crime and should be fully prosecuted. Questions should still be asked about the content of the emails but that has no bearing on the legitimacy of the tactics used to aquire the information.

    Full extent of the law… would that be “Gleick’s Law?”

  10. Posted Mar 14, 2012 at 7:22 PM | Permalink

    Pretexting and fraud
    By club-footed clod:
    He did half-admit
    To only one bit

    This legal pursuit
    He hopes will be moot
    With passing of time
    Reducing the crime

    But as to the cries:
    “FOIA fries”
    “He’s evil! He lies!”
    Gleick’s their booby prize.

    ===|==============/ Keith DeHavelle

  11. Don B
    Posted Mar 14, 2012 at 8:38 PM | Permalink

    The police “raid” of Tallbloke after Climategate The 2nd:

    http://blogs.telegraph.co.uk/news/jamesdelingpole/100124397/climategate-obamas-boot-boys-strike-back/

    Senator Boxer: hacking of climategate emails might be coordinated criminal activity and should face criminal prosecution:

    http://digitaljournal.com/article/283102

  12. Posted Mar 14, 2012 at 9:28 PM | Permalink

    Of people who called Climategate leaks a “crime”
    No doubt you’ll get links by the million
    Senator Boxer did, early in time
    Though not now — is that Boxer’s Rebellion?

    http://thehill.com/blogs/blog-briefing-room/news/70249-boxer-hacked-climategate-emails-may-face-criminal-probe

    ===|==============/ Keith DeHavelle

  13. EdeF
    Posted Mar 14, 2012 at 10:21 PM | Permalink

    Its one thing to commit fraud or a crime solely in the state of California, but
    going into another state seems to make the case for Federal intervention, especially if Heatlands Directors or contributors are widely dispersed. The California law, by itself,
    should be pretty tough.

  14. AntonyIndia
    Posted Mar 14, 2012 at 10:24 PM | Permalink

    Two Gospel truths from the CAGW bible:
    – wealthy MNCs (like HP) support climate skeptics with big money
    – it is the climate skeptics who use the dirty tricks

    If believers can read their faith should start to falter.

  15. EdeF
    Posted Mar 14, 2012 at 10:26 PM | Permalink

    BTW, the climategate hacker should be fined………..for improper disposal of waste.

  16. Colonial
    Posted Mar 14, 2012 at 11:36 PM | Permalink

    It appears Dr. Gleick is liable for another Federal felony in addition to those Steve has listed. The email the good doctor sent, distributing the stolen and faked documents to his allies, said that he was going to delete the account he was sending it from. Deleting the account appears to be an instance of a Federal felony Wikipedia describes as “anticipatory obstruction of justice“. The Sarah Palin email hacker was convicted of that felony and a misdemeanor.

    On January 30, 2012, Politico noted the hacker’s appeal of his conviction had been rejected:

    Lawyers for the ex-student, David Kernell, said the felony obstruction of justice statute he was convicted under was so vague as to be unconstitutional. In particular, they argued, Kernell had no obvious notice that a federal investigation was underway before he deleted files from his computer and defragmented his hard disk.

    However, in an opinion Monday, a three-judge panel of the U.S. Court of Appeals for the 6th Circuit said the law was clear enough to be enforced and it covered the kind of conduct Kernell allegedly engaged in. They noted that he posted on the Internet that he was worried that if the FBI found out what he done he “was f—-d.”

    The Politico’s summary shows that the three-judge panel of the Sixth Circuit Court of Appeals was completely unsympathetic to the hacker’s pleas. The Court’s opinion is a scorcher:

    COLE, Circuit Judge. Defendant David Kernell was convicted of obstruction of justice under 18 U.S.C. § 1519 for deleting information from his computer that related to his effort to gain access to the email account of then-Alaska governor and Vice Presidential candidate Sarah Palin. Section 1519, passed as part of the Sarbanes-Oxley Act of 2002, prohibits the knowing destruction or alteration of any record “with the intent to impede, obstruct, or influence the investigation . . . of any matter within the jurisdiction of any department or agency of the United States . . . or in relation to or in contemplation of any such matter or case . . . .” Kernell argues that § 1519 is unconstitutionally vague, and that there is not sufficient evidence to support his conviction. We AFFIRM the conviction and sentence.

    It appears that when it comes to anticipatory obstruction of justice, Dr. Gleick’s violation of 18 U.S.C. § 1519 is just as calculated, and thus just as criminal, as that of the Sarah Palin email hacker before him.

    • dpeaton
      Posted Mar 15, 2012 at 9:41 AM | Permalink

      Good stuff.

      I would argue, contrary to Mosh’s opinion, that Kernell’s offense, while serious WAS a political dirty trick and not as malicious as the crime Gleick committed. Gleick’s crime involved many more people– less powerful people who could be struggling in their careers and perhaps presently out of job and looking for work. The invasion of privacy was much more widespread. Yes, Kernell was attempting to influence the outcome of a presidential election, but the material released really didn’t hurt Palin from what I could see reading it. It was a minor embarrassment, no more damaging than the material that is regularly uncovered in a presidential campaign.

    • MikeN
      Posted Mar 15, 2012 at 1:42 PM | Permalink

      I don’t think that applies here. Gleick can say he has deleted an account, but all he really means is that he won’t be using that e-mail again. It’s like if I said I will be throwing away this cellphone, that doesn’t actually erase the records of the calls I’ve made.

  17. Stacey
    Posted Mar 15, 2012 at 4:58 AM | Permalink

    Have the victims contacted the police?

    • dpeaton
      Posted Mar 15, 2012 at 10:23 AM | Permalink

      Heartland contacted the FBI. That’s all we know.

  18. johanna
    Posted Mar 15, 2012 at 7:57 AM | Permalink

    I don’t mind if the mills grind slowly, as long as they grind exceedingly fine. What we want to know is – are they grinding at all?

  19. neill
    Posted Mar 15, 2012 at 10:30 AM | Permalink

    The Greens’ wails about the Cimategate ‘hacker’ came fast and theick,
    ‘The emails were STOLEN — don’t you see, it’s a right-wing treick!’
    Yet with the actual ill-gotten provenance of the Heartland docs revealed,
    The Left’s strident proclamations of Heartland’s skull-duggery now well-concealed,
    Snow-ball’s chance in Hell we’ll hear of this DOJ’s prosecution, let alone a single Leftist syllable, of “high-profile climate scientist” Dr. Peter Gleick.

  20. Posted Mar 15, 2012 at 11:27 AM | Permalink

    I think there is really one degree of difference between the HP spying scandal and the Gleick/Heartland affair. Hewlett Packard was investigating [spying] on its own people in order to catch someone inside their organization [George Keyworth or who ever it really was] who was damaging them. The more direct comparison of the two scandals would be, hypothetically, if Heartland then resorted to some type of subterfuge to get the goods on Gleick.

    The techniques use and the subsequent legal ramifications may be analogous, but the ‘pretexts’ are one order of difference removed.

    That’s my thinking,

    W^3

    • Steve McIntyre
      Posted Mar 15, 2012 at 12:07 PM | Permalink

      I agree that this is an important difference. In HP’s justification, their pretexting was done without malice, whereas Gleick’s was done with malice.

  21. Tony Mach
    Posted Mar 15, 2012 at 9:34 PM | Permalink

    I am not a lawyer, but I think 502(c) does not apply. To me, this reads like a law against “classic hacking”, where the target is a computer (e.g. hacking a password), and not when a computer is used (“pretexing” or social engineering) to trick a person, e.g. via email.

    Otherwise, pretty impressive list.

  22. Keith Sketchley
    Posted Mar 17, 2012 at 1:51 PM | Permalink

    Thanks for the thorough work, Steve.

    There should be broad laws of principle to cover fraudulent mis-representation (my term, I do not know laws, which do vary between fiefdoms, “pretext” seems milder but I presume comes from “false pretenses”).

    I hope the average voter knows in their heart it is wrong.

    PS: Amusing goof in the quote from Politico about David Kernell deleting computer records of his hacking of Sarah Palin’s email. I’m not expert enough to be absolutely sure, but I doubt “defragmented his hard disk” would erase traces of the files. I’d reformat, use a utility that repeatedly does something to the disk, or destroy the drive. (Yesterday by incinerating, today there is the someone less secure approach of shredding machines used for hard drives and portable devices.)

  23. Keith Sketchley
    Posted Mar 19, 2012 at 3:02 PM | Permalink

    After thinking a bit, and to be explicit, it is obvious to anyone who has checked into it and used “defragmenting” that it is supposed to NOT lose data, but only to put the chunks of a file all in one area of the drive.

    (Normally the o/s grabs space where-ever it can, with some logic that may try to spread use of the surface to maximise life, as a file is made up of small chunks of space on the disc – even if in one area, it can become scattered. Including because the file may have been made larger, especially if superseded data is still in the file (which Word and WordPerfect used to default to in order to have “quick save” – IIRC later versions default to not (such as SP3 to Office 2003).

    • Brandon Shollenberger
      Posted Mar 19, 2012 at 4:07 PM | Permalink

      Keith Sketchley, it’s true defragmenting should* not lose data. However, there is a distinction between the “data” you refer to and “traces of… files.”

      When a file is deleted, the hard drive doesn’t suddenly lose it. Instead, it marks the portion of the hard drive that file was on as available for use. The file stays there, like that, until the space is reused. But until that space is reused, the file is still there. The data is still available.

      When you reformat a hard drive, it moves files around, and thus, it can place files “over top” of the deleted ones. This destroys traces of the data the file contained even though the file may have been deleted for months beforehand.

      *For completion’s sake, defragmenting errors do occasionally happen and cause data to be corrupted.

      • Dean Cardno
        Posted Mar 24, 2012 at 12:39 PM | Permalink

        Well… just to dive WAY down into the weeds: Brandon is correct, that defragging will (likely) overwrite some of the no-longer used file fragments that remain after a file is “deleted” by the OS – the problem is that it will not *reliably* overwrite any of them, and will undoubtedly not overwrite *all* of them. As well, when writing a current data file over a ‘marked as unused’ space that contains a “deleted” file a defrag will only write a single pass. There is generally enough of a magnetic trace from the former file (ie, a bit that nominally reads “1” may have ana ctual value coresponding to “0.85” – implying that the overwritten file contained a “0”) that a specialist can recover it. By comparison, a disk cleaner (say PGP/GPG ‘shred’ function, or similar) will overwrite *all* of the ‘marked as unused’ space (with random values), and will do so a number of times, so that the residual magnetic traces are simply random values.

One Trackback

  1. [...] Gleick and the HP “Pretexting” Scandal [...]

Follow

Get every new post delivered to your Inbox.

Join 3,254 other followers

%d bloggers like this: