• Home
  • News
  • Fortune 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia

H-P charges beset with hurdles

By
Roger Parloff
Roger Parloff
Down Arrow Button Icon
By
Roger Parloff
Roger Parloff
Down Arrow Button Icon
October 18, 2006, 10:31 AM ET

An odd subtlety in the facts underlying the criminal “pretexting” case against former Hewlett-Packard chairman Patricia Dunn and others may pose a hurdle to California Attorney General Bill Lockyer’s office as it tries to prove the “computer crime” charge it has lodged in that case.

The statute cited makes it a crime to “knowingly access without permission and take, copy, and make use of data from a computer.” (The provision is California Penal Code Section 502, which can be found be scrolling down the page linked here.) The potential problem is that both Dunn and the H-P inhouse counsel supervising the probe–Kevin Hunsaker, who is also charged as a defendant–appear to have believed that the phone records were obtained entirely through oral conversations between investigators and telephone employees, not through any techniques resembling computer hacking. Dunn got her information largely from Hunsaker, and Hunsaker expresses this misunderstanding repeatedly in the internal H-P memos that were made public last month by a subcommittee of the U.S. House of Representatives Energy and Commerce Committee.

In reality, we now know that the subcontractors who actually did the pretexting resorted to other techniques as well, some of which certainly look like the crime alleged here. To access the phone records of former H-P director Tom Perkins, for instance, a subcontractor (who is also charged) allegedly went online and gained access to his account by entering his phone number and the last four digits of his social security number into a dialog box. Such a procedure looks and feels more like the computer crime described in Section 502 than simply speaking to a live phone company employee over the phone. Of course, even the orally deceived phone employee would presumably then fetch the desired information out of a computer, but that wouldn’t be what we’d typically think of as a computer crime. (Or would it? What do people think?)
(The social security numbers appear to have been gathered mainly by the subcontractors themselves, using what they have called subscription databases available to licensed investigators. In at least one internal memo, Hunsaker admits having known that social security numbers might be used in the process, though he seems to have believed that they would be used verbally. I can’t find any evidence yet in the documents made public by the the House subcommittee that Dunn ever knew that social security numbers would be used.)

To be sure, Dunn, Hunsaker, and their three co-defendants–the outside security contractors and subcontractors who actually carried out the pretexting–are also charged with three other offenses besides the computer crimes provision. But, as has been previously reported to varying degrees, each of those charges also carries its own significant challenges when the attempt is made to bring “pretexting” within its ambit. Attorney General Lockyer’s best bet certainly looks like the charge of “fraudulently obtaining . . . customer records” from a public utility, which is elsewhere defined to include any “telephone corporation.” (California Penal Code Section 538.5 and California Public Utility Code Section 216. Section 538.5 can be found by scrolling down this page.)

Yet there are at least two potential problems with this charge, too. First, Dunn will doubtless argue–as she repeatedly did during her testimony before the House subcommittee on September 27–that she had no idea records were being “fraudulently” obtained, in that she had been repeatedly assured by both senior attorney Hunsaker and H-P’s respected then-general counsel, Anne Baskins, that they were lawful. (Baskins, who resigned and then took the Fifth at the Congressional hearing on September 27, has not been charged.) The other possible problem with the public utilities charge is that, notwithstanding its broad and seemingly applicable language, it appears to have never been designed or used before to catch pretexting. In an interview, Stanford law professor Robert Weisberg says that the 1982 law may not have been intended to protect the privacy of customers, but, instead, to protect public utilities from having their trade secrets–including customer lists–stolen.

The third charge against Dunn, called “using personal identifying information without authorization,” requires that the defendant “willfully” obtain the information “for an unlawful purpose, including to obtain . . . credit, goods, services, and medical information.” Dunn’s purpose was arguably different in kind from those listed in the statute. (This statute, California Penal Code Section 530.5, can be found by scrolling down this page.)

The fourth and final charge is “conspiracy” to commit the other three offenses, so it’s viability depends on the validity of the three underlying offenses.

The reason, of course, that the prosecution’s case faces so many hurdles, is that California did not enact a law specifically aimed at prohibiting pretexting until September 29 of this year–two days after the Congressional hearing. Interestingly enough, this new law only makes the offense a misdemeanor, whereas all the charges Attorney General Lockyer has brought are felonies. What do people think of the fairness of this situation? (I’m putting aside the fact that Dunn has fourth-stage ovarian cancer. That alone, of course, might lead to her acquittal due to jury nullification.)

About the Author
By Roger Parloff
See full bioRight Arrow Button Icon

Latest in

EconomyDebt
The most likely solution to the U.S. debt crisis is severe austerity triggered by a fiscal calamity, former White House economic adviser says
By Jason MaDecember 6, 2025
9 minutes ago
Big TechApple
Apple rocked by executive departures, with chip chief at risk of leaving next
By Mark Gurman and BloombergDecember 6, 2025
2 hours ago
SuccessWealth
The $124 trillion Great Wealth Transfer is intensifying as inheritance jumps to a new record, with one 19-year-old reaping the rewards
By Jason MaDecember 6, 2025
2 hours ago
Nvidia CEO Jensen Huang said China is better equipped for an AI data center buildout than the U.S.
AITech
Nvidia CEO says data centers take about 3 years to construct in the U.S., while in China ‘they can build a hospital in a weekend’
By Nino PaoliDecember 6, 2025
5 hours ago
Arts & EntertainmentMedia
Former Amazon Studios boss warns the Netflix-Warner Bros. deal will make Hollywood ‘a system that circles a single sun’
By Jason MaDecember 6, 2025
5 hours ago
Jay Clayton
LawCrime
25-year DEA veteran charged with helping Mexican drug cartel launder millions of dollars, secure guns and bombs
By Dave Collins, Michael R. Sisak and The Associated PressDecember 6, 2025
6 hours ago

Most Popular

placeholder alt text
Economy
Two months into the new fiscal year and the U.S. government is already spending more than $10 billion a week servicing national debt
By Eleanor PringleDecember 4, 2025
2 days ago
placeholder alt text
Big Tech
Mark Zuckerberg rebranded Facebook for the metaverse. Four years and $70 billion in losses later, he’s moving on
By Eva RoytburgDecember 5, 2025
1 day ago
placeholder alt text
Success
Nvidia CEO Jensen Huang admits he works 7 days a week, including holidays, in a constant 'state of anxiety' out of fear of going bankrupt
By Jessica CoacciDecember 4, 2025
2 days ago
placeholder alt text
Success
‘Godfather of AI’ says Bill Gates and Elon Musk are right about the future of work—but he predicts mass unemployment is on its way
By Preston ForeDecember 4, 2025
2 days ago
placeholder alt text
Success
Nearly 4 million new manufacturing jobs are coming to America as boomers retire—but it's the one trade job Gen Z doesn't want
By Emma BurleighDecember 4, 2025
2 days ago
placeholder alt text
Asia
Despite their ‘no limits’ friendship, Russia is paying a nearly 90% markup on sanctioned goods from China—compared with 9% from other countries
By Jason MaNovember 29, 2025
7 days ago
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Fortune Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.