MEMORANDUM ORDER
On June 5, 1990, this court entered a memorandum opinion denying defendant Craig Neidorf s motion to dismiss the original indictment in this case.
See United States v. Riggs,
FACTS
The facts set forth in the superseding indictment are essentially the same as those in the original indictment, so only a brief overview of them is necessary here. The government charges that Neidorf and Riggs devised and implemented a scheme to defraud involving the use of computers. The original indictment charged that the focus of the fraud scheme was narrow; the government claimed that the goal of the scheme was to use computers to steal the E911 text file owned by Bell South Telephone Company (“Bell South”). 2 The superseding indictment, however, now charges that misappropriation of Bell South’s E911 text file was only one of the goals of the fraud scheme in which Neidorf and Riggs participated. The objective of the scheme is now more generally described as follows:
[T]o fraudulently obtain and steal private property in the form of computerized files by gaining unauthorized access to other individuals’ and corporations’ computers, copying the sensitive computerized files in those computers, and then publishing the information from the computerized files in a hacker publication for dissemination to other computer hackers.
Thus, government now claims that Riggs and Neidorf entered into a scheme to steal and disseminate not only Bell South’s E911 file, but other valuable computer-stored information as well.
According to the superseding indictment, Riggs and Neidorf committed several acts in furtherance of their broad scheme to distribute information stolen from computer systems. Each of these acts forms the basis for separate charges in Counts Two, Three, Four and Seven of the superseding indictment. Count Two charges that Nei-dorf violated the federal wire fraud statute, 18 U.S.C. § 1343, by using his computer to announce the beginning of the “Phoenix Project.” According to the government, that project involved a plan to solidify the hacker community by publishing hacking tutorials and disseminating other items of interest to hackers, such as information on how to prevent law enforcement authorities from discovering hacking activity. Neidorf’s plan was to use a computer hacker newsletter entitled “PHRACK,” which he published regularly, to distribute information to the hacking community. Counts Three and Four charge that Nei-dorf and Riggs further violated § 1343 by sending communications to each other via electronic mail concerning the implementation of their scheme. In addition, Count Seven charges that Neidorf violated § 1343 by publishing an issue of PHRACK which contained a series of tutorials about breaking into computer systems.
The superseding indictment also charges Neidorf and Riggs with committing acts in furtherance of their more specific goal to fraudulently obtain Bell South’s E911 text file. These acts form the basis of the remaining counts in the superseding indictment — Counts One, Five, Six, Eight, Nine, Ten, and Eleven. Count One charges that Riggs violated § 1343 by gaining unauthorized access to Bell South’s computer system in Atlanta, Georgia, downloading a copy of Bell South’s E911 text file to his home computer in Decatur, Georgia, and then transferring the E911 file to a computer bulletin board service in Lockport, Illinois, where he stored it for Neidorf’s review. Count Five charges that Neidorf and Riggs violated § 1343 when Neidorf, using a computer located at the University of Missouri in Columbia, Missouri, retrieved the E911 file from the Lockport computer bulletin board. Count Six charges that Neidorf’s receipt of the E911 file from Riggs through the Lockport computer bulletin board constitutes a violation of the federal statute prohibiting the interstate transportation of stolen property, 18 U.S.C. § 2314.
*559 After receiving the E911 file, Neidorf allegedly edited the file to conceal the fact that it had been fraudulently obtained by Riggs. Counts Eight and Nine charge that Riggs and Neidorf violated § 1343 and § 2314 when Neidorf transferred the edited version of the E911 file back to Riggs through the Lockport bulletin board. A short time later, Neidorf used his computer to publish the edited version of the E911 text file in an issue of PHRACK. Count Ten charges that Neidorf violated § 1343 by publishing the E911 text file in PHRACK, and Count Eleven charges that the publication of the E911 file in PHRACK constituted a violation of § 2314 by both Neidorf and Riggs.
DISCUSSION
Neidorfs arguments, as presented by amicus EFF, attack the superseding indictment in two waves. One set of arguments challenges the counts against Neidorf based on the transfer of the stolen E911 file — Counts Five, Six, Eight, Nine, Ten and Eleven. The other set of arguments challenges the counts dealing with the remaining charges — Counts Two, Three, Four, and Seven. The court will address each set of Neidorfs arguments separately-
I. Counts Five, Six, Eight, Nine, Ten and Eleven
A. First Amendment
Neidorfs main challenge to Counts Five, Six, Eight, Nine, Ten and Eleven of the superseding indictment is grounded in the First Amendment. He argues that criminalizing his publication of the E911 text file in PHRACK — as the government attempts to do in Counts Ten and Eleven— constitutes an unconstitutional abridgement of his First Amendment rights. He further contends that since Counts Five, Six, Eight and Nine are based on the transfer of information which was incidental to the publication of the E911 file in PHRACK, finding him criminally liable under those counts would also abridge his First Amendment freedoms.
In support of his argument, Neidorf relies principally on three eases:
Smith v. Daily Mail Publishing Co.,
Moreover, the law is clear that where an individual violates an otherwise valid criminal statute, the First Amendment does not act as a shield to preclude
*560
the prosecution of that individual simply because his criminal conduct involves speech. For example, in
United States v. Rowlee,
“[Sjpeech is not protected by the First Amendment when it is the very vehicle of the crime itself[”] ... [Rowlee was] convicted of the act of conspiracy, an act forbidden by section 371. [His] conduct was not protected by the First Amendment merely because, in part, it may have involved the use of language.
Id.
at 1278 (quoting
United States v. Varani,
Similarly, in
United States v. Morison,
Neidorf argues that the E911 text file he published “is plainly of interest to any member of the public concerned with the operation of the system through which he can reach ‘police, fire, and/or ambulance services.’ ” Even if that were true, however, under
Branzburg v. Hayes,
It would be frivolous to assert — and no one does in these cases — that the First Amendment, in the interest of securing news or otherwise, confers a license on either the reporter or his news sources to violate valid criminal laws. Although stealing documents or wiretapping could provide newsworthy information, neither reporter nor source is immune from conviction for such conduct, whatever the impact on the flow of news.
Id.
at 691,
In short, the court finds no support for Neidorf’s argument that the criminal activi *561 ty with which he is charged in this case is protected by the First Amendment. Interpreting the First Amendment as shielding Neidorf from criminal liability would open a gaping hole in criminal law; individuals could violate criminal laws with impunity simply by engaging in criminal activities which involve speech-related activity. The First Amendment does not countenance that kind of end run around criminal law.
B. Vagueness
Under
Palmer v. City of Euclid,
The court finds no merit in Nei-dorf's contention. Two elements must be proven to sustain a conviction under the wire fraud statute: (1) a scheme to defraud; and (2) use of wire communications in furtherance of the scheme.
Lombardo v. United States,
With respect to § 2314, Neidorf’s vagueness argument is a by-product of his previous argument against the original indictment that he did not cause “goods, wares, or merchandise” to be transferred within the meaning of the statute. The court rejected that argument, finding that the confidential, computer-stored information which Neidorf allegedly transferred comes within the § 2314 definition of “goods, wares, or merchandise.” Neidorf now argues that § 2314 is unconstitutionally vague as applied to him because he could not have known that the information he transferred came within the definition of “goods, wares, or merchandise.”
However, as this court detailed in the earlier opinion in this case, several courts have already held that the definition of “goods, wares, or merchandise” in § 2314 encompasses proprietary business information which is stored on a tangible medium, such as paper. See
United States v. Riggs,
II. Counts Two, Three, Four and Seven
A. Scheme to Defraud
Neidorf argues that Counts Two, Three, Four and Seven — all of which
*562
charge wire fraud — should be dismissed on the grounds that the superseding indictment “fails to allege a scheme to defraud of which these counts could be a part.” This argument is easily rejected. As noted above, the superseding indictment expressly alleges that Neidorf and Riggs entered into a scheme to defraud individuals and corporations out of proprietary information stored on computers. This plan involved two major steps: (1) stealing the information by gaining unauthorized access to computers; and (2) disseminating the information to others. Any use of the wires in furtherance of the alleged scheme is chargeable under the wire fraud statute. To satisfy the “in furtherance” requirement, a wire communication must simply be “incident to an essential part of the scheme.”
Schmuck v. United States,
Each wire communication alleged in Counts Two, Three, Four and Seven clearly satisfies that requirement. Counts Three and Four charge that Neidorf and Riggs exchanged electronic mail discussing the implementation of the scheme. Counts Two and Seven involve wire transfers of separate issues of PHRACK. In one of those issues (Count Two), Neidorf announced the beginning of the “Phoenix Project;” in the other (Count Seven), he published tutorials on computer hacking. Each of these communications was certainly incident to an essential part of the scheme, since the aim of the communications was ostensibly to encourage others to illicitly obtain confidential, computer-stored information. Therefore, based on the scheme alleged in the superseding indictment, the acts in Counts Two, Three, Four, and Seven are properly chargeable under the wire fraud statute.
B. First Amendment
Relying again on the First Amendment, Neidorf raises a separate challenge to Counts Two and Seven, which he claims charge him with mere advocacy of illegal conduct. He argues that under
Brandenburg v. Ohio,
Neidorf s argument must be rejected for the same reasons the court rejected Nei-dorf’s previous First Amendment argument. If Neidorf participated in the scheme to defraud as alleged in the superseding indictment, then he is criminally responsible for his conduct in furtherance of the scheme, and the First Amendment does not shield him from that responsibility merely because his criminal conduct involved speech.
See, e.g., Rowlee,
CONCLUSION
For the foregoing reasons, Neidorf s motion to dismiss the superseding indictment is denied.
IT IS SO ORDERED.
Notes
. Neidorf also reasserts the arguments he made in challenging the original indictment. Nothing in the superseding indictment, however, gives the court reason to revisit the issues already resolved by the court’s June 5 order. Accordingly, to the extent that Neidorf applies his previous arguments to the superseding indictment, those arguments are summarily rejected.
. The E911 computer text file contains confidential, valuable, proprietary information describing the computerized control and maintenance of the emergency 911 services in the nine-state region in which Bell South operates.
. The First Amendment argument in EFF’s ami-cus brief is based largely on its assertion that Neidorf "did not participate in or know of the theft [of the E911 file] in advance.” While Nei-dorf is certainly free to try to prove the truth of that assertion at trial, that statement is directly contradictory to the charges in the superseding indictment.
. The court notes that as with its First Amendment argument, EFF's vagueness argument is based largely on the notion that Neidorf was an innocent recipient of the stolen E911 file. As the court has already pointed out, that notion is contradicted by the express allegations in the superseding indictment. Those allegations charge that when Neidorf received the E911 file, he was completely aware of the fact that it had been stolen.
.
Schmuck
involved the mail fraud statute, but the Seventh Circuit has consistently held that cases construing the mail fraud statute are applicable to the wire fraud statute.
See United States v. Gimbel,
