💾 Archived View for spam.works › mirrors › textfiles › law › bbs_law.law captured on 2023-06-16 at 18:54:21.

View Raw

More Information

-=-=-=-=-=-=-




              THE ELECTRONIC PAMPHLET--COMPUTER
                 BULLETIN BOARDS AND THE LAW


              Submitted in Partial Fulfillment
                   Of the Requirements of
                     Mass Communications
 
                             by
                      Michael H. Riddle
                  72446.3241@compuserve.com
                  Sysop on 1:285/27@fidonet


(c) Copyright 1990, by Michael H. Riddle.  All Rights Reserved.  
This paper may be freely distributed via electronic media 
provided that the entire text remains intact, including this 
first page,notice, and disclaimer, and further provided that 
full credit is given.  

DISCLAIMER:  This paper was prepared by a law student as part 
of a course of study, and should not be construed to represent a 
legal opinion.  Anyone with a need for a current legal opinion 
relating to this material should contact an attorney licensed 
to practice in their state.
---



              THE ELECTRONIC PAMPHLET--COMPUTER
                 BULLETIN BOARDS AND THE LAW


         Introduction--Bulletin Boards Then and Now

     In 1517, Martin Luther nailed his 95 theses to the door
of the church in Wittenberg, Germany, an act which is gener-
ally considered the start of the Reformation, the Protestant
religious  movement  (Protesting  aspects  of  the  Catholic
church as it then existed). [FN1]   The author remembers how
outrageous it seemed  to him,  the first time  he heard  the
story, that anyone  would have the  effrontery to nail  even
one, let alone 95, documents to a church door.  It  was only
later,  after much  study of  history and theology,  that he
came to learn  that the church  door was routinely used  for
this  purpose.  At  a time before  widespread publication of
newspapers, before  telegraph, telephone, television,  or CB
radio, the  church door  was the  acknowledged location  for
important notes or topics of discussion. [FN2] 

     Students at the  University of Nebraska College  of Law
use the "kiosk" inside  the main entrance to the  college to
pass notes to  each other.  Hexagonal in shape,  one side of
the kiosk is  reserved for general announcements  and bulle-
tins.  Sometimes the postings are as routine as announcement
of a meeting; at other times, they might be a call to action
to  save  the trees  in  a  local park  from  the bulldozer.
Students are  cautioned, during their first  formal orienta-
tion at the College, to check the kiosk daily. [FN3] 

     Just inside the door at Baker's Supermarket in LaVista,
Nebraska, is a board where customers (and presumably others)
may post notes  about items for sale,  offers of employment,
and the like.   Similar boards are found in  other locations
around town, provided either as a  public service by a busi-
ness,  or  perhaps  as yet  another  advertising  "gimmick,"
another way of increasing business at the store. [FN4] 

     During   the   Revolution,   and  when   the   Founding
Fathers [FN5]   wrote  the  Constitution  and  the  Bill  of
Rights, similar functions were often fulfilled by  "pamphle-
teers."  Anyone with an idea and a little loose change could
buy or  borrow a  printing press,  and soon be  distributing
their ideas around the town. [FN6] 

     Today, another  forum  is  increasingly  available  for
notices,  reminders  and discussions--the  computer bulletin
board. [FN7]    Listings of items for sale, notices of meet-
ings, and discussion about matters  important or trivial may
be found in the  world of electronics as well  as groceries.
At one time the province  of the technically and financially
gifted, bulletin  boards are increasing available  to Every-
man. [FN8]   At least one  commentator has directly compared
the  bulletin board  system of  today with  the  pamphlet of
yesterday. [FN9]   

     In the simplest form,  a bulletin board is a  computer,
often a small personal  computer (PC), connected to  a tele-
phone line by a device called  a modem. [FN10]   While large
and expensive  systems are  possible, a  person desiring  to
enter the bulletin board arena may do so for a total invest-
ment less than $500. [FN11]    At the simplest, the bulletin
board system acts as a "store and forward" system.  Individ-
uals call  the BBS one at a  time, "log on" (typically using
some  sort of entry  code and password  protection to insure
identity), read  messages that have  been left and  post any
messages they desire.  They then log  off, and the system is
available to the next caller. [FN12] 

     "Networked" systems  add an additional step,  one which
greatly expands the nature of the  forum.  At pre-designated
times,  the  BBS scans  the messages  to  see what  has been
posted on the board  since the last similar event,  and pre-
pares  "mail packets"  with those messages.   It  then calls
other systems  and forwards  the packets  to those  systems,
receiving  in  turn any  mail designated  for  it.   In this
manner, messages may  be entered in  Lincoln or Omaha at  no
expense  to  the  user,  and be  sent  literally  around the
world. [FN13] 

                    Static on the Lines?

     While bulletin board  systems may facilitate communica-
tion, they have  a potential  for misuse as  well.   Several
positive  benefits  of bulletin  boards  are that  users may
express their opinions  on matters  of public interest,  may
look for reviews  of products  they are considering  buying,
and might ask  specific questions about  any number of  mat-
ters. [FN14]   Potential for abuse exists in  both civil and
criminal areas, particularly for  defamation (libel or slan-
der), theft of intellectual  property (particularly software
piracy and  copyright  violations), and  theft (credit  card
abuse, telephone system fraud, and similar actions). [FN15] 
Press coverage of this type of activity inevitably refers to
the use of  bulletin boards, [FN16]  and in  the public mind
all  bulletin board  operators and  users become  associated
with "hackers" and "phreakers." [FN17]    Recent news events
covered at  some length  the "Internet  worm" propagated  by
Robert  Morris,  which  brought  several  national  computer
networks  almost  to  a complete  halt. [FN18]     The press
treatment of the  event once again tended toward  the sensa-
tional, using what have come to be pejorative terms, such as
"hacker,"  "phreaker",  and the  like.   These  reports also
frequently included what could easily interpreted as deroga-
tory references to bulletinboard systems ingeneral. [FN19] -
 
     The United States Secret Service  has been charged with
enforcement of federal laws relating  to computer crime, and
a recent  investigation known  as "Sun  Devil" has  received
some publicity  in the traditional  media, and even  more in
the  electronic  fora. [FN20]    In  the zealous  pursuit of
their goal to  eliminate computer crime, the  Secret Service
is often  trampling on toes  and arguably chilling  the free
expression of ideas.  An example of what can happen occurred
recently when someone  illegally (meaning without authoriza-
tion) entered a Bellsouth computer and downloaded  (arguably
"stole") documentation about  the "E911" enhanced  emergency
communications system.   (E911 is the system  that calls the
emergency dispatcher when someone  dials 9-1-1 and automati-
cally displays  for the  dispatcher the  calling number  and
address, and any other information  that has previously been
filed, such as hazardous chemicals,  invalids or small chil-
dren, etc.)   One Robert  Biggs plead guilty  to the  actual
theft, and  a Craig  Neidorf was charged  along with  Biggs.
Neidorf apparently was  not charged directly with  the theft
(assuming, arguendo,  theft had  occurred), but  rather with
publishing the data in an  electronic newsletter.  Neidorf's
computer equipment, including that use  for a bulletin board
system,  was  seized,  even though  it  contained electronic
mail. [FN21] 

     The case against Neidorf was  suddenly dismissed on the
fourth day, after it  became apparent that nothing  of value
(in  the sense that  it was already  publicly available) had
been published by Neidorf. [FN22] 

       Legal Issues Relating to Bulletin Board Systems

     Several  legal issues  remain unresolved,  at least  as
they pertain to bulletin board  systems. [FN23]   This paper
will survey what appear to  be the most obvious ones at  the
moment,  briefly review the law  as it appears  to be on the
subject, and may occasionally suggest  what the author advo-
cates as the  "proper" rule on  the issue.  Briefly  stated,
the  emerging  issues appear  to  be whether  bulletin board
systems are protected by either the Speech  or Press Clauses
of the  First Amendment,  and to  what  extent; whether  the
bulletin board system operators are or  should be liable for
illegal  or  actionable misdeeds  of  their users;  what the
expected duty of care should be  for the system operators as
a defense  to such liability, and what  protections might be
extended to bulletin board  systems, directly or  indirectly
through their operators,  under the Fourth Amendment.   This
paper will discuss  four areas bearing  on the legal  rights
and responsibilities of system operators:   whether a bulle-
tin board system  is "press"  for First Amendment  purposes,
what rules of  decision ought to  apply for system  operator
liability for defamation originally published by users, what
other liability might attach for contents of messages on the
system, and some limited concerns about privacy of electron-
ic mail vis-a-vis search and seizure rules.

       Bulletin Board Systems and the First Amendment

     In assessing  what vicarious liability,  for defamation
or for  illegal or  illegally  obtained information,  system
operators might have for information  posted on their bulle-
tin boards by users,  one is drawn to a comparison  with the
press.  While the analogy,  like most analogies, breaks down
at  some point, it is still helpful.   At least one reported
decision  has held that  electronic information  storage and
retrieval systems  may in  some circumstances be  considered
"press." [FN24]  

Access to Information

     In Legi-Tech,  Inc., v. Keiper, [FN25]   a computerized
legislative information retrieval service was denied  access
to a state-owned computer database of legislative materials.
In deciding for Legi-Tech, the  court treated the service as
if it were  a form of press,  in that it existed  to collect
and disseminate  information about  issues of  public impor-
tance  and interest.   While Legi-Tech did  not directly ad-
dress a bulletin  board system,  at least not  in the  sense
that the term  is generally  used, the  comparison is  clear
when the  bulletin board  system contains  message areas  of
public discussion  in traditional  areas of public  concern,
such as government, politics,  and laws.  At least  one com-
mentator,  citing Legi-Tech,  has  concluded  that for  some
purposes [FN26]   bulletins  boards  should   be  considered
press. [FN27]   

Liability for Defamation

     Deciding that a  bulletin board  system is "press"  for
some purposes  begs the  question, what  does it  mean about
anything?   One of  the  more common  concerns among  system
operators  appears to  be  vicarious  liability  for  libels
published by users. [FN28]    While the seminal  modern case
discussing liability of  the press for libel, New York Times
v. Sullivan, [FN29]  might suggest  a stringent standard for
press liability, more recent cases  call that into question.
Dun & Bradstreet, Inc. v.  Greenmoss Builders, Inc., [FN30] 
might fairly be read  to suggest there is no  difference, in
the libel context,  between press and non-press,  but rather
the true distinction is between what is and is  not a matter
of public concern worthy of  heightened protection.  Such an
interpretation would arguably be consistent with the interim
case of  Robert Welch,  Inc., v.  Gertz, [FN31]  which  also
appeared to rest  its holding  on a public-private  distinc-
tion.

     Assuming, arguendo, that  the New York Times  v. Sulli-
van [FN32]   decision established a special level of protec-
tion  for the  press, then  the BBS  operator clearly  would
benefit from the extension of such a privilege.  At the time
the message  is entered  by the  user, the  operator has  no
knowledge whatsoever  of the  contents of  the message,  and
therefore  cannot  know it  to be  false.   Later,  when the
operator sees the message, the  operator might arguably have
a duty to remove  it if it were blatantly  false; otherwise,
the issue would appear  to become when failure to  remove or
challenge a message would be  "reckless disregard of whether
it was  false or not." [FN33]   In considering the question,
one might expect normally to find dispositive the holding in
St.  Amant v. Thompson [FN34]   that failure to investigate,
without more, could not establish reckless disregard for the
truth. [FN35] 

     The astute reader  recognizes, of course, that  the New
York Times  holding concerned statements about  public offi-
cials.  The  commentary found  on bulletin boards  certainly
talks  about  politics and  public  officials. [FN36]    The
question  remains, however, about  private parties.   Robert
Welch,  Inc.,  v. Gertz [FN37]   is  generally cited  as the
decision next addressing the subject.  In Gertz, an attorney
had representing police officer's family  in a murder inves-
tigation.   The defendant  made false  statements about  the
attorney in its  monthly publication American Opinion.   The
judge having ruled the attorney was not a public figure, the
jury returned  a plaintiff's verdict for $50,000.  The trial
judge later reconsidered his ruling,  and entered a judgment
not withstanding the verdict on the theory that a discussion
about a matter  of public concern deserved  protection.  The
issue on appeal  appeared to be  whether the attorney was  a
public figure, not whether the  issue was of public concern.
The Court  ruled that the  fact he  was not a  public figure
controlled.  He had  not "thrust himself into the  vortex of
this public issue, nor did he engage  the public's attention
in an attempt to influence the outcome." The Court then held
that as long as liability was not imposed without some basis
of fault, the states  could write their own rules  for "pri-
vate" libels. [FN38] 

     If New York Times [FN39]  established a new standard of
"malice"  for  press  publishing   on  public  matters,  and
Gertz [FN40]   refused  to extend  that standard  to private
parties, even  when matters  of public  concern might be  at
stake, then  what  about Dun  & Bradstreet? [FN41]    Dun  &
Bradstreet, a private credit-reporting firm, published false
information about Greenmoss  Builders, suggesting  Greenmoss
had filed bankruptcy  when in fact  it was an Greenmoss  em-
ployee who had filed.  The Vermont Supreme Court found Gertz
inapplicable to  nonmedia defamation actions,  and sustained
damages to Greenmoss.  The Supreme  Court affirmed, but on a
different  basis not  involving a distinction  between media
and  nonmedia.   The  plurality  opinion suggested  that the
crucial distinction was whether the  speech involved a "pub-
lic issue,"  "public speech,"  or an  "issue of public  con-
cern."  While Gertz did not clearly draw the distinction, it
was clear to the plurality from the facts of Gertz that such
a limitation was implied. [FN42] 

     As applied to  bulletin board systems, it  would appear
then that if the BBS  is press, New York Times malice  would
be the rule for defamation involving public issues or public
officials.  As long as the  defamation was by one user about
another user, the defamed party could be held to have delib-
erately  "thrust  himself  into the  vortex  of  this public
issue"  in an  "attempt  to influence  the outcome." [FN43] 
That the issue was of public concern [FN44]  could fairly be
implied  from  the fact  of discussion  on a  public message
base,  subject  to  rebuttal.   Of  course,  the possibility
always exists that  a user  inserted a defamatory  statement
into a void, [FN45]  in which case the system operator would
arguably at least have a duty to remove the offending state-
ment, absent a privilege to republish. [FN46] 

     One of  the difficulties in  discussing the  defamation
issue lies in  distinguishing the  system operator as  "vic-
tim," i.e., the  innocent republisher of a  defamation, from
the system  operator as initial  defamer.  The  operator may
be, but usually is not, the original publisher of an alleged
defamation. [FN47]   The system operator is more generally a
republisher of information and, like the bookseller in Smith
v. California, [FN48]  may  not fairly  be held  to know  in
advance the contents of messages left on the bulletin board,
let alone whether they are true or false. [FN49]   In Smith,
the issue was  whether the  bookseller, absent knowledge  of
the contents, could  be held liable for  obscene material in
his store.   The Court held that he could not.  "Every book-
seller  would be placed under  an obligation to make himself
aware of  the contents of every book in  his shop.  It would
be altogether unreasonable  to demand so near an approach to
omniscience...." [FN50]   One must be careful, however, when
discussing the  impact of Smith.   At least  one commentator
has suggested that the typical application of Smith is that,
in the totality of the  circumstances surrounding an "adult"
bookstore, the bookseller  can be inferred to  know the con-
tents of his  merchandise. [FN51]    One could suggest  that
the factual situation would be critical  in the context of a
bulletin board system.

     In manner similar  to the Smith bookseller,  the system
operator is not  aware of the contents  of a message  at the
moment it is posted.  While most system operators review the
contents of most messages left on their bulletin boards most
of the time, it is not always practical to do so, and to the
extent  that  the discussion  centers  on issues  of obvious
public  importance,  such  prescreening  implicates  serious
First Amendment  concerns regarding censorship  and chilling
debate on issues of public importance. [FN52]   

     While it is  not reasonable to expect  system operators
to be aware of the  contents of every message,  particularly
as it is  posted, the  question still remains  of what  duty
they  owe once they  become aware  of an  offending message.
Courts  interpreting  Smith [FN53]   generally have  applied
some element of scienter.   Once system operators  are aware
that  offending messages have been posted on the board, they
arguably have a  duty to remove the  message. [FN54]   Proof
of scienter might arguably  be shown by the totality  of the
circumstances  surrounding the  operation,  such as  limited
access, extensive  password protection, or  previous pattern
of abuse. [FN55] 

     Such a  pattern  might be  shown  if a  bulletin  board
system has, for example,  16 message areas, 15 of  which are
generally available to the public at large, but one of which
is  "hidden" and available only to close friends and associ-
ates of  the system  operator.   Such a  restricted sub-area
("sub"),  if used  for questionable  activities, might  more
easily  be  distinguishable  from the  generally  accessible
subs.  The operator, by exercising the control  necessary to
keep the sub restricted  and to grant access to  the "chosen
few," could arguably be inferred  to have personal knowledge
of the questionable activities. [FN56] 

     A question also arises about  whether the system opera-
tors might be  able to claim  a privilege of  republication.
The  primary privilege normally  mentioned in bulletin board
circles  is that  of the  common carrier.   The  Restatement
(Second)  of  Torts acknowledges  a  privilege for  a common
carrier to  republish a  defamation if  the "public  utility
[is]  under  a  duty to  transmit  messages...." [FN57]    A
careful examination  suggests that  a common  carrier privi-
lege, however, is neither warranted  nor wise.  In  National
Ass'n of  Reg. Util.  Comm'rs v.  F.C.C., [FN58]  the  court
formulated a  two-part test  that would  appear to apply  to
bulletin boards and one which they could arguably pass.  The
case involved cable television.  The coaxial cable installed
for distribution of cable television  is capable of carrying
signals in the reverse direction.   FCC regulations required
such a reverse channel to be  available.  The FCC originally
had not completely foreclosed state  and local regulation of
the reverse channel.  When it  acted to preempt such regula-
tion, the plaintiffs in this action sued to void the preemp-
tion.    The court  ruled that  the  reverse channel  was an
intrastate  common  carrier,  holding that  to  be  a common
carrier an entity must first  provide indifferent service to
all who request it.   Many bulletin board systems  will nor-
mally accept as  a user  anyone who applies,  and many  more
accept anyone  who applies whose registration information is
not facially false;  e.g., anyone who  might provide a  name
listed in the  applicable telephone directory at  the number
provided.  Second, the system must  be such that the custom-
ers can transmit  information of their  own choice.  In  the
case of the bulletin board system, by  definition the infor-
mation is of the customer's own choice.  The difficulty with
this approach, probably  fatal if ever adjudicated,  is that
no one has yet suggested a  duty of bulletin board operators
to transmit any or  all messages submitted to them,  or even
to  open their boards to  the public. [FN59]   Most bulletin
board  systems,  after  all,  are  run   as  a  hobby  at  a
loss. [FN60]   It would  be an absurd result to  decide that
merely by operating a bulletin board system as a hobby, that
an operator mustprovide service to anyonewho asked. [FN61] -
Additionally, most  system operators reserve  the right to
edit  or delete  questionable messages, an  action certainly
incompatible with the requirement that  on a common carrier,
the  information be  of the  customer's own  choice. [FN62] 
(Such a reservation of rights,  however, is entirely consis-
tent  with  the  editorial discretion  inherent  in  a Press
Clause  model,  as is  the  discretion concerning  which few
echoes or message areas, out of the extensive possibilities,
should  be carried on the system. [FN63] )  In addition, the
bulletin board is not a common carrier as that term has been
interpreted by the  FCC, and the  courts will normally  give
"great deference" to the interpretation  given by the admin-
istrative agency. [FN64]    The Federal  Communications Com-
mission  is  authorized to  regulate interstate  commerce by
wire or radio. [FN65]   Since bulletin board systems operate
by connection to the interstate  telephone system, and since
many of them actually are connected [FN66]  to an interstate
network of computerized bulletin board systems, and since it
seems well-settled  that the term "interstate  commerce" has
an extremely broad  meaning, then it  would follow that  the
FCC could  assert jurisdiction.   While  it would  logically
follow, it seems  to this  author that it  would exceed  the
probable intent of  the Congress which enacted  the Communi-
cations Act of 1934. [FN67]   

     The FCC appears to agree with  the author.  In response
to the "increasing complexity  and overlap of communications
systems in the 1970s," [FN68]  the FCC conducted a series of
hearings   which  has become  known as  the  Second Computer
Inquiry. [FN69]     The  Commission   distinguished  between
"basic" and  "enhanced" services.   Basic services act  as a
pipe for  information without  significantly altering  it--a
transparent  path.  Enhanced  services combine basic service
with some sort  of processing.  The  Commission retained its
traditional  jurisdiction  over  basic  services,  but  left
enhanced  services  essentially  unregulated.   Computerized
bulletin  board  services  were  specifically  mentioned  as
enhanced services. [FN70] 

     If it seems likely that bulletin board  systems are not
common carriers, it also seems wise.   We saw in the discus-
sion of defamation, supra, that  bulletin boards might argu-
ably  be characterized as  press.  While  the discussion was
based on access to information, it  was noted that a logical
extension  could be made.  One such likely extension is to a
privilege  of  republication.   In  1977, the  United States
Supreme  Court  denied  certiorari  to Edwards  v.  National
Audubon Society, Inc. [FN71]    In Edwards, the editor of an
Audubon  Society  magazine  characterized  scientists  using
Society data to support  the continued use of the  pesticide
DDT as "paid liars." [FN72]   The  New York Times accurately
reported the  charges.   Five scientists  sued both  Audubon
Society and  the Times.   The  Second Circuit  dismissed the
judgment against the  Times, finding a privilege  of neutral
reporting essential to the operation  of the Press Clause of
the First  Amendment. [FN73]   While the  precedential value
of "cert. denied" is of uncertain value, the decision stands
in the Second Circuit.   The courts are split  about whether
the  "neutral reporting" privilege  is valid. [FN74]    Many
have accepted it and many have refused to accept it. [FN75] 
If there is any  validity to it, however, it should apply to
bulletin boards.  The  editors of the New York  Times, after
all, had the  option (editorial discretion) not  to publish.
In contrast, inherent in the nature of the bulletin board is
immediate republication.   The  operator may  only, once  he
becomes aware of the libel, remove  it.  No editorial choice
is  exercised  immediately,  and in  the  case  of networked
systems, an intervening mail event  will cause the question-
able  matter  to  be republished  widely  before  the system
operator has the reasonable opportunity  to take any action.
At  least to the extent that  bulletin board systems facili-
tate  discussion  of matters  of  public importance,  and at
least to  the  extent that  the  Edwards privilege  is  ever
valid,  the neutral (fair)  reporting privilege should apply
to  bulletin  boards. [FN76]     This  application  of   the
neutral/fair  reporting  privilege would,  it  seems to  the
author, be a better solution to the problem of republication
than  common  carrier  recognition, as  it  would  leave the
system operator with the independence and discretion implic-
it in a hobby. [FN77] 

    Civil and Criminal Liability for Contents of Messages

     In a similar manner, system operators have been charged
with various criminal  violations based  on the contents  of
messages  left on their bulletin boards. [FN78]   One of the
earliest reported cases  involved a  Mr. Tcimpidis, who  was
charged solely because of information posted on his bulletin
board containing stolen telephone credit  card numbers.  The
exact  basis of  the  charge is  missing  from the  reviews;
however, one can surmise that it was for aiding and abetting
or some similar theory, in  that charges were later  dropped
for lack  of evidence of  knowledge or intent. [FN79]    Re-
cently, the "Sun  Devil" investigation by the  United States
Secret  Service  has  resulted in  the  seizure  of computer
equipment and at least the temporary cessation of activities
at several  bulletin board systems.  Boards  operated by Mr.
Craig Neidorf and one outside Chicago, called "JOLNET" have,
for example, ceased operations.  The JOLNET  operator, a Mr.
Rich Andrews, initiated contact with the Secret Service when
he  became  aware  of potentially  illegal  activity  on his
board.    Notwithstanding 18  U.S.C.   2703  et seq.,  which
appear to prefer solicitation of  archival copies and backup
records  of  such  systems, the  Secret  Service  seized the
actual  computer equipment  as evidence,  shutting  down the
system. [FN80] 

     Such seizures  would appear  to be  troublesome to  the
extent that a bulletin board system may fairly be said to be
some kind of a  forum provided for the public  discussion of
matters of importance. [FN81]    One  cannot foresee a  more
"chilling" effect on free speech than to be frozen to death-
-or shut down by seizure.

          Privacy Concerns and the Fourth Amendment

     The discussion above briefly mentioned that some bulle-
tin board systems had been seized, apparently without regard
to the presence of  electronic mail.  While search  and sei-
zure and  privacy  issues are  not directly  pertinent to  a
paper on mass communications law, they seem to the author to
be  inextricably  combined  in  any discussion  of  bulletin
boards.   Virtually  every bulletin  board  system  provides
facilities forsome sort ofprivate, electronic mail. [FN82] -
  One  case  in California  involved  a foundation  known as
ALCOR, which  practiced cryogenic preservation of people who
died from what they hoped would,  in the future, be a treat-
able disease.   ALCOR  came under  investigation on  charges
they had preserved some people a little hastily, essentially
a charge of some kind of homicide.  While no serious commen-
tator  has  suggested that  the  case should  not  have been
investigated, the  problem appears  to be  that the  founda-
tion's electronic  mail system  was seized with  undelivered
mail still in storage.  The system was apparently accessible
to the  public. [FN83]   ALCOR  sued under 42  U.S.C.   1983
for the  return of the  system and damages,  alleging, inter
alia, that  the government  violated the  provisions of  the
Electronic Communication Privacy Act of 1986 (ECPA). [FN84] 
A decision has not yet been reached in the case.

     The  only  other  known action  involving  the  privacy
provisions of the ECPA  is Thompson v. Predaina. [FN85]    A
user  accused  a  system operator,  inter  alia,  of causing
private messages to be made public without the permission of
the sender or intended recipient, thereby violating the act.
The complaint was  voluntarily dismissed  prior to trial  on
the merits.   Predaina would have been  an ideal opportunity
for judicial  construction of  the latest  Congressional at-
tempt to define  the privacy  protections of the  electronic
world.

     As the technological complexity of society increasingly
draws us into the electronic world, privacy issues become of
more  concern to more people.  The responsibilities and duty
of  care of a  system operator to  the users  of the system,
regarding whatever  reasonable expectation  of privacy  they
may have,  would seem to  be something each  system operator
would want  to know.   Experience in both this  class and in
the real world tells the prudent observer of the legal scene
that Congress  passing an Act  is but  the first step  in an
area filled with  First and Fourth  Amendment concerns.   It
would have been helpful for  a judicial construction of  the
ECPA, but that will of necessity wait for another time.

          There is, from  empirical data, [FN86]  a  connec-
tion between the earlier discussion of liability for defama-
tion and illegal activities and liability for privacy.  Many

From kadie Sat Oct 12 09:51:10 1991
To: cafb-mail
~Subject: Computers and Academic Freedom mailing list (batch edition)
Status: R


Computers and Academic Freedom mailing list (batch edition)
Sat Oct 12 09:50:57 EDT 1991

[For information on how to get a much smaller edited version of the
list, send email to archive-server@eff.org. Include the line:
   send acad-freedom caf
- Carl ]

In this issue:

:                                                                             

The addresses for the list are now:
	comp-academic-freedom-talk@eff.org     - for contributions to the list
		or	caf-talk@eff.org
	listserv@eff.org    - for automated additions/deletions
                (send email with the line "help" for details.)
	caf-talk-request@eff.org    - for administrivia

-------------------

sysops have  difficulty in separating the two,  and it seems
that  to   "normal" sysops  "liability is  liability."   The
distinction as to the form of  the action, and whether it is
brought by a citizen or the state, either eludes or does not
concern them.

                         Conclusion

     The ever-increasing rate of change  in the world around
us has eclipsed  the state of the law  in many ways.   As we
have progressed from  Luther's church door, to  Paine's pam-
phlet, to the supermarket bulletin board, and to the comput-
erized  BBS, the lines between mail  and press and telephony
and  public  and private  have  often become  unclear.   The
application of  traditional legal lines  of demarcation  and
tests for responsibility for defamation and criminal liabil-
ity  appears  unclear as  well.   The  computerized bulletin
board system has become a fixture  in a small but increasing
segment  of our society,  and that  society needs  the legal
system to sort out the rules so that everyone in it can play
the game on  a level playing  field--so that they both  know
what  they may reasonably  expect of others  and what others
may reasonably expect of them.

[Footnotes -cmk]

FN1.  LINDBERG, MARTIN LUTHER: JUSTIFIED BY GRACE 24 (1988)

FN2.  Id.

FN3.  The  author  remembers  well  his orientation  at  the
beginning of  the fall  semester, 1988,  and the  admonition
given by (now  assistant dean) Anne  Lange.  His  experience
since then has borne out the wisdom of her words.

FN4.  The author sees the board at Baker's all too frequent-
ly, as his meager  income outgoes to the provider  of suste-
nance.

FN5.  In the spirit of inclusive  language, should one, with
tongue  in cheek, refer  to them as  the "Precipitating Par-
ents"?  On a more serious note, to make  the sentence struc-
ture as  short and direct  as possible, and  consistent with
the  generally accepted  rules of construction  for statutes
and legal texts, we  have used the pronouns "he",  "his," in
lieu  of "he  or she," or  "his or  hers," etc.   Unless the
context  clearly  indicates  otherwise,  masculine  pronouns
should be read as inclusive.

FN6.  Pamphleteers  were  pervasive  and   almost  certainly
within the intended coverage of  the First Amendment's Press
Clause.  Lange,  The Speech and Debate  Clauses, 23 U.C.L.A.
L. REV. 77, 106 (1975).

FN7.  The terminology is far from standardized in discussing
computer bulletin board systems.  The author, in researching
this paper and  in general experience, has  experienced com-
puter  bulletin board systems  (CBBS), remote bulletin board
system (RBBS),  electronic bulletin  board system,  and just
"bulletin board system:  (BBS).  For simplicity,  this paper
will use  bulletin board, bulletin  board system, or  BBS as
the context dictates.  

FN8.  A  1985 law  review article  cited  sources indicating
there were some  1500 active bulletin  board systems in  the
United States  as of  1984; however,  the authors  indicated
some skepticism as  the source cited  15 in the Denver  area
and they personally knew  of 50-60.  Soma, Smith  & Sprague,
Legal Analysis of Electronic Bulletin Board Activities, 7 W.
NEW  ENG. L.  REV. 571,  572 n. 3  (1985).   Another article
suggests the number is between 1000 and 5000.  Note, Comput-
er Bulletin  Board Operator  Liability for  User Misuse,  54
FORDHAM L.  REV. 439, 441 n. 12 (1985).   The author is cur-
rently system operator ("sysop") of an bulletin board system
affiliated with networks known as "Fidonet," "Metronet," and
"OPCN."   The current  combined  "nodelists," or  addressing
information,  list  over  8500  independent bulletin  boards
worldwide.  Nodelist 222, Fidonet, available  electronically
and from the author.   In addition, several large commercial
networks exist.  While it is  apparently difficult to obtain
information  about their subscriber  base, one  source lists
them  as CompuServe  (500,000 +),  Dow Jones/News  Retrieval
(275,000), and GEnie (General Electric Network for  Informa-
tion  Exchange) (150,000).   Becker,  Liability of  Computer
Bulletin Board Operators for Defamation Posted by Others, 22
CONN. L. REV. 203, 204 n. 4 (1989).

FN9.  Dembart,  The  Law  Versus  Computers:  A  Confounding
Terminal Case, L.A. Times, Aug. 11, 1985, at 3, col. 1.

FN10.  "Modem" is a contraction of  two terms, modulator and
demodulator, referring to  two separate processes  that must
occur  to transmit  computerized information  over telephone
lines.  At  the present time, the modem is normally either a
small box set next to the  computer and connected by cables,
or a small printed circuit  card physically installed inside
the  PC.  In either instance  the modem must be connected to
the  telephone  system for  the  bulletin board  to operate.
Kahn,  Defamation Liability  of Computerized  Bulletin Board
Operators  and  Problems of  Proof 6  (1989) (electronically
distributed, available from the author of this paper).

FN11.  Becker, supra n. 8 at 203 n. 2.

FN12.  Becker,  supra  n.  8.   See  also,  Soma,  Smith and
Sprague, supra n. 8.

FN13.  Attached to this paper are a partial current combined
system list for  FidoNet, MetroNet and  OPCN, and a list  of
"echo"  areas, by  somewhat  cryptic but  at  the same  time
somewhat understand area  "tags," that are available  to him
as a system operator.  Also  attached is a brief description
of "echomail," and  sample printouts of some  recent discus-
sions. The  cost of  long distance  transmission is  usually
absorbed  by the system operator as part  of the cost of the
hobby.    Occasional  "pooling" arrangements  allow  for the
economical transmission between cities (several operators in
the Omaha area do this, for example).

FN14.  Note, FORDHAM L. REV., supra.

FN15.  Id.

FN16.  Id., at 439, n. 4.

FN17.  Soma, Smith and Sprague, Legal Analysis of Electronic
Bulletin board Activities, 7  W. NEW ENG. L. REV.  571, 572-
575 (1985).  See also note 19, infra.

FN18.  UPI, May  5,  1990, Computer  hacker gets  probation,
fine, LEXIS, NEXIS library, Current file.

FN19.  Westbrook, User  to user: the comms  column; Bulletin
boards  helpful  for communication,  PC  User, LEXIS,  NEXIS
library, Current file (1990).  

     Consider the following equation: Computer +  Modem
     = Illegal  Activity.   This is  the basic  formula
     used by non-expert TV and radio programme  editors
     when examining the subject of data  communications
     and it's a view which has been encouraged by a few
     pundits who're  only too  happy to  take money  to
     talk about  children playing  noughts and  crosses
     with  military computers.   This attitude seems to
     be  the  result of  a  few celebrated  cases where
     illegal activity has been brought to light involv-
     ing a hacker, his  computer and a modem.   Yet the
     same principle might be applied  to all drivers of
     Mk II Jaguars to identify  them as getaway drivers
     for bank robbers. 
     The suspicion that the  modem/computer combination
     can generate is nowhere more  apparent than in the
     public view  of the bulletin board.   To read, see
     or hear  the popular media in action, you could be
     forgiven  for thinking  that  bulletin boards  are
     used  exclusively  to  disseminate pornography  or
     recipes for Molotov cocktails.  At the very least,
     such  services  are  seen as  havens  for  spotty,
     adolescent, sex-mad anarchists rather than serious
     computer users.

Id.  Westbrook goes on to  suggest that bulletin boards have
valuable uses as sources of  information and discussion, but
that the  general public can  be forgiven for  not realizing
this, given the nature of press coverage of computer crime.

FN20.  In fact,  the Internet/Usenet system,  with which the
University of Nebraska is  affiliated, carries a "newsgroup"
somewhat  misleadingly  labelled  the "Computer  Underground
Digest," which devotes a  great deal of space to  known cur-
rent investigations and debunking rumors and myths surround-
ing them.  CuD Volumes 1.22 through 1.28, available from the
author.

FN21.  Electronic mail is  specially protected by 18  U.S.C.
   2701 et  seq., the Electronic Communications  Privacy Act
of 1986 (ECPA).   There is  no indication that the  officers
requesting  any  warrants or  the  judge or  magistrate that
issued  them paid any  attention to the  requirements of the
ECPA.   See  generally, CuD  Vol. 1.23,  available  from the
author.   A limited  discussion of  electronic mail  privacy
issues as  they interact  with bulletin  board systems  will
follow infra.

FN22.  The following  electronic note  was published  in the
newsgroup comp.dcom.telecom  (Telecommunications Digest)  on
Saturday,  August  11, 1990.    The accompanying  header and
routing control information is deliberately left in place so
one may get a  sense of the complexity and  pervasiveness of
the electronic world:

      From comp.dcom.telecom Sat Aug 11 09:47:24 1990
      Path: hoss!maverick.ksu.ksu.edu!ux1.cso.uiuc.edu!
         brutus.cs.uiuc.edu!wuarchive!cs.utexas.edu!mailrus!
         accuvax.nwu.edu!nucsrl!telecom-request
      From: colin@array.uucp (Colin Plumb)
      Newsgroups: comp.dcom.telecom
      Subject: Dial 1-800 ... For Bellsouth `Secrets'
      Message-ID: <10698@accuvax.nwu.edu>
      Date: 10 Aug 90 17:41:07 GMT
      Sender: news@accuvax.nwu.edu
      Organization: Array Systems  Computing, Inc.,  Toronto,
      Ontario,    CANADA 
      Lines: 71
      Approved: Telecom@eecs.nwu.edu
      X-Submissions-To: telecom@eecs.nwu.edu
      X-Administrivia-To: telecom-request@eecs.nwu.edu
      X-Telecom-Digest: Volume 10, Issue 558, Message 5 of 11


      {Computerworld},  August 6,  1990, Vol.  XXIV,  No. 32,
      Page 8.

      Dial 1-800...for Bellsouth `Secrets'

        BY MICHAEL ALEXANDER
                      CW STAFF
       CHICAGO --- The attorney for  Craig Neidorf, a 20-year-
      old  electronic newsletter editor,  said last week that
      he  plans  to file  a  civil lawsuit  against Bellsouth
      Corp.  as  a  result  of  the  firm's ``irresponsible''
      handling  of a case  involving the theft  of a computer
      text file from the firm.

      Federal prosecutors dismissed  charges against  Neidorf
      four days into  the trial,  after the prosecution  wit-
      nesses conceded  in cross-examination that much  of the
      information in the text was widely available.

      Neidorf,  the co-editor of ``Phrack,'' a newsletter for
      computer hackers, was accused by federal authorities of
      conspiring to steal  and publish a  text file that  de-
      tailed  the inner workings  of Bellsouth's enhanced 911
      emergency telephone  system across  none states  in the
      southeast [CW, July 30].

      ``What happened  in this  case is  that the  government
      accepted  lock,  stock,  and   barrel  everything  that
      Bellsouth    told    them   without    an   independent
      assessment.'' said Sheldon Zenner, Neidorf's attorney.

      One witness, a Bellsouth service manager,  acknowledged
      that detailed  information about the inner  workings of
      the 911 system could be purchased  from Bellsouth for a
      nominal fee using a toll-free telephone number.

      A Bellcore security  expert who was hired  by Bellsouth
      to  investigate intrusions  into  its computer  systems
      testified that the  theft of  the file went  unreported
      for nearly a year.

      Last week, a Bellsouth spokesman  said the firm's secu-
      rity experts delayed reporting  the theft because  they
      were  more intent on  monitoring and  preventing intru-
      sions into the company's computer systems.  ``There are
      only so much  resources in the data security arena, and
      we felt  that it was  more urgent to  investigate,'' he
      said.

      He also disputed  assertions that  the document was  of
      little  value. ``It is  extremely proprietary  and con-
      tained  routing information  on 911  calls through  our
      none-state [sic -cmk] territory as  well as entry points  into the
      system,'' he said.

      A quick ending:

      The case  unraveled after  Robert Riggs, a  prosecution
      witness who  had already pleaded guilty for his role in
      the theft of the document,  testified that he had acted
      alone and Neidorf had merely agreed to publish the text
      file in ``Phrack.''

      Neidorf and his  attorney agreed  to a pretrial  diver-
      sion, a  program under which the government voluntarily
      dismisses the  indictment  but could  reinstate  it  if
      Neidorf commits a similar crime within a year.

      The case has  stirred up national debate  on the rights
      of computer users in the age of electronic information.
      The Electronic  Frontier Foundation, a  civil liberties
      group  set up by Mitch Kapor, founder of Lotus Develop-
      ment Corp., may  participate in the filing of a lawsuit
      against Bellsouth, and Terry Gross,  an attorney at the
      New York law firm of Rabinowitz Boudin Standard Krinsky
      & Lieberman.

      ``The  Electronic Frontier  Foundation is  concerned by
      the
      irresponsibility of  Bellsouth  of  claiming  from  the
      outset that  this was confidential information  when it
      should have known that it was not,'' Gross said.

FN23.  The unsettled state of  the law may be discovered  by
reviewing the current writing on  the subject, at least some
of which is listed in note 28, infra.

FN24.  Legi-Tech, Inc.,  v. Keiper,  766 F.2d  728 (2d  Cir.
1985).

FN25.  Id.

FN26.  The narrow holding in Legi-Tech was that an electron-
ic  information  and retrieval  service  is "press"  for the
purpose of access to government  information.  The commenta-
tor  extends  this  holding from  information  retrieval  to
bulletin boards, and suggests that it  would extend at least
as far as  defamation actions.   He then appears to  abandon
this line, as he reads Dun & Bradstreet, note 30, infra, and
accompanying text, as  negating the need for such a distinc-
tion.

FN27.  Comment,  An  Electronic  Soapbox: Computer  Bulletin
Boards  and the  First  Amendment, 39  FED.  COMM. L.J.  217
(1987) (authored by Eric L. Jensen).

FN28.  The Jensen article, supra note 27, for example pays a
great  deal of attention  to the libel  question.  Liability
for  defamation is also discussed  in Soma, Smith & Sprague,
Legal Analysis of Electronic Bulletin Board Activities, 7 W.
NEW ENG. L. REV.  571 (1985); Becker, The Liability  of Com-
puter  Bulletin Board  Operators  for  Defamation Posted  by
Others, 22 CONN. L.  REV. 203 (1989); and Comment,  Computer
Bulletin  Board  Operator  Liability  for  User  Misuse,  54
FORDHAM  L.  REV. 439  (1985).   The  subject  is frequently
discussed  within the framework  of bulletin  board systems,
particularly in those message areas devoted to system opera-
tors, and at least one paper on the subject is electronical-
ly distributed:  Kahn, Defamation Liability  of Computerized
Bulletin Board  Operators  and  Problems  of  Proof  (1989),
available by anonymous ftp from the archives of the Internet
Telecommunications Digest,  lcs.mit.edu, directory  telecom-
archives,  as sysop.libel.liability.   It is  also available
from the author of this paper.

FN29.  New York Times v. Sullivan, 376 U.S. 254 (1964).

FN30.  Dun &  Bradstreet, Inc. v. Greenmoss  Builders, Inc.,
105 S. Ct. 2939 (1985).

FN31.  Robert Welch, Inc., v. Gertz, 418 U.S. 323 (1974).

FN32.  376 U.S. 254 (1964).

FN33.  Id.

FN34.  390 U.S. 727 (1968).  In  St. Amant, a candidate read
on television statements received from a union official that
had been made  under oath.  The court found  that the candi-
date's failure to investigate the  statements' truth was not
reckless  disregard  for  the purpose  of  "New  York Times"
malice.

FN35.  There "must  be  sufficient evidence  to  permit  the
conclusion that  the defendant  in fact  entertained serious
doubts as  to the truth  of his publication."   390 U.S. 727
(1968).

FN36.  See  generally,  the samples  from  the  POLITICS and
SERIOUS SIDE echoes attached at the end of this paper.

FN37.  418 U.S. 323 (1974).

FN38.  The case  was remanded for  retrial, as the  jury had
found  liability without  fault  being  established and  had
awarded $50,000 without proof of damages.  Id.

FN39.  376 U.S. 254.

FN40.  418 U.S. 323.

FN41.  472 U.S. 749 (1985).

FN42.  472 U.S. 749.

FN43.  Gertz.

FN44.  Dun & Bradstreet.

FN45.  Dare I say, "amorphous void?"

FN46.  See generally,the discussionof republication,notes 57
- 77, infra, and accompanying text.

FN47.  See generally, Jensen, supra note 27.

FN48.  Smith v. California, 361 U.S. 147 (1959).

FN49.  See both Jensen and Soma, supra note 28.

FN50.  Smith v. California, 361 U.S. at 153-4.

FN51.  Interview with Professor  John Snowden, University of
Nebraska College of Law, August 4, 1990.

FN52.  See Comment, Computer Bulletin Board Operator Liabil-
ity for User Misuse,  54 FORDHAM L. REV. 439,  447-9 (1985).
Attached at the end of this paper is a sample of the debates
recently carried in  message echoes  available in the  Omaha
area.

FN53.  Smith v. California, 361 U.S. 147 (1959).

FN54.  United States  v. Mishkin,  317 F.2d  634 (2d  Cir.),
cert denied, 375 U.S. 827 (1963).

FN55.  In  Gold v.  United States,  378 F.2d  588 (9th  Cir.
1967),  the defendant knew the detailed shipping identifica-
tion of the parcel in question; in United States v. Mishkin,
317 F.2d 634  (2d Cir.), cert  denied, 375 U.S. 827  (1963),
the defendant was held to  have scienter of obscene contents
based on the clandestine nature of the transaction.

FN56.  The  hypothetical  becomes  real  in  the  electronic
world.   "Dr. Ripco" operated  a bulletin board  in Chicago,
one  which  included  electronic  mail  (see generally,  the
limited  discussion of  electronic mail,  infra), which  in-
cluded  a restricted  access sub  called "phone phun."   The
Secret Service recently executed a search warrant and seized
his system in an ongoing investigation, the details of which
have not  yet been released.   While Dr.  Ripco has  not yet
been charged, he  relates the existence of the  "phone phun"
sub was prominent  when he was  interrogated at the time  of
the search and seizure.   CuD, Vol. 1.28 (1990), distributed
electronically and  available from  the author.   While  Dr.
Ripco's knowledge, if any, was about illegal activities, one
can easily  see a similar  argument being made  about libel.
If system operators carefully control  access to an area, or
if the  operators frequently  participate in the  discussion
where a libel is committed, then activities of  the operator
could lead to  a presumption of  knowledge of the libel  and
liability at least  for failure  to promptly remove,  absent
some privilege.   See the  discussion of a  possible Edwards
privilege, infra.

FN57.  RESTATEMENT (SECOND) OF TORTS   612 (1977).

FN58.  533 F.2d 601 (D.C. Cir. 1976).

FN59.  See Jensen, supra note 27, at 251.

FN60.  See Soma, Smith & Sprague, supra n. 8.

FN61.  "The Restatement privilege recognizes `that a [common
carrier],  which with  very  limited exceptions  extends its
facilities to all users, has exhibited no actual or  implied
"malice"  when  it  merely refuses  to  censor  a particular
communication.'"  39 FED.  COMM. L.J.  217 at  250, n.  173,
citing Anderson v.  New York Telephone  Co., 42 A.D.2d  151,
345  N.Y.S.2d  745  (1973)  (dissenting  opinion), rev'd  35
N.Y.2d 746, 361  N.Y.S.2d 913 (1974) (emphasis added).   See
also note 59, supra.

FN62.  553 F.2d 601.

FN63.  See generally, the listing attached  to this paper of
message  echo  areas available  to  system operators  in the
Omaha, Nebraska, vicinity.

FN64.  Notwithstanding the  ultimate holding adverse  to the
FCC, the court  in National Ass'n  of Reg. Util. Comm'rs  v.
F.C.C. went to  some lengths  to acknowledge the  principle,
and then to  distinguish it on the facts in the case at bar.
553 F.2d 601.

FN65.  47 U.S.C.   151 (1982).

FN66.    They are connected in the logical sense, if not the
physical sense, as computer theorists use the terms.

FN67.  June 19, 1934, c. 652, 48 Stat. 1064.

FN68.  Comment,  An  Electronic  Soapbox: Computer  Bulletin
Boards and the First Amendment, 39 FED. COMM. L.J. 217, 220.

FN69.  Second Computer Inquiry,  Final Decision, 77 F.C.C.2d
384, 47 R.R.2d 669 (1980), reconsidered  84 F.C.C.2d 512, 50
R.R.2d 629 (1981),  aff'd sub  nom. Computer and  Communica-
tions Indus.  Assn'n  v. F.C.C.,  693  F.2d 198  (D.C.  Cir.
1982), cert. den., 461 U.S. 938 (1983).

FN70.  "In an enhanced  service the content of  the informa-
tion need  not be changed and may  simply involve subscribed
interaction with stored information.  Many enhanced services
feature  voice or data  storage and  retrieval applications,
such as in a 'mail box' service."  Id. at 421.

FN71.  556  F.2d 113  (2d Cir.  1977), cert.  den. sub  nom.
Edwards v. New York Times Co., 434 U.S. 1002 (1977).

FN72.  The pesticide DDT  had been criticized as  harmful to
many kinds of wildlife, particularly following  the publica-
tion of  Rachel Carson's book  Silent Spring.   The National
Audubon Society had  for many years conducted  periodic bird
counts.    The counts  could  be interpreted  to  show that,
contrary to the anti-DDT concerns, bird life was increasing.
The  Audubon  Society  felt  that statistical  reasons,  not
actual wildlife increases, were  responsible for the  anoma-
lous count data  and opposed the use of its  data to support
DDT.  556 F.2d 113.

FN73.  Id.

FN74.  Magnetti, "In the  End the Truth  Will Out" . . .  Or
Will It?, 52 MISS. L. REV. 299, 329-331 (1987).

FN75.  Id.

FN76.  The privilege of fair reporting, after all, should at
the minimum include the actual words of the original author,
nothing more and nothing  less being said, which is  exactly
what the bulletin board republishes.

FN77.  The question would  arise of what judgment  was exer-
cised if anyone could post a message.  The judgment arguably
would in the first instance be the exercise of discretion in
awarding access to the  system.  See Soma, Smith  & Sprague,
supra.  The  final exercise  of judgment would  be when  the
editor/system operator removed or left in place a potential-
ly offending  message.   Removal would  be  the exercise  of
editorial judgment, leaving in place an exercise of neutral-
ly reporting what the individual already had said.

FN78.  A Mr. Len Rose was recently indicted for the theft of
American Telephone and Telegraph  Company software detailing
the  operation of  the  "E911"  emergency telephone  system.
Several other individuals were charged because the software,
either without their knowledge, or  with their knowledge but
without their  knowing it was  stolen, was stored  or trans-
mitted  by their systems.  (This is the same theft where Mr.
Biggs was convicted.   See  n. 21,  supra, and  accompanying
text.)  A final decision has  not been reached in Mr. Rose's
case.  A copy  of the Rose indictment is available  from the
author.  Various versions of the other charges are available
in issues of the Computer  Underground Digest available from
the author.

FN79.  Soma, Smith & Sprague,  Legal Analysis of  Electronic
Bulletin Board Activities,  7 W. NEW  ENG. L. REV. 571,  605
(1985).

FN80.  Computer  Underground   Digest,  various   electronic
editions,  available  from the  author.   The parallel  to a
pamphleteer  would  be the  seizure  of his  printing press.
Particularly troublesome  is that the  warrants, apparently,
did not specify seizure of the electronic mail stored on the
system.  An action is pending in a California case.

FN81.  Public importance might not be  the only First Amend-
ment concern--the Speech Clause, on its face, does not limit
itself to public importance--but would be applicable to most
bulletin board systems with which the author is familiar.

FN82.  Hernandez, ECPA and Online Computer Privacy,  41 FED.
COMM. L.J. 17 (1989).

FN83.  Copies of most of the pleadings  to date in the ALCOR
case are available from the author.

FN84.  The relevant  portions of  the Electronic  Communica-
tions Privacy Act as recorded in  the United States Code are
set out in an attachment to this paper.

FN85.  Complaint,  Thompson v.  Predaina,  No. 88-93C  (S.D.
Indiana  1988),  dismissed August  10th,  1988.   One source
relates the dismissal  was voluntary.   Hernandez, ECPA  and
Online  Computer  Privacy,  41 FED.  COMM.  L.J.  17 (1989).
Another source  indicates the  dismissal was  caused by  the
defendant's filing bankruptcy, thereby automatically staying
the prosecution of the suit.  Wilson, message in Fidonet:LAW
echo (1990).  An electronic copy  of the complaint is avail-
able from the author.

FN86.  By "empirical data" the author means that he continu-
ally receives questions from fellow  sysops who, knowing him
to be a law student, verbalize questions about their liabil-
ity  exposure over  the range  of issues  discussed in  this
paper.

Downloaded From P-80 International Information Systems 304-744-2253