💾 Archived View for spam.works › mirrors › textfiles › politics › civlib captured on 2023-11-14 at 11:35:00.

View Raw

More Information

⬅️ Previous capture (2023-06-16)

-=-=-=-=-=-=-

Civil Liberties in Cyberspace:
When does hacking turn from an exercise 
of civil liberties into crime?

by Mitchell Kapor

published in Scientific American, 
September, 1991.


On March 1, 1990, the U.S. Secret Service raided the offices of Steve
Jackson, an entrepreneurial publisher in Austin, Tex. Carrying a
search warrant, the authorities confiscated computer hardware and
software, the drafts of his about-to-be-released book and many business
records of his company, Steve Jackson Games. They also seized the
electronic bulletin-board system used by the publisher to communicate
with customers and writers, thereby seizing all the private electronic
mail on the system.


The Secret Service held some of the equipment and material for months,
refusing to discuss their reasons for the raid. The publisher was forced
to reconstruct his book from old manuscripts, to delay filling orders
for it and to lay off half his staff. When the warrant application was
finally unsealed months later, it confirmed that the publisher was
never suspected of any crime.


Steve Jackson's legal difficulties are symptomatic of a widespread
problem.  During the past several years, dozens of individuals have been
the subject of similar searches and seizures. In any other context, this
warrant might never have been issued. By many interpretations, it
disregarded the First and Fourth Amendments to the U. S. Constitution,
as well as several existing privacy laws. But the government proceeded
as if civil liberties did not apply. In this case, the government was
investigating a new kind of crime -- computer crime.


The circumstances vary, but a disproportionate number of cases share a
common thread: the serious misunderstanding of computer-based communi-
cation and its implications for civil liberties. We now face the task
of adapting our legal institutions and societal expectations to the
cultural phenomena that even now are springing up from communications
technology.


Our society has made a commitment to openness and to free
communication. But if our legal and social institutions fail to adapt
to new technology, basic access to the global electronic media could be
seen as a privilege, granted to those who play by the strictest rules,
rather than as a right held by anyone who needs to communicate. To
assure that these freedoms are not compromised, a group of computer
experts, including myself, founded the Electronic Frontier Foundation
(EFF) in 1990.


In many respects, it was odd that Steve Jackson Games got caught up in a
computer crime investigation at all. The company publishes a popular,
award-winning series of fantasy roleplaying games, produced in the
form of elaborate rule books. The raid took place only because law
enforcement officials misunderstood the technologies -- computer
bulletin-board systems (BBSs) and on-line forums -- and misread the
cultural phenomena that those technologies engender.


Like a growing number of businesses, Steve Jackson Games operated an
electronic bulletin board to facilitate contact between players of its
games and their authors. Users of this bulletin-board system dialed in
via modem from their personal computers to swap strategy tips, learn
about game upgrades, exchange electronic mail and discuss games and
other topics.


Law enforcement officers apparently became suspicious when a Steve
Jackson Games employee -- on his own time and on a BBS he ran from his
house -- made an innocuous comment about a public domain protocol for
transferring computer files called Kermit. In addition, officials
claimed that at one time the employee had had on an electronic
bulletin board a copy of Phrack, a widely disseminated electronic publi-
cation, that included information they believed to have been stolen from
a BellSouth computer.


The law enforcement officials interpreted these facts as unusual
enough to justify not only a search and seizure at the employee's
residence but also the search of Steve Jackson Games and the seizure of
enough equipment to disrupt the business seriously. Among the items
confiscated were all the hard copies and electronically stored copies of
the manuscript of a rule book for a role-playing game called GURPS
Cyberpunk, in which inhabitants of so-called cyberspace invade
corporate and government computer systems and steal sensitive data.
Law enforcement agents regarded the book, in the words of one, as "a
handbook for computer crime."


A basic knowledge of the kinds of computer intrusion that are
technically possible would have enabled the agents to see that GURPS
Cyberpunk was nothing more than a science fiction creation and that
Kermit was simply a legal, frequently used computer program.
Unfortunately, the agents assigned to investigate computer crime did not
know what -- if anything -- was evidence of criminal activity.
Therefore, they intruded on a small business without a reasonable
basis for believing that a crime had been committed and conducted a
search and seizure without looking for "particular" evidence, in vi-
olation of the Fourth Amendment of the Constitution.


Searches and seizures of such computer systems affect the rights of
not only their owners and operators but also the users of those systems.
Although most BBS users have never been in the same room with the
actual computer that carries their postings, they legitimately expect
their electronic mail to be private and their lawful associations to
be protected.


The community of bulletin-board users and computer networkers may be
small, but precedents must be understood in a greater context. As
forums for debate and information exchange, computer-based bulletin
boards and conferencing systems support some of the most vigorous
exercise of the First Amendment freedoms of expression and association
that this country has ever seen. Moreover, they are evolving rapidly
into large-scale public information and communications utilities.


These utilities will probably converge into a digital national public
network that will connect nearly all homes and businesses in the U.S.
This network will serve as a main conduit for commerce, learning,
education and entertainment in our society, distributing images and
video signals as well as text and voice.  Much of the content of this
network will be private messages serving as "virtual" town halls,
village greens and coffeehouses, where people post their ideas in public
or semipublic forums.


Yet there is a common perception that a defense of electronic civil
liberties is somehow opposed to legitimate concerns about the
prevention of computer crime. The conflict arises, in part, because
the popular hysteria about the technically sophisticated youths known as
hackers has drowned out reasonable discussion.


Perhaps inspired by the popular movie _WarGames_, the general public
began in the 1980s to perceive computer hackers as threats to the
safety of this country's vital computer systems. But the image of
hackers as malevolent is purchased at the price of ignoring the
underlying reality -- the typical teenage hacker is simply tempted by
the prospect of exploring forbidden territory. Some are among our best
and brightest technological talents: hackers of the 1960s and 1970s,
for example, were so driven by their desire to master, understand and
produce new hardware and software that they went on to start companies
called Apple, Microsoft and Lotus.


How do we resolve this conflict? One solution is ensure that our scheme
of civil and criminal laws provides sanctions in proportion to the
offenses. A system in which an exploratory hacker receives more time in
jail than a defendant convicted of assault violates our sense of
justice. Our legal tradition historically has shown itself capable of
making subtle and not-so-subtle distinctions among criminal offenses.


There are, of course, real threats to network and system security. The
qualities that make the ideal network valuableQits popularity, its
uniform commands, its ability to handle financial transactions and its
international access -- also make it vulnerable to a variety of
abuses and accidents. It is certainly proper to hold hackers
accountable for their offenses, but that accountability should never
entail denying defendants the safeguards of the Bill of Rights,
including the rights to free expression and association and to free-
dom from unreasonable searches and seizures.


We need statutory schemes that address the acts of true computer crim-
inals (such as those who have created the growing problem of toll and
credit-card fraud) while distinguishing between those criminals and
hackers whose acts are most analogous to noncriminal trespass. And we
need educated law enforcement officials who will be able to recognize
and focus their efforts on the real threats.


The question then arises: How do we help our institutions, and
perceptions, adapt? The first step is to articulate the kinds of values
we want to see protected in the electronic society we are now shaping
and to make an agenda for preserving the civil liberties that are
central to that society. Then we can draw on the appropriate legal
traditions that guide other media. The late Ithiel de Sola Pool argued
in his influential book Technologies of Freedom that the medium of
digital communications is heir to several traditions of control: the
press, the common carrier and the broadcast media.


The freedom of the press to print and distribute is explicitly
guaranteed by the First Amendment. This freedom is somewhat limited,
particularly by laws governing obscenity and defamation, but the thrust
of First Amendment law, especially in this century, prevents the
government from imposing "prior restraint" on publications.


Like the railroad networks, the telephone networks follow common-car-
rier principles -- they do not impose content restrictions on the
"cargo" they carry. It would be unthinkable for the telephone company to
monitor our calls routinely or cut off conversations because the
subject matter was deemed offensive.


Meanwhile the highly regulated broadcast media are grounded in the
idea, arguably mistaken, that spectrum scarcity and the pervasiveness
of the broadcast media warrant government allocation and control of
access to broadcast frequencies (and some control of content). Access
to this technology is open to any consumer who can purchase a radio or
television set, but it is nowhere near as open for information
producers.


Networks as they now operate contain elements of publishers,
broadcasters, bookstores and telephones, but no one model fits. This
hybrid demands new thinking or at least a new application of the old
legal principles. As hybrids, computer networks also have some features
that are unique among the communications media. For example, most
conversations on bulletin boards, chat lines and conferencing systems
are both public and private at once. The electronic communicator speaks
to a group of individuals, only some of whom are known personally, in a
discussion that may last for days or months.


But the dissemination is controlled, because the membership is limited
to the handful of people who are in the virtual room, paying attention.
Yet the result may also be "published" -- an archival textual or voice
record can be automatically preserved, and newcomers can read the
backlog. Some people tend to equate on-line discussions with party (or
party-line) conversations, whereas others compare them to newspapers
and still others think of citizens band radio.


In this ambiguous context, freespeech controversies are likely to
erupt. Last year an outcry went up against the popular Prodigy comput-
er service, a joint venture of IBM and Sears, Roebuck and Co. The
problem arose because Prodigy management regarded their service as
essentially a newspaper" or "magazine," for which a hierarchy of
editorial control is appropriate. Some of Prodigy's customers, in
contrast, regarded the service as more of a forum or meeting place.


When users of the system tried to protest Prodigy's policy, its editors
responded by removing the discussion.  then the protestors tried to
use electronic mail as a substitute for electron- assembly,
communicating through huge mailing lists. Prodigy placed a limit on the
number of messages each individual could send.


The Prodigy controversy illustrates important principle that belongs on
civil liberties agenda for the future: freedom-of-speech issues will not
disappear simply because a service provider has tried to impose a
metaphor on its service. Subscribers sense, I believe, that freedom of
speech on the networks is central for individuals to use electronic
communications. Science fiction writer William Gibson once remarked
that "the street finds its own uses for things." Network service pro-
viders will continue to discover that their customers will always find
their own best uses for new media.


Freedom of speech on networks will be promoted by limiting content-based
regulations and by promoting competition among providers of network
services. The first is necessary because governments will be tempted
to restrict the content of any information service they subsidize or
regulate. The second is necessary because market competition is the
most efficient means of ensuring that needs of network users will be
met.


The underlying network should essentially be a "carrier" -- it should
operate under a content-neutral regime in which access is available to
any entity that can pay for it. The information and forum services would
be "nodes" on this network. (Prodigy, like GEnie and CompuServe,
currently maintains its own proprietary infrastructure, but a future
version of Prodigy might share the same network with services like
CompuServe.)


Each service would have its own unique character and charge its own
rates. If a Prodigy-like entity correctly perceives a need for an
electronic "newspaper" with strong editorial control, it will draw an
audience. Other less hierarchical services will share the network with
that "newspaper" yet find their own market niches, varying by format and
content.


The prerequisite for this kind of competition is a carrier capable of
highbandwidth traffic that is accessible to individuals in every
community. Like common carriers, these network carriers should be seen
as conduits for the distribution of electronic transmissions.  They
should not be allowed to change the content of a message or to discrim-
inate among messages.

This kind of restriction will require shielding the carriers from legal
liabilities for libel, obscenity and plagiarism.  Today the ambiguous
state of liability law has tempted some computer network carriers to
reduce their risk by imposing content restrictions. This could be
avoided by appropriate legislation. Our agenda requires both that the
law shield carriers from liability based on content and that carriers
not be allowed to discriminate.


All electronic "publishers" should be allowed equal access to networks.
Ultimately, there could be hundreds of thousands of these information
providers, as there are hundreds of thousands of print publishers
today. As "nodes," they will be considered the conveners of the
environments within which on-line assembly takes place.


None of the old definitions will suffice for this role. For example,
to safeguard the potential of free and open inquiry, it is desirable
to preserve each electronic publisher's control over the general flow
and direction of material under his or her imprimaturQin effect, to give
the "sysop," or system operator, the prerogatives and protections of a
publisher.


But it is unreasonable to expect the sysop of a node to review every
message or to hold the sysop to a publish er's standard of libel.
Message traffic on many individually owned services is already too
great for the sysop to review.  We can only expect the trend to grow.
Nor is it appropriate to compare nodes to broadcasters (an analogy
likely to lead to licensing and content-based regulation). Unlike the
broadcast media, nodes do not dominate the shared resource of a public
community, and they are not a pervasive medium. To take part in a
controversial discussion, a user must actively seek entry into the
appropriate node, usually with a subscription and a password.


Anyone who objects to the content of a node can find hundreds of other
systems where they might articulate their ideas more freely. The danger
is if choice is somehow restricted: if all computer networks in the
country are restrained from allowing discussion on particular subjects
or if a publicly sponsored computer network limits discussion.


This is not to say that freedom-of-speech principles ought to protect
all electronic communications. Exceptional cases, such as the BBS used
primarily to traffic in stolen long-distance access codes or credit-card
numbers, will always arise and pose problems of civil and criminal
liability. We know that electronic freedom of speech, whether in public
or private systems, cannot be absolute. In face-to-face conversation and
printed matter today, it is commonly agreed that freedom of speech
does not cover the communications inherent in criminal conspiracy,
fraud, libel, incitement to lawless action and copyright infringement.


If there are to be limits on electronic freedom of speech, what
precisely should those limits be? One answer to this question is the
U.S. Supreme Court's 1969 decision in Brandenburg v. Ohio.  The court
ruled that no speech should be subject to prior restraint or criminal
prosecution unless it is intended to incite and is likely to cause
imminent lawless action.


In general, little speech or publication falls outside of the
protections of the Brandenburg case, since most people are able to
reflect before acting on a written or spoken suggestion. As in
traditional media, any on-line messages should not be the basis of
criminal prosecution unless the Brandenburg standard is met.


Other helpful precedents include cases relating to defamation and
copyright infringement. Free speech does not mean one can damage a
reputation or appropriate a copyrighted work without being called to
account for it. And it probably does not mean that one can release a
virus across the network in order to "send a message" to network
subscribers. Although the distinction is trickier than it may first
appear, the release of a destructive program, such as a virus, may be
better analyzed as an act rather than as speech.


Following freedom of speech on our action agenda is freedom from unrea-
sonable searches and seizures. The Steve Jackson case was one of many
cases in which computer equipment and disks were seized and held some-
times for months -often without a specific charge being filed. Even when
only a few files were relevant to an investigation, entire computer
systems, including printers, have been removed with their hundreds of
files intact.


Such nonspecific seizures and searches of computer data allow "rummag-
ing," in which officials browse through private files in search of
incriminating evidence. In addition to violating the Fourth Amendment
requirement that searches and seizures be "particular," these searches
often run afoul of the Electronic Communications Privacy Act of 1986.
This act prohibits the government from seizing or intercepting elec-
tronic communications without proper authorization. They also contravene
the Privacy Protection Act of 1980, which prohibits the government from
searching the offices of Dublishers for documents, including
materials that are electronically stored.


We can expect that law enforcement agencies and civil libertarians
will agree over time about the need to establish procedures for
searches and seizures of "particular" computer data and hardware. Law
enforcement officials will have to adhere to guidelines in the above
statutes to achieve Fourth Amendment "particularity" while maximizing
the efficiency of their searches. They also will have to be trained to
make use of software tools that allow searches for particular files or
particular information within files on even the most capacious hard
disk or optical storage device.


Still another part of the solution will be law enforcement's abandonment
of the myth of the clever criminal hobbyist. Once law enforcement no
longer assumes worst-case behavior but looks instead for real evidence
of criminal activity, its agents will learn to search and seize only
what they need.


Developing and implementing a civil liberties agenda for computer net-
works will require increasing participation by technically trained
people. Fortunately, there are signs that this is begining to happen.
The Computers, Freedom and Privacy Conference, held last spring in San
Francisco, along with electronic conferences on the WELL (Whole Earth
'Lectronic Link) and other computer networks, have brought law
enforcement officials, supposed hackers and interested members of the
computer community together in a spirit of free and frank discussion.
Such gatherings are beginning to work out the civil liberties guidelines
for a networked society.


There is general agreement, for example, that a policy on electronic
crime should offer protection for security and privacy on both
individual and institutional systems. Defining a measure of damages
and setting proportional punishment will require further goodfaith
deliberations by the community involved with electronic freedoms, in-
cluding the Federal Bureau of Investigation, the Secret Service, the
bar associations, technology groups, telephone companies and civil
libertarians.  It will be especially important to represent the damage
caused by electronic crime accurately and to leave room for the valuable
side of the hacker spirit: the interest in increasing legitimate under-
standing through exploration.


We hope to see a similar emerging consensus on security issues. Network
systems should be designed not only to provide technical solutions to
security problems but also to allow system operators to use them
without infringing unduly on the rights of users. A security system
that depends on wholesale monitoring of traffic, for example, would
create more problems than it would solve.


Those parts of a system where damage would do the greatest harm --
financial records, electronic mail, military data -- should be
protected. This involves installing more effective computer security
measures, but it also means redefining the legal interpretations of
copyright, intellectual property, computer crime and privacy so that
system users are protected against individual criminals and abuses by
large institutions. These policies should balance the need for civil
liberties against the need for a secure, orderly, protected electronic
society.


As we pursue that balance, of course, confrontations will continue to
take place. In May of this year, Steve Jackson Games, with the support
of the EFF, filed suit against the Secret Service, two individual Secret
Service agents, an assistant U.S. attorney and others.


The EFF is not seeking confrontation for its own sake. One of the
realities of our legal system is that one often has to fight for a legal
or constitutional right in the courts in order to get it recognized
outside the courts. One goal of the lawsuit is to establish clear
grounds under which search and seizure of electronic media is
"unreasonable" and unjust. Another is to establish the clear
applicability of First Amendment principles to the new medium.


But the EFF's agenda extends far beyond liagation. Our larger agenda
includes sponsoring a range of educational initiatives aimed at the
public's general lack of familiarity with the technology and its
potential. That is why there is an urgent need for technologically
knowledgeable people to take part in the public debate over communica-
tions policy and to help spread their understanding of these issues.
Fortunately, the very technology at stake -- electronic conferencing
-- makes it easier than ever before to get involved in the debate.