💾 Archived View for spam.works › mirrors › textfiles › politics › free-spe captured on 2023-11-14 at 11:37:42.

View Raw

More Information

⬅️ Previous capture (2023-06-16)

-=-=-=-=-=-=-







            Note: This file was created by printing Word for Windows
            document files to an ASCII file, using a Generic/Plain Text
            printer driver.  Line breaks and some formatting
            characteristics weren't preserved very well in this
            conversion.

            The author can be reached at the following email address:

                                 rberry@vnet.ibm.com 











                              FREE SPEECH IN CYBERSPACE                              FREE SPEECH IN CYBERSPACE                              FREE SPEECH IN CYBERSPACE


                     The First Amendment and the Computer Hacker                     The First Amendment and the Computer Hacker                     The First Amendment and the Computer Hacker
                                Controversies of 1990                                Controversies of 1990                                Controversies of 1990





                                         by                                         by                                         by

                                   ROBERT R. BERRY                                   ROBERT R. BERRY                                   ROBERT R. BERRY





            A Thesis submitted to the faculty of The University of North
                Carolina at Chapel Hill in partial fulfillment of the
             requirements for the degree of Master of Arts in the School
                        of Journalism and Mass Communication.

                                     Chapel Hill

                                        1991















                                                            Approved by:

                                                Cathy L. Packer, Advisor
                                                     Ruth Walden, Reader
                                                   John Semonche, Reader 


























































                        Copyright (c) 1991 by Robert R. Berry 





                                  Table of Contents



            Chapter 1. New Questions for a New Medium..................1
            Chapter 2. The Net........................................28
            Chapter 3. Hackerphobia...................................52
            Chapter 4. Operation Sun Devil............................79
            Chapter 5. Conclusions...................................115
            Bibliography.............................................128 






                                     CHAPTER ONE:                                     CHAPTER ONE:                                     CHAPTER ONE:

                            New Questions for a New Medium                            New Questions for a New Medium                            New Questions for a New Medium

               Introduction               Introduction               Introduction

               In the spring of 1990, a 20-year-old student at the

            University of Missouri in Columbia was prosecuted in a

            federal court because of something he published.  The

            information he published was true, it was of public concern,

            and it had come to him through legal channels.  Nonetheless,

            the government charged that his publication was part of a

            conspiracy to commit fraud and that his information-

            gathering activities and publication amounted to interstate

            transportation of stolen property.

               Shouldn't the First Amendment have protected Craig

            Neidorf from prosecution?  Unfortunately, the answer to that

            question is unclear because of the technology he used to

            deliver his message.  Neidorf's publication was electronic.

            He created it as text on his computer and distributed it

            over a network to other computer users who read it on their

            video screens.  It went from author to audience without ever

            existing in tangible form.  And the information whose

            publication led to his prosecution -- a document describing

            a telephone system -- came to him through the same channels.

            For the first time, a federal court confronted this

            question: How does the First Amendment apply to computer-

            based communication?

               Craig Neidorf's prosecution was only one part of a

            crackdown on computer crime that in 1990 aroused widespread 






            concern over civil liberties and computer use.  In another

            case, Steve Jackson Games, a small publishing company in

            Austin, Texas, found itself nearly put out of business when

            the Secret Service raided its premises and confiscated its

            computers -- all because the agency suspected it might find

            contraband information on the computers.1

               Was the government casting its net too broadly in its

            campaign against computer crime, infringing on free speech

            in the process?  The events of 1990 demonstrated better than

            any before the confused and uncertain state of the law as it

            applied to computer-based communication.



               The Problems of a New Medium               The Problems of a New Medium               The Problems of a New Medium

               Advances in computer technology over the past decade have

            made computers available to a vast number of people and

            irrevocably changed the way most work is done in this

            country.  The United States Department of Commerce estimated

            in 1988 that as many as 38 million personal computers would

            be installed by 1991, with 28 percent of all American

            households computer-equipped.2  But computers have proved to

            be more than tools for word processing and math;

            increasingly, the computer is a communication tool.


                                

            1See, e.g., Costikyan, "Closing the Net," Reason, Jan. 1991,
             at 22; Kapor, "Civil Liberties in Cyberspace," Scientific
             American, Sept. 1991, at 116.

            2National Technical Information Service, U.S. Dept. of
             Commerce, NTIA Information Services Report (1988), at 27.


                                          2 






               Today, anyone with a computer and a modem3 -- and an

            estimated 19 million modems are currently installed4 --

            possesses the means to communicate with thousands of other

            computer users.  Available services include hundreds of

            commercial online information services such as CompuServe

            and Prodigy.5  These services provide electronic access to

            major news services such as USA Today, Dow Jones and the

            Associated Press.  They also provide their own news, advice

            columns, movie and music reviews, and hundreds of other

            features online.  Syndicated columns from writers such as

            Dave Barry and Mike Royko are available by electronic

            subscription for users who have electronic mail addresses on

            any of the major national computer networks.6  And a

            probably uncountable number of amateur newsletters and

            magazines produced by individuals are distributed

            electronically via computer networks to small lists of

            subscribers.  Electronic bulletin boards7 number as many as

                                

            3A modem is a device used to translate digital computer data
             into electrical signals capable of transmission over
             telephone lines.

            4NTIA Report, supra note 2, at 29.

            5One directory lists 718 online informations services
             worldwide. Cuadra/Elsevier, Directory of Online Databases
             (vol. 12, nos. 1 and 2 (Jan. 1991)).

            6Online advertisement from ClariNet, a service that
             distributes syndicated publications electronically (April
             9, 1991).

            7Bulletin boards are "computer systems that function as
             centralized information sources and message switching
             systems for a particular interest group. Users dial up the


                                          3 






            100,000.8  Available to an increasing number of people at

            constantly shrinking expense, the computer and modem may be

            the 1990s equivalent of the mimeographed handbill.

               Clearly, "the press" no longer requires ink or paper.

            Some of these publications9 are direct electronic analogues

            of magazines, newspapers, newsletters and pamphlets, while

            others are entirely new forms; but none need ever exist on

            paper.  A new medium of mass communication, distinct from

            print but sharing many of its essential characteristics, is

            spreading, and as computers become ever more accessible, its

            continued spread is inevitable.

               Because these forms of communication may be well on their

            way to becoming the dominant ones, it is important that the

            law be ready to accommodate them.  But the existing models

            of media law are inadequate to the task.  Today's system

            divides technologies of communication into essentially three

            tiers of First Amendment protection.10  Most protected are

            traditional print media, newspapers and magazines, which

                                                                        
             bulletin board, review and leave messages for other users
             as well as communicate to other users attached to the
             system at the same time." Freedman, The Computer Glossary
             80 (4th ed. 1989), at 80.

            8L. Wood, D. Blankenhorn, "State of the BBS Nation," Byte,
             Jan. 1990, at 298.

            9Although the technology is new, there can be no doubt that
             these activities are indeed publishing. Black's Law
             Dictionary defines publish as "[t]o make public; to
             circulate; to make known to people in general.  To issue;
             to put into circulation."

            10See, e.g,, De Sola Pool, infra note 18; Becker, infra note
             73, at 829-30.


                                          4 






            enjoy great, though not absolute, freedom from government

            control under the First Amendment.11  The middle ground is

            occupied by the broadcast media, radio and television.

            Although the First Amendment still protects broadcast

            journalists from governmental interference with day-to-day

            editorial decision-making,12 broadcasters are nonetheless

            subject to government licensing and many other requirements

            dictated by the FCC and Congress.13  Least protected by the

            First Amendment -- or most regulated -- are common carriers,

            telephone and other wire communication systems operated by

            companies such as AT&T.  Common carriers operate under

            strict guidelines governing access, rates, even content.

            Because common carriers have almost no control of how their

            facilities are used, however, they are generally immune from

            liability for misuse.14

               None of these legal models can comfortably encompass

            computer-based communication.  The content of such

            communication -- written text -- is most analogous to print,

                                

            11See, e.g., Near v. Minnesota, 283 U.S. 697 (1931); New
             York Times Co. v. Sullivan, 376 U.S. 254 (1964), New York
             Times Co. v. United States, 403 U.S. 713 (1971), Miami
             Herald Publishing Co. v. Tornillo, 418 U.S. 241 (1974).

            12See, e.g., CBS v. Democratic National Committee, 412 U.S.
             94 (1973).

            13See, e.g., Red Lion Broadcasting Co. v. FCC, 395 U.S. 367
             (1969); FCC v. Pacifica Foundation, 438 U.S. 726 (1978).

            14The history of common-carrier regulations, rather than
             being derived from First Amendment law, is descended from
             the regulation of railroads in the nineteenth century. See
             De Sola Pool, infra note 18, at 75-107.


                                          5 






            but because computer networks rely on telephone lines, its

            technological foundation is that of the common carrier.

            Perhaps even more problematic, though, is that this new

            technology just doesn't look like print, and policymakers

            may therefore be hesitant to afford it the same

            protection.15

               Such problems may prevent a major new outlet for free

            expression from achieving its potential.  But the danger may

            be even more significant.  If more traditional technologies

            such as print are replaced by electronic delivery, the First

            Amendment will no longer protect "the press" as it does

            today.



               Literature Review               Literature Review               Literature Review

               The difficulties associated with fitting a new

            communication technology such as computer-based

            communication into existing legal frameworks has not escaped

            legal commentators.  "Electronic publishing," writes former

            White House policymaker Richard Neustadt, "provides square

            pegs to fit into the round holes of old regulatory

            categories."16  And Kim Uyehara writes, "Lawmakers are





                                

            15See, e.g., De Sola Pool, infra note 18, at 197.

            16R. Neustadt, G. Skall, M. Hammer, "The Regulation of
             Electronic Publishing," 33 Fed. Comm. L.J. 331, 332
             (1981).


                                          6 






            having a hard time keeping legislation current with the

            technical explosion."17

               Most writers have taken either a broad approach --

            discussing very generally the legal and social problems of

            new communication technology -- or a very narrow one, asking

            and answering very specific legal questions.  The most

            significant entry in the former category is by Ithiel de

            Sola Pool, whose book Technologies of Freedom,18 cited

            frequently by other authors, seems to be the seminal work in

            the field.  The book is slightly dated as far as the

            technology goes -- 1983 is a long time ago in the world of

            computers -- but its discussion of the underlying issues is

            insightful.

               De Sola Pool's book is more descriptive than analytical,

            concentrating on elucidating the legal problems of new

            communication technology rather than solving them.  It opens

            with a warning:

                    For five hundred years a struggle was fought,
                 and in a few countries won, for the right of
                 people to speak and print freely, unlicensed,
                 uncensored, and uncontrolled.  But new
                 technologies of electronic communication may now
                 relegate such old and freed media such as
                 pamphlets, platforms, and periodicals to a corner
                 of the public forum.  Electronic modes of
                 communication that enjoy lesser rights are moving
                 to center stage.  The new communication
                 technologies have not inherited all the legal
                 immunities that were won for the old.... And so,
                 as speech increasingly flows over those electronic
                                

            17K. Uyehara, "Computer Bulletin Boards: Let the Operator
             Beware," 14 Student Lawyer, April 1986, at 30.

            18I. de Sola Pool, Technologies of Freedom (1983).


                                          7 





                 media, the five-century growth of an unabridged
                 right of citizens to speak without controls may be
                 endangered.19

               De Sola Pool provides a history of communication

            technology, starting with the origins of print20 and

            covering the emergence of electronic media.21  He also

            summarizes the history and current state of modern media

            law, dividing media into regulatory categories; one chapter

            each is devoted to print,22 common carriers,23 and

            broadcasting.24  Additional chapters address the newer

            technologies of cable25 and -- most significantly for the

            purposes of this thesis -- electronic publishing.26  It is

            here that de Sola Pool warns that regulations driven by

            technology may eventually undermine the First Amendment:

                    If computers become the printing presses of the
                 twenty-first century, will judges and legislators
                 recognize them for what they are?... Practices are
                 now being canonized in regard to cable television,
                 computer networks, and satellites which may
                 someday turn out to be directly relevant to
                 publishing.  People then may ask in puzzlement
                 where protections of the free press have gone.27
                                

            19
              Id. at 1.
            20
              Id. at 12-14.
            21
              Id. at 23-54.

            22Id. at 55-74.

            23Id. at 75-107.

            24Id. at 108-150.

            25Id. at 151-188.

            26Id. at 189-225.

            27Id. at 189.


                                          8 






               De Sola Pool makes no specific policy recommendations for

            dealing with these new problems.  Instead, having sounded

            the alarm, he suggests general principles to guide

            policymakers.  He suggests that the First Amendment applies

            equally to all media, that all communication should be

            unfettered by government restriction, and that regulation --

            including common-carriage rules -- should be a last resort

            reserved only for cases of true physical monopoly.28

               De Sola Pool's main message, though, seems to be that

            vigilance may be required to safeguard the First Amendment

            into the future.  "Lack of technical grasp by policy makers

            and their propensity to solve problems of conflict, privacy,

            intellectual property, and monopoly by accustomed

            bureaucratic routines are the main reasons for concern," he

            writes.  "But as long as the First Amendment stands ... the

            loss of liberty is not foreordained."29

               A similarly broad -- and cautionary -- approach is taken

            by law professor M. Ethan Katsh.30  Katsh suggests that new

            communication technologies not only present novel legal

            problems, but "are likely to affect both how we think about





                                

            28Id. at 246.

            29Id. at 251.

            30M.E. Katsh, "The First Amendment and Technological Change:
             The New Media Have a Message," 57 Geo. Wash. L. Rev. 1459
             (1989).


                                          9 






            information and what the relationship is between citizen and

            government."31

               Katsh argues that electronic communication not only

            provides a new physical channel for speech, but changes the

            nature of the information itself:

                    Electronic information is even more active and
                 more easily manipulable, revisable, and changeable
                 [than print].  It is changeable in ways that print
                 is not and, by its very nature, moves much faster.
                 One who looks at words on a computer screen or
                 even at words on paper that have emerged from a
                 "printer" may think that he or she is seeing
                 print, but the static or fixed quality of print is
                 gradually being lost as information is encoded in
                 electronic form.32

               Katsh is not optimistic about the future of First

            Amendment law.  "[D]ifferences in treatment among media can

            be expected to multiply," he writes.  "It is even possible

            that 'full' First Amendment protection, whatever that may

            mean in the future, will not be enjoyed by any medium other

            than, perhaps, the spoken word."33  But he argues that

            despite greater legal restrictions, the power of new

            technologies will diminish the ability of the state to

            impede the flow of information.34  Prior restraint, for

            example, may become virtually impossible as means of




                                

            31Id. at 2.

            32Id. at 13.

            33Id. at 17.

            34Id. at 17.


                                         10 






            publication proliferate.35  Katsh sees in the future a "new

            communications environment," an environment characterized by

            a vigorous system of expression but an unstable and confused

            First Amendment framework.36

               Apart from de Sola Pool and Katsh, few authors appear to

            have tackled the broad issues associated with computer

            communication.  Most have concentrated instead on specific

            legal questions associated with specific media.  Almost

            universally, the authors ask which model of media law can

            apply to these new technologies.  But their analyses

            generally concentrate on very narrow regulatory and

            liability issues rather than the larger First Amendment

            issues involved.  The question of legal models is generally

            answered only to the extent necessary to resolve the narrow

            questions they have tackled.

               Also, most of the existing literature is devoted to

            analysis of one specific form of computer communication, the

            electronic bulletin board system or BBS.  The discussion of

            BBSs is further limited to one particular legal question,

            the liability of the BBS's system operator, or sysop, for

            messages posted by users on the BBS.







                                

            35Id. at 21.

            36Id. at 23.


                                         11 






               Attorney Robert Charles examines the question of sysop

            liability for defamation posted on a BBS.37  Charles uses

            the analogy technique used by virtually every other author

            writing on this subject.  "This question may be answered by

            looking to the standards of liability that have been applied

            to other communication technologies," he writes.38  He then

            divides existing media into two categories based upon their

            legal status in defamation cases: print media, which are

            generally held accountable for defamation, and common

            carriers, which generally are not.39  The exception to that

            common carrier rule is when a common carrier is a "knowing"

            participant in the defamation.40  Charles ultimately

            recommends the formulation in explicit detail of a new,

            clear standard "tailored specifically to computer bulletin

            boards," incorporating the "knowing" test used for common

            carriers.41

               Most writers tackling the sysop liability question

            discuss not defamation but messages related to criminal

            action, mainly computer hacking and other forms of computer



                                

            37R. Charles, "Computer Bulletin Boards and Defamation: Who
             Should Be Liable? Under What Standard?" 2 J. of Law and
             Technology, Winter 1987, at 121.

            38Id. at 123.

            39Id. at 132.

            40Id. at 132-3.

            41Id. at 147.


                                         12 






            crime.42  In particular, phreaking, the theft of long-

            distance telephone service -- usually closely associated

            with hacking -- has been a popular subject of discussion.

            "While bulletin boards are usually not directly involved in

            any of these crimes, they are used to receive and distribute

            information by the computer enthusiasts who commit the

            illegal acts," writes attorney Eric Jensen, who also

            includes distribution of pornography and the formation of

            pedophilia rings among the potential abuses of BBSs.43

               Jensen similarly asks whether earlier models of media law

            can accommodate BBSs.  Dividing older media into the

            categories of publishers, republishers, and common carriers

            -- and choosing republishers as the best analogy to BBSs --

            Jensen ultimately reaches a conclusion much like Charles',

            that sysop liability should be based upon the degree of the

            sysop's participation in the illegal actions.44  He cautions

            that direct regulation of BBSs, because of their nature,



                                

            42The term hacker originally meant a person with great
             technical expertise with computers -- particularly with
             programming -- and for whom computing was an end in
             itself, even an art form. However, it has popularly come
             to mean a person who, through stealing passwords and
             otherwise exploiting security holes, gains unauthorized
             access to computer systems, either maliciously or
             mischievously.  See Chapter 2, notes 36-38 and surrounding
             text.

            43E. Jensen, "An Electronic Soapbox: Computer Bulletin
             Boards and the First Amendment," 39 Fed. Comm. L.J. 217,
             224-226 (1987).

            44Id. at 257.


                                         13 






            would be unenforceable.  Hobbyists could easily "go

            underground," concealing their activities from regulators.45

               Jensen provides one original analogy, what he calls "the

            BBS as an association,"46 a place where "people from all

            across the country gather electronically and exchange views,

            recipes, or epithets, just as would the local Jaycees."47

            Citing NAACP v. Alabama,48 he writes, "As an association

            engaged in speech, a bulletin board is entitled to

            constitutional protection."49

                A slightly different approach to the sysop liability

            question is taken by Edward Di Cato,50 who discusses a more

            recent addition to the list of BBS hazards: the distribution

            of computer viruses.51  Di Cato reaches a familiar

            conclusion -- that a sysop would be liable only for

            "recklessly" allowing a computer virus to spread through a


                                
            45
              Id. at 232-3.

            46Id. at 252.

            47Id.

            48357 U.S. 449 (1958).

            49Id.

            50E. Di Cato, "Operator Liability Associated With
             Maintaining a Computer Bulletin Board," 4 Software L.J.
             147 (1990).

            51A virus is a computer program that is designed to
             replicate itself by attaching itself surreptitiously to
             other programs. Viruses may be fairly harmless, perhaps
             popping up a mischievous message on the screen, or
             destructive -- erasing files from a hard disk or perhaps
             scrambling the disk's data irretrievably.


                                         14 






            BBS.52  He also suggests that sysops could protect

            themselves by exercising tight control over their BBSs,

            verifying users' identities before giving them access.53  He

            further suggests that a disclaimer clearly specifying the

            responsibilities of users and specifically repudiating sysop

            responsibility might further protect sysops from

            liability.54

               The sysop liability question has also been tackled by

            John T. Soma, Paula J. Smith and Robert D. Sprague.55  Their

            article, however, consists mostly of an extensive survey of

            "computer crime" laws, engaging in little First Amendment

            analysis.

               One commentator reaches a conclusion quite different from

            most others on the subject of BBS regulation.  Robert Beall

            examines the liability of sysops for the posting of

            illegally obtained information by phone phreakers.56  In

            asking which model of media law will apply, Beall forces a

            choice between the laws covering newspapers or the laws



                                

            52Di Cato, supra note 50, at 155.

            53Id. at 156.

            54Id. at 157.

            55J. Soma, P. Smith, R. Sprague, "Legal Analysis of
             Electronic Bulletin Board Activities," 7 W. New Eng. L.
             Rev. 571 (1985).

            56R. Beall, "Developing a Coherent Approach to the
             Regulation of Computer Bulletin Boards," 7 Computer/Law
             Journal 499 (1987).


                                         15 






            covering telephone service;57 he ends up choosing elements

            of each.  He agrees with other commentators that a sysop may

            not be liable without affirmative involvement in the illegal

            activity.58  While he seems to favor strong First Amendment

            protection for BBSs, he is not satisfied with the resulting

            lack of protection against phreaking activity.  He therefore

            proposes a full-fledged system of licensing of BBSs by the

            FCC, with licensees required to adhere to certain rules in

            order to retain or renew their licenses.59  However, he

            would rely upon the private sector for enforcement of these

            rules; telephone companies, for instance, would be expected

            to monitor BBSs for stolen credit card numbers.60

               Besides the BBS, the only other related communication

            media that have received significant attention in the legal

            literature are the similar technologies of teletext and

            videotex.   Teletext is a form of electronic text delivered

            by television stations to subscribers' TV sets, either via

            broadcasting or cable hookups but as part of a conventional

            television signal.  Teletext presents a series of pages, or

            frames, of text, from which the subscriber may select using

            a special keypad.61  Videotex is a similar service,

                                

            57Id. at 509-10.

            58Id. at 504-5.

            59Id. at 513-15.

            60Id. at 516.

            61Freedman, supra note 7, at 689.


                                         16 






            delivered to customers' TV sets via telephone lines.62

            Neither service has been implemented on a large scale in the

            United States, but despite their obscurity, they have

            received much attention from legal commentators.

               Jeffrey Hurwitz devotes his attention to teletext,

            particularly broadcast teletext.63  He suggests that the

            FCC's 1983 decision not to regulate teletext -- reasoning

            that it is an "ancillary service" not subject to the

            regulations applied to regular TV programming -- was

            incorrect.64  Teletext, like traditional broadcasting, he

            felt should be content regulated -- subject to the Fairness

            Doctrine,65 the "equal opportunity" rule and the "reasonable

            access" rule.66  Exempting teletext from such content

            regulations provides an easy avenue for circumventing the

            purpose of such regulations as applied to broadcasting, he

            writes.67  Perhaps most troubling, however, is his argument

            that the FCC, more than anything else, has simply

            misconstrued the clear language of the statutes and


                                

            62Id. at 735.

            63J. Hurwitz, "Teletext and the FCC: Turning the Content
             Regulatory Clock Backwards," 64 Boston Univ. L. Rev. 1057
             (1984).

            64Id. at 1057.

            65The Fairness Doctrine, no longer FCC policy, was still
             applied to broadcasters when Hurwitz wrote his article.

            66Hurwitz, supra note 63, at 1083.

            67Id. at 1098.


                                         17 






            regulations in question.68  Hurwitz's arguments suggest that

            the existing statutes could pose a threat to the freedom of

            computer communication.

               Another writer, Richard Hindman, has a markedly different

            view of teletext.69  "The first amendment," he writes,

            "protects the right of every person to participate in the

            marketplace of ideas."70  Most of Hindman's article is

            devoted to an analysis of a consent decree that currently

            bars telecommunications giant AT&T from entering the

            teletext business.71  However, Hindman's comments about the

            First Amendment issues underlying teletext regulation are

            insightful:

                    The history of broadcast and cable regulation
                 suggests that as new communication technologies
                 become available Congress and the courts will fail
                 to fully comprehend how the first amendment limits
                 government authority to regulate.  In fact, at
                 first, the courts will attempt to characterize
                 users of the new medium as someone other than a
                 speaker entitled to full first amendment
                 protection or, as a speaker entitled to some
                 lessor [sic] protected right.... [U]ntil a new
                 technology becomes familiar in its own right,
                 courts generally attempt to impute the regulatory
                 baggage of an existing medium, leaving unresolved
                 the difficult constitutional issues.72

                                

            68Id. at 1083-1094.

            69R. Hindman, "The Diversity Principle and the MFJ
             Information Services Restriction: Applying Time-Worn First
             Amendment Assumptions to New Technologies," 38 Catholic
             Univ. L. Rev. 471 (1989).

            70Id. at 471.

            71U.S. v. AT&T, 552 F.Supp. 131 (D.C. Cir. 1982).

            72Id. at 494-5.


                                         18 






               Lynn Becker, in her survey of the confused state of the

            law regarding teletext and videotex, agrees that the

            technology of delivery should not be the decisive factor in

            deciding its regulatory status.73  "A preferable

            alternative," she writes, "would be to view all electronic

            publishing as a single communications medium regardless of

            the method of transmission.... The basis for distinguishing

            between typeset and electronically transmitted

            communications is not viable in 1985.  The regulatory

            underpinnings are without merit."74  Instead, she calls for

            the design of a new legal framework designed to accommodate

            the new media and to recognize their true nature.  "[T]he

            new media must be viewed according to their function rather

            than through their methods of distribution.... When viewed

            in this manner, the regulatory mandate is clear: Congress

            shall make no laws abridging ... the freedom of the

            press."75

               What conclusions emerge from this body of literature?

            It is clear that analogy to older media has been the method

            of choice for deciding the legal status of computer

            communication, whether BBS, teletext or videotex.  Almost

            every author divides existing media into regulatory

                                

            73L. Becker, "Electronic Publishing: First Amendment Issues
             in the Twenty-First Century," 13 Fordham Urban L.J. 801
             (1985).

            74Id. at 866.

            75Id. at 868.


                                         19 






            categories, generally classifying print media as most immune

            to regulation but most vulnerable in liability cases and

            common carriers as most regulated but generally immune to

            liability, with broadcasters in the middle.  With only a

            couple of exceptions -- Beall's scheme of licensing BBSs and

            Hurwitz's argument in favor of content regulation for

            teletext -- the authors are opposed to governmental

            regulation of electronic publishing.  However, the authors

            devote themselves to answering narrow questions, questions

            either of BBS sysop liability or of the regulatory status of

            two obscure technologies, teletext and videotex.

               In the literature there seems to be agreement on several

            specific questions.  First, BBS sysops should be held liable

            for messages on their boards only when they are in some way

            involved with or aware of the illegality.  Second, a new

            legal framework may be necessary to accommodate these media.

            And third, the First Amendment does apply to computer-based

            communication.

               Missing from most of the literature is recognition of a

            serious First Amendment threat or an attempt to discover the

            specific sources of that threat.  With the exception of De

            Sola Pool's forward-looking book and Katsh's philosophical

            article, most authors seem to perceive only technical legal

            difficulties.  While most authors conclude, or even assume,

            that the First Amendment applies to computer communication,

            they do not seem to see implications for the mainstream of

            First Amendment law.  Computer-based communication is


                                         20 






            portrayed either as something still far in the future or as

            a "niche" medium of interest only to computer hackers and

            scientists.  It is depicted as only peripheral to the speech

            the First Amendment is intended to protect.

               In fact, however, such electronic communication is in use

            today by a vast number of people with diverse interests,

            using inexpensive and readily available technology.  It is

            already a significant and important forum for speech on

            almost every conceivable topic.  The way in which this

            medium is used indicates that it is not peripheral to First

            Amendment "core speech."  It should be considered in the

            mainstream of First Amendment-protected expression.  If

            computer-based media are to become a dominant channel for

            information delivery in the future, it is vitally important

            that the decisions made today regarding the treatment of

            these media be the right ones.



               Objectives               Objectives               Objectives

               Perceptions of a threat to the First Amendment freedoms

            of computer-based communication have come not from codified

            policies -- of which there are few -- but from de facto

            policies emerging from an unsettled and chaotic area of law.

            These de facto policies are, in turn, the product of

            precedent-setting events such as the Craig Neidorf and Steve

            Jackson cases and other controversies of 1990.

               Krasnow, Longley and Terry, in their book The Politics of

            Broadcast Regulation, begin their analysis with the idea


                                         21 






            that "there is no such thing as 'government regulation';

            there is only regulation by government officials."76  In

            other words, particularly with a medium as new as this one,

            attention is best directed not toward codified regulations

            but rather toward the attitudes and agendas of the people

            who will create them -- people both in and out of the

            government.  The legal treatment of any new technology will

            ultimately be a product of political pressures, different

            players with different agendas pushing in different

            directions.  The result will depend upon whose voice is

            heard most strongly.

               The embryonic field of computer-communication law is

            characterized by several different facets of government and

            the private sector influencing policy formation.  These

            include Congress, which has responded primarily to economic

            pressures related to computer crime, but has passed statutes

            incidentally affecting computer communication; the courts,

            which only recently and at the lowest levels have been asked

            to recognize constitutional protection for computer

            communication; and law enforcement agencies, which have

            caused the most visible controversies by enforcing computer

            crime laws zealously and without evident regard for free

            speech.  Other entities exerting an influence on the

            policymaking process include the computer-user community,

                                

            76Krasnow, Longley, and Terry, The Politics of Broadcast
             Regulation 9 (citing Loevinger, The Sociology of
             Bureacracy, 24 Business Lawyer 9 (1968)) (3d ed. 1982).


                                         22 






            particularly the "computer underground" and the hacker

            subculture, which have been the focus of the recent

            controversies; and the Electronic Frontier Foundation, a

            political action group founded to protect the civil

            liberties of computer communicators.

               This thesis will examine the political development of de

            facto policies affecting the First Amendment freedoms

            associated with computer-based communication, particularly

            during the important events of 1990.  It will examine the

            legislative history of the relevant federal statutes and the

            events surrounding the important cases, including those of

            Craig Neidorf and Steve Jackson, and the Secret Service's

            "Operation Sun Devil," and attempt to identify the roles of

            the major players in this process.



               Research Questions and Methodology               Research Questions and Methodology               Research Questions and Methodology

               The specific research questions addressed by this thesis

            are:

               1) Does a threat to the freedom of computer-based               1) Does a threat to the freedom of computer-based               1) Does a threat to the freedom of computer-based

            communication represent a threat to the core meaning of the            communication represent a threat to the core meaning of the            communication represent a threat to the core meaning of the

            First Amendment?            First Amendment?            First Amendment?

               In order to answer this question, this thesis will first

            explore the nature of computer-based communication as it is

            used today.  After an overview of the technology that makes

            such communication possible, it will examine the way in

            which this medium is used.  It will demonstrate that

            computer-based communication is a vital and important


                                         23 






            medium, and that users of this medium are members of a

            community engaged in "core speech" deserving of the highest

            constitutional protection.

               2) Who are the important players involved in the               2) Who are the important players involved in the               2) Who are the important players involved in the

            controversies of 1990 and the formation of computer-            controversies of 1990 and the formation of computer-            controversies of 1990 and the formation of computer-

            communication policy and what are their roles?            communication policy and what are their roles?            communication policy and what are their roles?

               The thesis will then examine in detail the important

            cases of 1990 and the events surrounding them in an attempt

            to discover the role of each major player involved.  The

            players themselves will be identified, and the contribution

            of each will be evaluated.  This will include an exploration

            of the legislative history of the statutes involved in these

            cases, as well as factual accounts from news media and other

            sources of the events surrounding the 1990 controversies.

            Source documents, including legislative debates,

            indictments, written court opinions, search warrant

            affidavits, briefs and policy statements will provide

            insight into the motives and objectives of each player.

               3) Based upon the roles of the players involved, what is               3) Based upon the roles of the players involved, what is               3) Based upon the roles of the players involved, what is

            the general direction of the law?            the general direction of the law?            the general direction of the law?

               From this analysis should emerge an overall picture of

            the regulatory atmosphere, the degree of the First Amendment

            threat and what the future may hold for these new media.



               Organization               Organization               Organization

               Chapter Two will describe the technological foundation of

            today's computer-based communication media in order to


                                         24 






            define terms and concepts important to this topic.  It will

            briefly describe the way in which these media are used, in

            order to establish that a genuine outlet for First

            Amendment-protected speech is involved.  It will also

            introduce the culture of computer hackers, which plays an

            important part in events described later.

               Chapter Three will examine the legislative history of the

            computer crime laws that served as the authority for the

            hacker crackdown of the late 1980s and 1990.  This chapter

            will study the role of Congress as a regulatory player and

            will also reveal the early involvement of two other players

            that figure prominently in later events: computer hackers

            and law enforcement.

               Chapter Four will discuss in detail the major cases of

            1990 and the surrounding events that have been the focus of

            the recent controversies over First Amendment freedoms and

            computer communication.  These events demonstrate the

            involvement of four important players in this regulatory

            process: computer hackers, law enforcement agencies, the

            courts and the Electronic Frontier Foundation.

               Chapter Five will summarize and discuss the preceding

            material and will attempt to identify the direction of the

            law based upon the roles of the involved players.



               Limitations               Limitations               Limitations

               Some legal aspects of this new communication technology,

            while important, will not be included in this thesis.


                                         25 






               First, any examination of computers and civil liberties

            seems to include a discussion of privacy.  Computers provide

            new ways of collecting and retrieving information about

            individuals, and many civil libertarians see this use of

            computers as a threat to privacy.  However, privacy law will

            not be a part of this thesis.

               Second, the communication of data by electronic

            transmission introduces a host of new and difficult

            questions of copyright and patent.  While these questions

            are intriguing, they could themselves be the basis of

            another thesis.  While the law of intellectual property

            plays a part in some of the cases involved in this area,

            extended discussion of copyright or patent law is beyond the

            scope of this thesis.

               Third, where this thesis discusses computer-crime laws,

            it will limit such discussion to the federal statutes

            involved in the hacker-crackdown controversies of 1990.

            Consequently, state computer-crime laws, of which there are

            many, will not be discussed.



               A Note About Sources and Citations               A Note About Sources and Citations               A Note About Sources and Citations

               Because of the nature of this topic, a large number of

            the sources used in this thesis are themselves electronic

            publications, or are source documents made available through

            electronic means.  Citation of such documents is

            problematic, as conventional citation forms are not readily

            adaptable to nonprinted sources.  In this thesis, citation


                                         26 






            of an electronic document will provide complete

            identification of the publication and the source through

            which it was obtained.  Because electronic publications do

            not generally have page numbers, citation to a specific

            passage in an electronic document will give the line number

            in the file.












































                                         27 






                                     CHAPTER TWO:                                     CHAPTER TWO:                                     CHAPTER TWO:

                                        The Net                                        The Net                                        The Net

               This chapter will explore the nature of today's computer-

            based media, both technological and cultural, in order to

            lay the foundation for the discussion that follows.

               The first section will describe the technological

            foundation of computer-based communication.  In order to

            understand many aspects of this topic, and to appreciate the

            culture of computer users, it is necessary first to

            understand the media through which communication takes

            place.  Such an understanding requires a certain amount of

            technical explanation.  However, the minute technical

            details of computer networking are less important than an

            appreciation of the vast variety and immense power of the

            technology.

               The second section will examine the way in which these

            media are used today.  This will include general

            descriptions and examples of the types of communication that

            take place via computer-based media.

               The final section will be a brief introduction to the

            culture of computer hackers, a group that has played a

            continuing and important role in the development of policy

            in this area. 






               The Technology               The Technology               The Technology1

               Several kinds of technological media exist through which

            computer-based communication takes place.  These can

            generally be grouped into three categories: the computer

            bulletin board system (BBS), the online information service

            and the computer network.  There is considerable overlap

            between these categories, and within each category there is

            much variation in implementation.  Nonetheless, meaningful

            distinctions can be made between these types of systems and

            the way in which they operate.

               Bulletin Board Systems (BBSs)               Bulletin Board Systems (BBSs)               Bulletin Board Systems (BBSs)

               At the low end of the technological and economic scale is

            the computer bulletin board system or BBS.  Typically, a BBS

            is operated on a single personal computer, often in a spare

            bedroom or corner of the home of the system operator

            (sysop).  Such a BBS is usually operated strictly as a

            hobby, and no fee is charged for access (though some BBSs

            may charge a small fee to help defray costs).  The only

            equipment required to operate a BBS is a computer, BBS

            software,2 a modem and a telephone line.  In some cases the


                                

               1Much of the information in this section comes from the
            author's own experience.  Where this information has been
            supplemented by external sources, or where such sources
            might provide additional useful information, citations are
            given.

               2BBS packages include TBBS (The Bread Board System),
            Wildcat! and Searchlight.  Many BBS packages are shareware
            (see infra note 7), bringing the cost of operating a BBS
            even lower.


                                          29 






            BBS will not even have its own telephone line but will share

            the sysop's home or business line (and consequently may be

            available only during certain hours).

               The idea of a computer system publicly available for

            posting messages goes back at least to 1973 when a project

            called Community Memory went online in San Francisco.  A

            project of a group of progressive computer enthusiasts,

            Community Memory was a system consisting of a mainframe3

            computer connected to a dedicated teletype terminal placed

            in a record store (a second terminal was added later).  The

            system functioned much like the message base of a modern

            BBS, allowing anyone who wanted to use it to leave a message

            that could be viewed by others.4

               The first true BBS appeared in January of 1978 when two

            members of a Chicago computer club called CACHE (Chicago

            Area Computer Hobbyist Exchange) came up with the idea of

            using a computer to help the club members share information

            that had previously been posted on a real bulletin board.

            The system, called the CACHE Bulletin Board System/Chicago

            or CBBS/Chicago, was strictly a message board and ran on



                                

               3A mainframe is a large computer with abundant processing
            power.  The term is usually used to distinguish such large
            computers from personal computers such as the IBM PC or the
            Apple Macintosh.  Technically, before the advent of such
            small computers in the late 1970s, all computers were
            mainframes.  See Freedman, The Computer Glossary 434 (4th
            ed. 1989).

               4S. Levy, Hackers 155-58, 167-80 (Paperback ed. 1984).


                                          30 






            software the two men, Randy Seuss and Ward Christensen,

            designed over a weekend.  The program was freely distributed

            and widely adapted, and before long BBSs sprang up all over

            the country.5

               Today, many different BBS software packages offer

            different features, but certain functions are common to

            virtually all BBSs.  After logging on to the BBS by

            providing a user name and a password,6 a caller is usually

            presented with a menu of BBS functions from which to choose.

            These generally include bulletins, electronic mail (e-mail),

            message areas, file downloads and perhaps other features

            such as online games.

               Bulletins, e-mail and the message areas are all forms of

            electronic communication between BBS users.  Bulletins are

            text files, usually prepared by the sysop and usually

            containing information about the operation of the BBS

            itself.  They inform the user of BBS rules and regulations,

            the history of the BBS, scheduled down time and other


                                

               5Petersen, "Whether for Gabbing or Gobbling Facts,
            Computer Bulletin Board Systems Have Taken Wing," Chicago
            Tribune, Mar. 16, 1989, at sec. 5, p. 2; Balz, "Signing On
            to the World of Computer Bulletin Boards," Chicago Tribune,
            May 30, 1986, at 53.

               6The user name or user ID may be the caller's real name
            or a "handle."  Systems that allow handles will usually also
            require the user to provide his real name so the sysop can
            verify his identity, even though the handle may be all that
            other users will see.  The password, chosen by the user, is
            the BBS's primary means of maintaining security.  Users are
            usually advised to select a password that would not be easy
            to guess and not to write the password anywhere.


                                          31 






            information of general interest.  Bulletins are often

            displayed automatically to first-time callers, and some BBSs

            require that callers read certain bulletins before full

            access is granted.

               E-mail is a private form of communication between two

            users.  An e-mail note will be addressed to a specific

            person, using that person's user name, and will not be

            visible to anyone else (except perhaps the sysop).  When the

            user to whom the note is addressed logs on, he will usually

            be notified right away that he has mail waiting.  He can

            then read any e-mail notes waiting for him and reply if he

            chooses to.

               The heart of most BBSs is the "message base."  Generally,

            a BBS will have a number of message areas divided by topic.

            Unlike e-mail notes, these messages are visible to any

            caller.  These message areas are public discussion forums

            where any reader is free to jump in at any time.

               In addition to these forms of communication, information

            may also be published via the file download section.

            Ordinarily, a BBS's file collection consists mostly of

            public-domain and shareware7 software, but it may also


                                

               7Shareware is a method of software distribution in which
            copies of a software product may be freely distributed
            through BBSs and other means, allowing users to try the
            software before deciding to buy it.  If the user chooses to
            continue using the software beyond a certain trial period,
            he is expected to register it by sending a fee to the
            program's author.  In exchange for registering, the user
            will typically receive printed documentation, upgrade


                                          32 






            contain text files.  These files might be extracts from

            threads8 in the message areas, instructional articles,

            electronic newsletters, fiction, poetry or virtually any

            other form of written material.

               Information Services               Information Services               Information Services

               Similar in concept to the BBS, but very different in

            scale, is the online information service.  Unlike most BBSs,

            the information service is a commercial enterprise,

            operating on a subscription or membership basis and charging

            a fee for access, usually an hourly rate.  Such a service is

            much larger than a BBS, operating on a mainframe computer

            (or even an array of mainframe computers).  Furthermore, the

            information service supports hundreds or even thousands of

            simultaneous callers and is available nationally, or even

            internationally, through local telephone calls.

               Major online information services in the United States

            include CompuServe, Prodigy, GEnie, The Source and BIX.  Of

            these, the largest and most familiar is probably CompuServe,

            a subsidiary of H&R Block.  CompuServe has over half a






                                                                        


            notices, technical support and perhaps a more fully
            functional version of the software.

               8A thread is "a more or less continuous chain of postings
            on a single topic." Online Jargon File, version 2.9.6
            (distributed via the Internet,  Aug. 16, 1991), at line
            15707.


                                          33 






            million members9 who pay an hourly rate ($12.50 in 1991) to

            use the service.  Like a BBS, CompuServe features e-mail,

            file libraries and message areas organized by topic.

            However, these areas are so large and so numerous that books

            exist for the sole purpose of helping one navigate them.

            CompuServe also offers many special online services (some of

            which cost an additional surcharge); users can make airline

            reservations, search online databases, invest in the stock

            market and shop in an "electronic mall" while online.10

            Other online information services offer similar assortments

            of services.

               The Internet and Usenet               The Internet and Usenet               The Internet and Usenet

               In terms of the number of users and the volume of

            traffic, the largest component of the online community is

            probably the international network of mainframe computers

            generally referred to as the Internet.  Originally called

            ARPANet, this "network of networks" was originally developed

            in 1969 by the U.S. Defense Advanced Research Projects

            Agency (DARPA) to connect university computers to one

            another.  The first national computer network, it was

            intended as a means of sharing resources among academic

            researchers.  During its first year the network had only




                                

               9CompuServe Inc., CompuServe Information Manager Users
            Guide 2 (1989).

               10See Compuserve Inc., Compuserve Almanac (5th ed. 1989).


                                          34 






            four nodes,11 a number that grew to 25 by 1973.  By the

            1980s, however, the network had begun to grow exponentially,

            and as access became more widely available its usage

            broadened to include general-purpose communication.12  As of

            July 1991, 535,000 nodes were connected to the Internet.13

            Estimates suggest that the network serves as many as two

            million individual users.14

               Connected to the Internet is another international

            network, the diverse and vital Usenet.  Usenet is a

            "volunteer" network in that it has no central authority or

            governing body.  The only requirement for operating a Usenet

            node is finding another node willing to provide a

            connection.15

               Usenet began as the idea of two students at Duke

            University in 1979, and the first two Usenet sites were




                                

               11A node is "a computer system used as a junction or
            connection point in a communication network." Freedman,
            supra note 3, at 482.  In simple terms, a node is simply one
            of the computers connected to a network.  In the case of the
            Internet, however, an individual node may actually be a
            gateway to another entire network.  See infra note 24.

               12Hafner and Markoff, Cyberpunk: Outlaws and Hackers on
            the Computer Frontier 278-80 (1991).

               13"ACM Forum," Communications of the ACM, Nov. 1991, at
            21-22 (letter from Mark Lottor, SRI International, Network
            Information Systems Center).

               14Hafner and Markoff, supra note 12, at 280.

               15Cerf, "Networks," Scientific American, Sept. 1991, at
            50.


                                          35 






            called unc (at the University of North Carolina) and duke.16

            As of October 1991 Usenet had an estimated 40,000 sites and

            served 1,902,000 active users.17

               Usenet provides e-mail services as well as a set of

            public discussion forums called newsgroups.  A newsgroup is

            simply a series of messages, called articles, related to a

            particular topic.  A user with access to Usenet can post an

            article to a newsgroup, and that article will then be

            propagated to all other Usenet sites carrying that

            newsgroup.  Although there is no authority mandating

            adherence to any rules regarding newsgroup administration, a

            set of conventions has emerged regarding the creation of

            newsgroups and their arrangement within standard

            hierarchies.  Any newsgroup created without adherence to

            these conventions is unlikely to be carried by other

            sites.18

               The standard newsgroup hierarchies include, among others,

            rec, for recreational topics; comp, for computer-related





                                

               16Each node on a network must have a unique name to
            identify it.  This name is used as part of the network
            addressing used to route e-mail and other data to the node.
            Network convention is to give the name of a node in lower
            case.

               17Usenet Readership Summary Report for October 91 (text
            file distributed via Usenet, Nov. 2, 1991).

               18G. Spafford, What Is Usenet? (text file distributed via
            Usenet, Sept. 9, 1991), at line 243.


                                          36 






            topics; and soc, for social topics.19  Hence a newsgroup for

            discussing dogs is called rec.pets.dogs.  There are also a

            number of "alternative" newsgroup hierarchies that do not

            generally follow the standard rules, but are nonetheless

            carried by a large number of systems (though not

            universally).20

               Other national or international mainframe networks

            include Bitnet, which connects educational institutions, and

            Milnet, which connects American military installations.

               BBS Networks               BBS Networks               BBS Networks

               In addition to the nationwide (and worldwide) mainframe

            networks, the 1980s also saw the emergence of several

            networks connecting small BBS systems to one another.  The

            oldest and largest is FidoNet, which began as a pair of BBSs

            in Baltimore that had the capability of exchanging messages.

            As other systems were added, it grew into a nationwide

            network.21  Today FidoNet has more than 11,000 nodes.22

               A caller to a FidoNet BBS will usually find two different

            groups of message areas.  One contains the local message



                                

               19G. Spafford, List of Active Newsgroups (text file
            distributed via Usenet, July 25, 1991).

               20G. Spafford, Alternative Newsgroup Hierarchies, (text
            file distributed via Usenet, Sep. 9, 1991).

               21Dvorak and Anis, Dvorak's Guide to PC
            Telecommunications 96-7 (1990).

               22"FidoCon91 -- 408 Attend Biggest BBS Bash Ever,"
            Boardwatch Magazine, Oct. 1991, at 13.


                                          37 






            base, those messages available only to callers of the same

            BBS.  The other area contains the FidoNet message areas, or

            echoes, which are the messages shared through the FidoNet

            network.  Generally, a FidoNet BBS will go offline once per

            day, usually at night, and during that time will connect to

            neighboring FidoNet boards.  The BBSs will exchange

            messages, and in that way a message posted to a FidoNet echo

            will eventually be propagated to every FidoNet board.

               Other BBS networks include Alternet, Eggnet and

            PCBoard.23

               Gateways               Gateways               Gateways

               As systems become more interconnected, the distinctions

            between BBSs, information services and national networks

            become less important to the user.  Today gateways24 exist

            between virtually all of these networks and information

            services.  A user with an account on any of these systems,

            therefore, can send electronic mail through these gateways

            to a user on any of the others.  A CompuServe subscriber,

            for instance, can address an e-mail message in such a way

            that it will be transmitted through an Internet gateway to a

            FidoNet node.




                                

               23Dvorak and Anis, supra note 21, at 100.

               24A gateway is "a computer that connects two different
            communication networks together.  The gateway will perform
            the protocol conversions necessary to go from one network to
            the other." Freedman, supra note 3, at 307.


                                          38 






               The effect of this is the creation of a single, vast

            network, connecting users from all walks of life and

            virtually every geographic location.  Indeed, many users do

            not distinguish between the Internet, Usenet and other

            networks; instead, the entire global complex of

            interconnected computer networks is often referred to simply

            as "The Net."25  A computer hobbyist with an account on a

            FidoNet BBS or a privately-owned Usenet node can participate

            in an online community populated by scientists, college

            students, professionals, government employees and others

            across the globe.  This virtual world,26 existing not in

            physical space but in the electronic realm of computer

            networks, is sometimes called cyberspace.27



               The Culture               The Culture               The Culture

               Originally, mainframe networks such as the Internet were

            created to provide a means by which scientists could share

            technical information.28  Likewise, BBSs originally existed

            to provide specialized groups of people with a medium

            through which they could exchange information.  But the way


                                

               25E.g., Godwin, "The First on a New Frontier," The Quill,
            Sept. 1991, at 19.

               26In computer science, virtual describes a "simulated or
            conceptual environment and, as a result, may refer to
            'virtually' anything."  Freedman, supra note 3, at 735.

               27Hafner and Markoff, supra note 12, at 9.

               28Id. at 280.


                                          39 






            in which these media are used today goes far beyond mere

            information sharing.  Instead, computer networks and the

            systems they comprise have become a means of association, a

            community not bound by geography.  In this virtual

            community, people from all over the world meet and associate

            with others who share their interests, all without ever

            seeing one another.

               Naturally, much of the discussion that takes place

            through these media is on the subject of computers.  But a

            surprising amount is nontechnical in nature.  On Usenet, for

            instance, none of the five most popular newsgroups are

            computer-related.29  Instead, Usenet newsgroups provide a

            forum for discussing sex, Star Trek, movies, Indian culture,

            cooking, politics, law, country music, and any other topic

            of enough interest to inspire the creation of a newsgroup.30

               A thread on a Usenet newsgroup might begin with an

            article like this one from rec.music.country.western:

                 From: uuwayne@venus.lerc.nasa.gov (Wayne Stopak)
                 Newsgroups: rec.music.country.western
                 Subject: Keith Whitley
                 Date: 7 Nov 1991 12:44 EDT



                                

               29The five most popular newsgroups as of October 1991
            were alt.sex, rec.humor.funny, misc.jobs.offered, rec.humor
            and rec.arts.erotica.  Top 40 Newsgroups In Order By
            Popularity, text file distributed via Usenet, November 2,
            1991.

               30As of July 25, 1991, there were 569 newsgroups in the
            standard hierarchies, as well as 655 in "alternative"
            hierarchies, for a total of 1,224.  Spafford, supra notes 19
            and 20.


                                          40 





                 I have only been listening to country music for a
                 little while now
                 on W.G.A.R. in Cleveland.  They play some Keith Whitley
                 that I
                 like, namely, I'M NO STRANGER TO THE RAIN and DON'T
                 CLOSE YOUR
                 EYES.  I know that he is no longer alive.  Does anyone
                 know when
                 or how he died?  How old was he?31

               To which the following response might appear:

                 From: warnock@nssdca.gsfc.nasa.gov (Archie Warnock)
                 Newsgroups: rec.music.country.western
                 Subject: Re: Keith Whitley
                 Date: Fri, 8 Nov 1991 14:15:00 GMT

                 <'scuse me, guys - I'll handle this...>

                 Keith died of alcohol poisoning in May of 1989 at the
                 age of 34.
                 "Don't Close Your Eyes" was the song of the year for
                 1988, and
                 just a glimmer of what we'd have gotten from him, had
                 he lived.32

               Of course, Usenet newsgroups are not limited to

            recreational topics.  Many newsgroups are devoted to

            political discussions,33 as shown by these examples from two

            threads in the newsgroup talk.politics.misc:

                 From: enbal@tamu.edu (James L. Heilman)
                 Subject: Pat Buchanan and David Duke
                 Date: 18 Nov 91 21:42:06 GMT


                                

               31Article posted to Usenet newsgroup
            rec.music.country.western on November 7, 1991.  Newsgroup
            articles have been edited slightly for cosmetic reasons, but
            errors in grammar and spelling -- arguably part of the
            unique flavor of Usenet -- have been left intact.

               32Article posted to Usenet newsgroup
            rec.music.country.western on Nov. 8, 1991.

               33These include talk.politics.drugs,
            talk.politics.mideast, talk.politics.soviet,
            talk.politics.theory, soc.politics,
            alt.politics.homosexuality, and others.


                                          41 





                 Newsgroups: talk.politics.misc

                 Given the fact that Pat Buchanan and David Duke will
                 likely run
                 for president, a columnist recently wrote that for
                 George Bush to
                 get elected, he must run to the right of Buchanan and
                 to the left
                 of Duke.  Sounds like a Bozo sandwich to me.  As to the
                 remarkably
                 high voter turnout in Louisiana, George Will stated on
                 This Week
                 With David Brinkley that the way to increase voter
                 turnout in the
                 U.S. is to run a crook against a Nazi.


                 From: bard@cutter.ssd.loral.com (James Woodyatt)
                 Newsgroups: talk.politics.misc,alt.censorship
                 Subject: Re: Censorship of 'Doonesbury'
                 Date: 19 Nov 91 01:43:37 GMT

                 In article <1991Nov17.014025.527@desire.wright.edu>,
                 demon@desire.wright.edu (Enemy of Totalitarianism)
                 writes:

                 > Great, if you want to play word games, then we'll
                 play along:
                 > Newspapers have every right to censor their
                 publication.
                 > Newspapers are exercising their right to censor their
                 > publication.  Newspapers ARE NOT CENRSORING Mr.
                 Trudeau.
                 > In the context of the censorship of Mr. Trudeau,
                 there is no
                 > censorship.  He can continue to spout his views, he
                 can talk to
                 > people in the street, pass out leaflets, get
                 published in
                 > sympathetic newspapers, but freedom of speech does
                 not garauntee
                 > access to any and all printed material.  It protects
                 individuals
                 > and organizations from being prevented from airing
                 their
                 > views in a public forum, which is not happening to
                 Mr. Trudeau.
                 > He can not force people to listen to him, or to print
                 his views.
                 > Let him start his own newspaper if he wants to repeat
                 lies.

                 Oh, if only it were so bloody simple. It's not.



                                          42 





                 The San Jose Metro wanted to print the strips that the
                 San Jose
                 Mercury News wouldn't run, so they went to United Press
                 Syndicate
                 and told them what they wanted to do. UPS said it was
                 fine with
                 them as long as the Merc, which has exclusive rights to
                 print
                 Doonesbury in the South Bay Area here, signed a waiver
                 allowing
                 the Metro to print the strips that the Merc wouldn't.
                 The Merc
                 refused saying that their intention was to prevent the
                 strip from
                 being read in the South Bay.

                 Tell me with a straight face that is not censorship. It
                 is not
                 illegal. It can be argued that it is not even immoral
                 on its face.
                 But it is certainly censorship.

                 > But they do not send people around to the sources
                 saying "don't
                 > try to publish anywhere else, either".  That's why
                 this form of
                 > "censorship" is more commonly known as "editing".

                 The S.J. Mercury News effectively "edited" the strips
                 out of all the papers in the South Bay area.34

               The decentralized and uncontrolled nature of Usenet

            permits disagreements between participants to become quite

            heated.  This is probably exacerbated by the fact that

            posters may forget social niceties when communication is not

            face to face.  A personal attack on another poster is called

            a flame, and flaming is one of the hazards of life on the

            network.




                                

               34Articles posted to Usenet newsgroup talk.politics.misc
            on Nov. 18 and 19, 1991.  In a reply to another article, net
            convention is to place the ">" symbol to the left of quoted
            passages from the article being replied to.


                                          43 






               Electronic Magazines               Electronic Magazines               Electronic Magazines

               BBS message areas and Usenet newsgroups are propagated to

            many people and are themselves a form of publishing.  But

            even closer analogies exist to conventional, printed media

            such as newsletters and magazines.  Numerous electronic

            magazines and newsletters are published regularly and

            distributed to subscribers via computer.

               Bitnet, the mainframe network connecting educational

            institutions, features a number of electronic journals and

            magazines.  These include academic journals covering topics

            such as computers, psychology, medicine and education; they

            also include magazines of fiction, music reviews and

            environmental issues.35

               BBSs also feature a number of online publications.

            Boardwatch, a magazine devoted to news related to BBSs and

            online services, is published monthly in both printed and

            online formats; it can be found both on newsstands and on

            BBSs that subscribe to it.  Another magazine, Info-Mat, is

            published only electronically and covers general computer-

            industry news.  FidoNet BBSs carry Fido News, a newsletter

            covering FidoNet and BBS topics.







                                

               35Bitnet Servers (text file distributed via Bitnet); see
            also E. Parker, "Computer Conferencing Offers Boundless
            Geography, Time," Journalism Educator, Winter 1991, at 49.


                                          44 






               The Hacker Culture               The Hacker Culture               The Hacker Culture

               An important subset of the culture of "the Net" is what

            has been called the computer underground, particularly the

            "hacker" subculture.  Chiefly because of its prominent

            involvement in cases and controversies that have contributed

            to the development of policies affecting free speech, this

            part of the online community warrants special consideration.

               To discuss computer hackers, it is necessary first to

            explain what is meant by the term.  The word hacker has many

            different meanings and is used differently by different

            groups.  The online Jargon File, an extensive lexicon of

            hacker slang distributed via computer networks, defines the

            word hacker thus:

                    [originally, someone who makes furniture with
                 an axe] n. 1. A person who enjoys exploring the
                 details of programmable systems and how to stretch
                 their capabilities, as opposed to most users, who
                 prefer to learn only the minimum necessary.  2.
                 One who programs enthusiastically (even
                 obsessively) or who enjoys programming rather than
                 just theorizing about programming.  3. A person
                 capable of appreciating {hack value}.  4. A person
                 who is good at programming quickly.  5. An expert
                 at a particular program, or one who frequently
                 does work using it or on it; as in 'a UNIX
                 hacker'.  (Definitions 1 through 5 are correlated,
                 and people who fit them congregate.)  6. An expert
                 or enthusiast of any kind.  One might be an
                 astronomy hacker, for example.  7. One who enjoys
                 the intellectual challenge of creatively
                 overcoming or circumventing limitations.  8.
                 [deprecated] A malicious meddler who tries to
                 discover sensitive information by poking around.
                 Hence 'password hacker', 'network hacker'.36



                                

               36Jargon File, supra note 8, at line 8397.


                                          45 






               The word hacker originated in the early computer labs at

            MIT in the late 1950s.  Originally, it did not even

            necessarily involve computers but referred generally to a

            person who derived pleasure from mastering complex

            technological systems (such as the telephone network or even

            a subway system).  Soon, however, the word came to mean a

            person who compulsively programmed a computer, usually

            ingeniously, and did so for its own sake rather than to

            achieve any goal (other than the program itself).37

               More recently, however, the word has most commonly been

            understood to mean a person who gains unauthorized access to

            computer systems.  This has been the preferred usage in the

            mainstream media, although in computer-enthusiast circles

            this meaning is often frowned upon.  The word cracker,

            according to the Jargon File, was coined in the mid-1980s to

            take this meaning in an attempt to stave off the distortion

            of hacker brought about by the popular press.38  Cracker is

            not widely understood outside hacker circles but is used

            within that culture.

               To some degree, the ambiguity of the word hacker is

            unavoidable.  The two senses are not mutually exclusive: An

            "unsavory" hacker (a cracker) is also a hacker in the

            classic sense, a person who enjoys exploring and mastering



                                

               37See generally Levy, supra note 4.

               38Jargon File, supra note 8, at line 4725.


                                          46 






            the complex systems of computers and telecommunications.

            Therefore, while all hackers might not break into computer

            systems, it is not generally inaccurate to apply the word

            hacker to someone who does.

               Despite the potential ambiguity, this thesis will use the

            word hacker mainly in its popular sense: a person who, using

            stolen passwords or other security breaches, gains

            unauthorized access to a computer system.  Most available

            sources use the word in this sense, and continual shifting

            of terminology would not be useful.  However, it is

            necessary first to discuss the elements of hacker culture

            that are common to all hackers, crackers and "classic"

            hackers alike.  In this context, where such distinctions are

            necessary, the word cracker will be used to specify a hacker

            who breaks into computer systems.

               That computer hackers have a culture all their own seems

            beyond question.  The introduction to the Jargon File

            explains the justification for a lexicon of hacker

            terminology:

                    The 'hacker culture' is actually a loosely
                 networked collection of subcultures that is
                 nevertheless conscious of some important shared
                 experiences, shared roots, and shared values.  It
                 has its own myths, heroes, villains, folk epics,
                 in-jokes, taboos, and dreams.  Because hackers as
                 a group are particularly creative people who
                 define themselves partly by rejection of 'normal'
                 values and working habits, it has unusually rich








                                          47 





                 and conscious traditions for an intentional
                 culture less than 35 years old.39

               The history and evolution of this culture was traced by

            Steven Levy in his book Hackers: Heroes of the Computer

            Revolution (1984).  The beliefs and values of the hacker

            culture Levy summed up in what he called the "Hacker Ethic":

                    Access to computers -- and anything which might
                 teach you something about the way the world works
                 -- should be unlimited and total....

                    All information should be free....

                    Mistrust Authority -- Promote
                 Decentralization....40

               Ideas such as these help to explain the motivations of

            modern crackers as they break in to computer systems "just

            to look around" and attempt to wrest control of large

            systems away from their owners.

               More recently Gordon Meyer, a sociology student at

            Northern Illinois University, examined the social

            organization of the computer underground.41  Meyer defines

            the computer underground as including not only hackers

            (crackers) but also phone phreaks, people who obtain and use

            unauthorized information about the telephone system, and

            pirates, people who collect and trade illegitimate copies of




                                

               39Id. at line 55.

               40Levy, supra note 4, at 40-41.

               41G. Meyer, The Social Organization of the Computer
            Underground, unpublished master's thesis, Northern Illinois
            University, Aug. 1989.


                                          48 






            commercial software.42  These groups are related and,

            especially in the case of phone phreaks and hackers,

            overlapping.43

               While the ethics of hackers and phreakers might be

            questioned, their attitudes seem clearly descended from

            Levy's "Hacker Ethic" and motivated not by malice, but by a

            desire for knowledge:

                    The phone system is the most interesting,
                 fascinating thing that I know of.  There is so
                 much to know....

                    Phreaking involves having the dedication to
                 commit yourself to learning as much about the
                 phone system/network as possible.  Since most of
                 this information is not made public, phreaks have
                 to resort to legally questionable means to obtain
                 the knowledge they want.44

               Meyer's study demonstrates that the computer underground

            exhibits characteristics of a loosely organized social

            group, including association, sharing of information and

            socialization, all through the media of BBSs and computer

            networks.45  This degree of contact between individuals,

            together with the existence of specialized language and

            conduct, indicate clearly that the computer underground is






                                

               42Id. at 25.

               43Id. at 28.

               44Phreaker quoted by Meyer, id. at 29.

               45Id. at 63.


                                          49 






            truly a culture.46  But this culture is dependent upon

            computer-based communication for its existence.



               Conclusions               Conclusions               Conclusions

               It is beyond question that this medium falls squarely

            within the Supreme Court's definition of "the press": "The

            press in its historical connotation comprehends every sort

            of publication which affords a vehicle of information and

            opinion."47

               Rather than a "niche" medium of interest only to

            scientists, or a medium of only potential value to society

            at large, computer-based communication is used today by

            countless thousands of people to engage in speech at the

            very heart of that protected by the First Amendment.

            Furthermore, the ready availability of the technology means

            that anyone with a few hundred dollards and the desire to do

            so can become a "publisher" with a potential audience of

            vast size.  "The new computer-based forums for debate and

            information exchange," writes attorney Mike Godwin, "are

            perhaps the greatest exercise of First Amendment freedoms

            this country has ever seen."48  Unencumbered by the

            governmental regulation and financial barriers associated



                                

               46Id. at 76.

               47Lovell v. City of Griffin, 303 U.S. 444, 452 (1938).

               48Godwin, supra note 25, at 18.


                                          50 






            with other media -- few people can afford to own a newspaper

            or broadcast station --  computer-based communication

            represents the epitome of a "robust and wide-open" debate.49

            It is also a medium that has spawned its own unique culture,

            and it is that culture's primary means of First-Amendment-

            protected communication and association.

































                                

               49"[W]e consider this case against the background of a
            profound national commitment to the principle that debate on
            public issues should be uninhibited, robust, and wide-open,
            and that it may well include vehement, caustic, and
            sometimes unpleasantly sharp attacks on government and
            public officials."  New York Times Co. v. Sullivan, 376 U.S.
            254 (1964), at 270.


                                          51 






                                    CHAPTER THREE:                                    CHAPTER THREE:                                    CHAPTER THREE:

                                     Hackerphobia                                     Hackerphobia                                     Hackerphobia

               Recent controversies involving computers and the First

            Amendment have been the culmination of a conflict that has

            been building since at least the early 1980s.  It was then

            that the activities of computer hackers first came to the

            attention of Congress, leading eventually to the passage of

            laws addressing the perceived problem and opening the door

            to the kind of zealous prosecution that came later.

               The important computer crime legislation passed by

            Congress during the 1980s consisted of the Counterfeit

            Access Device and Computer Fraud and Abuse Act of 1984,

            later amended by the Computer Fraud and Abuse Act of 1986.1

            The 1984 act, part of an omnibus crime bill, was aimed

            primarily at credit card fraud, but also established new

            computer crime offenses.  It created several new offenses

            for unauthorized access to a "federal interest computer"2

            resulting in at least $5,000 or more in illegal gains,

            unauthorized access to classified government data, or

            unauthorized access to confidential financial data.  The

            1986 act made some technical adjustments to the wording of



                                

               118 U.S.C. S1029, 1030 (1988).

               2A federal interest computer is defined in the act as a
            computer used by the government or a federally insured
            financial institution or a computer used in committing an
            offense involving computers in more than one state.  18
            U.S.C. S1030(e)(2) (1988). 






            these offenses and added two new ones: one for "malicious

            damage" involving access to a federal interest computer, and

            one proscribing trafficking in stolen passwords.

               These laws only incidentally affected free speech by

            providing law enforcement agencies with broad new authority

            to prosecute computer crime.  In order to understand whether

            that authority has been abused, it is necessary first to

            identify Congress's intentions.

               By examining the committee hearings held throughout the

            1980s on the subject of computer crime, this chapter will

            identify the attitudes and concerns that contributed to

            these computer crime laws.  It will examine the roles not

            only of the legislators themselves, but also of witnesses

            from the industry, law enforcement community and hacker

            culture.



               Government Takes Notice               Government Takes Notice               Government Takes Notice

               The number and variety of information services and other

            forms of computer-based communication available in this

            country suggest a vigorous and almost totally free medium of

            expression.  But this freedom has been the freedom of a

            frontier -- only fairly recently have government regulators

            begun to notice what goes on in the virtual world.  Writer

            John Perry Barlow (a cofounder of the Electronic Frontier

            Foundation) has drawn comparisons between the "electronic

            frontier" of cyberspace and the Old West:




                                          53 





                    Cyberspace, in its present condition, has a lot
                 in common with the 19th Century West.  It is vast,
                 unmapped, culturally and legally ambiguous,
                 verbally terse (unless you happen to be a court
                 stenographer), hard to get around in, and up for
                 grabs.  Large institutions already claim to own
                 the place, but most of the actual natives are
                 solitary and independent, sometimes to the point
                 of sociopathy.  It is, of course, a perfect
                 breeding ground for both outlaws and new ideas
                 about liberty.3

               It was only a matter of time before government at some

            level became interested in the activities associated with

            computer communication.  In the words of policy analyst Eli

            Noam, "The problems involving the increased computerization

            of society are somewhat analogous to those that occurred

            with the advent of the automobile.  The car was a wonderful

            thing until we discovered that it produced something called

            pollution.  Then we had to do something about it, or we were

            going to choke on its fumes."4  In the case of computer

            communication, the "pollution" that first drew the attention

            of regulators was computer hacking.



               WarGames               WarGames               WarGames

               Widespread public awareness of computer hacking can be

            traced to 1983 and the release of the movie WarGames, which

            tells the story of David Lightman, a high-school student who

            breaks into a military computer and nearly starts World War


                                

               3Barlow, "Crime and Puzzlement," Whole Earth Review, Fall
            1990, at 45.

               4Daly, "Group Tries Taming 'Electronic Frontier,'"
            Computerworld, Mar. 25, 1991, at 77.


                                          54 






            III.5  Lightman, trying to reach a game company's system,

            accesses a fictitious Defense Department computer called the

            WOPR (War Operations Planned Response, pronounced

            "whopper"), which has just been given direct control of the

            nation's nuclear missiles.  Playing what he thinks is a

            game, Lightman initiates a program that brings the world to

            the brink of nuclear war.

               The movie, while entertaining, depicts events ranging

            from highly unlikely to utterly impossible -- in the words

            of one expert, "nothing more than very interesting

            fantasy."6  Despite its implausibility, however, the movie

            contributed to a heightened awareness of computer security

            issues.7

               Only months after the release of WarGames, the FBI, with

            much publicity, arrested a group of young computer hackers

            from Minneapolis who called themselves the 414s (after their

            telephone area code).  Over the course of several months,

            they had broken into numerous computer systems ranging from

            military computers at the Los Alamos National Laboratory to


                                

               5MGM/UA 1983.

               6Computer and Communications Security and Privacy:
            Hearings Before the Subcommittee on Transportation, Aviation
            and Materials of the Committee on Science and Technology,
            House of Representatives, 98th Cong., 1st Sess. (1983)
            (statement of Stephen Walker, president, Trusted Information
            Systems, Inc.)

               7See, e.g., McLellan, "The Hacker's Bane," Inc., Dec.
            1983, at 55; Heins, "Foiling the Computer Snoops," Forbes,
            Nov. 21, 1983, at 58.


                                          55 






            a medical records system at the Memorial Sloan-Kettering

            cancer research hospital.8  The hackers had apparently been

            inspired at least partly by WarGames, although their

            activities had begun prior to the film's release.9  They had

            done no damage to most of the systems they had infiltrated,

            though files were erased on a few.  Certainly no real danger

            of the sort depicted in WarGames ever existed.10

            Nonetheless, the arrests seemed to confirm the fears that

            movie had created.

               The cumulative effect of WarGames and the arrests of the

            414s was to catapult hacking into the public eye.  It seemed

            that hacking -- which had, in one form or another, been

            around for decades -- was no longer as harmless as it may

            once have been.  Society's increasing dependence on

            computers was a new vulnerability.  Arizona prosecutor Gail

            Thackeray, a key player in the later Operation Sun Devil,

            returned to the Old West analogy to describe this feeling:

                    Out here in the Wild West, when it was just a
                 few settlers on the land, frontier justice had its
                 place.... You could rustle up wild horses, have
                 Saturday night shoot-'em-ups, do whatever you
                 wanted.  But as the West became more settled,
                 there were still a few guys who wanted to go out


                                

               8See, e.g., Markoff, "Teen Hackers' Antics Prompt House
            Hearing," InfoWorld, Nov. 7, 1983, at 26; DeWitt, "The 414
            Gang Strikes Again," Time, Aug. 29, 1983, at 75.

               9Gillard and Smith, "Computer Crime: A Growing Threat,"
            Byte, Oct. 1983, at 398.

               10See, e.g., Alpern and Lord, "Preventing WarGames,"
            Newsweek, Sep. 5, 1983, at 48.


                                          56 





                 and have shoot-'em-ups on Saturday night.  But now
                 they also wanted to shoot at the telegraph poles.
                 And as the shooters began to attack things the
                 community valued, the community acted to protect
                 its rights.11

               It was not long before Congress responded to this sudden

            awareness of the threats of hacking in a computer-dependent

            society.  Several committees in the House of Representatives

            and the Senate began holding hearings on computer crime.12

            All shared a recognition of the pervasiveness of computers

            in American society and the drawbacks associated with that

            pervasiveness, as illustrated by Rep. Dan Glickman's (D-

            Kansas) remarks at one of the earliest hearings, in the fall

            of 1983:

                    We are in an era where we cannot live without
                 computers.  Now, of course, we must learn to live
                 with them.  But have we lost control?  Have we
                 created a monster?  Are we, in effect, the modern-
                 day Dr. Frankenstein?  Do we have a technical
                 problem or is there an ethical problem?  And I
                 suspect the answer is probably both.13







                                

               11Bromberg, "In Defense of Hackers," The New York Times
            Magazine, April 21, 1991, at 45.

               12These included the Subcommittee on Civil and
            Constitutional Rights and the Subcommittee on Crime of the
            House Judiciary Committee, the Subcommittee on
            Transportation, Aviation and Matterials of the House
            Committee on Science and Technology, the Subcommittee on
            Health and the Environment of the House Energy and Commerce
            Committee, and the Subcommittee on Oversight of Government
            Management of the Senate Governmental Affairs Committee.

               13Computer and Communications Security and Privacy, supra
            note 6, at 2.


                                          57 






               To illustrate the danger, the subcommittee then proceeded

            to watch an excerpt from WarGames.14

               When that subcommittee issued its report a few months

            later, among its findings were that computers were pervasive

            in American society; that they represented "assets of

            incalculable value"; and that their vulnerability presented

            "a problem of national significance."15  But its

            recommendations were not drastic: It suggested that Congress

            charter a national commission to gather more information on

            the subject and to ultimately recommend a policy

            framework.16  And seemingly recognizing that more was at

            stake than just computer crime, the report said that the

            commission should consider not only the vulnerabilities of

            "critical national systems," but should also take into

            account "the implications of technological innovation on

            government, society and the individual."17

               The Subcommittee on Civil and Constitutional Rights of

            the House Judiciary Committee held a hearing in late 1983 to

            explore the question of whether a federal law would be an



                                

               14Id. at 13.

               15Computer and Communications Security and Privacy:
            Report Prepared by the Subcommittee on Transportation,
            Aviation and Materials, Transmitted to the Committee on
            Science and Technology, House of Representatives, 98th
            Cong., 2d Sess. (1984), at 1.

               16Id.

               17Id.


                                          58 






            appropriate remedy to this potential epidemic of computer

            crime.18  Rep. Glickman advised the committee members that

            the subject was more complicated than they thought, though

            he stopped short of suggesting a First Amendment problem:

                    [This subject] goes far beyond the issue of
                 whether there ought to be a Federal crime against
                 accessing illegally a computer of somebody else's
                 system.  It involves privacy issues, it involves
                 management questions both in the private sector
                 and in the Federal Government.... I would tell you
                 that with technology changing so dramatically,
                 electronic mail, a variety of things, I would just
                 urge you to be somewhat cautious in how you
                 proceed in this area.19

               The onward march of technology was at the heart of the

            problem: It was evident that the government was ill-equipped

            to deal with a technology it didn't understand.  Rep. Dan

            Mica (D-Florida) reported that the committee's legislative

            drafting service was having difficulty drafting a computer-

            crime bill because it didn't have any attorneys

            knowledgeable about computers.20  "We have to grope and we

            have to patch and paste from [existing law], and there isn't

            much," he said.  "It is all new ground."21





                                

               18Computer Crime: Hearing Before the Subcommittee on
            Civil and Constitutional Rights of the Committee on the
            Judiciary, House of Representatives, 98th Cong., 1st Sess.
            (1983).

               19Id. at 3.

               20Id. at 10.

               21Id.


                                          59 






               "Falling Through The Cracks"               "Falling Through The Cracks"               "Falling Through The Cracks"

               What were the objectives of legislators as they

            approached this new form of crime?  Why did they feel that a

            new federal law was called for?  The basic idea seemed to be

            that computer criminals would somehow "fall through the

            cracks" between existing laws covering fraud, theft and

            embezzlement.22  Rep. Bill Nelson (D-Florida) summed up the

            concern:

                    [T]here is [a] new kind of criminal that is
                 lurking in the shadows of criminal activity.  He
                 is a highly sophisticated criminal.  He is a high-
                 technology criminal, and he is one who, when faced
                 by the Nation's prosecutors, often find they do
                 not have the adequate tools to prosecute.23

               Support for this statement, however, seemed lacking.

            Prosecutors at several hearings testified about their

            experience with computer crime, and universally, they had

            succeeded in prosecuting every case they had pursued.  An

            FBI witness listed crimes committed by computer in terms of

            the existing statutes under which they were already being

            prosecuted: wire fraud, interstate transportation of stolen

            property, bank fraud and embezzlement, destruction of

            government property, and theft of government property.24



                                

               22Computer Crime, supra note 18, at 3-5.

               23130 CONG. REC. H7632 (daily ed. July 24, 1984)
            (statement of Rep. Nelson).

               24Id. at 24 (statement of Floyd I. Clarke, Deputy
            Assistant Director, Criminal Investigative Division, Federal
            Bureau of Investigation).


                                          60 






            "We in the FBI have not had, to date, any significant

            problems in prosecution of computer related crime under

            already existing statutes over which we have jurisdiction,

            such as the Fraud by Wire Statute."25  Indeed, although

            prosecutors expressed fears about the difficulty of

            prosecuting computer crime under existing laws, there were

            many examples provided at the hearings of computer crimes

            that had been successfully prosecuted.26

               Nonetheless, the FBI and other law-enforcement witnesses

            went on record as supporting new laws to prevent potential

            future problems.  One prosecutor who had been involved in

            successful computer-crime prosecutions summed up this

            attitude: "It is my view that any additional tool that can

            assist the prosecutor, albeit one that has not so far been

            needed, is not something that I would turn down."27

               Victoria Toensing, a federal deputy assistant attorney

            general, explained in more detail:

                    I am quite certain that sooner or later, we are
                 going to run into some factual situations where we
                 cannot slip the step-sister's foot into


                                

               25Ibid.

               26See, e.g., Computer Crime, supra note 18, at 15-17
            (statement of Rep. Coughlin) (youths who stole $100,000 in
            merchandise by computer and were successfully prosecuted);
            at 18-19 (statement of John Keeney, Deputy Assistant
            Attorney General, Criminal Division, Department of Justice)
            (two "difficult" cases nonetheless prosecuted under existing
            law).

               27Id. at 25 (statement of William Block, Assistant U.S.
            Attorney for the District of Columbia).


                                          61 





                 Cinderella's slipper, and we will need a statute
                 that really covers computer fraud....
                    I stress that this is a potential problem
                 because so far at least we have been able to
                 prosecute computer fraud cases under existing
                 statutes.28



               The "Hacker Threat"               The "Hacker Threat"               The "Hacker Threat"

               The hearings also revealed that, despite the excitement

            caused by WarGames and the 414s, the hacker threat was not

            great.  Several witnesses, including 414 hacker Neal

            Patrick,29 testified that the most rudimentary of security

            precautions would have prevented their break-ins.  Asked if

            it was possible for hackers to do extensive damage, Patrick

            responded, "I think it is.  But I also think it's very easy

            to prevent that.  There is no need for million-dollar

            security measures, but just commonsense ideas and attitudes

            would prevent most of this, if not all of this, from

            happening."30  Robert Morris, a prominent computer security

            expert who had worked with the National Security Agency,

            agreed:

                    The notion that we are raising a generation of
                 children so technically sophisticated that they
                 can outwit the best efforts of the security


                                

               28Computer Fraud Legislation: Hearing Before the
            Subcommittee on Criminal Law of the Committee on the
            Judiciary, U.S. Senate, 99th Cong., 1st Sess. (1985), at 34-
            5 (statement of Victoria Toensing, Deputy Assistant Attorney
            General, Criminal Division, Department of Justice).

               29Computer and Communications Security and Privacy, supra
            note 6, at 17.

               30Id. at 19.


                                          62 





                 specialists of America's largest corporations and
                 of the military is utter nonsense.  I wish it were
                 true.  That would bode well for the technological
                 future of the country.... These kids appear to be
                 having fun and, in most cases, the techniques
                 involved, the techniques required have almost no
                 sophistication whatever.  They are the moral
                 equivalent of stealing a car for joy riding
                 purposes when the keys have been left in the
                 ignition.31

               By and large, most legislators seemed to understand this

            -- that the success of hackers such as the 414s was due

            almost entirely to poor password control and other lax

            security procedures.32  And they were reassured by

            government witnesses that rigorous security measures made

            sensitive national-security data such as that at Los Alamos

            impervious to access by outsiders.33  Nonetheless, many

            seemed to favor a "brute force" approach to solving the

            immediate problem:

                    I have learned that this problem is largely the
                 result of poor and/or lax computer security.
                 However, until computer security is improved and
                 installed I believe we owe it to our citizenry to
                 protect those records and the vital information
                 which is so stored.  This protection can best be
                 afforded with a federal statute ...34



                                

               31Computer and Communications Security and Privacy, supra
            note 6, at 507 (statement of Robert Morris).

               32See, e.g., Computer Crime, supra note 18, at 7
            (statement of Rep. Glickman).

               33Computer and Communications Security and Privacy, supra
            note 6, at 34 (statement of Jimmy McClary, Division Leader
            for Operation Security and Safeguards Division, Los Alamos
            National Laboratory).

               34Computer Crime, supra note 18, at 17 (statement of Rep.
            Coughlin (R-Pennsylvania)).


                                          63 






               Others continued to believe that hackers were a serious

            threat to American businesses and to national security.

            Legislators spoke of the "underground culture of people

            known as computer hackers who continuously try to defeat the

            security measures programmed into modern computers."35  But

            attempts to uncover a hacker conspiracy capable of bringing

            down the entire national infrastructure were unsuccessful.

            Rep. William Carney (R-New York) asked hacker Neal Patrick

            if he was aware of any "professional groups" of hackers who

            worked to break into computers for personal gain.  When

            Patrick said no, Carney reminded him of TAP, which he

            described as "an organization [with] bulletins, letters, and

            communications back and forth."36  In fact, TAP was not an

            organization at all, but a four-page newsletter

            (Technological Assistance Program) providing technical

            information of interest to hackers.37  Rep. Glickman asked

            witness Donn Parker, who described himself as a hacker (but

            not of what he called the "unsavory" variety), if there was

            a "hackers organization,"38 to which Parker said no.  Parker

            went on to say that he had been approached by military


                                

               35Computer and Communications Security and Privacy, supra
            note 6, at 2.

               36Id. at 21.

               37Hafner and Markoff, Cyberbunk: Outlaws and Hackers on
            the Computer Frontier 20-21 (1991).

               38Computer and Communications Security and Privacy, supra
            note 6, at 81.


                                          64 






            officials who were also concerned about organized hacker

            conspiracies:

                    I was paid a visit by some of the Office of
                 Special Investigations of the Air Force on this
                 exact concern of theirs.... [I]n the future what
                 they were concerned about was sort of a type of an
                 electronic Messiah, a charismatic figure being
                 able to rally the unsavory hacker forces together,
                 and in effect direct them towards the penetration
                 -- organized penetration -- of computer systems.39

               The potential danger from such an "electronic Messiah" --

            or in Rep. Glickman's words, "a 21st century Adolf Hitler"40

            -- was evidently perceived as great.  One study cited by

            Parker had tackled the question of whether computer crime

            could bring about "national collapse" in the United States.

            While the study's conclusion was negative, it said that

            great damage could still be done; and Parker added that many

            experts disagreed with the conclusion and felt that the

            nation had already reached "a critical stage of

            vulnerability."41

               Despite these fears, it became clear as the hearings

            progressed that hackers generally were merely mischievous

            rather than malicious.  As one witness cautioned, "You don't

            want to lock up some kid who is just fooling with his

            computer and all of a sudden he is guilty of a felony and




                                

               39Id.

               40Id.

               41Id. at 77.


                                          65 






            you have an obligation to go after him, like in that movie

            we saw."42

               Most legislators seemed ultimately to conclude that the

            real threat was not from hackers at all, but from a less

            spectacular source: employees and others who already had

            authorized access and misused it.43



               Exaggerated Fears: The "WarGames Scenario"               Exaggerated Fears: The "WarGames Scenario"               Exaggerated Fears: The "WarGames Scenario"

               There remained those, however, whose fear of computers

            and of mysterious, shadowy hackers -- perhaps reinforced, or

            even caused, by WarGames -- led to a tendency to exaggerate

            the danger of hackers.  Legislators couldn't resist the

            temptation to compare real-life hacking incidents to

            WarGames, despite assurances that the events in the film

            were impossible.  While certainly there may have been a real

            computer-crime problem, that problem -- fraud perpetrated by

            insiders -- was in reality less spectacular and exciting.

            And legislators tended to see grave problems where there

            were, at best, only potential problems.

               This tendency is perhaps best illustrated by the hearings

            and debates surrounding one of the post-WarGames computer-


                                

               42Computer Crime, supra note 18, at 28 (statement of Mr.
            Edwards).

               43See, e.g., Computer Crime, supra note 18, at 49-50
            (statement of James F. Falco, Assistant State Attorney,
            Consumer Fraud and Economic Crime Division, Eleventh
            Judicial Circuit of Florida); Computer and Communications
            Security and Privacy, supra note 15, at 4.


                                          66 






            crime bills.  The Medical Computer Crime Act of 198444 was a

            response to the 414s' computer break-in at the Memorial

            Sloan-Kettering cancer research center45 and was designed to

            provide medical institutions specific legal recourse to help

            protect their computerized medical records.  This break-in

            was a popular example of the "hacker problem," and it was

            frequently cited as having been a "life-threatening"

            incident.46

               At a hearing in April 1984,47 the Subcommittee on Health

            and the Environment of the Committee of Energy and Commerce

            of the House of Representatives explored the supposedly

            pervasive problem of illegal access to medical records.

            Despite this supposed pervasiveness, however, witness Robert

            Coburn -- whose company provided computer services to

            hospitals -- could cite only two examples of illegal access

            to hospital computers.  One was the 414s' Sloan-Kettering








                                

               44H.R. 4954, 98th Cong. (1984).

               45132 CONG. REC. H9262 (daily ed. Oct. 6, 1986)
            (statement of Rep. Wyden).

               46See, e.g., Computer Crime, supra note 18, at 12
            (statement of Rep. Mica).

               47Health and the Environment Miscellaneous -- Part 4:
            Hearings Before the Subcommittee on Health and the
            Environment of the Committee  of Energy and Commerce, House
            of Representatives, 98th Cong. (1984).


                                          67 






            break-in.  The other was in an episode of the television

            show St. Elsewhere.48

               Furthermore, while the St. Elsewhere break-in did result

            in a patient's death, the Sloan-Kettering incident was

            decidedly less exciting.  "This situation demonstrated the

            potential for a War Games scenario to occur, albeit on a

            less dramatic scale in the hospital setting," Coburn

            testified.  "We understand that the data base that was

            accessed and tampered with at Sloan Kettering was actually

            billing data, and therefore probably did not pose a life-

            threatening situation."49

               When asked if he was aware of any other such break-ins,

            Coburn's answer was probably not what the committee wanted

            to hear:

                    In discussions with various hospitals around
                 the country, we have not been able to find
                 evidence of other similar instances of medical
                 computer crime.  We have noted that as hospitals
                 are becoming more technologically sophisticated,
                 they are recognizing the need to safeguard their
                 data from this possibility by instituting ... more
                 sophisticated security measures on the computer
                 systems themselves.50

               Several witnesses, while favoring the bill, spoke only of

            a potential problem.  Coburn explained, "We are not aware

            that the problem is as yet widespread or pervasive.  As you


                                

               48Id. at 350 (statement of Robert W. Coburn, President,
            Commons Management Group).

               49Id.

               50Id.


                                          68 






            have indicated, however, it is a potentially disastrous

            situation...."51  Another witness predicted that

            "[p]otential problems will become real problems.

            Unauthorized tampering with medical records will result in

            incorrect -- and possibly life threatening -- changes in

            treatment."52  But none cited any incidents where this had

            already happened.

               Indeed, witness Meryl Bloomrosen of the American Medical

            Record Association testified that "[i]t is unlikely that

            unauthorized access and tampering with information such as

            that used for billing would result in interference with the

            patient's treatment."53

               The consensus seemed to be that only the potential for a

            problem existed, and the Sloan-Kettering break-in appeared

            to be the only case anyone knew about of an actual illegal

            access to a hospital computer.  Furthermore, it became clear

            that even the Sloan-Kettering break-in did not threaten

            lives.  A report from the hospital submitted for another

            hearing explained that

                 [i]n no way did any of the tampering affect the
                 treatment of patients receiving radiation therapy.




                                

               51Id. at 355 (emphasis added).

               52Id. at 423 (statement of Robert B. Conaty, on behalf of
            American Hospital Association).

               53Id. at 427 (statement of Meryl Bloomrosen, on behalf of
            American Medical Record Association).


                                          69 





                 Only the accounting information -- billing records
                 to [hospitals using the system] -- was affected.54

                 Hacker Neal Patrick of the 414s, testifying at that

            same hearing, agreed that only "doctor's bills, where ...

            doctors would be billed for services or would be billed for

            the time that he used" on the computer system had been

            accessed.55

               Despite all this, however, the bill's sponsor, Rep. Ron

            Wyden (D-Oregon), reported back to the full House that "last

            summer, with just a few taps of a computer keyboard, a group

            of adolescents put at risk the health of thousands of cancer

            patients at Memorial Sloan-Kettering Cancer Center in New

            York."  He said that the 414s had "gained access to the

            radiation treatment records for 6,000 past and present

            patients and had at their fingertips the ability to control

            the radiation levels that every patient received....

            Luckily, no one was hurt -- this time."56

               Rep. Henry Waxman (D-California) contributed to the

            excitement, speaking of "the large and growing problem of

            outsiders gaining access to hospital records"57 -- a problem

            none of the expert witnesses had been able to see.


                                

               54Computer and Communications Security and Privacy, supra
            note 6, at 546 (statement submitted for the record by the
            Memorial Sloan-Kettering Cancer Center).

               55Id. at 27 (statement of Neal Patrick).

               56130 CONG. REC. H9637 (daily ed. Sept. 17, 1984)
            (statement of Rep. Wyden).

               57Ibid. (statement of Rep. Waxman).


                                          70 






               Perhaps not surprisingly, the bill was passed.  Though it

            never became law independently, it contributed to the

            Computer Fraud and Abuse Act of 1986, the law under which

            Craig Neidorf would be indicted in 1990.



               Mistrust of Computers               Mistrust of Computers               Mistrust of Computers

               A recurring theme throughout new proposals like the

            Medical Computer Crime Act was a tendency to focus on the

            tool of the crime -- the computer -- rather than on the

            crime itself.  The computer was seen as super-powerful and a

            crime committed by computer as somehow worse than the same

            crime committed by more conventional means.  "[C]omputer

            embezzlement is to traditional embezzlement as a nuclear

            bomb is to a slingshot," one witness said.  "They are both

            weapons in the latter and they are both offenses in the

            former, but other than that they have nothing in common."58

               It appeared that to some, the crime itself was less

            important than the tool used to commit it.  According to

            Rep. Don Edwards (D-California), "It might be easier to

            convict somebody for stealing money from a bank by charging

            the person with computer crime, rather than the crime of






                                

               58Computer Crime, supra note 18, at 35 (statement of
            James Falco, Assistant State Attorney, Consumer Fraud and
            Economic Crime Division, Eleventh Judicial Circuit of
            Florida).


                                          71 






            embezzlement or stealing money from it."59  This sort of

            emphasis on the computer rather than the theft was evidently

            already practiced under existing state computer crime laws;

            a Florida woman, for instance, was convicted of stealing

            more than $100,000 from her employer, an insurance company.

            For insurance fraud and grand theft, she was sentenced to

            five years, but for computer fraud, she was sentenced to

            seven years.60

               Some legislators commented on this evident misdirection

            of their attention, pointing out that the computer was

            merely a tool like a gun or a forger's pen61 and therefore

            capable of being misused.  Rep. Bill Nelson pointed out that

            even the terminology used was misleading:

                    Computer-assisted crime is the way we should
                 refer to this particular type of wrongdoing.  But
                 I doubt that the simpler, less accurate term
                 'computer-crime' will disappear from popular
                 reports of the problem.
                    Nevertheless, what we are talking about is not
                 crimes committed by computers, but crimes
                 committed by people with the assistance of
                 computers.62





                                

               59Computer Crime, supra note 18, at 27 (statement of Mr.
            Edwards).

               60Conputer Crime, supra note 18, at 35.

               61Computer Crime, supra note 18, at 27 (statement of Mr.
            Clarke); Computer Communications Security and Privacy, supra
            note 15, at 20.

               62132 CONG. REC. H3277 (daily ed. June 3, 1986)
            (statement of Rep. Nelson).


                                          72 






               There was some recognition that the tool used to commit

            these crimes was not the real issue at all.  Though no one

            spoke of cyberspace or the Hacker Ethic, some legislators

            and witnesses did recognize that what was new was an

            attitude about information.  Indeed, at one of the earliest

            hearings, Rep. Dan Glickman cautioned his colleagues:

                    We need to respond to a very real problem, but
                 the real issue is abuse of information.  The bills
                 tend to focus on the device or instrumentation of
                 the crime.  Perhaps we should be looking at more
                 all-encompassing ways to address the violation,
                 the misuse of information.63

               Others also advocated a comprehensive approach:

                    [W]e need to shift attention in our statutes
                 from concepts such as "tangible property" and
                 credit and debt instruments to concepts of
                 "information" and "access to information."64

               Others also spoke of the intricacies and difficulties of

            adapting property law to an information-based society.

                    We also need better legal definitions for our
                 electronic information society.  Such terms as
                 "property," "property rights," "theft of
                 property," "malicious access," and "manipulation
                 of contents" need to be defined with our current
                 and future electronic information society in
                 mind.65




                                

               63Computer Crime, supra note 18, at 8.

               64Counterfeit Access Device and Computer Fraud and Abuse
            Act: Hearings Before the Subcommittee on Crime of the
            Committee on the Judiciary, House of Representatives, 98th
            Cong., 1st and 2d Sess. (1983-84), at 1.

               65Id. at 299 (statement of George Minot, Senior Vice
            President, CompuServe); see also Computer Crime, supra note
            18, at 25 (statement of William Block).


                                          73 






               One witness spoke of "crimes of information" and the need

            to "properly value, assess, and protect information as an

            asset."66  It would be just such an assessment that would

            lead to the prosecution of Craig Neidorf.



               Financial Impact               Financial Impact               Financial Impact

               Ultimately, the financial impact of computer crime seems

            to have been Congress's primary motive for moving ahead with

            computer crime legislation.  Though the issue of computer

            crime was originally brought to its attention by the

            spectacular exploits of hackers such as the 414s and David

            Lightman in WarGames, it became clear that the largest

            threat came not from hackers (whose motives, it seemed, were

            rarely avaricious), but from "insiders" -- employees and

            others with authorized access who committed fraud by

            computer.67  The danger to national security -- the

            possibility of a "WarGames scenario" -- turned out to be

            very slight, but less-exciting computer crime did exist.

            Such crime, according to an American Bar Association survey









                                

               66Id. at 256 (statement of Henry Dreifus, President,
            Corpra Research).

               67Computer and Communications Security and Privacy, supra
            note 15, at 4.


                                          74 






            cited at several hearings, cost American businesses $730

            million in one year.68

               Rep. Peter Rodino summed up the economic approach by

            arguing that attacking white-collar crime such as computer

            crime would be

                 more productive, economically, to this country
                 than the more publicized emphasis on violent
                 crime.
                    The prosecution of this type of crime, which
                 silently robs millions of dollars from all of the
                 taxpayers, a few dollars at a time, we believe,
                 must remain a high priority for Federal law
                 enforcement.69

               In the end, then, it seems that the computer-crime laws

            that were passed in the wake of the hacker fears of 1983

            were intended not so much to deter hacking as to provide

            law-enforcement officials with tools to prosecute thieves.

            The economic intent of these laws is perhaps illustrated by

            the fact that in the new laws Congress gave primary

            authority to the Secret Service -- an arm of the Treasury

            Department -- to investigate computer crime.



               First Amendment Concerns               First Amendment Concerns               First Amendment Concerns

               It is evident that for the most part, Congress did not

            perceive any First Amendment implications in the bills it



                                

               68See, e.g., The Computer Fraud and Abuse Act of 1986:
            Hearing Before the Committee on the Judiciary, U.S. Senate,
            99th Cong., 2d Sess. (1986), at 1.

               69130 CONG. REC. H7634 (daily ed. July 24, 1984)
            (statement of Rep. Rodino).


                                          75 






            considered.  Indeed, only one computer-crime bill of the

            mid-1980s appears to have turned Congress's attention to the

            First Amendment.  In July 1985, the Judiciary Committee's

            Subcommittee on Security and Terrorism held a hearing to

            consider the reported problem of computer networking by

            pedophiles.70  The bill under consideration would have

            explicitly proscribed obscene interstate computer

            transmissions, as well as transmissions "whose purpose is to

            facilitate the sexual abuse or sexually explicit depiction

            of a child."71

               Deputy Assistant Attorney General Victoria Toensing of

            the Department of Justice's criminal division evaluated the

            bill in constitutional terms:

                    It is abundantly clear that neither obscene
                 material nor child pornography is protected by the
                 first amendment.  It is also clear that indecent
                 material which is not obscene, but which is in and
                 of itself offensive, may be regulated civilly if
                 not banned.  The extent to which legislation may
                 go beyond this point to ban material which is
                 merely communicative in nature and not per se
                 obscene or indecent is somewhat more problematic.
                    As a general rule, the first amendment
                 prohibits the Government from interfering in
                 communication of purely factual information even
                 where the material communicated is of a commercial
                 nature.  Thus, in our view, legislation which
                 seeks to ban the transmission of only descriptive
                 or factual information about juveniles with



                                

               70The Use of Computers to Transmit Material Inciting
            Crime: Hearing Before the Subcommittee on Security and
            Terrorism of the Committee on the Judiciary, United States
            Senate, 99th Cong., 1st Sess. (1985).

               71Id. at 12.


                                          76 





                 nothing more, without a specific intent, would
                 raise serious constitutional problems....
                    Of course we are all repulsed by the fact that
                 people are using information like this.  However,
                 we do not have a Supreme Court case that allows us
                 to do that yet.72

               This statement indicates -- albeit indirectly -- that if

            nothing else, the Justice Department does (or did in 1985)

            recognize computer-based communication as deserving of First

            Amendment rights.  Furthermore, the model Toensing applied

            seemed closer to that of print than that of broadcast: "The

            written word has not been considered exempt from first

            amendment protection," she testified.  "And that is the

            problem there, Senator."73



               Summary               Summary               Summary

               The release of the movie WarGames, followed closely by

            the highly visible arrests of the 414s, initiated the early

            phase of the regulatory process regarding computer

            communication.  This early phase saw the involvement of

            three important players: Congress, which set the stage for

            later controversy with its computer crime legislation;

            computer hackers, who sparked the whole controversy; and law

            enforcement agencies, which encouraged Congress to pass laws

            covering crimes that might otherwise "fall through the

            cracks."  The latter two would continue to play an important



                                

               72Id. at 27-34.

               73Id. at 34.


                                          77 






            part in the ongoing controversy of freedom of speech and

            computer communications.




















































                                          78 






                                     CHAPTER FOUR:                                     CHAPTER FOUR:                                     CHAPTER FOUR:

                                  Operation Sun Devil                                  Operation Sun Devil                                  Operation Sun Devil

               The late 1980s and early 1990s saw the emergence of

            several major players in the controversy over computer-based

            communication.  During the early 1980s, when Congress was

            considering and passing the Computer Fraud and Abuse Acts of

            1984 and 1986, law enforcement agencies, though interested,

            remained largely on the sidelines.  They made it clear to

            legislators that they would not turn down new laws to help

            them fight computer crimes but otherwise kept a low profile.

            During the late 1980s and especially 1990, however, law

            enforcers -- particularly the Secret Service, which was

            given primary authority to enforce computer crime laws under

            the 1984 and 1986 statutes -- took their duties to lengths

            some thought excessive.  While the passage of computer crime

            laws had not caused much controversy, the way in which the

            laws were executed caused many to fear for the future of the

            First Amendment.1

               Other major players who emerged prominently during this

            time include the hacker community, which suddenly found

            itself at the middle of a constitutional controversy; a new

            political action group, the Electronic Frontier Foundation,

            which championed the cause of freedom in cyberspace; and


                                

               1See, e.g., Costikyan, "Closing the Net," Reason, Jan.
            1991, at 22; Kapor, "Civil Liberties in Cyberspace,"
            Scientific American, Sept. 1991, at 116; Barlow, "Crime and
            Puzzlement," Whole Earth Review, Fall 1990, at 45. 






            federal courts, which for the first time had the opportunity

            to rule on the First Amendment questions associated with

            computer-based communication.

               This chapter will examine the contributions of these

            players in the hacker crackdown controversy that exploded

            during 1990.  After a survey of the events surrounding the

            crackdown and the two major cases that emerged from it, this

            chapter will identify the positions and agendas of these

            players, based upon policy statements, legal documents, news

            stories and other material.



               Crackdown               Crackdown               Crackdown

               On May 9, 1990, the United States Department of Justice

            announced the culmination of Operation Sun Devil, a two-year

            investigation into computer hacking.2  The operation had

            involved "sophisticated investigative techniques" and

            targeted "computer hackers who were alleged to have

            trafficked in and abuse [sic] stolen credit card numbers,

            unauthorized long distance dialing codes, and who conduct

            unauthorized access and damage to computers."3

               On the two days immediately before the announcement, the

            Secret Service, under the authority bestowed upon it by the

            Counterfeit Access Device and Computer Fraud and Abuse Act


                                

               2U.S. Department of Justice, United States Attorney,
            District of Arizona, Press Release (May 9, 1990).

               3Id.


                                          80 






            of 1984,4 had executed 27 search warrants in cities across

            the United States.5  Forty computers and 23,000 computer

            disks were seized by federal agents and local law

            enforcement officials.6  No arrests were immediately made

            and no charges filed; the searches and seizures were part of

            the ongoing investigation of Operation Sun Devil.  The

            operation was the latest development in a crackdown that had

            been going on at least since 1987.7

               Communications on BBSs from the time show that the Secret

            Service's enforcement efforts were having an effect on the

            hacker community.  The feeling in the computer underground

            during the late 1980s and 1990 was one of siege:

                    We can now expect a crackdown.... I just hope
                 that I can pull through this one and that my
                 friends can also.  This is the time to watch
                 yourself.  No matter what you are into....
                 Apparently the government has seen the last straw
                 in their point of view.... I think they are going
                 after all the 'teachers' [of hacking techniques]
                 ... and so that is where their energies will be
                 put: to stop all hackers, and stop people before
                 they can become threats.8



                                

               418 U.S.C. S1030 (1988).

               5Press release, supra note 2.

               6"Probe Focuses on Entry, Theft by Computers," Chicago
            Tribune, May 10, 1990, at sec. 1, p. 6.

               7See, e.g., Betts, "Hackers Under the Gun: Secret Service
            Sweep Yields Arrests Nationwide," Computerworld,  Aug. 17,
            1987, at 2.

               8Posting from a computer BBS, quoted in E. Goldstein, "An
            Overview," 2600 Magazine, Spring 1990 (as reproduced in
            Computer Underground Digest, Issue 1.10, at lines 87-92).


                                          81 






               One of the sysops of a BBS called the Phoenix Project,

            concerned about his users' privacy, posted the following

            announcement in the spring of 1990, months before the

            announcement of Operation Sun Devil:

                    I will be adding a secure encryption routine9
                 into the e-mail in the next 2 weeks -- I haven't
                 decided exactly how to implement it, but it'll let
                 two people exchange mail encrypted by a password
                 only known to the two of them.... Anyway, I do not
                 think I am due to be busted.... I don't do
                 anything but run a board.  Still, there is that
                 possibility.  I assume that my lines are all
                 tapped until proven otherwise.  There is some
                 question to the wisdom of leaving the board up at
                 all, but I have personally phoned several
                 government investigators and invited them to join
                 us here on the board.  If I begin to feel that the
                 board is putting me in any kind of danger, I'll
                 pull it down with no notice -- I hope everyone
                 understands.  It looks like it's sweeps-time again
                 for the feds.  Let's hope all of us are still
                 around in 6 months to talk about it.10

               The Phoenix Project BBS was shut down within a few days

            as part of the Steve Jackson Games raid.11

               Another Sun Devil target was the Ripco BBS, operated in

            Chicago by Bruce Esquibel ("Dr. Ripco"), who was not a






                                

               9Encryption is "the encoding of data for security
            purposes by converting the standard data code into a
            proprietary code before transmission over a network.  The
            encrypted data must be decoded at the receiving station."
            Essentially, encryption renders computer data unintelligible
            until it is decrypted using the correct mathematical key.
            A. Freedman, The Computer Glossary 259 (4th ed. 1989).

               10Quoted in Goldstein, supra note 8, at lines 224-235.

               11Id. See infra notes 54-61 and surrounding text.


                                          82 






            hacker and claimed no interest in hacking.12  Ripco,

            however, was a popular "hangout" in the computer

            underground, largely because of its extensive collection of

            text files, and was a popular "chat" BBS covering wide-

            ranging topics.  It had a reputation as being a "legal and

            above-board" BBS.13  In fact, Ripco had an explicit policy

            forbidding the posting of stolen credit card numbers or

            specific instructions on how to "phreak" a phone call, as

            sysop Esquibel explained later:

                    It is no secret that many of the posts of board
                 5 (fone phun) either solicited for the need of or
                 said they had and would share such information. I
                 never considered this wrongful for a number of
                 reasons.  The primary one would be most people on
                 there were blowing smoke as far as really knowing
                 anything either fraudulent or important....  Many
                 people who wish to raise their status will often
                 come up with outlandish claims in an attempt to
                 convince others he or she is an expert on one
                 matter or another.
                    Any attempt to suppress this act I felt would
                 of [sic] damaged Ripco's open door policy since
                 people do have to start somewhere and eventually
                 learn their peers will catch on fast if someone is
                 pulling a bluff.  Thus this type of activity was
                 tolerated but the line was crossed if anyone
                 attempted to really do it.  For example if a
                 message contained something like 'just dial 1-800-
                 555-1212 and punch in 123456 at the tone', the
                 entire message was removed or in more cases re-
                 edited especially if other parts were about non-
                 related matters.14


                                

               12Sulski, "Crackdown on Crime Is Raising Question of
            Computer Rights," Chicago Tribune, Nov. 18, 1990, at 17.

               13"Update on Ripco BBS and Dr. Ripco," Computer
            Underground Digest, Issue 1.26, at lines 574-607.

               14Esquibel, "Dr. Ripco Speaks Out," Computer Underground
            Digest Issue 1.27, at lines 342-370.


                                          83 






               On May 8, 1990, Secret Service awakened Esquibel and

            seized his BBS.15  In addition to the BBS computer, they

            also confiscated several other computers that had no

            connection to the BBS but were physically close to it.

            Esquibel was not charged with a crime, but during the

            agents' questioning, they told him they had printouts of

            stolen credit card numbers and long-distance access codes

            that had apparently been posted to the BBS without

            Esquibel's knowledge.  They also commented on files that

            contained instructions on constructing bombs, telling him

            that making such information available was "wrong."16

               Those affected by Operation Sun Devil seemed keenly aware

            of the implications of such shutdowns.  "Does the First

            Amendment come into play at all?" Esquibel asked.  "[W]hy

            isn't a newspaper's printing press taken when a reporter

            refuses to name his sources about a sensitive story?"17

               "Raiding Ripco seems to be throwing the baby out with the

            bath water by intimidating sysops willing to allow

            provocative discussions," wrote the editors of one online

            newsletter.  "In our view, this is no long a computer







                                

               15E.g., Sulski, supra note 12, at 17.

               16Esquibel, supra note 14, at lines 328, 388.

               17Id. at line 520.


                                          84 






            underground issue, but one of First Amendment

            protections."18

               Closing down BBSs, however, did not seem to attract very

            much attention, perhaps because the First Amendment's

            applicability to the medium remained untested.  The most

            visible and controversial "busts" resulting from the Secret

            Service's hacker crackdown were the related cases of Craig

            Neidorf, a Missouri college student, and Steve Jackson

            Games, a small publishing company in Austin, Texas -- cases

            in which the First Amendment issues seemed clearer than ever

            before.19



               The Case of Craig Neidorf               The Case of Craig Neidorf               The Case of Craig Neidorf

               The legal troubles of Craig Neidorf centered around a

            computer text file that originated at the Atlanta offices of

            the Bell South telephone company.  The E911 (Enhanced 911)

            file, as it was called, contained "a description of the

            purposes, operation, installation, and maintenance of the

            emergency 911 telephone service operated by Bell South [and]

            a glossary of the terminology needed to understand the




                                

               18"Moderators' Corner," Computer Underground Digest Issue
            1.09 (May 16, 1990), at lines 108-117.

               19See, e.g., "Group to Defend Civil Rights of Hackers
            Founded by Computer Industry Pioneer," Wall Street Journal,
            July 11, 1990, at B4, col. 1; "Enforcement Questions Raised
            After Hacker Case Dismissed," Washington Post, Aug. 2, 1990,
            at C13, col.1.


                                          85 






            operation of the 911 system."20  Sometime around December of

            1988, Robert Riggs, a member of a hacker group called the

            Legion of Doom,21 gained unauthorized access to Bell South's

            Atlanta computer system, from which he downloaded22 a copy

            of the E911 file to his home computer in Decatur, Georgia.

            He then transferred the file to a public BBS in Lockport,

            Illinois.  Neidorf downloaded the file from the Illinois BBS

            to his home computer in Missouri, edited it and published

            its contents in Issue 24 of his electronic magazine Phrack,

            which was distributed to subscribers and BBSs via computer

            networks.23

               On February 7, 1990, Riggs and Neidorf were indicted by

            an Illinois grand jury on charges of wire fraud,24 violation

            of the Computer Fraud and Abuse Act of 198625 and interstate

            transportation of stolen property.26  The indictment alleged



                                
               20
                 Memorandum of Law of Amicus Electronic Frontier
            Foundation at 2, U.S. v. Riggs, 743 F.Supp. 556 (N.D. Ill.
            1990).

               21Costikyan, supra note 1, at 23.

               22To download is "to transmit data from a central
            computer to a remote computer." Freedman, supra note 9, at
            232.

               23Costikyan, supra note 1. at 2-3.

               2418 U.S.C.A. S1343 (1990).

               2518 U.S.C.A. S1030 (1990).

               2618 U.S.C.A. S2314 (1990).  Riggs/Neidorf indictment
            reproduced in Computer Underground Digest, Issue 1.00 (Mar.
            1990).


                                          86 






            that the E911 file was proprietary27 and confidential, that

            it was worth $79,449 to Bell South, and that it contained

            information hackers could use to disrupt the operation of

            the 911 system.28  Four months later the grand jury revised

            that indictment, relying now only upon charges of wire fraud

            and interstate transportation of stolen property.29

               The charges against Neidorf fell generally into three

            categories: those alleging a broad conspiracy to commit wire

            fraud; those connected with the transfer of the E911 file

            from Georgia, through Illinois, to Missouri; and those

            connected with the publication of Phrack -- not only the

            issue containing the E911 file, but also two previous issues

            that allegedly advocated hacking activity.30

               One of these issues had contained an article titled "The

            Phoenix Project."31  This project, according to the

            government, was "a plan to solidify the hacker community by

            publishing hacking tutorials and disseminating other items



                                

               27"Belonging to ownership; belonging or pertaining to a
            proprietor; relating to a certain owner or proprietor.  Made
            and marketed by a person or persons having the exclusive
            right to manufacture and sell such; as a proprietary
            article, medicine, or food." Black's Law Dictionary 637
            (Abridged 5th ed. 1983).

               28Indictment, supra note 26.

               29U.S. v. Riggs superseding indictment reproduced in
            Computer Underground Digest Issue 1.15 (June 16, 1990).

               30U.S. v. Riggs, 743 F.Supp. 556, 559 (N.D. Ill. 1990).

               31Costikyan, supra note 1, at 26.


                                          87 






            of interest to hackers, such as information on how to

            prevent law enforcement authorities from discovering hacking

            activity."32  Another charge related to a later issue of

            Phrack that allegedly contained such tutorials.33

               Shortly after Neidorf's trial began in July 1990, the

            prosecution's case began to come apart.  A Bell South

            employee testified that the supposedly confidential document

            -- which Bell South had originally valued at $79,449, though

            it later reduced that figure to $20,000 -- was, in fact,

            available for $13 to anyone calling an 800 number.34

            Prosecutors dropped the charges against Neidorf on July 27.

            Robert Riggs had already pleaded guilty.35

               The Steve Jackson Games Case               The Steve Jackson Games Case               The Steve Jackson Games Case

               Steve Jackson Games (SJG), a small, privately owned

            company in Austin, Texas, designs and manufactures role-

            playing adventure games of the type played with dice and

            elaborate rule books.  Many of these games have been part of

            GURPS, the Generic Universal Role Playing System, a series

            that includes such titles as GURPS Witch World, GURPS Conan

            and GURPS Riverworld. The company also operates a BBS called

            Illuminati, which SJG uses to facilitate communication


                                

               32743 F.Supp. 556, 558.

               33Id.

               34Costikyan, supra note 1, at 26.

               35Markoff, "U.S. Drops Computer Case Against Student,"
            The New York Times, July 28, 1990, at 9, col. 3.


                                          88 






            between its customers and game authors.  In the spring of

            1990, SJG was preparing to publish a new game, GURPS

            Cyberpunk, a game in the tradition of William Gibson's

            award-winning science fiction novel Neuromancer and other

            fiction of the "cyberpunk" genre.36  The introduction to

            GURPS Cyberpunk describes this genre:

                    "Cyberpunk" is the term applied to a science
                 fiction literary "movement" of the 1980s.
                 Although there are several authors from the 1960s
                 and 1970s whose work appears cyberpunk in
                 retrospect, the term wasn't coined until the
                 publication in 1984 of William Gibson's novel
                 Neuromancer....
                    Neuromancer presented a view of the future that
                 was different.  Gone were the glass-domed cities
                 and utopias of Golden Age science fiction.  The
                 domes are still there in cyberpunk, but they're
                 occupied by the rich and guarded by security
                 forces that shoot first and don't bother to ask
                 questions....
                    The cyberpunk future is vibrant -- pulsating
                 with life, from the streets to the high-rises....
                    Cyberpunk is a style defined by two elements.
                 The first is the interaction of man with
                 technology.  Computers are as common as
                 dishwashers in the cyberpunk future, and the
                 dividing line between man and machine is sometimes
                 blurred....
                    The second element found in most cyberpunk work
                 is that of struggle.  The world is divided into
                 two groups -- the haves and the have-nots -- with
                 a vast chasm between them.37

               More familiar examples of cyberpunk include the movie

            Blade Runner and the short-lived television series Max




                                

               36Sterling, "Gurps' Labor Lost: The Cyberpunk Bust,"
            Effector (newsletter of the Electronic Frontier Foundation),
            Vol. 1 Number 2, at 1-2.

               37L. Blankenship, GURPS Cyberpunk 4 (1990).


                                          89 






            Headroom.38  It is easy to understand why the genre, with

            its pervasive themes of technology and fighting against

            centralized authorities, is popular among computer hackers.

            Hacking, in fact, is itself a component of the genre.

               On March 1, 1990, agents of the Secret Service, search

            warrant in hand, raided the offices of Steve Jackson Games.

            The authorities seized from the company three computers, two

            laser printers and all of the drafts of GURPS Cyberpunk,

            both on computer disk and on paper.  The computers included

            not only the ones used in the drafting of GURPS Cyberpunk,

            but also the system that ran the Illuminati BBS.39  A total

            of about $10,000 worth of computer hardware and software was

            confiscated.40  The officers left behind broken locks,

            damaged filing cabinets and a ransacked warehouse.41  They

            refused to say what they were looking for.42

               When Steve Jackson visited the local Secret Service

            office in an attempt to recover some of his equipment, he

            was told by the agents that GURPS Cyberpunk was "a handbook


                                

               38Hafner and Markoff, Cyberpunk: Outlaws and Hackers on
            the Computer Frontier 9 (1991).

               39Electronic Frontier Foundation, Legal Case Summary,
            July 10, 1990; Lewis, "The Executive Computer: Can Invaders
            Be Stopped But Civil Liberties Upheld?" The New York Times,
            Sept. 9, 1990, at F12.

               40J. Wilson, "It CAN Happen Here," Computer Gaming World,
            June 1990, at 8.

               41Costikyan, supra note 1, at 23.

               42Lewis, supra note 39.


                                          90 






            for computer crime."  When he explained that it was science

            fiction, they insisted, "This is real."43

               The confiscation of the company's computers and all the

            existing drafts of GURPS Cyberpunk nearly put Steve Jackson

            Games out of business.  Callers to the company's Illuminati

            BBS saw only the following message:

                    Before the start of work on March 1, Steve
                 Jackson Games was visited by agents of the United
                 States Secret Service.  They searched the building
                 thoroughly, tore open several boxes in the
                 warehouse, broke a few locks, and damaged a couple
                 of filing cabinets (which we would gladly have let
                 them examine, had they let us into the building),
                 answered the phone discourteously at best, and
                 confiscated some computer equipment, including the
                 computer that the BBS was running on at the time.
                    So far we have not received a clear explanation
                 of what the Secret Service was looking for, what
                 they expected to find, or much of anything else.
                 We are fairly certain that Steve Jackson Games is
                 not the target of whatever investigation is being
                 conducted; in any case, we have done nothing
                 illegal and have nothing whatsoever to hide.
                 However, the equipment that was seized is
                 apparently considered to be evidence in whatever
                 they're investigating, so we aren't likely to get
                 it back any time soon.  It could be a month, it
                 could be never.
                    To minimize the possibility that this system
                 will be confiscated as well, we have set it up to
                 display this bulletin, and that's all.  There is
                 no message base at present.  We apologize for the
                 inconvenience, and we wish we dared to do more
                 than this.44

               Forced to miss the publication deadline for GURPS

            Cyberpunk, Jackson had to lay off half of his staff, and for



                                

               43L. Blankenship, GURPS Cyberpunk (1990), at 5
            (introduction by Steve Jackson).

               44E. Goldstein, supra note 8, at lines 253-275.


                                          91 






            a while SJG operated on a precarious financial basis.45

            Eventually, using some old backups of their computer data

            and some fragments of early drafts that had been distributed

            to testers -- as well as reconstructing much from memory --

            Jackson and his staff were able to complete and publish

            GURPS Cyberpunk.46  But Jackson estimated that the raid and

            the delays it caused cost his small company more than

            $125,000.47

               The Secret Service returned most of Steve Jackson Games'

            property in June of 1990.48  Some of the equipment was

            irreparably damaged,49 and the Secret Service retained the

            drafts of GURPS Cyberpunk.50  Furthermore, the Secret

            Service's affidavit and application for the search warrant

            remained sealed, leaving it a mystery what the Secret

            Service had been looking for.51  There was no evidence, nor

            any formal accusation, that Steve Jackson Games had ever

            been involved in any kind of illegal activity.




                                
               45
                 Legal Case Summary, supra note 39; Costikyan, supra
            note 1, at 24.

               46Barlow, supra note 1, at 52.

               47Costikyan, supra note 1, at 24.

               48Sterling, supra note 36, at 3.

               49Costikyan, supra note 1, at 24.

               50Legal Case Summary, supra note 39.

               51Id.


                                          92 






               When the warrant was finally unsealed several months

            later, it confirmed that Steve Jackson Games was never

            suspected of anything illegal.52  Furthermore, GURPS

            Cyberpunk had had nothing to do with the raid.  In fact, the

            object of the search had been none other than the E911 file

            published by Craig Neidorf in Phrack.53

               The link between the E911 file and Steve Jackson Games

            was an employee of the company named Loyd Blankenship and

            his association with a shadowy hacker group called the

            Legion of Doom, a group that was targeted by the Secret

            Service's crackdown.  Blankenship, known also as The Mentor,

            was a former hacker and the author of GURPS Cyberpunk.54

            During the time he was working on GURPS Cyberpunk, he had

            been in contact with some members of the Legion of Doom for

            the purpose of verifying the game's faithfulness to its

            genre.55  (In fact, the title page of the published book

            credits the Legion of Doom as "Hacking Consultants."56)

               From his home, Blankenship operated a BBS called The

            Phoenix Project, which took its name from the "Phoenix




                                

               52Kapor, supra note 1, at 116.

               53Sterling, supra note 36, at 3.

               54Id. at 2.

               55From commentary by SJG employee Walter Milliken posted
            to the Usenet newsgroup comp.risks.

               56Blankenship, supra note 43, at 1.


                                          93 






            Project" announced in Phrack #19.57  Blankenship's BBS, like

            many others, had on it a copy of Phrack #24, the issue

            containing the edited E911 file.  The file was identified

            and reported to the Secret Service by Henry Kluepfel, a Bell

            security manager who was working with investigators.58

               Furthermore, the affidavit alleged, e-mail messages

            posted on the Phoenix Project BBS indicated that Blankenship

            and Legion of Doom member Chris Goggans (Erik Bloodaxe) had

            "established a password decryption service"59 for hackers

            attacking computer systems, a service to be provided through

            The Phoenix Project BBS.60

               Based on these facts, the Secret Service alleged

            interstate transportation of stolen property and computer

            fraud.61  On this basis it raided both the home and

            workplace of Loyd Blankenship, shutting down Steve Jackson

            Games in the process.





                                

               57Costikyan, supra note 1, at 24.

               58Application and affidavit for search warrant for Steve
            Jackson Games (case #A-90-54m), Feb. 28, 1990, at 11.

               59On most multiuser computer systems, users' logon
            passwords are stored in an encrypted file for security
            reasons.  Decryption of passwords stored in this file would
            reveal the passwords of all users, allowing the person
            possessing the decrypted passwords to freely access any
            account on the system.

               60Id. at 7.

               61Id. at 17.


                                          94 






               The Hunt for the Legion of Doom               The Hunt for the Legion of Doom               The Hunt for the Legion of Doom

               The troubles of Craig Neidorf and Steve Jackson resulted

            from what was apparently one of the central objectives of

            the Secret Service's hacker crackdown: the eradication of

            the hacker group the Legion of Doom (LOD).62  The government

            perceived the Legion of Doom as "a closely knit group of

            hackers" engaged in disruption of telephone services, credit

            card fraud and theft of proprietary information.63  These

            descriptions of a highly organized and malevolent group of

            hackers echo the fears expressed at Congressional hearings

            during the 1980s of hacker conspiracies and "professional"

            hacker groups.64

               The reality, however, is that the Legion of Doom was far

            less dangerous and far less organized than the government

            apparently believed.  The membership of the Legion of Doom

            is probably impossible to determine.  One member said that

            the group never had more than 15 to 20 members and that

            "it's almost like if you say you're in, you are."65  And as

            is the custom in hacking circles, members generally used



                                

               62Markoff, "Drive to Counter Computer Crime Aims At
            Invaders," The New York Times, June 3, 1990, at 30.

               63E.g., Riggs/Neidorf indictment, infra note 26;
            Riggs/Neidorf superseding indictment, infra note 29; SJG
            search affidavit, infra note 58.

               64See Chapter 3, notes 35-41 and surrounding text.

               65Schatz, "The Terminal Men," The Washington Post, June
            24, 1990, at H6.


                                          95 






            pseudonyms, though the true identities of some were revealed

            when they became ensnared in the crackdown.  A list of

            Legion of Doom members might include Robert Riggs (The

            Prophet), Loyd Blankenship (The Mentor), Chris Goggans (Erik

            Bloodaxe) and Len Rose (Terminus), as well as such

            mysterious figures as Acid Phreak, Phiber Optik and Lex

            Luthor.

               The group's foreboding name was taken from a group of

            comic-book villains that frequently clashed with Superman.

            "You wouldn't want a fairy kind of thing like Legion of

            Flower Pickers or something," one member explained.  "But

            the media ate it up too.  Probing the Legion of Doom like it

            was a gang or something, when really it was just a bunch of

            geeks behind terminals."66

               The Legion of Doom was not a "closely knit group,"67 and

            its agenda was not nearly so malevolent as the Sun Devil

            investigators alleged.  "We're just out to learn," Acid

            Phreak explained.  "We transfer data about records that we

            find in systems.  But we draw the line on how we use that

            data.  We use it to play around, not abuse it."68







                                

               66Barlow, supra note 1, at 49.

               67Goldstein, supra note 8, at line 214.

               68Schatz, supra note 65, at H1.


                                          96 






               Exaggerated Fears               Exaggerated Fears               Exaggerated Fears

               The government's belief that the Legion of Doom was

            actively engaged in theft and fraud and disruption of

            telephone services may help to explain why the E911 file was

            seen as so dangerous.  Prosecutors, however, seemed not to

            have a clear idea of exactly what the file was.  The Secret

            Service, in the affidavit and application for the Steve

            Jackson Games search warrant, refers to the E911 file

            variously as a "document," as "source code" and as a

            "program."69  Similarly, the press release issued by the

            Department of Justice upon the indictment of Riggs and

            Neidorf said that the two "stole a copy of Bell South's

            highly proprietary and closely held computer program that

            controlled and maintained the E911 system."70  The

            government further claimed that Neidorf published the file

            "so that [other hackers] could unlawfully access the E911

            system and potentially disrupt or halt ... 911 service in

            the United States."71  William Cook, the assistant United

            States attorney who led the prosecution of Neidorf,

            described the E911 file to the jury as a "road map" to the

            emergency telephone system.  He explained that the file



                                

               69Affidavit, supra note 58.

               70Indictment, supra note 26 (emphasis added).

               71U.S. Dept. of Justice, Press Release, Feb. 6, 1990
            (reproduced in Computer Underground Digest, Issue 1.00, Mar.
            1990).


                                          97 






            "described in vivid detail each of the locations along the

            E911 path to an emergency call."72

               In fact, the E911 file, titled "Control Office

            Administration Of Enhanced 911 Services For Special Services

            And Major Account Centers," is an administrative document

            containing little technical information.  The document

            describes the 911 system very generally and defines some of

            the terms used in administration of the system -- terms like

            PSAP (Public Safety Answering Point), "an agency or facility

            which is authorized by a municipality to receive and respond

            to police, fire and/or ambulance services."73  It defines

            the responsibilities of the various entities involved in the

            911 system with regard to maintenance, testing and problem

            reporting.  The document is dry reading, filled with

            acronyms and other bureaucratic jargon:

                    The MMOC should notify the appropriate SSC/MAC
                 when the Host, Node, or all Node circuits are down
                 so that the SSC/MAC can reply to customer reports
                 that may be called in by the PSAPs.  This will
                 eliminate duplicate reporting of troubles.  On
                 complete outages the MMOC will follow escalation
                 procedures for a Node after two (2) hours and for
                 a PSAP after four (4) hours.  Additionally the
                 MMOC will notify the appropriate SSC/MAC when the
                 Host, Node, or all Node circuits are down.74



                                

               72Transcript of William Cook's opening statement at trial
            of Craig Neidorf, reproduced in Computer Underground Digest
            Issue 3.41 (Nov. 16, 1991), at lines 108, 482.

               73E911 file as reproduced in Phrack Issue 24, at line
            1071.

               74Id. at lines 1270-1276.


                                          98 






               It also includes a glossary of terms used to describe the

            E911 system -- terms such as PSAP, selective routing and

            night service.75  Nothing in the file appears to provide any

            technical information that could be used to actually

            interfere with the operation of the system.

               Rather than a tool for sabotage, the republished E911

            file was more likely seen as a kind of trophy, an

            interesting glimpse at part of the complex telephone system

            with which hackers were fascinated.  In response to

            Neidorf's arrest, hacker Chris Goggans, known as Erik

            Bloodaxe, said, "No member of LOD has ever (to my knowledge)

            broken into another system and used any information gained

            from it for personal gain of any kind ... with the exception

            of maybe a big boost in his reputation around the

            underground.... The information [in the E911 file] is hardly

            something anyone could possibly gain anything from except

            knowledge about how a certain aspect of the telephone

            company works."76

               Like its descriptions of the E911 file, the government's

            charges of conspiracy against Craig Neidorf similarly

            reflected an exaggerated threat.  The indictment against

            Neidorf prominently mentions an article in Phrack #19 titled

            "The Phoenix Project," described by the government as "a



                                

               75Id. beginning at line 1438.

               76Goldstein, supra note 8, at lines 185-192.


                                          99 






            plan to solidify the hacker community by publishing hacking

            tutorials and disseminating other items of interest to

            hackers, such as information on how to prevent law

            enforcement authorities from discovering hacking

            activity."77  In fact, the "project" announced in Phrack #19

            seemed more likely intended to boost morale in the besieged

            hacker community than anything else.  It was mostly devoted

            to announcing an upcoming convention for hackers, as well as

            the new Phoenix Project BBS:

                    SummerCon '88 is a celebration of a new
                 beginning.  Preparations are currently underway to
                 make this year's convention twice as fun as last
                 year's and the greater the turnout the greater the
                 convention shall be.  No one is directly excluded
                 from the festivities and the practice of passing
                 illegal information is not a part of this
                 convention....
                    Any security consultants or members of law
                 enforcement agencies that wish to attend should
                 contact the organizing committee as soon as
                 possible to obtain an invitation to the actual
                 convention itself....
                    The first step in what is called The Phoenix
                 Project, which is a re-birth of the hack/phreak
                 community is underway.  This first step is a
                 public education bulletin board system dedicated
                 to teaching the public about telecommunications
                 and computer systems.  The board is called The
                 Phoenix Project, and the number is (XXX)XXX-XXXX.
                 No illegal information is to be posted on this
                 system.  Our SysOp is The Mentor.  Thank you, and
                 call if you're interested.78





                                

               77743 F.Supp. 556, 558.

               78Knight Lightning (Craig Neidorf), "Phrack World News,"
            Phrack, Issue 19 (no date given), at lines 1531-1651
            (telephone number removed).


                                          100 






               In addition to the E911 file, the Secret Service also

            expected to find at Steve Jackson Games a program providing

            a "password decryption service" established by Loyd

            Blankenship and Chris Goggans.79  But the evidence presented

            in the agency's own affidavit suggests that this service

            was, in fact, little more than idle chatter; it was neither

            "established" nor operational in any way.  It was merely an

            apparently half-serious suggestion made on the BBS by co-

            sysop Chris Goggans (under the pseudonym Erik Bloodaxe):

                 13/58 things...
                 Name: Erik Bloodaxe #2
                 Date: Tue Jan 23 22:57:29 1990

                 I think it's time for your friend at the Legion of
                 Doom to start a new service...(with great help
                 from friends)
                 Decryption service! On any unix or Prime, send the
                 etc/passwd file, or the UAF file to the sysop
                 directory, and you will be mailed back the
                 encrypted passwords...(on UNIX( any pw that the
                 deszip could bust)
                 The Prime UAF must be in binary, so kermit it from
                 the site, and xmodem it here.
                 In return, we will not distribute any information
                 gained from your site, but we will probably look
                 around it anyway...but it will remain between you
                 and us.
                 What do you people think? Bad idea? Good idea?
                 Hell...It is just another attempt by me to piss
                 everyone off.

                 ->ME80





                                

               79Affidavit, supra note 58.

               80Messages from The Phoenix Project BBS, attached to
            search affidavit and reproduced in Computer Underground
            Digest 2.11, Nov. 13, 1990.


                                          101 






               Even if this "service" had been operational, Loyd

            Blankenship's connection to it was tenuous.  The Secret

            Service's conclusion that he was involved in trafficking in

            stolen passwords was apparently based entirely on a

            Blankenship's answer to another user's question about what

            "Kermit," mentioned in Goggan's message, was:81

                 23/47: kermit
                 Name: The Mentor #1
                 Date: Fri Jan 26 10:11:23 1990

                 Kermit is a 7-bit transfer protocol that is used
                 to transfer files to/from machines. It is mostly
                 found on mainframes (it's a standard command on
                 VAX, for instance). Kermit has the added advantage
                 of being able to work through an outdial (because
                 it is 7-bit).

                 Mentor82

               Kermit is a commonly used file transfer protocol83 and is

            certainly not limited to use in stealing passwords.  But

            based upon this straightforward technical explanation, the

            Secret Service alleged that Loyd Blankenship was involved in

            Chris Goggan's proposed password decryption scheme.




                                

               81Indictment as quoted in Computer Underground Digest
            Issue 2.11, Nov. 13, 1990.

               82Id.

               83A file transfer protocol is a set of standards
            regarding the transmission of data from one computer to
            another and how errors in transmission should be handled.
            The Kermit protocol is noted for its ability to complete
            file transfers over even noisy telephone connections and its
            ability to communicate between personal computers and large
            mainframes that may have different data formats.  See
            Freedman, supra note 9, at 385.


                                          102 






               This tendency toward exaggeration was also demonstrated

            by the agents who raided Steve Jackson Games.  When he

            attempted to recover some of his equipment, agents insisted

            to Steve Jackson that GURPS Cyberpunk was a "handbook for

            computer crime" and that the techniques it described were

            real.  While the technology described in the book is

            extrapolated from that of today, no specific real-world

            techniques, only game rules, are described.  A roll of the

            dice, for instance, determines whether a player has

            successfully broken into a computer system.84  And much of

            the technology is fantastically futuristic, such as this

            description of the "Icon Interface":

                    This interface is very similar to the icon-
                 based operating systems used on personal computers
                 in the 1980s and early 1990s.  A two-dimensional
                 "screen" is projected directly onto the
                 character's optic nerve.  When he wishes to
                 execute a program or examine a database, he
                 mentally "selects" the appropriate icon.  To
                 connect to another computer, for instance, he
                 selects a telephone; to disconnect from a system,
                 he selects a door....
                    Installation requires a major surgical facility
                 and a minimum of 10 days.85

               About the only realistic hacking technique the book

            describes is searching through trash to find useful data

            (the success of which is still dependent upon a roll of the

            dice).86


                                

               84Blankenship, supra note 43, at 69.

               85Id. at 73.

               86Id. at 86-87.


                                          103 








               The Electronic Frontier Foundation               The Electronic Frontier Foundation               The Electronic Frontier Foundation

               Another major player to emerge during 1990 -- as a direct

            result of the government's hacker crackdown -- was the

            Electronic Frontier Foundation, founded by Mitch Kapor,

            author of the popular spreadsheet program 1-2-3 and former

            CEO of the software company Lotus, and writer John Perry

            Barlow.  The EFF was founded shortly after Barlow was

            visited by an FBI agent investigating another (possibly

            mythical) hacker group called the NuPrometheus League.  The

            mysterious group had stolen some Macintosh source code87

            from the Apple computer company and distributed it widely to

            members of the computer industry and the press, and was the

            subject of an FBI investigation in 1989 and 1990.88

               According to Barlow, an FBI agent who visited him at his

            home in Wyoming -- evidently suspecting that Barlow might be

            part of the NuPrometheus League -- knew almost nothing about

            computers.  Barlow found himself explaining computer

            technology to the agent.  "You know things have rather

            jumped the groove when potential suspects must explain to

            law enforcers the nature of their alleged perpetrations,"


                                

               87Source code is "the language a program is written in by
            the programmer." Freedman, supra note 9, at 641.  Because
            source code reveals the inner workings of a program, and
            because it can be easily modified and adapted by other
            programmers, it is generally considered highly confidential
            and proprietary by its owner.

               88Markoff, supra note 62, at 30.


                                          104 






            Barlow later wrote.  Much of the agent's visit was devoted

            to Barlow's explanation to the agent of exactly what had

            been stolen.89

               The FBI agent's visit demonstrated to Barlow one of the

            fundamental problems of the recent hacker crackdown: the

            lack of technical expertise among law enforcement officials.

                    I realized in the course of this interview that
                 I was seeing, in microcosm, the entire law
                 enforcement structure of the United States.  Agent
                 Baxter was hardly alone in his puzzlement about
                 the legal, technical, and metaphorical nature of
                 datacrime.
                    I also found in his struggles a framework for
                 understanding [the] series of recent Secret
                 Service raids on some young hackers.... And it
                 occurred to me that this might be the beginning of
                 a great paroxysm of governmental confusion during
                 which everyone's liberties would become at risk.90

               Mitch Kapor had received one of the copies of the

            NuPrometheus League's stolen Macintosh code and was also

            paid a visit by an FBI agent.  After hearing about Barlow's

            similar experience, Kapor began to see a larger problem:

                    I suddenly realized I wasn't alone, that I had
                 some direct connection to this, that NuPrometheus
                 was connected to all the other arrests of computer
                 hackers at the time, and I began to see how great
                 an injustice could be taking place within such a
                 huge investigation as Sun Devil.91





                                

               89Barlow, supra note 1, at 53-4.

               90Barlow, "A Man From the FBI: The Origins of the
            Electronic Frontier Foundation," Effector, March 1991, at 1.

               91Bromberg, "In Defense of Hackers," The New York Times
            Magazine, April 21, 1991, at 47.


                                          105 






               These concerns led Barlow and Kapor to found the

            Electronic Frontier Foundation.  The EFF's mission statement

            recognized the "new world" of cyberspace and the difficulty

            of applying old laws to a new medium such as computer-based

            communication.  The EFF, the statement said, would "help

            civilize the electronic frontier," both through educational

            activities to increase understanding of the new media, and

            through supporting litigation to preserve First Amendment

            rights in the realm of computer-based communication.92  But

            the EFF's founders resisted the suggestion that the EFF was

            a "hacker defense fund":

                    I regard unauthorized entry into computer
                 systems as wrong and deserving of punishment.
                 People who break into computer systems and cause
                 harm should be held accountable for their actions.
                 We need to make appropriate distinctions in the
                 legal code among various forms of computer crime,
                 based on such factors as intent and the degree of
                 actual damage....
                    As I began to find out the real story behind
                 government raids and indictments last summer, I
                 became incensed at the fact that innocent
                 individuals were getting caught up in the
                 blundering machinations of certain law enforcement
                 agencies....93

               The EFF immediately became involved in the case of Steve

            Jackson Games.94  Its attorneys helped Jackson obtain the




                                

               92Electronic Frontier Foundation, Mission Statement, July
            10, 1990.

               93Kapor, "Why Defend Hackers?", Effector, March 1991, at
            1, 3.

               94Electronic Frontier Foundation, supra note 39.


                                          106 






            return of his confiscated equipment95 and successfully

            sought to have the SJG search affidavit unsealed.96

               The EFF's most prominent early role, however, was

            probably its involvement in the defense of Craig Neidorf.

            With the aid of the EFF's attorneys, Neidorf moved to have

            the charges against him dropped on First Amendment grounds.

            In support of this motion the EFF filed an amicus brief in

            which it explained the importance of the issues in the case:

                    The indictment in this case has raised a
                 significant concern among BBS operators and users
                 as to the liability that they might face for the
                 communication of information that may turn out to
                 have originally been obtained without
                 authorization. . . . [M]any of these bulletin
                 board systems have ongoing discussions, or
                 conferences, about a wide variety of subjects, and
                 often, in the spirit of free and open
                 communication, individuals put postings on the
                 bulletin boards which could be construed as
                 advocating or supporting illegal activity.  While
                 the operators of these BBSs do not support such
                 activity, they would like to maintain a free, open
                 and robust interchange of ideas, and are concerned
                 about the liability they may face.97

               In challenging these charges stemming from Neidorf's

            publication of the E911 file, EFF's brief emphasized that

            Neidorf had been uninvolved in the illegal removal of the

            E911 file from the Bell South computer.  Neidorf, it said,

            acted as publisher, "much as the publisher of the Chicago


                                

               95Sterling, supra note 36, at 3.

               96Bromberg, supra note 91, at 49.

               97Motion of the Electronic Frontier Foundation for Leave
            to Appear as Amicus Curiae at 3-4, U.S. v. Riggs, 743
            F.Supp. 556 (N.D. Ill. 1990).


                                          107 






            Tribune does when printing and distributing that

            newspaper."98  Therefore, the EFF maintained,  Neidorf

            should be accorded the full protection of the First

            Amendment.  This protection, the EFF argued, extended not

            only to the actual publication of Phrack, but also to the

            transfer of the E911 file from Illinois to Missouri, because

            that transfer was incidental to publication.  "If ... the

            publication of the E911 text was protected by the First

            Amendment, the transmittal of the information to and from a

            bulletin board prior to publication triggers First Amendment

            protections."99

               The EFF then argued that any statute criminalizing

            publication of information must serve an overriding

            governmental interest, must be narrowly tailored to serve

            that interest and bears a heavy presumption against

            constitutionality.  The interest in protecting confidential

            business information, it argued, was not an overriding

            governmental interest, and thus the government interest did

            not outweigh Neidorf's First Amendment rights to receive and

            republish the E911 file, which was of "public

            significance."100





                                

               98Memorandum, supra note 20, at 4.

               99Id. at 4.

               100Id. at 4-9.


                                          108 






               In support of its argument, the EFF cited Smith v. Daily

            Mail Publishing Co.101  In that case, a newspaper had been

            prosecuted for violating a state law prohibiting publication

            of the name of a juvenile defendant without prior approval

            of a judge.  The Supreme Court struck down the law as

            unconstitutional.  Chief Justice Burger wrote that state

            action to punish publication of truthful information must

            serve a state interest "of the highest order."102  The

            interest here -- protecting the anonymity of juvenile

            offenders -- was recognized by the Court as legitimate, but

            not sufficiently compelling to outweigh First Amendment

            rights.  The EFF also cited similar decisions in Worrell

            Newspapers of Indiana, Inc. v. Westhafer,103 which declared

            unconstitutional a law prohibiting publication of a

            suspect's name before an arrest had been made, and Landmark

            Communications Inc. v. Virginia,104 which struck down a

            newspaper's indictment for publishing the name of a judge

            who was under investigation.

               Surely, the EFF argued in its brief, the interests

            involved in these cases -- protecting the anonymity of

            juvenile offenders in Smith, for instance, and apprehending



                                

               101443 U.S. 97 (1979).

               102Id. at 103.

               103739 F.2d 1219 (7th Cir. 1984).

               104435 U.S. 829 (1978).


                                          109 






            criminals in Worrell -- were more compelling than the

            governmental interest in protecting confidential business

            information such as that supposedly contained in the E911

            file.  Yet even those higher state interests had failed to

            outweigh the First Amendment's protection for the

            publisher.105  The information published by Neidorf related

            to a matter of public significance -- relating, as it did,

            to the availability of emergency service to the public -- so

            the First Amendment interest in publication outweighed the

            interest advanced by the government,106 the EFF argued.  And

            far narrower means of protecting that interest are

            available, such as imposing liability upon the person who

            actually stole the information rather than upon the

            republisher.107  To punish Neidorf for publishing

            information he knew to be stolen, the EFF argued, would be

            analogous to prosecuting The New York Times for publishing

            the Pentagon Papers, "which it may have known or had reason

            to know had been stolen by Daniel Ellsberg."108




                                

               105Memorandum, supra note 20, at 6.

               106Id. at 8.

               107Id. at 9.

               108Id. at 13.  The EFF also cited Pearson v. Dodd, 410
            F.2d 701 (D.C. Cir. 1969), and Dietemann v. Time, Inc., 449
            F.2d 245 (9th Cir. 1971), to support a "distinction between
            publishing information one has stolen [as in Dietemann] and
            publishing information stolen by others [as in Pearson]."
            Memorandum, supra note 20, at 12.


                                          110 






               Some of the charges against Neidorf related not to the

            publication of the E911 file but to two issues of Phrack

            that supposedly advocated hacking activity, one announcing

            "The Phoenix Project" and the other allegedly containing

            hacker tutorials.  Neidorf and the EFF challenged these

            counts of the indictment on First Amendment grounds as well.

            Since the charges centered around advocacy of illegal

            conduct, the brief argued, they had to meet the incitement

            standard established by Brandenburg v. Ohio.109  The Supreme

            Court's per curiam opinion in Brandenburg enunciated that

            test as follows: "[T]he constitutional guarantee of free

            speech and free press do not permit a State to forbid or

            proscribe advocacy of the use of force or of law violation

            except where such advocacy is directed to inciting or

            producing imminent lawless action and is likely to incite or

            produce such action."110



               The Court Responds               The Court Responds               The Court Responds

               The United States District Court for the Northern

            District of Illinois, where the case went to trial,

            recognized that with the Neidorf case it was plotting "a

            course on uncharted waters."111  In his decision ruling on



                                

               109395 U.S. 444 (1969).

               110395 U.S. 444, 447.

               111U.S. v. Riggs, 739 F.Supp. 414, 419 (N.D. Ill. 1990).


                                          111 






            the first of two motions by the defendants to have the

            charges dismissed,112 Judge Nicholas Bua wrote:

                    Over the course of the past decade, advances in
                 technology and growing respect and acceptance for
                 the powers of computers have created a true
                 explosion in the computer industry.  Quite
                 naturally, the growth of computer availability and
                 application has spawned a host of new legal
                 issues.  This case requires the court to wrestle
                 with some of these novel legal issues which are a
                 product of the marriage between law and
                 computers.113

               In responding to the EFF's arguments, however, the court

            stayed within familiar territory, avoiding the more

            difficult questions of First Amendment applicability to a

            new medium.  The First Amendment, Judge Bua ruled, would not

            be a defense in any case.  "[T]he law is clear," he wrote,

            "that where an individual violates an otherwise valid

            criminal statute, the First Amendment does not act as a

            shield to preclude the prosecution of that individual simply

            because his criminal conduct involves speech."114  Chief

            support for this position came from United States v.

            Rowlee,115 a Second Circuit case that upheld the defendant's

            conviction for mail fraud based upon his activities in a

            society devoted to promoting tax evasion.  Rowlee's conduct,


                                

               112The first motion to dismiss was not on constitutional
            grounds, but rather alleged insufficiency of the indictment
            under the statutes involved.

               113739 F.Supp. 414, 416.

               114Id. at 559-560.

               115899 F.2d 1275 (2d Cir. 1990).


                                          112 






            the circuit court had written, "was not protected by the

            First Amendment merely because, in part, it may have

            involved the use of language."116  If Neidorf had indeed

            participated in the scheme to defraud as alleged, Bua wrote,

            "then he is criminally responsible for his conduct in

            furtherance of the scheme, and the First Amendment does not

            shield him from that responsibility."117  According to

            Rowlee, Bua wrote, "the Brandenburg test cannot be

            reasonably applied to violations of the mail fraud or wire

            fraud statutes, which usually 'involve long-term, slowly-

            developing wrongs, not "imminent lawless action."'"118

               With the EFF's motions all denied by the court, Neidorf's

            trial began on July 23, 1990.  Within four days, testimony

            had revealed the E911 file to be largely in the public

            domain, and the charges against Neidorf were dropped.119



               Summary               Summary               Summary

               The explosive controversies of 1990, resulting from the

            Secret Service's crackdown on computer hackers, revealed the

            changing roles of some of the players in the regulatory

            process and the emergence of an entirely new player.


                                

               116Id. at 1278.

               117743 F.Supp. 556, 562.

               118Id. (quoting U.S. v. Rowlee, 899 F.2d 1275, 1280 (2d
            Cir. 1990)).

               119Markoff, supra note 35.


                                          113 






               Where it had previously remained quietly on the

            sidelines, law enforcement agencies, particularly the Secret

            Service, initiated the controversies over free speech and

            computers in the process of executing computer crime laws.

            The hacker community continued to act chiefly as catalyst,

            but by necessity found itself taking a more active role in

            the debate.  And in response to the evident disregard by law

            enforcement of the civil liberties of those it was

            investigating, the Electronic Frontier Foundation appeared

            to raise awareness of the civil-liberties issues that law

            enforcers appeared to be missing.


































                                          114 






                                     CHAPTER FIVE:                                     CHAPTER FIVE:                                     CHAPTER FIVE:

                                      Conclusions                                      Conclusions                                      Conclusions

               The events of 1983-1990, beginning with the release of

            the movie WarGames and culminating in Operation Sun Devil

            and the legal controversies surrounding Craig Neidorf and

            Steve Jackson, reveal a chaotic interplay of political

            forces, some of them new to the scene.  With a new and still

            largely unfamiliar technology, such chaos is understandable,

            and it is possible that expressions of fear for the future

            of the First Amendment have been overstated.

               Computer-based communication is, however, a troubled

            medium, and it is by no means certain that it will receive

            the First Amendment protection it deserves.  That it

            deserves First Amendment protection should not be doubted.

            The broad availability of the technology and the freedom and

            diversity of the content make computer-based communication

            possibly the purest expression of the First Amendment in

            existence today.  If, as A.J. Liebling said, freedom of the

            press belongs to those who own one, then thanks to computers

            and networking, today anyone with a few hundred dollars can

            own one and can have access to a broader audience than any

            mimeographed newsletter or handbill could ever reach.  A

            threat to the freedom of computer-based communication does

            indeed represent a threat to the very heart of the First

            Amendment.

               Threats to the medium's freedom have resulted not from

            affirmative governmental desires to censor so much as from 






            governmental failure to fully consider and recognize the

            nature of the medium.  An examination of the contribution of

            each of the important players considered in this thesis

            reveals a need to raise awareness of First Amendment issues

            and educate the uneducated about the powers (and

            limitations) of computer technology.



               Congress               Congress               Congress

               By and large, Congress did not intend the Counterfeit

            Access Device and Computer Fraud and Abuse Act of 1984 and

            the Computer Fraud and Abuse Act of 1986 laws to be aimed

            primarily at hackers.  Although deterrence and "sending a

            message" were part of their purpose, Congress realized that

            hackers were a minor threat at best to well-maintained

            computer systems.  Furthermore, witnesses and legislators

            seemed quite cautious about targeting only truly malicious

            criminals -- those who intended damage or sought financial

            gain -- rather than the merely mischievous.

               The primary thrust of this legislation was economic; it

            was to provide prosecutors the means to pursue white-collar

            criminals, usually insiders, whose crimes were strictly

            financial in nature.  These laws ultimately had little to do

            with the hacker subculture and certainly did not call for a

            wholesale persecution of hackers.

               Nonetheless, the hearings did demonstrate a fear of

            computers and of hackers.  The "hacker problem" was often

            exaggerated, and legislators tended to focus more upon the


                                          116 






            mysterious technology rather than the act itself.  This may

            explain why it was felt prosecutors needed new laws

            explicitly covering computer crime despite the fact that

            they had evidently not had great difficulty prosecuting

            computer criminals under the old laws.

               Perhaps because the 1984 and 1986 laws were narrowly

            tailored to apply to computer criminals, Congress apparently

            did not perceive a First Amendment concern connected with

            computer communication.  There did appear to be a

            recognition among some legislators and experts that the

            field was complicated, and that the question of placing

            monetary value upon information was a tricky one.  But the

            First Amendment did not itself appear to be implicated.

               That Congress failed to consider the First Amendment may

            have contributed to subsequent problems, because prosecutors

            and courts were left with no clear idea of legislative

            intent in that area.  Furthermore, although Congress was

            concerned with computer crime rather than speech, its

            emphasis upon the technology of an act (the computer) rather

            than upon the act itself may be symptomatic of the same

            conceptual problems facing computer communication.  By

            singling out computers for special legal treatment, even

            though the crime may be the same as one committed with a pen

            and paper, Congress has set a precedent that could deny

            computer-based communication the constitutional protection

            other media receive.




                                          117 






               Law Enforcement               Law Enforcement               Law Enforcement

               The early role of law enforcement agencies was largely to

            tell Congress what it wanted to hear: that it would be happy

            to have a new weapon to use in the fight against white-

            collar crime.  But enforcers were chiefly concerned with

            financial crimes such as embezzlement and fraud, crimes

            committed almost universally by "insiders" rather than

            hackers.  It is also significant that despite their

            willingness to add another statute to their arsenal,

            enforcers generally reported universal success in

            prosecuting computer crime under existing laws.

               Armed with the Counterfeit Access Device and Computer

            Fraud and Abuse Act of 1984 and the Computer Fraud and Abuse

            Act of 1986, however, law enforcement agencies in the United

            States -- particularly the Secret Service -- apparently

            interpreted these laws as a mandate to eradicate computer

            hackers of every stripe.  The sweeping crackdown of

            Operation Sun Devil and particularly the cases of Craig

            Neidorf and Steve Jackson Games suggest that in their zeal

            to root out the Legion of Doom, enforcers may have taken

            their authority beyond what Congress intended or the

            Constitution should allow.

               The actions of law enforcers during the events of 1990

            again reveal a basic fear and misunderstanding of computers

            and computer hackers.  This fear is almost certainly a

            result of simple ignorance.  Familiarity with computers and

            network technology reveals material such as the E911 file,


                                          118 






            GURPS Cyberpunk or Loyd Blankenship's comments about the

            Kermit protocol to be harmless.  Yet the Secret Service

            evidently believed each of these to be dangerous -- and in

            the case of the E911 file and Blankenship's Kermit comments,

            these beliefs led the agency to take disruptive action that

            deprived Craig Neidorf and Steve Jackson of their rights.

               However, despite the sinister images painted by some in

            the computer underground, law enforcement agencies such as

            the Secret Service have acted not out of any desire to

            abridge First Amendment rights, but out of ignorance.  The

            errors made by the agents who raided Steve Jackson Games,

            like the confusion of the FBI agent who visited John Perry

            Barlow, are indeed "in microcosm, the entire law enforcement

            structure of the United States" -- they are struggling to

            enforce laws regarding a technology that is, by and large,

            alien to them.  Where they have overreacted with

            exaggeration and fear, it is ultimately because they do not

            understand.



               Electronic Frontier Foundation               Electronic Frontier Foundation               Electronic Frontier Foundation

               The Electronic Frontier Foundation, then, appears to be

            on the right track with its stated goals to "engage in and

            support educational activities that increase popular

            understanding of the opportunities and challenges posed by

            computing and telecommunications" and "develop among policy-

            makers a clear understanding of the issues underlying free




                                          119 






            and open telecommunications."1  While coming to the legal

            defense of people like Craig Neidorf and Steve Jackson is a

            worthy goal -- and probably necessary if formal legal

            safeguards are to be put in place -- such legal struggles

            cannot alone solve the underlying problem.

               Indeed, the EFF's most important role in 1990 may have

            been that of educator and consciousness-raiser rather than

            litigator, as some of its legal arguments in the Neidorf

            case left something to desired.  For instance, its amicus

            brief asserted without support that information-gathering

            activity (such as Neidorf's receipt of the E911 file) enjoys

            the same First Amendment status as publication, a suggestion

            that would make a sweeping change in First Amendment law.  A

            long list of cases (chiefly Branzburg v. Hayes2 and Zemel v.

            Rusk3) shows that information gathering has never received



                                

               1"Goals of the Electronic Frontier Foundation," Effector,
            Sept. 1991, at 4.

               2"It is clear that the First Amendment does not
            invalidate every incidental burdening of the press that may
            result from the enforcement of civil or criminal statutes of
            general applicability." 408 U.S. 665, 682 (1971) (opinion of
            Justice White).

               3"There are few restrictions on action which could not be
            clothed by ingenious argument in the garb of decreased data
            flow.  For example, the prohibition of unauthorized entry
            into the White House diminishes the citizen's opportunities
            to gather information he might find relevant to his opinion
            of the way the country is being run but that does not make
            entry into the White House a First Amendment right.  The
            right to speak and publish does not carry with it the
            unrestrained right to gather information." 381 U.S. 1, 16-17
            (1964).


                                          120 






            the First Amendment protection given to publication.

            Equally questionable is the EFF's reliance on Smith v. Daily

            Mail and Landmark Communications v. Virginia to support the

            requirement of an overriding governmental interest.  These

            cases provide shaky support in a case such as Neidorf's,

            where the legality of the information gathering is in

            dispute, because both cases are explicitly limited to

            publication of information obtained legally.4

               Although Neidorf was vindicated, the outcome of his case

            was not the victory sought by the EFF.  Neidorf did not win

            his case by virtue of First Amendment protection, nor did he

            win it by virtue of innocence; the prosecution dropped the

            case primarily because it had received incorrect information

            from Bell South about the availability of the E911 file.5

            The case raised questions to which it provided no answers.

            Could publication of confidential information really be

            transporting stolen goods?  What liability was faced by the

            republisher of information that had been obtained illegally

            by someone else?



                                

               4"If the information is lawfully obtained, as it was
            here, the state may not punish its publication except when
            necessary to further an interest more substantial than is
            present here."  Smith v. Daily Mail, 443 U.S. 97 (1979)
            (emphasis added); "We are not here concerned with the
            possible applicability of the statute to one who secures the
            information by illegal means and thereafter divulges it."
            Landmark Communications v. Virginia, 435 U.S. 829 (1978).

               5"Enforcement Questions Raised After Hacker Case
            Dismissed," Washington Post, Aug. 2, 1990, at C13, col. 1.


                                          121 








               Hackers               Hackers               Hackers

               From the very beginning, computer hackers, a group that

            shuns attention, took on a central role in the controversy

            over computer security.  At first, their role was mainly

            that of catalyst.  The exploits of fictional hacker David

            Lightman in WarGames, given an air of authenticity by the

            subsequent arrests of the 414s, called public attention to

            the problems of computer security and the vulnerability of a

            computer-dependent society.  A few hackers, such as Neal

            Patrick of the 414s, did play a direct role in the early

            policymaking process by testifying before Congressional

            committees.  But such testimony -- which attempted to calm

            the hysteria by downplaying the danger and mystery of

            hacking -- had less of an effect on Congressional attitudes

            than did the perceived threat of an "electronic Messiah" or

            a "WarGames scenario."

               Later, it became clear that hackers, like the other

            players in this process, do have an agenda.  Actions such as

            Craig Neidorf's redistribution of the E911 file are not

            mindless vandalism, but are part of the hacker quest for a

            sort of ultimate "freedom of information," part of Levy's

            "Hacker Ethic."  Neidorf did not stand to gain anything

            personally -- except perhaps an enhanced reputation among

            hackers -- from his actions.  He sought merely to further

            the goals of decentralization and shared information.

            Whether or not these goals are wise, their advocacy is a


                                          122 






            position entitled to the opportunity to compete in the

            marketplace of ideas.  Neidorf's alleged advocacy of hacking

            in Phrack was not in furtherance of any scheme to defraud,

            as the government alleged; it was in pursuit of political,

            social and economic change, based on the belief that all

            information should be free.  Brandenburg v. Ohio explicitly

            affirmed that the First Amendment does not permit government

            to forbid advocacy even of violence to effect social

            change.6  Can the government forbid advocacy of unauthorized

            access to computers in pursuit of such goals?



               The Courts               The Courts               The Courts

               Although courts will likely have a strong influence upon

            the formation of policy regarding the freedom of computer-

            based communication -- as they have for other media -- the

            events of 1990 do not provide an adequate sample by which to

            judge what this influence will be.  The only judicial

            opinion addressing the First Amendment issues connected to

            the Secret Service's hacker crackdown was that of Judge Bua

            in the Neidorf case, an opinion in which the First Amendment

            questions were sidestepped.  Because a trial court's opinion

            carries no precedential weight and the subsequent dropping

            of the charges against Neidorf left no opportunity for





                                

               6395 U.S. 444, 447-448 (1969).


                                          123 






            appeal, the courts have yet to speak decisively in this

            matter.



               Recent Developments               Recent Developments               Recent Developments

               Two recent events may have significant implications for

            the future of computer-communication law.  On May 1, 1991,

            Steve Jackson Games and the Electronic Frontier Foundation

            filed a lawsuit against the United States Secret Service,

            citing, among other offenses, violations of the First and

            Fourth Amendments to the Constitution.7  The First Amendment

            charges were based upon the prior restraint that resulted

            from the confiscation of the GURPS Cyberpunk materials and

            from the seizure of SJG's BBS system.  Among many other

            charges, the lawsuit alleges that the Secret Service's

            affidavit was invalid because it swept within its scope

            numerous forms of First-Amendment-protected expression.

            Perhaps most significantly, the lawsuit specifically

            includes in that category "a BBS that was a forum for speech

            and association protected by the First Amendment."8

               The lawsuit, filed in the U.S. District Court for the

            western district of Texas, was hailed by EFF attorney Mike

            Godwin as "the most important case brought to date to


                                

               7Electronic Frontier Foundation, Press Release, May 1,
            1991.

               8Complaint and Demand for Jury Trial, Steve Jackson Games
            Inc. et al. v. U.S. Secret Service et al., U.S. District
            Court, Western District of Texas, Austin Division.


                                          124 






            vindicate the Constitutional rights of the users of

            computer-based communication technology."9  The SJG lawsuit

            may succeed where the Neidorf trial failed: It may provide

            the watershed case in which a court could define the First

            Amendment's applicability to computer-based communication.

               In an unrelated case, on October 29, 1991, the U.S.

            District Court for the Southern District of New York handed

            down a ruling that may prove to be a significant development

            in the law regarding computer communication.  In Cubby v.

            CompuServe, Inc.,10 Judge Peter K. Leisure dismissed a libel

            suit against the CompuServe information service regarding

            allegedly defamatory statements posted in one of its many

            forums, tackling the sticky question of sysop liability:

                    The requirement that a distributor must have
                 knowledge of the contents of a publication before
                 liability can be imposed for distributing that
                 publication is deeply rooted in the First
                 Amendment....
                    While CompuServe may decline to carry a given
                 publication altogether, in reality, once it does
                 decide to carry a publication, it will have little
                 or no editorial control over that publication's
                 contents....
                    CompuServe has no more editorial control over
                 such a publication than does a public library,
                 book store, or newsstand, and it would be no more
                 feasible for CompuServe to examine every
                 publication it carries for potentially defamatory
                 statements than it would be for any other
                 distributor to do so.11


                                

               9Press Release, supra note 7.

               101991 U.S. Dist. LEXIS 15545 (unreported as of November
            1991, retrieved from the LEXIS online database).

               11Id. at 9-11.


                                          125 






               Judge Leisure's reliance upon the First Amendment seems a

            clearer affirmation than ever that the First Amendment

            applies unequivocally to computer-based media (though it

            remains unclear which existing model, if any, is the best

            fit).  The decision seems to adopt the "knowing" test for

            sysop liability: that the sysop can only be held responsible

            if he is aware, or could reasonably be expected to be aware,

            of the defamatory material.



               The Direction of the Law               The Direction of the Law               The Direction of the Law

               Concerns over the First Amendment rights of computer

            communicators are legitimate.  But the overall direction of

            the law leaves room for optimism.  The Secret Service's

            crackdown on hackers in 1990 served to bring the questions

            of free speech and computer media into the public eye, and

            it was directly responsible for the creation of the

            Electronic Frontier Foundation.  Although individuals such

            as Steve Jackson and Craig Neidorf may have been injured by

            the persecution they endured, their cases demonstrated the

            need for greater understanding of computers and computer-

            based communication.   The controversies of 1990 have

            ensured that the formation of policy regarding computer

            communication will receive the attention it deserves from

            not only special-interest groups like the Electronic

            Frontier Foundation, but from the mainstream legal community

            as well.  Noted constitutional scholar Laurence Tribe has




                                          126 






            gone so far as to propose a constitutional amendment

            explicitly protecting computer communication:

                    If my own life as a lawyer and legal scholar
                 could leave just one legacy, I'd like it to be the
                 recognition that the Constitution as a whole
                 "protects people, not places."  If that is to come
                 about, the Constitution as a whole must be read
                 through a technologically transparent lens.  That
                 is, we must embrace, as a rule of construction or
                 interpretation, a principle one might call the
                 "cyberspace corollary."  It would make a suitable
                 Twenty-seventh Amendment to the Constitution, one
                 befitting the 200th anniversary of the Bill of
                 Rights....
                    The Twenty-seventh Amendment, to be proposed
                 for at least serious debate in 1991, would read
                 simply:
                    "This Constitution's protections for the
                 freedoms of speech, press, petition, and assembly,
                 and its protections against unreasonable searches
                 and seizures and the deprivation of life, liberty,
                 or property without due process of law, shall be
                 construed as fully applicable without regard to
                 the technological method or medium through which
                 information content is generated, stored, altered,
                 transmitted, or controlled."12

               Such a proposal, along with recent events such as Cubby

            v. CompuServe and the potential of Steve Jackson Games v.

            United States Secret Service, show that some of the

            strongest regulatory players may be on the side of freedom

            in cyberspace.










                                

               12L. Tribe, "The Constitution in Cyberspace," prepared
            remarks, keynote address at the First Conference on
            Computer, Freedom and Privacy, Mar. 26, 1991.


                                          127 






                                    BIBLIOGRAPHY                                    BIBLIOGRAPHY                                    BIBLIOGRAPHY



            Books            Books            Books

            De Sola Pool, Technologies of Freedom (1983)

            Krasnow, Longley, and Terry, The Politics of Broadcast
               Regulation (3d. ed. 1982).

            Levy, Hackers (Paperback ed. 1984).

            Freedman, The Computer Glossary (4th ed. 1989)

            Hafner and Markoff, Cyberpunk: Outlaws and Hackers on the
               Computer Frontier (1991).

            Dvorak and Anis, Dvorak's Guide to PC Telecommunications
               (1990).



            Magazine Articles            Magazine Articles            Magazine Articles

            Costikyan, "Closing the Net," Reason, Jan. 1991, at 22.

            Kapor, "Civil Liberties in Cyberspace," Scientific American,
               Sept. 1991, at 116.

            Barlow, "Crime and Puzzlement," Whole Earth Review, Fall
               1990, at 45.



            Law Review Articles            Law Review Articles            Law Review Articles

            R. Neustadt, G. Skall, M. Hammer, "The Regulation of
               Electronic Publishing," 33 Fed. Comm. L.J. 331 (1981).

            K. Uyehara, "Computer Bulletin Boards: Let the Operator
               Beware," 14 Student Lawyer, April 1986, at 30.

            M. E. Katsh, "The First Amendment and Technological Change:
               The New Media Have a Message," 57 Geo. Wash. L. Rev. 1459
               (1989).

            R. Charles, "Computer Bulletin Boards and Defamation: Who
               Should Be Liable? Under What Standard?" 2 J. of Law and
               Technology, Winter 1987, at 121.

            E. Jensen, "An Electronic Soapbox: Computer Bulletin Boards
               and the First Amendment," 39 Fed. Comm. L.J. 217 (1987). 





            E. Di Cato, "Operator Liability Associated With Maintaining
               a Computer Bulletin Board," 4 Software L.J. 147 (1990).

            J. Soma, P. Smith, R. Sprague, "Legal Analysis of Electronic
               Bulletin Board Activities," 7 W. New Eng. L. Rev. 571
               (1985).

            R. Beall, "Developing a Coherent Approach to the Regulation
               of Computer Bulletin Boards," 7 Computer/Law Journal 499
               (1987).

            J. Hurwitz, "Teletext and the FCC: Turning the Content
               Regulatory Clock Backwards," 64 Boston Univ. L. Rev. 1057
               (1984).

            R. Hindman, "The Diversity Principle and the MFJ Information
               Services Restriction: Applying Time-Worn First Amendment
               Assumptions to New Technologies," 38 Catholic Univ. L.
               Rev. 471 (1989).

            L. Becker, "Electronic Publishing: First Amendment Issues in
               the Twenty-First Century," 13 Fordham Urban L.J. 801
               (1985).



            Congressional Hearings and Reports            Congressional Hearings and Reports            Congressional Hearings and Reports

            Computer and Communications Security and Privacy: Hearings
               Before the Subcommittee on Transportation, Aviation and
               Materials of the Committee on Science and Technology,
               House of Representatives, 98th Cong., 1st Sess. (1983).

            Computer and Communications Security and Privacy: Report
               Prepared by the Subcommittee on Transportation, Aviation
               and Materials, Transmitted to the Committee on Science
               and Technology, House of Representatives, 98th Cong., 2d
               Sess. (1984).

            Computer Crime: Hearing Before the Subcommittee on Civil and
               Constitutional Rights of the Committee on the Judiciary,
               House of Representatives, 98th Cong., 1st Sess. (1983).

            Computer Fraud Legislation: Hearing Before the Subcommittee
               on Criminal Law of the Committee on the Judiciary, U.S.
               Senate, 99th Cong., 1st Sess. (1985).

            Health and the Environment Miscellaneous -- Part 4: Hearings
               Before the Subcommittee on Health and the Environment of
               the Committee of Energy and Commerce, House of
               Representatives, 98th Cong. (1984).

            Counterfeit Access Device and Computer Fraud and Abuse Act:
               Hearings Before the Subcommittee on Crime of the


                                         129 





               Committee on the Judiciary, House of Representatives,
               98th Cong., 1st and 2d Sess. (1983-84).

            Computer Fraud and Abuse Act of 1986: Hearing Before the
               Committee on the Judiciary, U.S. Senate, 99th Cong., 2d
               Sess. (1986).

            Use of Computers to Transmit Material Inciting Crime:
               Hearing Before the Subcommittee on Security and Terrorism
               of the Committee on the Judiciary, United States Senate,
               99th Cong., 1st Sess. (1985).



            Cases            Cases            Cases

            U.S. v. Riggs, 739 F.Supp. 414 (N.D. Ill. 1990).

            U.S. v. Riggs, 743 F.Supp. 556 (N.D. Ill. 1990).



            Online Sources            Online Sources            Online Sources

            Jargon File version 2.9.6 (Aug. 16, 1991), distributed via
               the Internet.

            G. Spafford, What Is Usenet? (Sept. 9, 1991), distributed
               via Usenet.

            Computer Underground Digest, published every two to three
               weeks via Usenet.
























                                         130