923 lines
44 KiB
Plaintext
923 lines
44 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
****************************************************************************
|
|||
|
>C O M P U T E R U N D E R G R O U N D<
|
|||
|
>D I G E S T<
|
|||
|
*** Volume 3, Issue #3.09 (March 19, 1991) **
|
|||
|
****************************************************************************
|
|||
|
|
|||
|
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
|
|||
|
ARCHIVISTS: Bob Krause / Alex Smith / Bob Kusumoto
|
|||
|
RESIDENT GAEL: Brendan Kehoe
|
|||
|
|
|||
|
USENET readers can currently receive CuD as alt.society.cu-digest.
|
|||
|
Back issues are also available on Compuserve (in: DL0 of the IBMBBS sig),
|
|||
|
PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on
|
|||
|
FIDOnet. Anonymous ftp sites: (1) ftp.cs.widener.edu (or
|
|||
|
192.55.239.132) (back up and running) and (2)
|
|||
|
cudarch@chsun1.uchicago.edu E-mail server:
|
|||
|
archive-server@chsun1.uchicago.edu.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted as long as the source is
|
|||
|
cited. Some authors, however, do copyright their material, and those
|
|||
|
authors should be contacted for reprint permission. It is assumed
|
|||
|
that non-personal mail to the moderators may be reprinted unless
|
|||
|
otherwise specified. Readers are encouraged to submit reasoned
|
|||
|
articles relating to the Computer Underground. Articles are preferred
|
|||
|
to short responses. Please avoid quoting previous posts unless
|
|||
|
absolutely necessary.
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Contributors assume all
|
|||
|
responsibility for assuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
CONTENTS THIS ISSUE:
|
|||
|
File 1: "Hollywood Hacker" or More Media and LE Abuse?
|
|||
|
File 2: Computer Publication and the First Amendment
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.09, File 1 of 2: Hollywood Hacker or Media Hype? ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
From: Jim Thomas / CuD
|
|||
|
Subject: "Hollywood Hacker" or More Media and LE Abuse?
|
|||
|
Date: March 20, 1991
|
|||
|
|
|||
|
In CuD 3.08 we asked for information on the Hollywood Hacker.
|
|||
|
Here's what we've learned so far.
|
|||
|
|
|||
|
Stuart Goldman, a freelance investigative reporter, was raided on
|
|||
|
March 8, 1990, by Secret Service agents and the Los Angeles Police.
|
|||
|
According to news stories in the Los Angeles Times and elsewhere,
|
|||
|
Goldman was working on an expose of "sleaze-tv" shows such as Current
|
|||
|
Affair and Hard Copy, shows for which he had also provided written
|
|||
|
material. According to the news accounts, Goldman was caught
|
|||
|
attempting to access Fox computers in New York and Los Angeles
|
|||
|
containing files relevant to Current Affair. He was charged with the
|
|||
|
usual litany of allegations (fraud, theft, etc) under Section
|
|||
|
502(c)(2) of the California Penal Code. Section 502(c)(2) is
|
|||
|
sufficiently vague to make any number of acts a felony:
|
|||
|
|
|||
|
s 502 (c) Except as provided in subdivision (h), any person
|
|||
|
who commits any of the following acts is guilty of a public
|
|||
|
offense:
|
|||
|
(1) Knowingly accesses and without permission alters,
|
|||
|
damages, deletes, destroys, or otherwise uses any data,
|
|||
|
computer, computer system, or computer network in order to
|
|||
|
either (A) devise or execute any scheme or artifice to
|
|||
|
defraud, deceive, or extort, or (B) wrongfully control or
|
|||
|
obtain money, property, or data.
|
|||
|
(2) Knowingly accesses and without permission takes, copies,
|
|||
|
or makes use of any data from a computer, computer system,
|
|||
|
or computer network, or takes or copies any supporting
|
|||
|
documentation, whether existing or residing internal or
|
|||
|
external to a computer, computer system, or computer
|
|||
|
network.
|
|||
|
|
|||
|
Conviction carries the following:
|
|||
|
|
|||
|
(d) (1) Any person who violates any of the provisions of
|
|||
|
paragraph (1), (2), (4), or (5) of subdivision (c) is
|
|||
|
punishable by a fine not exceeding ten thousand dollars
|
|||
|
($10,000), or by imprisonment in the state prison for 16
|
|||
|
months, or two or three years, or by both that fine and
|
|||
|
imprisonment, or by a fine not exceeding five thousand
|
|||
|
dollars ($5,000), or by imprisonment in the county jail not
|
|||
|
exceeding one year, or by both that fine and imprisonment.
|
|||
|
|
|||
|
WHAT IS THE CASE ABOUT?
|
|||
|
|
|||
|
Piecing together the various news accounts and info from some of the
|
|||
|
legal documents we have obtained, the following seems to be the
|
|||
|
gist of the matter:
|
|||
|
|
|||
|
--Goldman had contributed material both to Fox's Current Affair and
|
|||
|
Paramount's Hard Copy, two competitors in the "sleaze-tv" school of
|
|||
|
journalism.
|
|||
|
|
|||
|
--According to various news articles, he was an articulate gadfly,
|
|||
|
specializing in "expose" pieces for both tv and hardcopy media. He
|
|||
|
was working on a story about tabloid tv, including the content and
|
|||
|
practices of Hard Copy and Current Affair when arrested.
|
|||
|
|
|||
|
--As near as can be interpreted from the search affidavit and news
|
|||
|
accounts, it appears that Goldman possessed access to a computer
|
|||
|
account at Fox, which he may or may not have had legitimate (or
|
|||
|
believed he had legitimate) access to. If we are interpreting the
|
|||
|
public information correctly, it appears that no password was required
|
|||
|
to access the accounts, only the log-on id. Tracey Miller, of KFI's
|
|||
|
Live Line in Los Angeles, described Goldman as some one who "had
|
|||
|
managed to infiltrate the world of tabloid journalism and then got
|
|||
|
caught up in a sting operation involving Fox Television computers."
|
|||
|
|
|||
|
--The search affidavit indicates that Paul Smirnoff, of Fox tv in New
|
|||
|
York, noticed attempted logins to the Fox computer in New York used by
|
|||
|
Current Affair writers. The account had a null password (meaning no
|
|||
|
password is required to gain access to the system) and the person to
|
|||
|
whom the account belonged indicated that she had not changed the
|
|||
|
password "for sometime." Smirnoff directed that a "bait" story be left
|
|||
|
in the LA computer. Using a phone trap and caller logs, investigators
|
|||
|
gathered evidence for their allegations against Goldman. On March 8,
|
|||
|
1990, local police and Secret Service agents burst into Goldman's
|
|||
|
apartment. However, unlike other raids, of which we have had
|
|||
|
second-hand reports, there was an added twist to this one: FOX
|
|||
|
TELEVISION WAS PRESENT WITH REPORTERS AND CAMERA CREW!
|
|||
|
|
|||
|
HACKING OR MEDIA HYPE?
|
|||
|
|
|||
|
Why was Fox tv present on this raid? The Secret Service has been
|
|||
|
surprisingly reticent about their procedures to the point of
|
|||
|
revealing little information in interviews, let alone allowing
|
|||
|
video tapes to be made. We are repeatedly told that the time and dates
|
|||
|
of raids are "secret." Yet, not only was Fox present, but they seemed
|
|||
|
to have full cooperation from the agents present. Is collusion in
|
|||
|
media events a standard practice between law enforcement and the
|
|||
|
media? Were other news agencies invited? How does Fox rate? If CuD
|
|||
|
asked to participate and report on a raid, my guess is that the
|
|||
|
response would be less than enthusiastic. The video was hyped on Fox
|
|||
|
on March 8 and shown on the news, teasing the audience with
|
|||
|
sensationalistic promos and dubbing Goldman "The Hollywood Hacker." In
|
|||
|
the current climate of media hyperbole and so-called crackdowns, this
|
|||
|
strikes us has highly prejudicial.
|
|||
|
|
|||
|
The news broadcast of the tape comes across like a segment from
|
|||
|
"COPS" or a Geraldo Rivera segment. There are the usual
|
|||
|
teases "Its not military espionage and it's not corporate
|
|||
|
spying," and the caption "HOLLYWOOD HACKER" graphically frames
|
|||
|
for the audience how to interpret the events: This is not simply
|
|||
|
a suspect, it is....THE HOLLYWOOD HACKER. Not "alleged" HH, but
|
|||
|
the real McCoy!
|
|||
|
|
|||
|
The tape opens with agents outside a door in bullet proof vests
|
|||
|
with guns drawn, hanging menacingly in a "hacker's might be
|
|||
|
dangerous so we'd better be ready to blow the suck fuck away"
|
|||
|
position. Granted, this was not as dramatic as the tapes of the
|
|||
|
magnum-force beating of a Black LA motorist, but the sources of
|
|||
|
such violence are more readily understandable when the force
|
|||
|
of a raid is graphically depicted. One wonders whether Keating,
|
|||
|
Ollie North, and others more preferentially situated stared down
|
|||
|
a phallus surrogate when they were arrested. LE agents tell us
|
|||
|
drawn weapons are standard procedure, because they never know
|
|||
|
what may lie on the other side of the door. But, in case after
|
|||
|
case of hacker raids, one wonders how many computerists shot it
|
|||
|
out with the cops? And, if the situation was so dangerous, one
|
|||
|
wonders why the tv crowd was allowed to charge in amidst the
|
|||
|
officers.
|
|||
|
|
|||
|
On the tape, loud voices can be heard yelling: "Open the Door!!!!"
|
|||
|
several times, and police and camera crowd enter, police with guns
|
|||
|
drawn, Fox Folk with cameras rolling. Agents are yelling "Hands up!!
|
|||
|
Against the Wall!" several times. The cameras are panning around and
|
|||
|
focus on Goldman sitting on a couch, reading the arrest warrant.
|
|||
|
Goldman's face was not, as it seems to be in shows such as COPS,
|
|||
|
blocked out, and from all appearances, he could pass for an IBM senior
|
|||
|
executive in his mid 40s.
|
|||
|
|
|||
|
WHY SHOULD THE CU CARE?
|
|||
|
|
|||
|
As with so many of the so-called hacker raids in the past year, it is
|
|||
|
neither guilt nor innocence, but the questions raised by procedure
|
|||
|
that should bother us:
|
|||
|
|
|||
|
1. The role of the media in inflaming public conceptions of hacking
|
|||
|
seems, in this case, to exceed even the cynical view of
|
|||
|
sensationalistic vested interests. The presence of a Fox news team and
|
|||
|
the subsequent hacker hyperbole for what the indictment suggests is a
|
|||
|
trivial offense at worst, makes one wonder whether some other motive
|
|||
|
other than computer access might not have led to the raid. We have
|
|||
|
seen from the events of 1990 that "victims" of computer intruders tend
|
|||
|
to grossly over-state losses. Only further inquiry will reveal
|
|||
|
whether Fox had motives for challenging an investigative journalist
|
|||
|
doing exposes on the type of tabloid tv they have made popular. It
|
|||
|
is worth noting that the Secret Service was involved in part because
|
|||
|
of a claim of a "federal interest computer," but, according to news
|
|||
|
accounts, they withdrew from the case almost immediately. Given the
|
|||
|
tenacity with which they have pursued other cases on less evidence
|
|||
|
(such as Steve Jackson Games, where part of the "evidence" was an
|
|||
|
employing explaining in a BBS post that Kermit is a 7-bit protocol),
|
|||
|
one wonders why they apparently ducked this case so quickly?
|
|||
|
|
|||
|
2. A second issue of relevance for the CU is the definition of
|
|||
|
"hacker." By no stretch of the imagination can the acts of whoever
|
|||
|
allegedly accessed the Fox computers be called hacking. From the few
|
|||
|
legal documents we have obtained and from media accounts, the action
|
|||
|
seems more akin to a graduate student using the account of another grad
|
|||
|
student without "official" authorization. We do not defend computer
|
|||
|
trespass, but we do strongly argue that there must be some distinction
|
|||
|
between types of trespass and what is done once a trespass occurs.
|
|||
|
|
|||
|
3. We have not yet contacted Ralph Greer, the apparent attorney of
|
|||
|
record in this case, so we can only surmise on a few possible issues.
|
|||
|
We wonder if the case is being treated as a typical criminal case or
|
|||
|
whether it is recognized that there are issues here that extend far
|
|||
|
beyond the "normal" crime of "theft," "fraud," and other metaphoric
|
|||
|
definitions brought to bear on computer cases? We also wonder if,
|
|||
|
like some others, there is any pressure to "cop a plea" because of the
|
|||
|
lack of a creative defense that Sheldon Zenner, The EFF and others
|
|||
|
have introduced in some other cases? Again, for us the concern is not
|
|||
|
who is or is not guilty in this case, but with the problem of
|
|||
|
defending against charges that seem far in excess of the act.
|
|||
|
|
|||
|
4. The matter of defense also raises the issue of California law.
|
|||
|
Parts of Section 502 and 502.7, as we (and others) have argued
|
|||
|
previously, see overly vague, excessively punitive, and could make
|
|||
|
even the most trivial form of trespass a felony. To non-lawyers such
|
|||
|
as ourselves, it seems that the alleged acts would, in most states, at
|
|||
|
worst be a misdemeanor and not subject a potential offender to three
|
|||
|
or more years in prison.
|
|||
|
|
|||
|
5. We have argued long and loud against the current tactics employed
|
|||
|
by agents on computer raids. Yes, we recognize that there are standard
|
|||
|
procedures and we recognize that police do face potential danger in
|
|||
|
raids. However, to raid an alleged computer offender in the same way
|
|||
|
that a crack house is raided seems over-kill and dangerous. There are
|
|||
|
many ways to arrest suspects, and raids, although dramatic, do not
|
|||
|
seem justified in any single case of which we are aware. The tv tape
|
|||
|
suggests that, if the suspect made an improper move (especially in the
|
|||
|
confusion of everybody yelling at once, the suspect perhaps responding
|
|||
|
to one set of commands and ignoring another, tv camera people in the
|
|||
|
thick of things), a tragic consequence could have occured. We should
|
|||
|
all be concerned with the "police state" mentality in such instances.
|
|||
|
Yes, there may be times when caution and full operative procedures on
|
|||
|
computer criminals is justified, but suspected hackers are not your
|
|||
|
typical computer criminals. One wonders what the response will be if a
|
|||
|
young teenager makes a "furtive gesture" and is blown away. One
|
|||
|
credible teenager once told us that when he was arrested, the police
|
|||
|
burst into his room with guns drawn. He was at the keyboard of his
|
|||
|
computer, and the agent in charge, perhaps to impress her male
|
|||
|
colleagues, allegedly pointed the gun to his head and said, "Touch
|
|||
|
that keyboard and die!"
|
|||
|
|
|||
|
6. The search warrant for Goldman's apartment authorizes seizure of a
|
|||
|
variety of material that seems--as it has in other cases--far in
|
|||
|
excess of what could even by a computer illiterate be used for any
|
|||
|
related offenses. This raises the issue of what constitutes "evidence"
|
|||
|
in such cases. We have seen from other raids that posters, personal
|
|||
|
letters unrelated to computers, news clippings, telephones, video
|
|||
|
tapes, science fiction books, research notes, and other artifacts were
|
|||
|
taken. Law enforcement agents readily justify this, but when raiding
|
|||
|
forgers, car thiefs, or even drug dealers, the scope of seized
|
|||
|
equipment is much narrower. Police, to our knowledge, do not
|
|||
|
confiscate all the spoons in the house, the matches, or the stove,
|
|||
|
when arresting suspected junkies. Yet, this is the mentality that
|
|||
|
seems to guide their seizures of equipment in computer cases.
|
|||
|
|
|||
|
In a recent issue of RISKS Digest, moderator Peter G. Neumann observed
|
|||
|
"that there is still a significant gap between what it is thought the
|
|||
|
laws enforce and what computer systems actually enforce." I interpret
|
|||
|
this to mean simply that the law has not caught up to changing
|
|||
|
technology, and old, comfortable legal metaphors are inappropriately
|
|||
|
applied to new, qualitatively different conditions. Calling simple
|
|||
|
computer trespass (even if files are perused) a heavy-duty felony
|
|||
|
subjecting the offender to many years in prison does not seem
|
|||
|
productive.
|
|||
|
|
|||
|
The point seems to be that emerging computer laws are archaic. Neither
|
|||
|
those who write the laws nor those who implement them have a clear
|
|||
|
understanding of what is involved or at stake. When mere possession
|
|||
|
(not use, but possession) of "forbidden knowledge" can be a felony (as
|
|||
|
it is in California), we must begin to question what the law thinks
|
|||
|
it's enforcing.
|
|||
|
|
|||
|
Few objected to the enactment of RICO laws, and fewer still to the
|
|||
|
laws allowing confiscation of property of drug suspects. The attitude
|
|||
|
seemed to be that harsh measures were justified because of the nature
|
|||
|
of the problem. Yet, those and similar laws have been expanded and
|
|||
|
applied to those suspected of computer abuse as we see in the cases of
|
|||
|
Steve Jackson Games, RIPCO BBS, the "Hollywood Hacker," and others
|
|||
|
have been raided under questionable circumstances.
|
|||
|
|
|||
|
I'm wondering: What does law think it's enforcing? What is the
|
|||
|
appropriate metaphor for computer trespass? What distinctions should
|
|||
|
be made between types of offense? Please remember, nobody is
|
|||
|
justifying trespass, so continual harangues on its dangers miss the
|
|||
|
point. I am only suggesting that there is a greater risk from
|
|||
|
misapplication of law, which--like a virus--has a historical tendency
|
|||
|
to spread to other areas, than from computer hackers. It's easier to
|
|||
|
lock out hackers than police with guns and the power of the state
|
|||
|
behind them, and we have already seen the risks to people that result
|
|||
|
from over-zealous searches, prosecution, and sentencing.
|
|||
|
|
|||
|
And, at the moment, I suggest that it's law enforcement agents who are
|
|||
|
the greatest danger to the computer world, not hackers. Why? Because
|
|||
|
"there is still a significant gap between what it is thought the laws
|
|||
|
enforce and what computer systems actually enforce." As Edmund Burke
|
|||
|
once (presumably) said, the true danger is when liberty is nibbled way
|
|||
|
for expedience and by parts.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Thu, 28 Feb 91 09:53:50 EST
|
|||
|
From: "Brian J. Peretti" <PERETTI@AUVM.BITNET>
|
|||
|
Subject: Computer Publication and the First Amendment
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.09: File 2 of 2: Computers & First Amendment ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
Computer Publication and The First Amendment
|
|||
|
|
|||
|
|
|||
|
Copyright Brian J. Peretti
|
|||
|
Computers and the Law
|
|||
|
|
|||
|
|
|||
|
Since their introduction, personal computers have had a tremendous impact
|
|||
|
on society. Computer, printers and their software have replaced
|
|||
|
accountants, secretaries and even typewriters in many offices across the
|
|||
|
United States. With the advent of this new way to gather, process and
|
|||
|
distribute information, new problems, many that could never have been
|
|||
|
perceived by the Framers of the Constitution, have developed. The
|
|||
|
Constitution is the basis of law in the United States. Although created in
|
|||
|
1787, it still governs the manner in which legal decisions are made with
|
|||
|
very few changes. It, along with the Bill of Rights and other amendments,
|
|||
|
has established what may or may not be done to a person, group,
|
|||
|
organization or business without infringing on its rights. The broad
|
|||
|
language was created so that the Constitution would be able to change and
|
|||
|
expand with the times. Although the founding fathers did have an idea of
|
|||
|
what the press was in their day, it has been expanded to cover television
|
|||
|
and radio. This coverage should be expanded to encompass the new media of
|
|||
|
computer publications. By deciding that computer publications will have
|
|||
|
the same rights under the first amendment as newspapers, information will
|
|||
|
be dispersed throughout the nation in a more efficient manner so that the
|
|||
|
goal of the first amendment will become reality.
|
|||
|
|
|||
|
I. What is a computer publication
|
|||
|
|
|||
|
Computer publications can take many forms. It has been
|
|||
|
argued that bulletin boards should be considered computer
|
|||
|
publications. The reason is that since the people who are in
|
|||
|
contact with the bulletin boards must communicate with the boards
|
|||
|
through the written word, that these communications should thus
|
|||
|
be considered publications.
|
|||
|
This paper is concerned with publications that are created
|
|||
|
exclusively on a computer or computer system. There have been
|
|||
|
only a few such computer publications.1
|
|||
|
There has not been a definition defining what is a computer
|
|||
|
publication. However, there are many similarities between the
|
|||
|
various newsletters that will give us a definition of what one
|
|||
|
is. First, all of the material which makes up the publication
|
|||
|
must have been created on a computer. This is to say, that
|
|||
|
although the information may have been written on paper as rough
|
|||
|
drafts or may have been gleaned from printed books or newspaper,
|
|||
|
the articles that compose the publication must have been written
|
|||
|
IN FINAL FORM ON THE COMPUTER.
|
|||
|
The production of the newsletter must also occur exclusively
|
|||
|
on the computer. This includes the editing, the check for
|
|||
|
spelling and formatting errors and the actual production of what
|
|||
|
the newsletter will look like, including the letterhead of the
|
|||
|
publication, if there is to be one.
|
|||
|
The transportation of the material that is to be contained
|
|||
|
in the newsletter must occur via a computer network2 or by an
|
|||
|
exchange of magnetic disk3, magnetic tape4, electrical impulses
|
|||
|
or other non-print media. This includes not only the gathering
|
|||
|
of the stories, but also the distribution of the newsletter to
|
|||
|
its subscribers.
|
|||
|
The computer magazines or newsletters that have existed in
|
|||
|
the past also had a common denominator in that they almost
|
|||
|
exclusively were published by computer users, for computer users
|
|||
|
and concerned computer topics. Although this could be a
|
|||
|
criteria, it would be to restrictive. It is very likely, with
|
|||
|
the continued proliferation of computers in our society, that
|
|||
|
publications with a much different orientations will emerge. If
|
|||
|
computer publications are to be protected, the topic of their
|
|||
|
publication should not be determinative of whether they fall
|
|||
|
under the definition of a computer publication.
|
|||
|
There are other publications that address the same issues
|
|||
|
that have been published in "Phrack". An example is 2600 on Long
|
|||
|
Island, New York which publishes material in printed form
|
|||
|
concerning generally the same information.5 However, it is the
|
|||
|
form in which "Phrack" was published and not the content of the
|
|||
|
magazine that is the issue of this paper.
|
|||
|
|
|||
|
II. Phrack6
|
|||
|
|
|||
|
Craig Neidorf is a student at the University of Missouri.
|
|||
|
At sixteen, he and a friend started to publish Phrack7. The
|
|||
|
way in which he went about creating his newsletter was to accept
|
|||
|
articles written by persons throughout the country. These
|
|||
|
articles would be left in his mailbox at the university or to
|
|||
|
retrieve articles written on computer bulletin boards. After he
|
|||
|
logged on to the system, he would then mail the articles from the
|
|||
|
mainframe computer to his person computer at his residence. If
|
|||
|
these articles would need to be edited, he would then do any
|
|||
|
necessary editing. Once he complied a large enough group of
|
|||
|
articles, he would then send the articles to the mainframe
|
|||
|
computer along with a heading and send it to his 250 subscribers.
|
|||
|
There was no charge for the newsletter.8
|
|||
|
|
|||
|
III. The Historic Rights of the Press
|
|||
|
|
|||
|
In order to discover whether or not the protections afforded
|
|||
|
to the press in the first amendment should be extended to this
|
|||
|
new form of information distribution, a look to the past is
|
|||
|
essential. Originally, control of the press by government was
|
|||
|
total. However, as time passed, both the monarch of Great
|
|||
|
Britain and their rulers in the American Colonies allowed greater
|
|||
|
freedom to publish.
|
|||
|
|
|||
|
A. The English Experience.
|
|||
|
|
|||
|
At first, England was an absolute monarchy, in which the
|
|||
|
king could do as he pleased. In 1215, the Magna Carta was
|
|||
|
signed, whereby the lords of England put restrictions on the
|
|||
|
King, which he pledged not to violate.9 The document, although
|
|||
|
not seen as an admission of the King that there were civil right,
|
|||
|
he did acknowledge that there were some basic human rights.10
|
|||
|
In 1275, the De Scandalis Magnatum was enacted which
|
|||
|
punished anyone who disseminated untrue information or "tales"
|
|||
|
that could disrupt the atmosphere between the king and his
|
|||
|
people.11 Over time this statute was gradually expanded. In
|
|||
|
1378, it was broadened to cover "peers, prelates, justices and
|
|||
|
various other officials and in the 1388 reenactment, offenders
|
|||
|
could be punished "by the advice of said council."12
|
|||
|
The first printing presses were established in Great Britain
|
|||
|
toward the end of the 15th century. When the De Scandalis
|
|||
|
Magnatum was reenacted in 1554 and 1559, "seditious words" were
|
|||
|
included as words that could bring punishment.13 This law,
|
|||
|
enforced by the Court of the Star Chamber, was a criminal statute
|
|||
|
to punish political scandal.14
|
|||
|
Regulations placed upon printers soon followed. In 1585,
|
|||
|
the Star Chamber required that in order to print a book, the
|
|||
|
publisher would have to get a license.15 A monopoly was created
|
|||
|
in the Stationers' Company, which had 97 London stationers, that
|
|||
|
could seize the publications of all outsiders.16 A 1637 ordnance
|
|||
|
limited the number of printers, presses and apprentices.17
|
|||
|
Punishment, at the time, was not limited to just printing, but
|
|||
|
also to "epigram[s] or rhyme[s] in writing sung and repeated in
|
|||
|
the presence of others . . . [or] an ignominious or shameful
|
|||
|
painting or sign."18
|
|||
|
Although the Star Chamber had been abolished in 1641, the
|
|||
|
licensing system remained through the orders of 1642 and 1643.19
|
|||
|
The Licensing Act of 1662 was a temporary statute which kept the
|
|||
|
licensing provisions until 1679, when it expired.20 During the
|
|||
|
reign of James II, licensing was renewed only to expire and not
|
|||
|
be reenacted in 1695.21
|
|||
|
Having realized that licensing was not the answer, Queen
|
|||
|
Anne in 1711 enacted a Stamp Act, by which a duty was imposed on
|
|||
|
all newspapers and advertisements.22 The purpose was to both
|
|||
|
restrain the press and destroy all but the larger newspapers.23
|
|||
|
Blackstone summed up the state of the law Great Britain
|
|||
|
concerning the press in his Commentaries by writing:
|
|||
|
The liberty of the press is indeed essential to the
|
|||
|
nature of a free state; but this consists in laying no
|
|||
|
previous restraints upon publications, and not in freedom
|
|||
|
from censure for criminal matter when published. Every
|
|||
|
freeman has an undoubted right to lay what sentiments he
|
|||
|
pleases before the public; to forbid this, is to destroy
|
|||
|
the freedom of the press; but if he publishes what is
|
|||
|
improper, mischievous, or illegal, he must take the
|
|||
|
consequences of his own temerity.24
|
|||
|
|
|||
|
B. The Colonial Experience
|
|||
|
The first presses arrived at Harvard University in 1638 and
|
|||
|
were used to disseminate church information.25 Aside from this
|
|||
|
purpose the colonial governments, when still under the power of
|
|||
|
Great Britain did not look favorably upon the press. However,
|
|||
|
with power in the colony moving toward the people, the press
|
|||
|
gained more freedom from the strict control imposed by the
|
|||
|
government.
|
|||
|
Each colony treated the press differently, although each did
|
|||
|
restrict the press. In 1671, Governor Berkeley of Virginia wrote
|
|||
|
"But I thank God, there are no free schools nor printing, and I
|
|||
|
hope we shall not have these hundred years; for learning has
|
|||
|
brought disobedience, and heresy, and sects into the world, and
|
|||
|
printing has divulged them, and libels against the best
|
|||
|
government. God keep us from both!"26 In New York, until 1719,
|
|||
|
all governors "had been instructed to permit no press, book,
|
|||
|
pamphlets or other printed matter %without your especial leave &
|
|||
|
license first obtained.'"27
|
|||
|
Gradually, state controls of the press gradually
|
|||
|
diminished.28 The Trial of John Peter Zenger, 17 Howell's St. Tr.
|
|||
|
675 (1735) illustrates how much the colonists were opposed to
|
|||
|
restrictions on the press. Zenger had printed material in his
|
|||
|
New York Weekly Journal a satiric article critical of New York
|
|||
|
Governor William Cosby. The governor had Zenger charged with
|
|||
|
seditious liable by the Attorney General after neither a Grand
|
|||
|
Jury would indict nor the General Assembly take action.29
|
|||
|
Although all the jury had to do was find him guilty was to
|
|||
|
declare that he published the paper, Zenger's attorney, Andrew
|
|||
|
Hamilton of Philadelphia argued a much larger issue. He put
|
|||
|
before the jury the argument that truth is a defense to liable,
|
|||
|
although the court rejected it.30 He was able to win an
|
|||
|
acquittal of Zenger by requesting that the jury give a general
|
|||
|
verdict of not guilty instead of a special verdict, which the
|
|||
|
court requested, and which the jury did.31
|
|||
|
|
|||
|
C. The Adoption of the First Amendment
|
|||
|
"The struggle for the freedom of the press was primarily
|
|||
|
directed against the power of the licensor. . . . And the liberty
|
|||
|
of the press became initially a right to publish %without a
|
|||
|
license what formerly could be published only with one.' While
|
|||
|
this freedom from previous restraint upon publication cannot be
|
|||
|
regarded as exhausting the guaranty of liberty, the prevention of
|
|||
|
that restraint was a leading purpose in the adoption of the
|
|||
|
constitutional provision."32 The purpose of the first amendment
|
|||
|
is "to prevent all such previous restraints upon publication as
|
|||
|
had been practiced by other government."33
|
|||
|
The first amendment states "Congress shall make no law
|
|||
|
respecting an establishment of religion, or prohibiting the free
|
|||
|
exercise thereof; or abridging the freedom of speech, or of the
|
|||
|
press; or the right of the people peaceably to assemble, and to
|
|||
|
petition the Government for a redress of grievances."34 It was
|
|||
|
originally proposed as part of twelve amendments to the United
|
|||
|
States Constitution during the first session of Congress in 1789.
|
|||
|
On December 15, 1791, the Bill of Rights, minus the first two
|
|||
|
amendments, became part of the Constitution.
|
|||
|
What the first amendment means as applied to the press has
|
|||
|
never been completely set forth. The only statement in Congress
|
|||
|
as to what the press and speech clause was to stand for was
|
|||
|
express by James Madison: "The right of freedom of speech is
|
|||
|
secured; the liberty of the press is expressly declared to be
|
|||
|
beyond the reach of this government."35 This, however, will be
|
|||
|
of little help for us when considering whether computer
|
|||
|
publications should receive first amendment protections.
|
|||
|
|
|||
|
IV. Does Computer Publications fall within the meaning of
|
|||
|
Press as stated in the first Amendment.
|
|||
|
|
|||
|
Since the legislative history of the First Amendment will
|
|||
|
not lead to a discovery concerning what is covered under it, we
|
|||
|
must look to how it has been interpreted by the courts. An
|
|||
|
examination must be undertook to determine what the courts have
|
|||
|
decided concerning both the purpose of the amendment and whether
|
|||
|
any physical manifestation guidelines on what fall within the
|
|||
|
definition of the "press".
|
|||
|
By examining what the drafters of the first amendment
|
|||
|
thought that press was during their time, the only media which
|
|||
|
would receive first amendment protections the printed press,
|
|||
|
which would include newspapers, handbills and leaflets.
|
|||
|
However, the court has not held the clause so narrowly.
|
|||
|
The United States Supreme Court has taken a broad view in
|
|||
|
considering what is the "press".36 "The liberty of the press is
|
|||
|
not confined to newspapers and periodicals. It necessarily
|
|||
|
embraces pamphlets and leaflets. . . . The press in its
|
|||
|
historical connotation comprehends every sort of publication
|
|||
|
which affords a vehicle of information and opinion."37 Thus, the
|
|||
|
Court has ruled that motion pictures38 also deserve such
|
|||
|
protection. Lower courts have held that the protection applies
|
|||
|
to doctor directories,39 college newspapers40 and computer
|
|||
|
bulletin boards.41
|
|||
|
Computer publications satisfy the definition that the Court
|
|||
|
has given to what is to be covered by the first amendment. By
|
|||
|
their very nature, computer publications are a vehicle by which
|
|||
|
information can be disseminated. In Phrack's first issue, the
|
|||
|
purpose was to gather "philes [which] may include articles on
|
|||
|
telcom (phreaking/hacking), anarchy (guns and death &
|
|||
|
destruction) or kracking. Other (sic) topics will be allowed
|
|||
|
also to a certain extent."42 These articles were to be
|
|||
|
distributed to members of the community who wished to obtain
|
|||
|
information on the topics in the "newsletter-type project".43
|
|||
|
Since this publication passes the Lovell test,44 because of it
|
|||
|
allows information to be distributed, these publication deserve
|
|||
|
the protection given to the media by the first amendment.45
|
|||
|
|
|||
|
VI. Freedom of Newspapers and Broadcasting Media46
|
|||
|
|
|||
|
|
|||
|
Currently there can be called two separate first amendment
|
|||
|
doctrines. The first applies to newspapers. Newspapers can have
|
|||
|
only a few restrictions placed on them. The second applies to
|
|||
|
radio and television, which can have many types of controls
|
|||
|
placed upon them. Computer publications, because of their
|
|||
|
similarity to the former, should have the least amount of
|
|||
|
restriction necessary placed upon them.
|
|||
|
As stated, supra, the first amendment had no legislative
|
|||
|
history that came along with it. Courts have had to interpret
|
|||
|
how it should be applied to the "press" since they had no
|
|||
|
guidance from the Congress. Although not to be applied in an
|
|||
|
absolute sense, Breard v. City of Alexandria, La.,47 the Supreme
|
|||
|
Court has only set forth three exceptions where prior restraint
|
|||
|
of the newspapers are allowed. These restrictions, as stated in
|
|||
|
dictum in Near v. Minnesota48 are 1) when it is necessary in
|
|||
|
order that "a government might prevent actual obstruction to its
|
|||
|
recruiting service or the publication of the sailing dates of
|
|||
|
transports or the number and location of troops", 2) the
|
|||
|
requirements of decency to prevent publication of obscene
|
|||
|
materials, and 3) "[t]he security of the community life may be
|
|||
|
protected against incitement to acts of violence and the
|
|||
|
overthrow of force of orderly government." These exceptions,
|
|||
|
although not having the force of law when stated, have been the
|
|||
|
only exceptions allowed.
|
|||
|
In the electronic realm, the Supreme Court has allowed
|
|||
|
greater restraints to be placed on radio and television.
|
|||
|
Licenses, although never allowed on newspapers,49 possibly as a
|
|||
|
result of the English experience,50 have been allowed on
|
|||
|
broadcast communication.51 Broadcaster must be fair to all sides
|
|||
|
of an issue,52 whereas newspapers may be bias.53 Broadcaster are
|
|||
|
required to meet the need of their community.54 However no court
|
|||
|
has held that this may be applied to a newspaper.55
|
|||
|
The main difference between these two groups is that
|
|||
|
"[u]nlike other modes of expression, radio inherently is not
|
|||
|
available to all. That is its unique characteristic, and that is
|
|||
|
why, unlike other modes of expression, it is subject to
|
|||
|
government regulation."56 This reasoning has been followed by
|
|||
|
the court on many occasions.57
|
|||
|
In the case concerning computer publishers, the less
|
|||
|
restrictive newspaper limitations should be used. A computer
|
|||
|
publisher does not send his information over a limited band or
|
|||
|
airwaves. Any individual or group can become a computer publish
|
|||
|
by obtaining a computer or access to a computer and a modem an
|
|||
|
information to publish. The amount of these newsletters are not
|
|||
|
limited by technology.
|
|||
|
Because of the large number of publications that can appear,
|
|||
|
there is no need to require that these publications be responsive
|
|||
|
to the public. The dissemination of the information can be
|
|||
|
terminated if the reader wants to by asking for his name to be
|
|||
|
removed from the subscription list, similar to that of a magazine
|
|||
|
or newspaper.58
|
|||
|
|
|||
|
V. Conclusion
|
|||
|
Computer based publications are a new development in the
|
|||
|
traditional way in which information is disseminated. The
|
|||
|
history of the United States and the first amendment has been
|
|||
|
against placing restrictions on the press. These new types of
|
|||
|
publications, because of their similarity to other types of
|
|||
|
media, should be granted first amendment protection.
|
|||
|
The rational for placing restrictions on radio and
|
|||
|
television should not apply to computer publications. Anyone who
|
|||
|
has access to this technology, which is becoming more prevalent
|
|||
|
in society, can publish in this manner. The least amount of
|
|||
|
restrictions on their publication, similar to those placed on
|
|||
|
newspapers, should be applied to this new media.
|
|||
|
BIBLIOGRAPHY
|
|||
|
|
|||
|
Freedom of Speech and Press in America, Edward G. Hudon (Public
|
|||
|
Affairs Press, Washington, D.C. 1963)
|
|||
|
|
|||
|
MacMillan Dictionary of Personal Computing & Communications
|
|||
|
Dennis Longley and Michael Shain, eds. (MacMillan Press Ltd,
|
|||
|
London 1986)
|
|||
|
|
|||
|
Shaping the First Amendment: The Development of Free Expression,
|
|||
|
John D. Stevens (Sage Publications, Beverly Hills, 1982)
|
|||
|
|
|||
|
Freedom of Speech and Press in Early American History: Legacy of
|
|||
|
Suppression, Leonard W. Levy (Harvard Press, Cambridge 1960)
|
|||
|
|
|||
|
American Broadcasting and the First Amendment, Lucas A. Powe, Jr.
|
|||
|
(University of California Press, Berkeley 1987)
|
|||
|
|
|||
|
Printers and Press Freedom: The Ideology of Early American
|
|||
|
Journalism, Jeffery A. Smith (Oxford University Press, New York
|
|||
|
1988).
|
|||
|
|
|||
|
|
|||
|
Seven Dirty Words and Six Other Stories: Controlling the Content
|
|||
|
of Print and Broadcast, Matthew L. Spitzer (Yale University
|
|||
|
Press, New Haven 1986).
|
|||
|
|
|||
|
Emergence of a Free Press, Leonard W. Levy (Oxford University
|
|||
|
Press, New York 1985).
|
|||
|
|
|||
|
Computer Underground Digest, volume 2, Issue #2.12, file 1
|
|||
|
(November 17, 1990).
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Endnotes
|
|||
|
|
|||
|
1. Phrack, see infra, CCCAN, a Canadian publication, The
|
|||
|
LEGION OF DOOM TECHNICAL JOURNAL, COMPUTER UNDERGROUND DIGEST AND VIRUS-L
|
|||
|
DIGEST ARE A FEW OF THE MANY PUBLICATIONS.
|
|||
|
|
|||
|
2. MacMillan Dictionary of Personal Computing &
|
|||
|
Communication (1986 ed) defines it as: "A network of computer
|
|||
|
systems that allow the fast and easy flow of data between the
|
|||
|
systems and users of the system." Id. at 68.
|
|||
|
|
|||
|
3. "[A] flat disk with a magnetizable surface layer on
|
|||
|
which data can be stored by magnetic recording." Id. at 215
|
|||
|
|
|||
|
4. "A plastic tape having a magnetic surface for storing
|
|||
|
data in a code of magnetized spots." Webster's NewWorld
|
|||
|
Dictionary of Computer Terms (1988 3 ed.) at 223.
|
|||
|
|
|||
|
5. Frenzy over Phrack; First Amendment concerns raised in
|
|||
|
computer hacker case, Communications Daily, June 29, 1990, at 6.
|
|||
|
|
|||
|
6. Information from this section was gathered in part from
|
|||
|
Dorothy Denning's paper The United States vs. Craig Neidorf: A
|
|||
|
Viewpoint on Electronic Publishing, Constitutional Rights, and
|
|||
|
Hacking." [hereinafter Denning] and Interview with Craig Neidorf,
|
|||
|
editor of Phrack (Oct. 16, 1990).
|
|||
|
|
|||
|
7. The name of the publication was derived from two words,
|
|||
|
phrack (telecommunication systems) and hack (from computer
|
|||
|
hacking). Denning. Hacking has been defined as "one who gains
|
|||
|
unauthorized, use non-fraudulent access to another's computer
|
|||
|
system." Webster's II New Riverside University Dictionary (1984)
|
|||
|
at 557. For other definitions, see United States v. Riggs, 739
|
|||
|
F. Supp. 414, 423-24 (N.D. Ill. 1990).
|
|||
|
|
|||
|
8. Mr. Neidorf was indicted after he published a Bell South
|
|||
|
E911 document which was downloaded from the Bell South computer
|
|||
|
system in Atlanta, Georgia. Determining if Mr. Neidorf should be
|
|||
|
punished for publishing such information is beyond the scope of
|
|||
|
this paper.
|
|||
|
|
|||
|
9. John Stevens, Shaping the First Amendment: The
|
|||
|
Development of Free Expression at 27 (1982). [hereinafter
|
|||
|
Stevens]
|
|||
|
|
|||
|
10. Id.
|
|||
|
|
|||
|
11. Edward Hudon, Freedom of Speech and Press in America,
|
|||
|
8-9 (1963).
|
|||
|
12. Id. at 9.
|
|||
|
|
|||
|
13. Id.
|
|||
|
|
|||
|
14. Id.
|
|||
|
|
|||
|
15. Id. at 10.
|
|||
|
|
|||
|
16. Id.
|
|||
|
|
|||
|
17. Id.
|
|||
|
|
|||
|
18. Id.
|
|||
|
|
|||
|
19. Id. at 11.
|
|||
|
|
|||
|
20. Id.
|
|||
|
|
|||
|
21. Id.
|
|||
|
|
|||
|
22. Id.
|
|||
|
|
|||
|
23. Id.
|
|||
|
|
|||
|
24. Leonard Levy, Freedom of Speech and Press in Early
|
|||
|
American History: Legacy of Suppression, 14 (1963) [hereinafter
|
|||
|
Levy] citing Sir William Blackstone, Commentaries on the Laws of
|
|||
|
England 2:112-113 (1936).
|
|||
|
|
|||
|
25. Stevens, at 29.
|
|||
|
|
|||
|
26. Levy, at 21-22, quoting William Waller Hening, The
|
|||
|
Statutes at Large Being a Collection of All the Laws of Virginia
|
|||
|
(1619-1792) (Richmond, 1809-1823), 2:517. [emphasis in original]
|
|||
|
|
|||
|
27. Levy, at 24, quoting "Instructions to Governor Dongan,"
|
|||
|
1686, in E.B. O'Callaghan and B. Fernow, eds., Documents Relative
|
|||
|
to the Colonial History of the State of New York 3:375 (Albany,
|
|||
|
1856-1887).
|
|||
|
|
|||
|
28. By 1721, Massachusetts effectively ended censorship by
|
|||
|
licensing. Levy, at 36.
|
|||
|
|
|||
|
29. Edward Hudson, Freedom of Speech and Press in America
|
|||
|
(1963) 19.
|
|||
|
|
|||
|
30. John D. Stevens, Shaping the First Amendment: The
|
|||
|
Development of Free Expression (1982), 31.
|
|||
|
|
|||
|
31. Hudson, at 19.
|
|||
|
|
|||
|
32. Lovell v. City of Griffen, Ga., 303 U.S. 444, 451-52
|
|||
|
(1938) [footnotes omitted].
|
|||
|
|
|||
|
33. Patterson v. Colorado, 205 U.S. 454, 462 (1907),
|
|||
|
quoting Commonwealth v. Blanding, 3 Pick. [Mass.] 304, 313-14.
|
|||
|
[emphasis in original]
|
|||
|
|
|||
|
34. U.S. Const. amend. I.
|
|||
|
|
|||
|
35. Leonard W. Levy, Freedom of Speech and Press in Early
|
|||
|
American History: Legacy of Suppression (1960), quoting The
|
|||
|
Debates and Proceedings in the Congress of the United States
|
|||
|
(Washington, 1834 ff.) I:766, 1st Cong., 1st Sess.
|
|||
|
|
|||
|
36. "The Protection of the First Amendment, mirrored in the
|
|||
|
Fourteenth, is not limited to the Blackstonian idea that freedom
|
|||
|
of the press means only freedom from restraint prior to
|
|||
|
publication." Chaplinsky v. New Hampshire, 315 U.S. 572, n.3,
|
|||
|
(1941) citing Near v. Minnesota, 283 U.S. 697 (1931).
|
|||
|
|
|||
|
37. Lovell v. City of Griffin, Ga. 303 U.S. 444, 452
|
|||
|
(1938).
|
|||
|
|
|||
|
38. "We have no doubt that moving pictures, like newspapers
|
|||
|
and radio, are included in the press whose freedom is guaranteed
|
|||
|
by the First Amendment." 334 U.S. 131, 166 (1948). "Expression
|
|||
|
by means of motion pictures in included within the free speech
|
|||
|
and speech and free press guaranty of the First and Fourteenth
|
|||
|
Amendments." Joseph Burstyn, Inc. v. Wilson, 343 U.S. 495, 502
|
|||
|
(1952).
|
|||
|
|
|||
|
39. "The propose directory [of physicians] contains
|
|||
|
information of interest to people who need physicians. The
|
|||
|
directory, therefore, is embraced by the term "press" as used in
|
|||
|
the first amendment." Health Systems Agency of Northern Virginia
|
|||
|
v. Virginia State Board of Medicine, 424 F. Supp. 267, 272 (E.D.
|
|||
|
Va. 1976).
|
|||
|
|
|||
|
40. "A campus newspaper is part of the "press" for the
|
|||
|
purpose of the First Amendment to the Constitution of the United
|
|||
|
States." Arrington v. Taylor, 380 F.Supp. 1348, 1365 (M.D.N.C.
|
|||
|
1974).
|
|||
|
|
|||
|
41. Legi-Tech v. Keiper, 766 F.2d 728, 734-35 (2d Cir.
|
|||
|
1985).
|
|||
|
|
|||
|
42. Phrack, volume 1, issue 1, phile 1, reprinted in
|
|||
|
Computer Underground Digest, volume 2, Issue #2.12, file 1
|
|||
|
(November 17, 1990).
|
|||
|
|
|||
|
43. Id.
|
|||
|
44. See, infra, note 35 and text.
|
|||
|
|
|||
|
45. This is not to say that publication of information in
|
|||
|
furtherance of a crime or criminal activity should receive the
|
|||
|
protection of the first amendment.
|
|||
|
|
|||
|
46. This section has been completed with the help of
|
|||
|
Spitzer, Seven Dirty Words and Six Other Stories (1986).
|
|||
|
|
|||
|
47. 341 U.S. 622, 642 (1951), "The First and Fourteenth
|
|||
|
Amendments have never been treated as absolutes."
|
|||
|
|
|||
|
48. 283 U.S. 697, 716.
|
|||
|
|
|||
|
49. Near v. Minnesota, 283 U.S. 697 (1931), New York Times
|
|||
|
Co. v. Sullivan, 403 U.S. 713 (1971), Minneapolis Star and
|
|||
|
Tribune Co. v. Minnesota Comm'r of Revenue, 460 U.S. 575 (1983).
|
|||
|
|
|||
|
50. See, supra, notes 9 through 24 and text.
|
|||
|
|
|||
|
51. Communications Act of 1934. 47 U.S.C. % 301 et. seq.
|
|||
|
(1988) (Requiring that radio stations and television stations
|
|||
|
obtain licenses).
|
|||
|
|
|||
|
52. Red Lion Broadcasting Co. v. F.C.C., 395 U.S. 367
|
|||
|
(1969).
|
|||
|
|
|||
|
53. See, e.g., Evans v. American Federation of Television
|
|||
|
and Radio Artists, 354 F.Supp 823, 838 (S.D.N.Y. 1973), rev'd on
|
|||
|
other grounds, 496 F.2d 305 (2nd Cir. 1974), cert. denied, 419
|
|||
|
U.S. 1093. ("In editorial comment, the New York Times and the
|
|||
|
Washington Post may be unreservedly liberal, while the
|
|||
|
Indianapolis News or the Manchester Union Leader may be
|
|||
|
unremittingly conservative.")
|
|||
|
|
|||
|
54. 47 U.S.C. % 309(a). Trinity Methodist Church v. Federal
|
|||
|
Radio Commission, 62 F.2d 850, (D.C. Cir. 1932), cert. denied,
|
|||
|
288 U.S. 599 (1933). (holding that if radio broadcasts were not
|
|||
|
in the public interest, a license could be revoked and not
|
|||
|
violate the first amendment.)
|
|||
|
|
|||
|
55. Of course, if a newspaper is not responsive to its
|
|||
|
readers, it may lose subscribers and either be forced to change
|
|||
|
or go out of business. However, since in that hypothetical there
|
|||
|
would be no state action, there would be no first amendment
|
|||
|
issue.
|
|||
|
|
|||
|
56. National Broadcasting Co. v. United States, 319 U.S.
|
|||
|
190, 226 (1943). The dissenting opinion also followed similar
|
|||
|
reasoning. "Owing to its physical characteristics radio, unlike
|
|||
|
the other methods of conveying information, must be regulated and
|
|||
|
rationed by the government." Id. at 319.
|
|||
|
|
|||
|
57. Red Lion Broadcasting v. Federal Communication
|
|||
|
Commission, 395 U.S. 367 (1969), and Federal Communication
|
|||
|
Commission v. League of Women Voters, 468 U.S. 364 (1984).
|
|||
|
|
|||
|
58. For the same reason, the fairness doctrine should not
|
|||
|
be applied to these types of publications.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
**END OF CuD #3.09**
|
|||
|
********************************************************************
|
|||
|
|
|||
|
|
|||
|
|