857 lines
44 KiB
Plaintext
857 lines
44 KiB
Plaintext
|
|
|||
|
Computer underground Digest Sun Nov 3, 1996 Volume 8 : Issue 77
|
|||
|
ISSN 1004-042X
|
|||
|
|
|||
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|||
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow Master: Stanton McCandlish
|
|||
|
Field Agent Extraordinaire: David Smith
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Ralph Sims / Jyrki Kuoppala
|
|||
|
Ian Dickinson
|
|||
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|||
|
|
|||
|
CONTENTS, #8.77 (Sun, Nov 3, 1996)
|
|||
|
File 1--Class Action Notice in CCC BBS lawsuit
|
|||
|
File 2--Excerpts from the CCC BBS Lawsuit
|
|||
|
File 3--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
|||
|
|
|||
|
|
|||
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
|
|||
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|||
|
|
|||
|
---------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Sat, 19 Oct 1996 12:18:00 -0400
|
|||
|
From: Pete Kennedy <PKENNEDY@gdf.com>
|
|||
|
Subject: File 1--Class Action Notice in CCC BBS lawsuit
|
|||
|
|
|||
|
Editors -- I would appreciate it if you could include the following
|
|||
|
notice in an upcoming edition of CUD. I believe this lawsuit is the
|
|||
|
first of its kind -- a class action brought by users of a 5,500-user
|
|||
|
BBS against the government officials who seized it in a pornography
|
|||
|
raid on June 16, 1995. The Judge (at our suggestion) has ordered
|
|||
|
that notice be distributed electronically, as there are some 500 plus
|
|||
|
non-subscribers whose mail was seized from the BBS Internet gateway.
|
|||
|
We have modelled this lawsuit after the Steve Jackson Games lawsuit
|
|||
|
which I participated in back in 1993, but expanded it to a class
|
|||
|
action on behalf of all users of the system.
|
|||
|
|
|||
|
--------------------------------------------------------------
|
|||
|
Peter D. Kennedy George Donaldson & Ford, L.L.P.
|
|||
|
pkennedy@gdf.com 114 West 7th Street, Suite 1000
|
|||
|
(512) 495-1416 (voice) Austin, Texas 78701
|
|||
|
(512) 499-0094 (fax) http://www.gdf.com
|
|||
|
--------------------------------------------------------------
|
|||
|
|
|||
|
NOTICE OF CLASS ACTION LAWSUIT
|
|||
|
|
|||
|
TO: All persons who, on June 16, 1995, were users,
|
|||
|
subscribers, or customers of the Cincinnati
|
|||
|
Computer Connection electronic bulletin board
|
|||
|
service, and all persons whose private electronic
|
|||
|
communications were resident on the Cincinnati
|
|||
|
Computer Connection BBS when it was seized by the
|
|||
|
Defendants, but not including the actual provider
|
|||
|
of that electronic bulletin board service or any
|
|||
|
law enforcement agencies or personnel investigating
|
|||
|
that electronic bulletin board service.
|
|||
|
|
|||
|
NOTICE IS HEREBY GIVEN that a lawsuit has been filed in this
|
|||
|
court that may affect your legal rights. This case has been
|
|||
|
certified by the Court as a class action. A class action is a
|
|||
|
lawsuit in which one or more persons can sue on behalf of other
|
|||
|
persons in the same or similar situation. If you are a person who
|
|||
|
falls within the group of persons described above, you are a member
|
|||
|
of the class that the named Plaintiffs represent. The Court has
|
|||
|
ruled that the named Plaintiffs, Steven Guest, Denise Kelley, Ben
|
|||
|
Kelley, Nelda Sturgill, Deborah Cummings, Randy Bowling and Richard
|
|||
|
Kramer, may bring this lawsuit on behalf of all those persons
|
|||
|
described in the group above.
|
|||
|
|
|||
|
YOU ARE NOT BEING SUED. THERE IS NO REQUIREMENT THAT YOU
|
|||
|
ATTEND COURT, HIRE A LAWYER, OR PAY ANY OF THE COSTS OF
|
|||
|
THIS LAWSUIT. IF YOU CHOOSE, HOWEVER, YOU MAY HIRE YOUR
|
|||
|
OWN LAWYER, AND, IF YOU DO SO, YOU WILL BE RESPONSIBLE
|
|||
|
FOR PAYING YOUR LAWYER'S FEES.
|
|||
|
|
|||
|
AS A MEMBER OF THE CLASS, YOU ARE HEREBY FURTHER GIVEN
|
|||
|
NOTICE OF THE FOLLOWING MATTERS:
|
|||
|
|
|||
|
1. On December 5, 1995, the individual Plaintiffs, Steven
|
|||
|
Guest, Denise Kelley, Ben Kelly, Nelda Sturgill, Deborah Cummings,
|
|||
|
Randy Bowling and Richard Kramer, sought certification of this
|
|||
|
lawsuit as a class action, against the following Defendants: Simon
|
|||
|
L. Leis, Jr., Hamilton County (Ohio) Sheriff's Department, Hamilton
|
|||
|
County (Ohio) Regional Electronics Computer Intelligence Task
|
|||
|
Force, Dale Menkhaus, David Ausdenmoore, and James Nerlinger.
|
|||
|
|
|||
|
2. The named Plaintiffs have brought this action not only on
|
|||
|
their own behalf, but on behalf of all the following group of
|
|||
|
persons ("the Class"):
|
|||
|
|
|||
|
All persons who, on June 16, 1995, were users, subscribers, or
|
|||
|
customers of the Cincinnati Computer Connection electronic
|
|||
|
bulletin board service, and all persons whose private
|
|||
|
electronic communications were resident on the Cincinnati
|
|||
|
Computer Connection BBS when it was seized by the Defendants,
|
|||
|
but not including the actual provider of that electronic
|
|||
|
bulletin board service or any law enforcement agencies or
|
|||
|
personnel investigating that electronic bulletin board
|
|||
|
service.
|
|||
|
|
|||
|
3. The named Plaintiffs generally allege that the
|
|||
|
Defendants' seizure, on June 16, 1995, of the Cincinnati Computer
|
|||
|
Connection electronic bulletin board system violated the civil
|
|||
|
rights of the subscribers and users of that system. This lawsuit
|
|||
|
has been filed, alleging that the Defendants' seizure and retention
|
|||
|
of the contents of the Cincinnati Computer Connection BBS violated
|
|||
|
the Electronic Communications Privacy Act of 1986, the First
|
|||
|
Amendment Privacy Protection Act of 1980, the First Amendment, the
|
|||
|
Fourth Amendment, and Ohio law.
|
|||
|
|
|||
|
4. The Defendants have denied the Plaintiffs' allegations.
|
|||
|
|
|||
|
YOU ARE ADVISED THAT IF YOU ARE A MEMBER OF THE CLASS, and
|
|||
|
that if you do not wish to be considered a member of this class and
|
|||
|
represented by the above-named Plaintiffs, you may be excluded from
|
|||
|
this lawsuit by notifying the Court in this cause in writing of
|
|||
|
that wish, within 60 days of the date of this Notice. If you wish
|
|||
|
exclusion, you should send written correspondence notifying the
|
|||
|
Court of your wish to be excluded from the lawsuit to:
|
|||
|
|
|||
|
Kenneth J. Murphy
|
|||
|
Office of the District Clerk
|
|||
|
United States District Court
|
|||
|
Southern District of Ohio
|
|||
|
100 E. Fifth Street
|
|||
|
Cincinnati, Ohio 45202
|
|||
|
(513) 583-4210
|
|||
|
|
|||
|
Re: Guest, et al., v. Leis, et al., No. C-1-95-673; U.S.
|
|||
|
District Court, Southern District of Ohio, Western
|
|||
|
Division
|
|||
|
|
|||
|
If you are excluded from the class, you will not receive
|
|||
|
payment from any settlement or judgment entered in this lawsuit.
|
|||
|
You will not be bound by the terms of any settlement or judgment
|
|||
|
entered in this lawsuit, and you will be free to pursue any legal
|
|||
|
rights you may have on your own behalf.
|
|||
|
|
|||
|
YOU ARE FURTHER ADVISED THAT IF YOU ARE A MEMBER OF THE CLASS
|
|||
|
and you do not elect to be excluded from the class, under Ohio and
|
|||
|
federal law:
|
|||
|
|
|||
|
1. You will be bound by the terms of the judgment in this
|
|||
|
cause, whether such judgment is favorable or not.
|
|||
|
|
|||
|
2. You may be subjected to a cross complaint or some other
|
|||
|
affirmative action by the Defendants.
|
|||
|
|
|||
|
3. Although this action is pending, the Defendants are not
|
|||
|
prevented in any way from exercising all remedies available to them
|
|||
|
by contract or law.
|
|||
|
|
|||
|
4. The named Plaintiffs and the Class in this lawsuit are
|
|||
|
represented by:
|
|||
|
|
|||
|
Scott T. Greenwood
|
|||
|
Greenwood & Associates
|
|||
|
2301 Carew Tower
|
|||
|
441 Vine Street
|
|||
|
Cincinnati, Ohio 45202
|
|||
|
(513) 684-0101 (phone)
|
|||
|
(513) 684-0077 (fax)
|
|||
|
stgrnwd@iac.net (internet)
|
|||
|
|
|||
|
Peter D. Kennedy
|
|||
|
George, Donaldson & Ford, L.L.P.
|
|||
|
114 W. 7th Street, Suite 1000
|
|||
|
Austin, Texas 78701
|
|||
|
(512) 495-1400 (phone)
|
|||
|
(512) 499-0094 (fax)
|
|||
|
pkennedy@gdf.com (internet)
|
|||
|
|
|||
|
5. You may contact the attorneys for the Plaintiffs listed
|
|||
|
above for further information concerning this action.
|
|||
|
|
|||
|
6. Be aware that the Court, by initially certifying this
|
|||
|
lawsuit as a class action, has not expressed any option as to the
|
|||
|
merits of this lawsuit.
|
|||
|
|
|||
|
SIGNED this 10th day of September, 1996.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
_____________/S/____________________
|
|||
|
JACK SHERMAN JR., UNITED STATES
|
|||
|
MAGISTRATE JUDGE
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Sat, 19 Oct 1996 12:18:00 -0400
|
|||
|
From: Pete Kennedy <PKENNEDY@gdf.com>
|
|||
|
Subject: File 2--Excerpts from the CCC BBS Lawsuit
|
|||
|
|
|||
|
((MODTERATORS' NOTE: Following are some excerpts from the
|
|||
|
complaint by Cincinnati Computer Connection BBS Lawsuit against
|
|||
|
law enforcement officials. The full text can be found at:
|
|||
|
http://www.soci.niu.edu/~cudigest/docs/cccsuit))
|
|||
|
|
|||
|
-1-
|
|||
|
|
|||
|
|
|||
|
UNITED STATES DISTRICT COURT
|
|||
|
SOUTHERN DISTRICT OF OHIO
|
|||
|
WESTERN DIVISION
|
|||
|
|
|||
|
|
|||
|
STEVEN GUEST,
|
|||
|
1513 Denny Drive:CIVIL ACTION NO. C-1-95-673
|
|||
|
Amelia, Ohio 45102
|
|||
|
Judge Weber
|
|||
|
and
|
|||
|
Magistrate Judge Sherman
|
|||
|
DENISE B. KELLEY,
|
|||
|
2814 Topview Place
|
|||
|
Cincinnati, Ohio 45251
|
|||
|
|
|||
|
and
|
|||
|
|
|||
|
BEN S. KELLEY,
|
|||
|
2814 Topview Place
|
|||
|
Cincinnati, Ohio 45251
|
|||
|
|
|||
|
and
|
|||
|
|
|||
|
NELDA STURGILL,
|
|||
|
5629 Homer Avenue
|
|||
|
Cincinnati, Ohio 45212
|
|||
|
|
|||
|
and
|
|||
|
|
|||
|
DEBORAH CUMMINGS,
|
|||
|
912 Ravine Drive
|
|||
|
Villa Hills, Kentucky 41017
|
|||
|
|
|||
|
and
|
|||
|
|
|||
|
RANDY BOWLING,
|
|||
|
P.O. Box 13425
|
|||
|
Hamilton, Ohio 45013
|
|||
|
|
|||
|
and CLASS ACTION
|
|||
|
|
|||
|
RICHARD E. KRAMER,:SECOND AMENDED
|
|||
|
998 Highland Avenue:COMPLAINT
|
|||
|
Hamilton, Ohio 45013:(JURY DEMAND
|
|||
|
ENDORSED
|
|||
|
and HEREON)
|
|||
|
|
|||
|
all others similarly situated,
|
|||
|
|
|||
|
Plaintiffs,
|
|||
|
|
|||
|
vs.
|
|||
|
|
|||
|
SIMON L. LEIS, JR.,
|
|||
|
Hamilton County Justice Center
|
|||
|
1000 Sycamore Street
|
|||
|
Cincinnati, Ohio 45202
|
|||
|
|
|||
|
and
|
|||
|
|
|||
|
Hamilton County
|
|||
|
Sheriff's Department,
|
|||
|
Hamilton County Justice Center
|
|||
|
1000 Sycamore Street
|
|||
|
Cincinnati, Ohio 45202
|
|||
|
|
|||
|
and
|
|||
|
|
|||
|
Hamilton County Regional
|
|||
|
ELECTRONIC Computer
|
|||
|
INTELLIGENCE Task Force,
|
|||
|
Hamilton County Justice Center
|
|||
|
1000 Sycamore Street
|
|||
|
Cincinnati, Ohio 45202
|
|||
|
|
|||
|
and
|
|||
|
|
|||
|
Dale MenkHaus,
|
|||
|
Hamilton County Justice Center
|
|||
|
1000 Sycamore Street
|
|||
|
Cincinnati, Ohio 45202
|
|||
|
|
|||
|
and
|
|||
|
|
|||
|
DAVID L. AUSDENMOORE,
|
|||
|
Hamilton County Justice Center
|
|||
|
1000 Sycamore Street
|
|||
|
Cincinnati, Ohio 45202
|
|||
|
|
|||
|
and
|
|||
|
|
|||
|
|
|||
|
JAMES NERLINGER,
|
|||
|
Hamilton County Justice Center
|
|||
|
1000 Sycamore Street
|
|||
|
Cincinnati, Ohio 45202
|
|||
|
|
|||
|
Defendants.
|
|||
|
|
|||
|
|
|||
|
I. INTRODUCTION
|
|||
|
|
|||
|
1.The Plaintiffs bring this lawsuit on behalf of themselves and the thousands
|
|||
|
of subscribers to the Cincinnati Computer Connection electronic bulletin board
|
|||
|
system, in order to redress the violation of their civil rights by Hamilton
|
|||
|
County Sheriff Simon L. Leis, Jr. and the other Defendants.
|
|||
|
2.On June 16, 1995, the Hamilton County Regional Electronic Computer
|
|||
|
Intelligence Task Force (the "Task Force") raided at least five electronic
|
|||
|
bulletin board systems in the Cincinnati area, in a search for allegedly
|
|||
|
obscene materials.
|
|||
|
3.During these raids, the Task Force seized the entire computer network
|
|||
|
comprising the Cincinnati Computer Connection BBS, a computer bulletin board
|
|||
|
service with thousands of subscribers in Southern Ohio, Northern Kentucky, and
|
|||
|
beyond. Robert Emerson owns and operates the Cincinnati Computer Connection
|
|||
|
BBS. The target of the raid was some 45 computer image files allegedly stored
|
|||
|
on the Cincinnati Computer Connection BBS. According to the search warrant,
|
|||
|
the Task Force already had obtained copies of these image files from the
|
|||
|
Cincinnati Computer Connection BBS.
|
|||
|
4.In pursuit of these 45 image files, the Sheriff and Task Force raided and
|
|||
|
seized the entire bulletin board system. In the process, Sheriff Leis and his
|
|||
|
Task Force seized the private electronic mail and communications of thousands
|
|||
|
of entirely innocent subscribers, they shut down an active, thriving,
|
|||
|
electronic community of average citizens, and they denied thousands of people
|
|||
|
access to their friends, neighbors, and business associates.
|
|||
|
5.The named Plaintiffs bring this lawsuit on behalf of themselves and the
|
|||
|
thousands of subscribers to the Cincinnati Computer Connection and all those
|
|||
|
whose electronic communications were seized and intercepted during the raid, in
|
|||
|
order to remedy this violation of their civil rights guaranteed by the First
|
|||
|
Amendment, the Fourth Amendment, the Fourteenth Amendment, the Ohio
|
|||
|
Constitution, the Electronic Communications Privacy Act of 1986 (18 U.S.C. '
|
|||
|
2510 et seq. and ' 2701 et seq.), the First Amendment Privacy Protection Act of
|
|||
|
1980 ( 42 U.S.C. ' 2000aa et seq.), and Ohio common law.
|
|||
|
|
|||
|
|
|||
|
II. JURISDICTION
|
|||
|
|
|||
|
6.This action seeks to enforce rights guaranteed by the Constitution and laws
|
|||
|
of the United States and is brought pursuant to 42 U.S.C. '' 1983 and 1985.
|
|||
|
Jurisdiction is based upon 28 U.S.C. '' 1331 and 1343(3). The substantive
|
|||
|
federal claims are brought pursuant to 42 U.S.C. ''1983 and 1985, 18 U.S.C.
|
|||
|
''2707 and 2520, and 42 U.S.C. ' 2000aa-7. Declaratory relief is sought
|
|||
|
pursuant to 28 U.S.C. ''2201-2202. Authority to hear the pendent state claims
|
|||
|
is conferred by the Court's supplemental jurisdiction under 28 U.S.C. '1367.
|
|||
|
This action does not raise novel or complex issues of state law, and the state
|
|||
|
law claims do not predominate over the federal law claims.
|
|||
|
7.Venue is proper in the Southern District of Ohio, Western Division, under 28
|
|||
|
U.S.C. '1391(b), because at least one Defendant resides in this District and
|
|||
|
Division and because a substantial part of the events or omissions giving rise
|
|||
|
to the claims occurred within this District and Division.
|
|||
|
|
|||
|
|
|||
|
III. PARTIES
|
|||
|
|
|||
|
|
|||
|
A.PLAINTIFFS
|
|||
|
8.PLAINTIFF STEVEN GUEST is a thirty-two year old resident of Clermont County,
|
|||
|
Ohio. Mr. Guest is a computer consultant who uses the Cincinnati Computer
|
|||
|
Connection BBS to send and receive electronic communications, to conduct his
|
|||
|
consulting business, to exchange files with his business partners, to access
|
|||
|
shareware, and otherwise to engage in expressive and associational activity.
|
|||
|
9.PLAINTIFF DENISE KELLEY is a sixty-nine year old resident of Hamilton County,
|
|||
|
Ohio. She is employed by the Hamilton County Department of Human Services as
|
|||
|
an investigation coordinator and serves as the chief union steward for AFSCME
|
|||
|
Local 1768. Mrs. Kelley, mother of three and grandmother of seven, uses the
|
|||
|
Cincinnati Computer Connection BBS for political discussion, to download
|
|||
|
shareware files, to play some games, to send and receive electronic mail
|
|||
|
communications across the Internet, to "chat" with users, to write stories in
|
|||
|
an on-line conference, and otherwise to engage in expressive and associational
|
|||
|
activity.
|
|||
|
10.PLAINTIFF BEN S. KELLEY is Mrs. Kelley's husband, a seventy-six year old
|
|||
|
retired machinist who resides in Hamilton County, Ohio. Mr. Kelley, father of
|
|||
|
three and grandfather of seven, uses the Cincinnati Computer Connection BBS to
|
|||
|
send and receive electronic communications, play games, to read the discussions
|
|||
|
going on in various conferences, and otherwise to engage in expressive and
|
|||
|
associational activity.
|
|||
|
11.PLAINTIFF NELDA STURGILL is a registered nurse in a local hospital who
|
|||
|
resides in Hamilton County. In her thirties, Ms. Sturgill uses the Cincinnati
|
|||
|
Computer Connection BBS to send and receive electronic communications across
|
|||
|
the Internet, to access shareware programs, to keep abreast of information
|
|||
|
through the use of the Usenet newsgroups, and otherwise to engage in expressive
|
|||
|
and associational activity. Ms. Sturgill particularly participates in the
|
|||
|
health-related conferences newsgroups, and has exchanged recipes and ideas with
|
|||
|
people from Australia, England and the United States.
|
|||
|
12.PLAINTIFF DEBORAH CUMMINGS is a resident of Kenton County, Kentucky. Ms.
|
|||
|
Cummings uses the Cincinnati Computer Connection BBS to send and receive
|
|||
|
electronic communications, to conduct her business, and to otherwise engage in
|
|||
|
expressive and associational activity.
|
|||
|
13.PLAINTIFF RANDY BOWLING is a resident of Butler County, Ohio. Mr. Bowling
|
|||
|
suffers from a head injury that makes speaking very difficult. Mr. Bowling
|
|||
|
uses the Cincinnati Computer Connection BBS to send and receive electronic
|
|||
|
communications, to supplement his limited ability to speak, and to discuss his
|
|||
|
head injury and therapy, and to engage in the majority of his expressive and
|
|||
|
associational activity. Mr. Bowling also uses the Cincinnati Computer
|
|||
|
Connection BBS to facilitate his current study of computer systems.
|
|||
|
14.PLAINTIFF RICHARD KRAMER is a retired insurance agent who resides in Butler
|
|||
|
County, Ohio. Mr. Kramer, who uses a wheelchair, uses the Cincinnati Computer
|
|||
|
Connection BBS to send and receive electronic communications, to supplement his
|
|||
|
sometimes restricted access to more traditional fora for expressive and
|
|||
|
associational activity, to access file-management and utility shareware, and to
|
|||
|
study computer systems.
|
|||
|
15.Each named Plaintiff is a citizen of the United States.
|
|||
|
16.At all times relevant herein, Plaintiffs were users of the Cincinnati
|
|||
|
Computer Connection BBS.
|
|||
|
Class Action Allegations
|
|||
|
17.The named Plaintiffs are proper representatives of a class within the
|
|||
|
meaning of Rule 23(a) and 23(b) (3) of the Federal Rules of Civil Procedure.
|
|||
|
18.The members of the class are so numerous that the joinder of all of them is
|
|||
|
impractical. Upon information and belief, the class consists of at least
|
|||
|
several thousand persons. The exact size of the class is unknown because the
|
|||
|
Defendants have seized and failed to return the computer and/or documentary
|
|||
|
records needed to determine the exact number and identity of the class members.
|
|||
|
19.The members of the class should be readily identifiable from records seized
|
|||
|
by the Defendants.
|
|||
|
20.There are questions of law and fact common to the class; their class claims
|
|||
|
predominate over any individual claims. Each class member shares the same
|
|||
|
federal and state constitutional protections of their right to speak, publish
|
|||
|
and associate. Each class member shares the same federal and state
|
|||
|
constitutional right to be free from unreasonable searches and seizures. Each
|
|||
|
class member shares the same federal and state rights protecting the privacy of
|
|||
|
their electronic communications and subscriber records.
|
|||
|
21.The claims of the named Plaintiffs are typical of the claims of the class.
|
|||
|
All class members suffered a similar violation of their common rights when the
|
|||
|
Defendants seized and shut down the Cincinnati Computer Connection BBS, and,
|
|||
|
upon information and belief, reviewed their private electronic communications
|
|||
|
and subscriber records. As alleged in greater detail above, the Plaintiffs'
|
|||
|
uses of the Cincinnati Computer Connection BBS typify the uses of the class
|
|||
|
members generally.
|
|||
|
22.The named Plaintiffs will fairly and adequately protect the interests of the
|
|||
|
class. As of June 16, 1995, each named Plaintiff was a user of the Cincinnati
|
|||
|
Computer Connection BBS. The named Plaintiffs are represented by counsel
|
|||
|
experienced in litigating federal and state civil rights lawsuits, including
|
|||
|
class actions, and who are familiar with the technology involved and
|
|||
|
experienced in litigating computer communications cases. The representative
|
|||
|
Plaintiffs know of no conflict of interest among class members. Plaintiffs
|
|||
|
will vigorously prosecute this action.
|
|||
|
23.The class consists of all persons who, on June 16, 1995, were users,
|
|||
|
subscribers, or customers of the Cincinnati Computer Connection electronic
|
|||
|
bulletin board service, and all persons whose private electronic communications
|
|||
|
were resident on the Cincinnati Computer Connection BBS when it was seized by
|
|||
|
the Defendants, but not including the actual provider of that electronic
|
|||
|
bulletin board service.
|
|||
|
24.Plaintiffs do not propose class notice at this time, but belief that class
|
|||
|
certification and notice can and should be achieved promptly.
|
|||
|
|
|||
|
B.DEFENDANTS
|
|||
|
25.Defendant Simon L. Leis, Jr., is and was at all relevant times the Sheriff
|
|||
|
of Hamilton County, Ohio. For the constitutional and common law claims,
|
|||
|
Defendant Leis is sued in his official capacity with respect to the declaratory
|
|||
|
and injunctive relief sought herein, and in his individual capacity with
|
|||
|
respect to the request for damages and attorney's fees in this action. For the
|
|||
|
federal statutory claims, Defendant Leis is sued in his individual and official
|
|||
|
capacities.
|
|||
|
26.Defendant Hamilton County Sheriff's Department is a sheriff's department
|
|||
|
organized under the laws of the State of Ohio.
|
|||
|
27.Defendant Hamilton County Regional ELECTRONIC Computer INTELLIGENCE Task
|
|||
|
Force was at all relevant times a division of the Hamilton County Sheriff's
|
|||
|
Department purportedly organized to develop and use special skills and
|
|||
|
expertise in investigating suspected computer crimes.
|
|||
|
28.Defendant Dale MenkHaus is and was at all relevant times the Commander and
|
|||
|
/or a member of the Regional Electronic Computer Intelligence Task Force. For
|
|||
|
the constitutional and common law claims, Defendant Menkhaus is sued in his
|
|||
|
official capacity with respect to the declaratory and injunctive relief sought
|
|||
|
herein, and in his individual capacity with respect to the request for damages
|
|||
|
and attorney's fees in this action. For the federal statutory claims,
|
|||
|
Defendant Menkhaus is sued in his individual and official capacities.
|
|||
|
29.Defendant DAVID L. AUSDENMOORE is and was at all times referred to herein a
|
|||
|
member of the Regional Electronic Computer Intelligence Task Force. For the
|
|||
|
constitutional and common law claims, Defendant Ausdenmoore is sued in his
|
|||
|
official capacity with respect to the declaratory and injunctive relief sought
|
|||
|
herein, and in his individual capacity with respect to the request for damages
|
|||
|
and attorney's fees in this action. For the federal statutory claims,
|
|||
|
Defendant Ausdenmoore is sued in his individual and official capacities.
|
|||
|
30.Defendant JAMES NERLINGER is and was at all times referred to herein a
|
|||
|
member of the Regional Electronic Computer Intelligence Task Force. For the
|
|||
|
constitutional and common law claims, Defendant Nerlinger is sued in his
|
|||
|
official capacity with respect to the declaratory and injunctive relief sought
|
|||
|
herein, and in his individual capacity with respect to the request for damages
|
|||
|
and attorney's fees in this action. For the federal statutory claims,
|
|||
|
Defendant Nerlinger is sued in his individual and official capacities.
|
|||
|
31.At all times relevant herein, each named individual Defendant was acting
|
|||
|
under color of state law.
|
|||
|
32.At all times relevant herein, Defendants, and each of them, separately and
|
|||
|
in concert, acted under color of state law. At all times relevant herein,
|
|||
|
Defendants, and each of them, separately and in concert, engaged in the illegal
|
|||
|
and unconstitutional conduct described herein and deprived Plaintiffs of the
|
|||
|
rights, privileges, and immunities secured to Plaintiffs by the First, Fourth,
|
|||
|
and Fourteenth Amendments to the United States Constitution, the laws of the
|
|||
|
United States, and the Constitution and laws of the State of Ohio.
|
|||
|
|
|||
|
IV. FACTS
|
|||
|
|
|||
|
A.The Cincinnati Computer Connection Community.
|
|||
|
33.On June 16, 1995, and for many years before that, the Cincinnati Computer
|
|||
|
Connection ("CCC") was a thriving community. The bulletin board system ("BBS")
|
|||
|
provided a forum for its users to speak and publish privately and publicly, to
|
|||
|
debate, to associate and recreate, and to exchange ideas and information. On
|
|||
|
June 16, 1995, the faces of the CCC subscribers were the faces of Greater
|
|||
|
Cincinnati -- working men and women, retirees, mothers, fathers, grandparents
|
|||
|
and children, Republicans, Democrats and Independents. The CCC community even
|
|||
|
included subscribers from around the United States and overseas.
|
|||
|
34.Many of the subscribers to the CCC BBS have made personal acquaintances
|
|||
|
through the bulletin board community. Subscribers have held dinner
|
|||
|
get-togethers to meet personally, to socialize, and to discuss matters of
|
|||
|
interest to the BBS community. These meetings were organized by the
|
|||
|
subscribers by using the BBS itself.
|
|||
|
35.On June 16, 1995, the CCC community included thousands of users and
|
|||
|
subscribers. Because the CCC computers and subscriber records remain in the
|
|||
|
hands of the Defendants, the exact number remains unknown.
|
|||
|
36.At all relevant times, the CCC BBS affected and operated in the stream of
|
|||
|
interstate commerce.
|
|||
|
|
|||
|
B.The Cincinnati Computer Connection BBS.
|
|||
|
37.Each user or subscriber to the CCC BBS selected a private password, which
|
|||
|
secured the privacy of his or her account. The subscriber contacted the CCC
|
|||
|
BBS by using his or her personal computer, a modem, and a phone line. The
|
|||
|
user's computer would call the CCC BBS over a phone line, and after "logging
|
|||
|
in" by using the confidential password, the user was given access to the CCC
|
|||
|
BBS. Once connected to the BBS, the subscriber could do a whole range of
|
|||
|
things, including:
|
|||
|
i.Private electronic mail or "e-mail."
|
|||
|
38.The CCC BBS provided subscribers the ability to send and receive private
|
|||
|
electronic communications, typically known as e-mail. A subscriber could
|
|||
|
compose private electronic messages either before "logging on" to the CCC, or
|
|||
|
while connected to the bulletin board system. Just like First Class mail,
|
|||
|
e-mail messages are addressed to a specific person, and are confidential.
|
|||
|
39.E-mail was sent and received in two manners on the CCC BBS. E-mail
|
|||
|
exchanged between persons who had accounts on the CCC BBS was sent within the
|
|||
|
many conference areas on the BBS (see below). If the sender designated a
|
|||
|
conference message "confidential," the message remained inaccessible to any
|
|||
|
user except the designated recipient. The CCC BBS also provided an "Internet
|
|||
|
mail gateway." This feature allowed subscribers to send and receive
|
|||
|
confidential electronic communications from persons who did not have an account
|
|||
|
on the CCC BBS, but who had an Internet address. This Internet mail gateway
|
|||
|
allowed the users of the CCC BBS to send confidential electronic communications
|
|||
|
to, and receive them from, tens of millions of persons around the world.
|
|||
|
40.This e-mail was not readily accessible to the public. The users of the CCC
|
|||
|
BBS, and those who sent electronic mail to the CCC BBS from the Internet, had a
|
|||
|
reasonable expectation of privacy in those communications.
|
|||
|
41.When Defendant Leis and the other Defendants seized the CCC BBS, they seized
|
|||
|
all of the private electronic communications contained on the system, and cut
|
|||
|
off the subscribers' ability to send and receive e-mail.
|
|||
|
ii.Conference areas.
|
|||
|
42.In addition to e-mail, the Cincinnati Computer Connection provided its
|
|||
|
subscribers access to thousands of "conferences." These conferences, like the
|
|||
|
sections of a library, are the main organizational units of the BBS. Each
|
|||
|
conference area had a name and a topic. For example, the CCC BBS had
|
|||
|
conference areas dedicated to writers, game players, and computer
|
|||
|
professionals. When a subscriber accessed the bulletin board system, he or she
|
|||
|
could "enter" an conference area. Once in a conference area, the subscriber
|
|||
|
could read all the public messages posted by other visitors to the conference,
|
|||
|
post public reply messages or begin new public discussions on new topics. The
|
|||
|
user could also send and receive private electronic communications within the
|
|||
|
conference. The CCC BBS provided literally thousands of conferences for its
|
|||
|
users, including:
|
|||
|
a.Local conference areas.
|
|||
|
43.These conferences were unique to the CCC BBS, and included discussions and
|
|||
|
debates on topics ranging from local and national politics to sports and
|
|||
|
computers. These conferences were the heart of the local CCC community
|
|||
|
interaction.
|
|||
|
b.Private local conference areas.
|
|||
|
44.The CCC BBS also provided conference areas that were restricted to
|
|||
|
particular users. These restricted conference areas were used by subscribers
|
|||
|
for confidential business purposes, including exchanging confidential
|
|||
|
information.
|
|||
|
c.BBS network conferences.
|
|||
|
45.On June 16, 1995, the CCC BBS also provided to its users "feeds" from
|
|||
|
networks of similar dial-up bulletin board systems. These networks provided
|
|||
|
dozens of additional conference areas, and allowed the users of the CCC BBS to
|
|||
|
engage in discussion on topics with users of a whole network of BBSs beyond the
|
|||
|
subscribers to the CCC BBS.
|
|||
|
d.Usenet newsgroups.
|
|||
|
46.The CCC BBS also received, via satellite feed, thousands of additional
|
|||
|
conferences from an Internet network known as Usenet. Usenet is essentially a
|
|||
|
bulletin board system for the Internet. Usenet is organized into thousands of
|
|||
|
separate "newsgroups" where people from all around the world can engage in
|
|||
|
discussion and debate on a huge variety of topics, ranging from computer
|
|||
|
science, philosophy, and law to pop music. The CCC subscribers could read and
|
|||
|
participate in these newsgroups.
|
|||
|
47.When Defendant Leis and the other Defendants seized the CCC BBS, they seized
|
|||
|
all of the contents of all of these thousands of conference areas, and denied
|
|||
|
the subscribers to the CCC any access to the conferences.
|
|||
|
iii.Live "chat."
|
|||
|
48. The Cincinnati Computer Connection BBS also featured live chat "channels."
|
|||
|
Similar to CB radio channels, the "chat" function allowed subscribers to
|
|||
|
converse in "real time" with other subscribers who were logged into the BBS.
|
|||
|
One subscriber could invite another person to chat, and the two subscribers
|
|||
|
could exchange confidential messages by typing them in sequence to each other.
|
|||
|
49.When Defendant Leis and the other Defendants seized the CCC BBS, they shut
|
|||
|
down any chat taking place on the board and seized any captured chat file
|
|||
|
sessions.
|
|||
|
iv.Games.
|
|||
|
50.The game areas on the CCC were very popular. Subscribers could play a
|
|||
|
variety of on-line games against the computer or against other subscribers.
|
|||
|
Some "games" were more like interactive creative writing, with different users
|
|||
|
of the BBS taking on personas and interacting with each other in a fictional
|
|||
|
world.
|
|||
|
51.The Defendants' seizure of the bulletin board system of course included
|
|||
|
seizure of all the games, and cut off the subscribers' access to the games.
|
|||
|
v.File transfer.
|
|||
|
52.The CCC BBS offered its subscribers the ability to "upload" computer files
|
|||
|
from their home computer to the bulletin board system, and to "download"
|
|||
|
computer files from the bulletin board to their home computers. Computer files
|
|||
|
can consist of anything from computer programs and other software, to the text
|
|||
|
of written material (such as this Complaint), to picture files and sound files.
|
|||
|
The CCC BBS had an enormous library of computer files for its users to access
|
|||
|
and use. The Defendants seized this entire library of thousands of computer
|
|||
|
files when they seized the 45 allegedly obscene images they were after.
|
|||
|
vi.The restricted adult file area.
|
|||
|
53.Among the thousands of conferences on the CCC, there was a single conference
|
|||
|
area dedicated to adult-oriented computer image files. Access to this area was
|
|||
|
extremely limited. In order to gain access to this conference, a subscriber
|
|||
|
was required to verify his age and identity in person to the CCC system
|
|||
|
operator, Mr. Emerson. After verifying the subscriber's age, Emerson would
|
|||
|
configure that user's account to give that subscriber access to the adult file
|
|||
|
area. Only after a subscriber's age and identity was verified, and the
|
|||
|
subscriber's account given access to the adult file area, would the existence
|
|||
|
of the adult file area even appear on the user's screen when logged in to the
|
|||
|
CCC. The "menu" of choices available to a subscriber who had not been verified
|
|||
|
and given access would not even show that an adult file area existed.
|
|||
|
54.Even for those with access to the restricted adult file area, the adult
|
|||
|
image files could not be viewed "on-line." In order to view a file, a
|
|||
|
subscriber with access would have to log onto the BBS, enter the restricted
|
|||
|
adult area, designate a file for downloading, download that file to the user's
|
|||
|
home computer, log off the system, and then run a separate computer program on
|
|||
|
the home computer that interprets the image and displays it on the user's home
|
|||
|
computer screen.
|
|||
|
55.The restricted adult file area comprised a very small percentage of the
|
|||
|
material on the CCC BBS -- no more than 3%, and upon information and belief far
|
|||
|
less than that. The number of users with access to this area was also very
|
|||
|
small -- no more than 3% of the subscribers, and upon information and belief
|
|||
|
far less than that. Many, if not most, of the CCC subscribers had no idea that
|
|||
|
an adult file area even existed.
|
|||
|
56.Compared to the Cincinnati Computer Connection as a whole, the adult file
|
|||
|
area was like a tiny, locked, and largely unknown private room within a huge,
|
|||
|
bustling convention center.
|
|||
|
C.Defendants Obtain A Search Warrant And Go Trolling for Computer Porn.
|
|||
|
57.On or about June 15, 1995, the Defendants applied to the Municipal Court of
|
|||
|
Clermont Count for a search warrant for the premises containing the CCC BBS
|
|||
|
computers. Municipal Court Judge James A. Shriver signed the search warrant at
|
|||
|
11:30 p.m. that evening. Upon information and belief, Judge Shriver had never
|
|||
|
reviewed an application for the search or for the seizure of an electronic
|
|||
|
communication system such as the CCC BBS, and had never issued a search warrant
|
|||
|
for such a system. The search warrant itself listed 45 particular image files,
|
|||
|
by name and description, that were the target of the search.
|
|||
|
58.The Defendants obtained an order sealing from public scrutiny the search
|
|||
|
warrant affidavit that allegedly justified their application for the search
|
|||
|
warrant. Plaintiffs have now obtained a copy of the single affidavit that was
|
|||
|
used to support the application for search warrant.
|
|||
|
59.The warrant filed in support of the application for search warrant was
|
|||
|
signed by David L. Ausdenmoore. The affidavit was false and/or misleading in
|
|||
|
at least the following respects:
|
|||
|
a)The affidavit failed to inform Judge Shriver that the CCC BBS was a forum for
|
|||
|
speech, publication and associated protected by the Privacy Protection Act of
|
|||
|
1980, the First Amendment to the United States Constitution, and the Ohio
|
|||
|
Constitution;
|
|||
|
b)The affidavit failed to inform Judge Shriver that the Defendants intended to
|
|||
|
shut down that protected forum, and seize all the publications on that forum;
|
|||
|
c)The affidavit failed to inform Judge Shriver that the CCC BBS contained
|
|||
|
thousands of private electronic communications to and from the subscribers of
|
|||
|
the CCC BBS protected from unauthorized interception, seizure and disclosure by
|
|||
|
the Electronic Communications Privacy Act of 1986;
|
|||
|
d)The affidavit failed to inform Judge Shriver that the Defendants intended to
|
|||
|
shut down this protected electronic communications system;
|
|||
|
e)The affidavit failed to inform Judge Shriver that the Defendants intended to
|
|||
|
seize, intercept and read these protected, private communications;
|
|||
|
f)The affidavit failed to inform Judge Shriver that the Defendants had no
|
|||
|
probable cause to believe that these private communications were relevant to
|
|||
|
the investigation of any criminal activity, let alone the criminal activity
|
|||
|
alleged in the Affidavit;
|
|||
|
g)The affidavit failed to inform Judge Shriver that the Defendants had no
|
|||
|
probable cause to believe that the public communications contained on the
|
|||
|
system of the Plaintiffs were related to any criminal activity, let alone the
|
|||
|
criminal activity alleged in the Affidavit;
|
|||
|
h)The affidavit failed to inform Judge Shriver that far less intrusive means of
|
|||
|
searching for the allegedly offending material were readily available to the
|
|||
|
Defendants, means that would not have involved the seizure of either the
|
|||
|
private electronic messages of the Plaintiffs or their publicly posted
|
|||
|
messages;
|
|||
|
i)The affidavit falsely stated and/or implied that the allegedly obscene
|
|||
|
material on the CCC BBS was "concealed in violation of law," when, according to
|
|||
|
the Affidavit itself, the Defendants had already obtained copies of the images
|
|||
|
by accessing the CCC BBS themselves; and
|
|||
|
j)The affidavit falsely stated that the images sought to be seized by the
|
|||
|
Defendants were downloaded from the CCC BBS "as a regular user of the BBS,"
|
|||
|
falsely implying that all users of the BBS had access to these images, rather
|
|||
|
than a very small number of users.
|
|||
|
D.Defendants Shut Down the Cincinnati Computer Connection BBS and
|
|||
|
Indiscriminately Seize Everything On It.
|
|||
|
60.On June 16, 1995, purportedly acting under the authority of the search
|
|||
|
warrant signed by Judge Shriver, the Defendants seized the entire CCC BBS. The
|
|||
|
Defendants made no effort to limit their seizure to materials or information
|
|||
|
related to the alleged offense under investigation; rather, they seized the
|
|||
|
entire system, shutting it down completely. If not for a significant personal
|
|||
|
financial commitment by Mr. Emerson after the raid, the CCC BBS would have been
|
|||
|
permanently shut down.
|
|||
|
61.The Defendants made no effort to return to the Plaintiffs or any other user
|
|||
|
of the CCC BBS their private electronic communications, or to assure that such
|
|||
|
communications reach their intended recipients. Upon information and belief,
|
|||
|
the Defendants have already, or have every intention to, read the private
|
|||
|
electronic communications of the CCC BBS subscribers.
|
|||
|
62.The Defendants made no effort to limit the scope of their seizure. Prior to
|
|||
|
the raid, the Defendants knew the exact file names of the computer image files
|
|||
|
they were searching for. In fact, the Defendants had already obtained those
|
|||
|
files prior to the raid. The Defendants consciously chose not to use means at
|
|||
|
their disposal that would have allowed for a limited search and seizure of
|
|||
|
evidence relevant to the alleged offense. The Defendants consciously refused
|
|||
|
to use narrower means of obtaining their investigative objectives that would
|
|||
|
have protected the privacy of the subscribers' communications and the integrity
|
|||
|
of their forum.
|
|||
|
63.The Defendants knew, or should have known, that the CCC BBS was a forum for
|
|||
|
protected speech, publication and communication. The Defendants knew, or
|
|||
|
should have known, that the CCC BBS contained materials being published
|
|||
|
electronically that were protected by the First Amendment to the U.S.
|
|||
|
Constitution, the Ohio Constitution, and the Privacy Protection Act. The
|
|||
|
Defendants knew, or should have known, that the BBS contained the private
|
|||
|
electronic communications of its users, and that such communications were not
|
|||
|
readily accessible to the public. The Defendants knew, or should have known,
|
|||
|
that the users of the CCC BBS had a reasonable expectation of privacy in their
|
|||
|
electronic communications.
|
|||
|
64.Reasonable law enforcement officers in the position of the Defendants, with
|
|||
|
the information available to the Defendants, would have known that the CCC BBS
|
|||
|
was a forum for speech, publication and communication protected by the First
|
|||
|
Amendment and the Ohio Constitution, and that the electronic communications on
|
|||
|
the CCC BBS were protected by the Fourth Amendment, the Ohio Constitution and
|
|||
|
federal statutory law from search and seizure and interception unless the
|
|||
|
officers had probable cause to believe that those communications were relevant
|
|||
|
to the law enforcement inquiry.
|
|||
|
65.The raid on the home of Bob Emerson, the seizure of the entire CCC BBS
|
|||
|
system, and the examination and review of the contents of that system, were
|
|||
|
conducted under the direction of Defendant Leis, who is the policymaker for the
|
|||
|
Hamilton County Sheriff's Department, and/or pursuant to a policy or custom
|
|||
|
authorized, permitted and tolerated by Defendants Leis, Hamilton County
|
|||
|
Sheriff's Department, and the Task Force to, among other things:
|
|||
|
a)indiscriminately seize and shut down entire electronic bulletin board systems
|
|||
|
without legal authority or probable cause;
|
|||
|
b)seize and intercept public and private electronic communications and other
|
|||
|
private information of persons without legal authorization or probable cause;
|
|||
|
c)deny innocent persons access to their public and private electronic
|
|||
|
communications, without legal authorization or probable cause;
|
|||
|
d)apply for and obtain search warrants purportedly authorizing the seizure of
|
|||
|
computers, without informing the issuing magistrate or judge that the computer
|
|||
|
system operates an electronic communication system, contains public and private
|
|||
|
communications unrelated to the investigation, and that seizure of the system
|
|||
|
will result in the seizure and interception of electronic communications and
|
|||
|
the complete shutting down of an electronic communication system;
|
|||
|
e)apply for and obtain search warrants purportedly authorizing the seizure of
|
|||
|
computers operating electronic communications systems, without informing the
|
|||
|
issuing magistrate or judge that the computers contain communications protected
|
|||
|
by the Electronic Communications Privacy Act, the Privacy Protection Act of
|
|||
|
1980, the First and Fourth Amendments to the United States Constitution, and
|
|||
|
Ohio statutory and constitutional law;
|
|||
|
f)exceed the authorization of search warrants in the seizure and examination of
|
|||
|
seized BBSs;
|
|||
|
g)seize and examine BBSs and computer systems in order to search for evidence
|
|||
|
of suspected crimes without legal authorization or probable cause;
|
|||
|
h)conduct searches and seizures outside the territorial jurisdiction of
|
|||
|
Hamilton County without legal authority;
|
|||
|
i)seize and shut down BBSs in order to prevent further publication and
|
|||
|
distribution of materials presumptively protected by the federal and state
|
|||
|
constitutions, without any adversarial determination of the legality of such
|
|||
|
materials; and
|
|||
|
j)knowingly fail and refuse to conduct investigations into suspected computer
|
|||
|
crimes without intercepting, seizing, or denying access to, the private and
|
|||
|
public communications and private information of innocent citizens.
|
|||
|
66.The Class Members' injuries and deprivation of constitutional, statutory and
|
|||
|
common law rights were proximately caused by Defendants Leis, Hamilton County
|
|||
|
Sheriff's Department, and the Task Force's failure to adequately train their
|
|||
|
officers in the proper manner of conducting investigations of alleged computer
|
|||
|
crime, so that such investigations would be made without the violation of
|
|||
|
innocent persons' rights, and such failure to train amounted to a deliberate
|
|||
|
indifference to the Class Members' constitutional, statutory and common law
|
|||
|
rights.
|
|||
|
|
|||
|
|
|||
|
((The full text of the suit can be obtained at:
|
|||
|
law enforcement officials. The full text can be found at:
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Thu, 21 Mar 1996 22:51:01 CST
|
|||
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|||
|
Subject: File 3--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost electronically.
|
|||
|
|
|||
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|||
|
|
|||
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|||
|
|
|||
|
SUBSCRIBE CU-DIGEST
|
|||
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|||
|
|
|||
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|||
|
|
|||
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|||
|
60115, USA.
|
|||
|
|
|||
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|||
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|||
|
(NOTE: The address you unsub must correspond to your From: line)
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|||
|
the PC Telecom forum under "computing newsletters;"
|
|||
|
On Delphi in the General Discussion database of the Internet SIG;
|
|||
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|||
|
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
|
|||
|
CuD is also available via Fidonet File Request from
|
|||
|
1:11/70; unlisted nodes and points welcome.
|
|||
|
|
|||
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|||
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|||
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|||
|
|
|||
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
|
|||
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|||
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|||
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|||
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|||
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|||
|
|
|||
|
|
|||
|
The most recent issues of CuD can be obtained from the
|
|||
|
Cu Digest WWW site at:
|
|||
|
URL: http://www.soci.niu.edu/~cudigest/
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Authors hold a presumptive copyright, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #8.77
|
|||
|
************************************
|
|||
|
|