1196 lines
57 KiB
Plaintext
1196 lines
57 KiB
Plaintext
|
|
|
|
|
|
THE ELECTRONIC PAMPHLET--COMPUTER
|
|
BULLETIN BOARDS AND THE LAW
|
|
|
|
|
|
Submitted in Partial Fulfillment
|
|
Of the Requirements of
|
|
Mass Communications
|
|
|
|
by
|
|
Michael H. Riddle
|
|
72446.3241@compuserve.com
|
|
Sysop on 1:285/27@fidonet
|
|
|
|
|
|
(c) Copyright 1990, by Michael H. Riddle. All Rights Reserved.
|
|
This paper may be freely distributed via electronic media
|
|
provided that the entire text remains intact, including this
|
|
first page,notice, and disclaimer, and further provided that
|
|
full credit is given.
|
|
|
|
DISCLAIMER: This paper was prepared by a law student as part
|
|
of a course of study, and should not be construed to represent a
|
|
legal opinion. Anyone with a need for a current legal opinion
|
|
relating to this material should contact an attorney licensed
|
|
to practice in their state.
|
|
---
|
|
|
|
|
|
|
|
THE ELECTRONIC PAMPHLET--COMPUTER
|
|
BULLETIN BOARDS AND THE LAW
|
|
|
|
|
|
Introduction--Bulletin Boards Then and Now
|
|
|
|
In 1517, Martin Luther nailed his 95 theses to the door
|
|
of the church in Wittenberg, Germany, an act which is gener-
|
|
ally considered the start of the Reformation, the Protestant
|
|
religious movement (Protesting aspects of the Catholic
|
|
church as it then existed). [FN1] The author remembers how
|
|
outrageous it seemed to him, the first time he heard the
|
|
story, that anyone would have the effrontery to nail even
|
|
one, let alone 95, documents to a church door. It was only
|
|
later, after much study of history and theology, that he
|
|
came to learn that the church door was routinely used for
|
|
this purpose. At a time before widespread publication of
|
|
newspapers, before telegraph, telephone, television, or CB
|
|
radio, the church door was the acknowledged location for
|
|
important notes or topics of discussion. [FN2]
|
|
|
|
Students at the University of Nebraska College of Law
|
|
use the "kiosk" inside the main entrance to the college to
|
|
pass notes to each other. Hexagonal in shape, one side of
|
|
the kiosk is reserved for general announcements and bulle-
|
|
tins. Sometimes the postings are as routine as announcement
|
|
of a meeting; at other times, they might be a call to action
|
|
to save the trees in a local park from the bulldozer.
|
|
Students are cautioned, during their first formal orienta-
|
|
tion at the College, to check the kiosk daily. [FN3]
|
|
|
|
Just inside the door at Baker's Supermarket in LaVista,
|
|
Nebraska, is a board where customers (and presumably others)
|
|
may post notes about items for sale, offers of employment,
|
|
and the like. Similar boards are found in other locations
|
|
around town, provided either as a public service by a busi-
|
|
ness, or perhaps as yet another advertising "gimmick,"
|
|
another way of increasing business at the store. [FN4]
|
|
|
|
During the Revolution, and when the Founding
|
|
Fathers [FN5] wrote the Constitution and the Bill of
|
|
Rights, similar functions were often fulfilled by "pamphle-
|
|
teers." Anyone with an idea and a little loose change could
|
|
buy or borrow a printing press, and soon be distributing
|
|
their ideas around the town. [FN6]
|
|
|
|
Today, another forum is increasingly available for
|
|
notices, reminders and discussions--the computer bulletin
|
|
board. [FN7] Listings of items for sale, notices of meet-
|
|
ings, and discussion about matters important or trivial may
|
|
be found in the world of electronics as well as groceries.
|
|
At one time the province of the technically and financially
|
|
gifted, bulletin boards are increasing available to Every-
|
|
man. [FN8] At least one commentator has directly compared
|
|
the bulletin board system of today with the pamphlet of
|
|
yesterday. [FN9]
|
|
|
|
In the simplest form, a bulletin board is a computer,
|
|
often a small personal computer (PC), connected to a tele-
|
|
phone line by a device called a modem. [FN10] While large
|
|
and expensive systems are possible, a person desiring to
|
|
enter the bulletin board arena may do so for a total invest-
|
|
ment less than $500. [FN11] At the simplest, the bulletin
|
|
board system acts as a "store and forward" system. Individ-
|
|
uals call the BBS one at a time, "log on" (typically using
|
|
some sort of entry code and password protection to insure
|
|
identity), read messages that have been left and post any
|
|
messages they desire. They then log off, and the system is
|
|
available to the next caller. [FN12]
|
|
|
|
"Networked" systems add an additional step, one which
|
|
greatly expands the nature of the forum. At pre-designated
|
|
times, the BBS scans the messages to see what has been
|
|
posted on the board since the last similar event, and pre-
|
|
pares "mail packets" with those messages. It then calls
|
|
other systems and forwards the packets to those systems,
|
|
receiving in turn any mail designated for it. In this
|
|
manner, messages may be entered in Lincoln or Omaha at no
|
|
expense to the user, and be sent literally around the
|
|
world. [FN13]
|
|
|
|
Static on the Lines?
|
|
|
|
While bulletin board systems may facilitate communica-
|
|
tion, they have a potential for misuse as well. Several
|
|
positive benefits of bulletin boards are that users may
|
|
express their opinions on matters of public interest, may
|
|
look for reviews of products they are considering buying,
|
|
and might ask specific questions about any number of mat-
|
|
ters. [FN14] Potential for abuse exists in both civil and
|
|
criminal areas, particularly for defamation (libel or slan-
|
|
der), theft of intellectual property (particularly software
|
|
piracy and copyright violations), and theft (credit card
|
|
abuse, telephone system fraud, and similar actions). [FN15]
|
|
Press coverage of this type of activity inevitably refers to
|
|
the use of bulletin boards, [FN16] and in the public mind
|
|
all bulletin board operators and users become associated
|
|
with "hackers" and "phreakers." [FN17] Recent news events
|
|
covered at some length the "Internet worm" propagated by
|
|
Robert Morris, which brought several national computer
|
|
networks almost to a complete halt. [FN18] The press
|
|
treatment of the event once again tended toward the sensa-
|
|
tional, using what have come to be pejorative terms, such as
|
|
"hacker," "phreaker", and the like. These reports also
|
|
frequently included what could easily interpreted as deroga-
|
|
tory references to bulletinboard systems ingeneral. [FN19] -
|
|
|
|
The United States Secret Service has been charged with
|
|
enforcement of federal laws relating to computer crime, and
|
|
a recent investigation known as "Sun Devil" has received
|
|
some publicity in the traditional media, and even more in
|
|
the electronic fora. [FN20] In the zealous pursuit of
|
|
their goal to eliminate computer crime, the Secret Service
|
|
is often trampling on toes and arguably chilling the free
|
|
expression of ideas. An example of what can happen occurred
|
|
recently when someone illegally (meaning without authoriza-
|
|
tion) entered a Bellsouth computer and downloaded (arguably
|
|
"stole") documentation about the "E911" enhanced emergency
|
|
communications system. (E911 is the system that calls the
|
|
emergency dispatcher when someone dials 9-1-1 and automati-
|
|
cally displays for the dispatcher the calling number and
|
|
address, and any other information that has previously been
|
|
filed, such as hazardous chemicals, invalids or small chil-
|
|
dren, etc.) One Robert Biggs plead guilty to the actual
|
|
theft, and a Craig Neidorf was charged along with Biggs.
|
|
Neidorf apparently was not charged directly with the theft
|
|
(assuming, arguendo, theft had occurred), but rather with
|
|
publishing the data in an electronic newsletter. Neidorf's
|
|
computer equipment, including that use for a bulletin board
|
|
system, was seized, even though it contained electronic
|
|
mail. [FN21]
|
|
|
|
The case against Neidorf was suddenly dismissed on the
|
|
fourth day, after it became apparent that nothing of value
|
|
(in the sense that it was already publicly available) had
|
|
been published by Neidorf. [FN22]
|
|
|
|
Legal Issues Relating to Bulletin Board Systems
|
|
|
|
Several legal issues remain unresolved, at least as
|
|
they pertain to bulletin board systems. [FN23] This paper
|
|
will survey what appear to be the most obvious ones at the
|
|
moment, briefly review the law as it appears to be on the
|
|
subject, and may occasionally suggest what the author advo-
|
|
cates as the "proper" rule on the issue. Briefly stated,
|
|
the emerging issues appear to be whether bulletin board
|
|
systems are protected by either the Speech or Press Clauses
|
|
of the First Amendment, and to what extent; whether the
|
|
bulletin board system operators are or should be liable for
|
|
illegal or actionable misdeeds of their users; what the
|
|
expected duty of care should be for the system operators as
|
|
a defense to such liability, and what protections might be
|
|
extended to bulletin board systems, directly or indirectly
|
|
through their operators, under the Fourth Amendment. This
|
|
paper will discuss four areas bearing on the legal rights
|
|
and responsibilities of system operators: whether a bulle-
|
|
tin board system is "press" for First Amendment purposes,
|
|
what rules of decision ought to apply for system operator
|
|
liability for defamation originally published by users, what
|
|
other liability might attach for contents of messages on the
|
|
system, and some limited concerns about privacy of electron-
|
|
ic mail vis-a-vis search and seizure rules.
|
|
|
|
Bulletin Board Systems and the First Amendment
|
|
|
|
In assessing what vicarious liability, for defamation
|
|
or for illegal or illegally obtained information, system
|
|
operators might have for information posted on their bulle-
|
|
tin boards by users, one is drawn to a comparison with the
|
|
press. While the analogy, like most analogies, breaks down
|
|
at some point, it is still helpful. At least one reported
|
|
decision has held that electronic information storage and
|
|
retrieval systems may in some circumstances be considered
|
|
"press." [FN24]
|
|
|
|
Access to Information
|
|
|
|
In Legi-Tech, Inc., v. Keiper, [FN25] a computerized
|
|
legislative information retrieval service was denied access
|
|
to a state-owned computer database of legislative materials.
|
|
In deciding for Legi-Tech, the court treated the service as
|
|
if it were a form of press, in that it existed to collect
|
|
and disseminate information about issues of public impor-
|
|
tance and interest. While Legi-Tech did not directly ad-
|
|
dress a bulletin board system, at least not in the sense
|
|
that the term is generally used, the comparison is clear
|
|
when the bulletin board system contains message areas of
|
|
public discussion in traditional areas of public concern,
|
|
such as government, politics, and laws. At least one com-
|
|
mentator, citing Legi-Tech, has concluded that for some
|
|
purposes [FN26] bulletins boards should be considered
|
|
press. [FN27]
|
|
|
|
Liability for Defamation
|
|
|
|
Deciding that a bulletin board system is "press" for
|
|
some purposes begs the question, what does it mean about
|
|
anything? One of the more common concerns among system
|
|
operators appears to be vicarious liability for libels
|
|
published by users. [FN28] While the seminal modern case
|
|
discussing liability of the press for libel, New York Times
|
|
v. Sullivan, [FN29] might suggest a stringent standard for
|
|
press liability, more recent cases call that into question.
|
|
Dun & Bradstreet, Inc. v. Greenmoss Builders, Inc., [FN30]
|
|
might fairly be read to suggest there is no difference, in
|
|
the libel context, between press and non-press, but rather
|
|
the true distinction is between what is and is not a matter
|
|
of public concern worthy of heightened protection. Such an
|
|
interpretation would arguably be consistent with the interim
|
|
case of Robert Welch, Inc., v. Gertz, [FN31] which also
|
|
appeared to rest its holding on a public-private distinc-
|
|
tion.
|
|
|
|
Assuming, arguendo, that the New York Times v. Sulli-
|
|
van [FN32] decision established a special level of protec-
|
|
tion for the press, then the BBS operator clearly would
|
|
benefit from the extension of such a privilege. At the time
|
|
the message is entered by the user, the operator has no
|
|
knowledge whatsoever of the contents of the message, and
|
|
therefore cannot know it to be false. Later, when the
|
|
operator sees the message, the operator might arguably have
|
|
a duty to remove it if it were blatantly false; otherwise,
|
|
the issue would appear to become when failure to remove or
|
|
challenge a message would be "reckless disregard of whether
|
|
it was false or not." [FN33] In considering the question,
|
|
one might expect normally to find dispositive the holding in
|
|
St. Amant v. Thompson [FN34] that failure to investigate,
|
|
without more, could not establish reckless disregard for the
|
|
truth. [FN35]
|
|
|
|
The astute reader recognizes, of course, that the New
|
|
York Times holding concerned statements about public offi-
|
|
cials. The commentary found on bulletin boards certainly
|
|
talks about politics and public officials. [FN36] The
|
|
question remains, however, about private parties. Robert
|
|
Welch, Inc., v. Gertz [FN37] is generally cited as the
|
|
decision next addressing the subject. In Gertz, an attorney
|
|
had representing police officer's family in a murder inves-
|
|
tigation. The defendant made false statements about the
|
|
attorney in its monthly publication American Opinion. The
|
|
judge having ruled the attorney was not a public figure, the
|
|
jury returned a plaintiff's verdict for $50,000. The trial
|
|
judge later reconsidered his ruling, and entered a judgment
|
|
not withstanding the verdict on the theory that a discussion
|
|
about a matter of public concern deserved protection. The
|
|
issue on appeal appeared to be whether the attorney was a
|
|
public figure, not whether the issue was of public concern.
|
|
The Court ruled that the fact he was not a public figure
|
|
controlled. He had not "thrust himself into the vortex of
|
|
this public issue, nor did he engage the public's attention
|
|
in an attempt to influence the outcome." The Court then held
|
|
that as long as liability was not imposed without some basis
|
|
of fault, the states could write their own rules for "pri-
|
|
vate" libels. [FN38]
|
|
|
|
If New York Times [FN39] established a new standard of
|
|
"malice" for press publishing on public matters, and
|
|
Gertz [FN40] refused to extend that standard to private
|
|
parties, even when matters of public concern might be at
|
|
stake, then what about Dun & Bradstreet? [FN41] Dun &
|
|
Bradstreet, a private credit-reporting firm, published false
|
|
information about Greenmoss Builders, suggesting Greenmoss
|
|
had filed bankruptcy when in fact it was an Greenmoss em-
|
|
ployee who had filed. The Vermont Supreme Court found Gertz
|
|
inapplicable to nonmedia defamation actions, and sustained
|
|
damages to Greenmoss. The Supreme Court affirmed, but on a
|
|
different basis not involving a distinction between media
|
|
and nonmedia. The plurality opinion suggested that the
|
|
crucial distinction was whether the speech involved a "pub-
|
|
lic issue," "public speech," or an "issue of public con-
|
|
cern." While Gertz did not clearly draw the distinction, it
|
|
was clear to the plurality from the facts of Gertz that such
|
|
a limitation was implied. [FN42]
|
|
|
|
As applied to bulletin board systems, it would appear
|
|
then that if the BBS is press, New York Times malice would
|
|
be the rule for defamation involving public issues or public
|
|
officials. As long as the defamation was by one user about
|
|
another user, the defamed party could be held to have delib-
|
|
erately "thrust himself into the vortex of this public
|
|
issue" in an "attempt to influence the outcome." [FN43]
|
|
That the issue was of public concern [FN44] could fairly be
|
|
implied from the fact of discussion on a public message
|
|
base, subject to rebuttal. Of course, the possibility
|
|
always exists that a user inserted a defamatory statement
|
|
into a void, [FN45] in which case the system operator would
|
|
arguably at least have a duty to remove the offending state-
|
|
ment, absent a privilege to republish. [FN46]
|
|
|
|
One of the difficulties in discussing the defamation
|
|
issue lies in distinguishing the system operator as "vic-
|
|
tim," i.e., the innocent republisher of a defamation, from
|
|
the system operator as initial defamer. The operator may
|
|
be, but usually is not, the original publisher of an alleged
|
|
defamation. [FN47] The system operator is more generally a
|
|
republisher of information and, like the bookseller in Smith
|
|
v. California, [FN48] may not fairly be held to know in
|
|
advance the contents of messages left on the bulletin board,
|
|
let alone whether they are true or false. [FN49] In Smith,
|
|
the issue was whether the bookseller, absent knowledge of
|
|
the contents, could be held liable for obscene material in
|
|
his store. The Court held that he could not. "Every book-
|
|
seller would be placed under an obligation to make himself
|
|
aware of the contents of every book in his shop. It would
|
|
be altogether unreasonable to demand so near an approach to
|
|
omniscience...." [FN50] One must be careful, however, when
|
|
discussing the impact of Smith. At least one commentator
|
|
has suggested that the typical application of Smith is that,
|
|
in the totality of the circumstances surrounding an "adult"
|
|
bookstore, the bookseller can be inferred to know the con-
|
|
tents of his merchandise. [FN51] One could suggest that
|
|
the factual situation would be critical in the context of a
|
|
bulletin board system.
|
|
|
|
In manner similar to the Smith bookseller, the system
|
|
operator is not aware of the contents of a message at the
|
|
moment it is posted. While most system operators review the
|
|
contents of most messages left on their bulletin boards most
|
|
of the time, it is not always practical to do so, and to the
|
|
extent that the discussion centers on issues of obvious
|
|
public importance, such prescreening implicates serious
|
|
First Amendment concerns regarding censorship and chilling
|
|
debate on issues of public importance. [FN52]
|
|
|
|
While it is not reasonable to expect system operators
|
|
to be aware of the contents of every message, particularly
|
|
as it is posted, the question still remains of what duty
|
|
they owe once they become aware of an offending message.
|
|
Courts interpreting Smith [FN53] generally have applied
|
|
some element of scienter. Once system operators are aware
|
|
that offending messages have been posted on the board, they
|
|
arguably have a duty to remove the message. [FN54] Proof
|
|
of scienter might arguably be shown by the totality of the
|
|
circumstances surrounding the operation, such as limited
|
|
access, extensive password protection, or previous pattern
|
|
of abuse. [FN55]
|
|
|
|
Such a pattern might be shown if a bulletin board
|
|
system has, for example, 16 message areas, 15 of which are
|
|
generally available to the public at large, but one of which
|
|
is "hidden" and available only to close friends and associ-
|
|
ates of the system operator. Such a restricted sub-area
|
|
("sub"), if used for questionable activities, might more
|
|
easily be distinguishable from the generally accessible
|
|
subs. The operator, by exercising the control necessary to
|
|
keep the sub restricted and to grant access to the "chosen
|
|
few," could arguably be inferred to have personal knowledge
|
|
of the questionable activities. [FN56]
|
|
|
|
A question also arises about whether the system opera-
|
|
tors might be able to claim a privilege of republication.
|
|
The primary privilege normally mentioned in bulletin board
|
|
circles is that of the common carrier. The Restatement
|
|
(Second) of Torts acknowledges a privilege for a common
|
|
carrier to republish a defamation if the "public utility
|
|
[is] under a duty to transmit messages...." [FN57] A
|
|
careful examination suggests that a common carrier privi-
|
|
lege, however, is neither warranted nor wise. In National
|
|
Ass'n of Reg. Util. Comm'rs v. F.C.C., [FN58] the court
|
|
formulated a two-part test that would appear to apply to
|
|
bulletin boards and one which they could arguably pass. The
|
|
case involved cable television. The coaxial cable installed
|
|
for distribution of cable television is capable of carrying
|
|
signals in the reverse direction. FCC regulations required
|
|
such a reverse channel to be available. The FCC originally
|
|
had not completely foreclosed state and local regulation of
|
|
the reverse channel. When it acted to preempt such regula-
|
|
tion, the plaintiffs in this action sued to void the preemp-
|
|
tion. The court ruled that the reverse channel was an
|
|
intrastate common carrier, holding that to be a common
|
|
carrier an entity must first provide indifferent service to
|
|
all who request it. Many bulletin board systems will nor-
|
|
mally accept as a user anyone who applies, and many more
|
|
accept anyone who applies whose registration information is
|
|
not facially false; e.g., anyone who might provide a name
|
|
listed in the applicable telephone directory at the number
|
|
provided. Second, the system must be such that the custom-
|
|
ers can transmit information of their own choice. In the
|
|
case of the bulletin board system, by definition the infor-
|
|
mation is of the customer's own choice. The difficulty with
|
|
this approach, probably fatal if ever adjudicated, is that
|
|
no one has yet suggested a duty of bulletin board operators
|
|
to transmit any or all messages submitted to them, or even
|
|
to open their boards to the public. [FN59] Most bulletin
|
|
board systems, after all, are run as a hobby at a
|
|
loss. [FN60] It would be an absurd result to decide that
|
|
merely by operating a bulletin board system as a hobby, that
|
|
an operator mustprovide service to anyonewho asked. [FN61] -
|
|
Additionally, most system operators reserve the right to
|
|
edit or delete questionable messages, an action certainly
|
|
incompatible with the requirement that on a common carrier,
|
|
the information be of the customer's own choice. [FN62]
|
|
(Such a reservation of rights, however, is entirely consis-
|
|
tent with the editorial discretion inherent in a Press
|
|
Clause model, as is the discretion concerning which few
|
|
echoes or message areas, out of the extensive possibilities,
|
|
should be carried on the system. [FN63] ) In addition, the
|
|
bulletin board is not a common carrier as that term has been
|
|
interpreted by the FCC, and the courts will normally give
|
|
"great deference" to the interpretation given by the admin-
|
|
istrative agency. [FN64] The Federal Communications Com-
|
|
mission is authorized to regulate interstate commerce by
|
|
wire or radio. [FN65] Since bulletin board systems operate
|
|
by connection to the interstate telephone system, and since
|
|
many of them actually are connected [FN66] to an interstate
|
|
network of computerized bulletin board systems, and since it
|
|
seems well-settled that the term "interstate commerce" has
|
|
an extremely broad meaning, then it would follow that the
|
|
FCC could assert jurisdiction. While it would logically
|
|
follow, it seems to this author that it would exceed the
|
|
probable intent of the Congress which enacted the Communi-
|
|
cations Act of 1934. [FN67]
|
|
|
|
The FCC appears to agree with the author. In response
|
|
to the "increasing complexity and overlap of communications
|
|
systems in the 1970s," [FN68] the FCC conducted a series of
|
|
hearings which has become known as the Second Computer
|
|
Inquiry. [FN69] The Commission distinguished between
|
|
"basic" and "enhanced" services. Basic services act as a
|
|
pipe for information without significantly altering it--a
|
|
transparent path. Enhanced services combine basic service
|
|
with some sort of processing. The Commission retained its
|
|
traditional jurisdiction over basic services, but left
|
|
enhanced services essentially unregulated. Computerized
|
|
bulletin board services were specifically mentioned as
|
|
enhanced services. [FN70]
|
|
|
|
If it seems likely that bulletin board systems are not
|
|
common carriers, it also seems wise. We saw in the discus-
|
|
sion of defamation, supra, that bulletin boards might argu-
|
|
ably be characterized as press. While the discussion was
|
|
based on access to information, it was noted that a logical
|
|
extension could be made. One such likely extension is to a
|
|
privilege of republication. In 1977, the United States
|
|
Supreme Court denied certiorari to Edwards v. National
|
|
Audubon Society, Inc. [FN71] In Edwards, the editor of an
|
|
Audubon Society magazine characterized scientists using
|
|
Society data to support the continued use of the pesticide
|
|
DDT as "paid liars." [FN72] The New York Times accurately
|
|
reported the charges. Five scientists sued both Audubon
|
|
Society and the Times. The Second Circuit dismissed the
|
|
judgment against the Times, finding a privilege of neutral
|
|
reporting essential to the operation of the Press Clause of
|
|
the First Amendment. [FN73] While the precedential value
|
|
of "cert. denied" is of uncertain value, the decision stands
|
|
in the Second Circuit. The courts are split about whether
|
|
the "neutral reporting" privilege is valid. [FN74] Many
|
|
have accepted it and many have refused to accept it. [FN75]
|
|
If there is any validity to it, however, it should apply to
|
|
bulletin boards. The editors of the New York Times, after
|
|
all, had the option (editorial discretion) not to publish.
|
|
In contrast, inherent in the nature of the bulletin board is
|
|
immediate republication. The operator may only, once he
|
|
becomes aware of the libel, remove it. No editorial choice
|
|
is exercised immediately, and in the case of networked
|
|
systems, an intervening mail event will cause the question-
|
|
able matter to be republished widely before the system
|
|
operator has the reasonable opportunity to take any action.
|
|
At least to the extent that bulletin board systems facili-
|
|
tate discussion of matters of public importance, and at
|
|
least to the extent that the Edwards privilege is ever
|
|
valid, the neutral (fair) reporting privilege should apply
|
|
to bulletin boards. [FN76] This application of the
|
|
neutral/fair reporting privilege would, it seems to the
|
|
author, be a better solution to the problem of republication
|
|
than common carrier recognition, as it would leave the
|
|
system operator with the independence and discretion implic-
|
|
it in a hobby. [FN77]
|
|
|
|
Civil and Criminal Liability for Contents of Messages
|
|
|
|
In a similar manner, system operators have been charged
|
|
with various criminal violations based on the contents of
|
|
messages left on their bulletin boards. [FN78] One of the
|
|
earliest reported cases involved a Mr. Tcimpidis, who was
|
|
charged solely because of information posted on his bulletin
|
|
board containing stolen telephone credit card numbers. The
|
|
exact basis of the charge is missing from the reviews;
|
|
however, one can surmise that it was for aiding and abetting
|
|
or some similar theory, in that charges were later dropped
|
|
for lack of evidence of knowledge or intent. [FN79] Re-
|
|
cently, the "Sun Devil" investigation by the United States
|
|
Secret Service has resulted in the seizure of computer
|
|
equipment and at least the temporary cessation of activities
|
|
at several bulletin board systems. Boards operated by Mr.
|
|
Craig Neidorf and one outside Chicago, called "JOLNET" have,
|
|
for example, ceased operations. The JOLNET operator, a Mr.
|
|
Rich Andrews, initiated contact with the Secret Service when
|
|
he became aware of potentially illegal activity on his
|
|
board. Notwithstanding 18 U.S.C. 2703 et seq., which
|
|
appear to prefer solicitation of archival copies and backup
|
|
records of such systems, the Secret Service seized the
|
|
actual computer equipment as evidence, shutting down the
|
|
system. [FN80]
|
|
|
|
Such seizures would appear to be troublesome to the
|
|
extent that a bulletin board system may fairly be said to be
|
|
some kind of a forum provided for the public discussion of
|
|
matters of importance. [FN81] One cannot foresee a more
|
|
"chilling" effect on free speech than to be frozen to death-
|
|
-or shut down by seizure.
|
|
|
|
Privacy Concerns and the Fourth Amendment
|
|
|
|
The discussion above briefly mentioned that some bulle-
|
|
tin board systems had been seized, apparently without regard
|
|
to the presence of electronic mail. While search and sei-
|
|
zure and privacy issues are not directly pertinent to a
|
|
paper on mass communications law, they seem to the author to
|
|
be inextricably combined in any discussion of bulletin
|
|
boards. Virtually every bulletin board system provides
|
|
facilities forsome sort ofprivate, electronic mail. [FN82] -
|
|
One case in California involved a foundation known as
|
|
ALCOR, which practiced cryogenic preservation of people who
|
|
died from what they hoped would, in the future, be a treat-
|
|
able disease. ALCOR came under investigation on charges
|
|
they had preserved some people a little hastily, essentially
|
|
a charge of some kind of homicide. While no serious commen-
|
|
tator has suggested that the case should not have been
|
|
investigated, the problem appears to be that the founda-
|
|
tion's electronic mail system was seized with undelivered
|
|
mail still in storage. The system was apparently accessible
|
|
to the public. [FN83] ALCOR sued under 42 U.S.C. 1983
|
|
for the return of the system and damages, alleging, inter
|
|
alia, that the government violated the provisions of the
|
|
Electronic Communication Privacy Act of 1986 (ECPA). [FN84]
|
|
A decision has not yet been reached in the case.
|
|
|
|
The only other known action involving the privacy
|
|
provisions of the ECPA is Thompson v. Predaina. [FN85] A
|
|
user accused a system operator, inter alia, of causing
|
|
private messages to be made public without the permission of
|
|
the sender or intended recipient, thereby violating the act.
|
|
The complaint was voluntarily dismissed prior to trial on
|
|
the merits. Predaina would have been an ideal opportunity
|
|
for judicial construction of the latest Congressional at-
|
|
tempt to define the privacy protections of the electronic
|
|
world.
|
|
|
|
As the technological complexity of society increasingly
|
|
draws us into the electronic world, privacy issues become of
|
|
more concern to more people. The responsibilities and duty
|
|
of care of a system operator to the users of the system,
|
|
regarding whatever reasonable expectation of privacy they
|
|
may have, would seem to be something each system operator
|
|
would want to know. Experience in both this class and in
|
|
the real world tells the prudent observer of the legal scene
|
|
that Congress passing an Act is but the first step in an
|
|
area filled with First and Fourth Amendment concerns. It
|
|
would have been helpful for a judicial construction of the
|
|
ECPA, but that will of necessity wait for another time.
|
|
|
|
There is, from empirical data, [FN86] a connec-
|
|
tion between the earlier discussion of liability for defama-
|
|
tion and illegal activities and liability for privacy. Many
|
|
|
|
From kadie Sat Oct 12 09:51:10 1991
|
|
To: cafb-mail
|
|
~Subject: Computers and Academic Freedom mailing list (batch edition)
|
|
Status: R
|
|
|
|
|
|
Computers and Academic Freedom mailing list (batch edition)
|
|
Sat Oct 12 09:50:57 EDT 1991
|
|
|
|
[For information on how to get a much smaller edited version of the
|
|
list, send email to archive-server@eff.org. Include the line:
|
|
send acad-freedom caf
|
|
- Carl ]
|
|
|
|
In this issue:
|
|
|
|
:
|
|
|
|
The addresses for the list are now:
|
|
comp-academic-freedom-talk@eff.org - for contributions to the list
|
|
or caf-talk@eff.org
|
|
listserv@eff.org - for automated additions/deletions
|
|
(send email with the line "help" for details.)
|
|
caf-talk-request@eff.org - for administrivia
|
|
|
|
-------------------
|
|
|
|
sysops have difficulty in separating the two, and it seems
|
|
that to "normal" sysops "liability is liability." The
|
|
distinction as to the form of the action, and whether it is
|
|
brought by a citizen or the state, either eludes or does not
|
|
concern them.
|
|
|
|
Conclusion
|
|
|
|
The ever-increasing rate of change in the world around
|
|
us has eclipsed the state of the law in many ways. As we
|
|
have progressed from Luther's church door, to Paine's pam-
|
|
phlet, to the supermarket bulletin board, and to the comput-
|
|
erized BBS, the lines between mail and press and telephony
|
|
and public and private have often become unclear. The
|
|
application of traditional legal lines of demarcation and
|
|
tests for responsibility for defamation and criminal liabil-
|
|
ity appears unclear as well. The computerized bulletin
|
|
board system has become a fixture in a small but increasing
|
|
segment of our society, and that society needs the legal
|
|
system to sort out the rules so that everyone in it can play
|
|
the game on a level playing field--so that they both know
|
|
what they may reasonably expect of others and what others
|
|
may reasonably expect of them.
|
|
|
|
[Footnotes -cmk]
|
|
|
|
FN1. LINDBERG, MARTIN LUTHER: JUSTIFIED BY GRACE 24 (1988)
|
|
|
|
FN2. Id.
|
|
|
|
FN3. The author remembers well his orientation at the
|
|
beginning of the fall semester, 1988, and the admonition
|
|
given by (now assistant dean) Anne Lange. His experience
|
|
since then has borne out the wisdom of her words.
|
|
|
|
FN4. The author sees the board at Baker's all too frequent-
|
|
ly, as his meager income outgoes to the provider of suste-
|
|
nance.
|
|
|
|
FN5. In the spirit of inclusive language, should one, with
|
|
tongue in cheek, refer to them as the "Precipitating Par-
|
|
ents"? On a more serious note, to make the sentence struc-
|
|
ture as short and direct as possible, and consistent with
|
|
the generally accepted rules of construction for statutes
|
|
and legal texts, we have used the pronouns "he", "his," in
|
|
lieu of "he or she," or "his or hers," etc. Unless the
|
|
context clearly indicates otherwise, masculine pronouns
|
|
should be read as inclusive.
|
|
|
|
FN6. Pamphleteers were pervasive and almost certainly
|
|
within the intended coverage of the First Amendment's Press
|
|
Clause. Lange, The Speech and Debate Clauses, 23 U.C.L.A.
|
|
L. REV. 77, 106 (1975).
|
|
|
|
FN7. The terminology is far from standardized in discussing
|
|
computer bulletin board systems. The author, in researching
|
|
this paper and in general experience, has experienced com-
|
|
puter bulletin board systems (CBBS), remote bulletin board
|
|
system (RBBS), electronic bulletin board system, and just
|
|
"bulletin board system: (BBS). For simplicity, this paper
|
|
will use bulletin board, bulletin board system, or BBS as
|
|
the context dictates.
|
|
|
|
FN8. A 1985 law review article cited sources indicating
|
|
there were some 1500 active bulletin board systems in the
|
|
United States as of 1984; however, the authors indicated
|
|
some skepticism as the source cited 15 in the Denver area
|
|
and they personally knew of 50-60. Soma, Smith & Sprague,
|
|
Legal Analysis of Electronic Bulletin Board Activities, 7 W.
|
|
NEW ENG. L. REV. 571, 572 n. 3 (1985). Another article
|
|
suggests the number is between 1000 and 5000. Note, Comput-
|
|
er Bulletin Board Operator Liability for User Misuse, 54
|
|
FORDHAM L. REV. 439, 441 n. 12 (1985). The author is cur-
|
|
rently system operator ("sysop") of an bulletin board system
|
|
affiliated with networks known as "Fidonet," "Metronet," and
|
|
"OPCN." The current combined "nodelists," or addressing
|
|
information, list over 8500 independent bulletin boards
|
|
worldwide. Nodelist 222, Fidonet, available electronically
|
|
and from the author. In addition, several large commercial
|
|
networks exist. While it is apparently difficult to obtain
|
|
information about their subscriber base, one source lists
|
|
them as CompuServe (500,000 +), Dow Jones/News Retrieval
|
|
(275,000), and GEnie (General Electric Network for Informa-
|
|
tion Exchange) (150,000). Becker, Liability of Computer
|
|
Bulletin Board Operators for Defamation Posted by Others, 22
|
|
CONN. L. REV. 203, 204 n. 4 (1989).
|
|
|
|
FN9. Dembart, The Law Versus Computers: A Confounding
|
|
Terminal Case, L.A. Times, Aug. 11, 1985, at 3, col. 1.
|
|
|
|
FN10. "Modem" is a contraction of two terms, modulator and
|
|
demodulator, referring to two separate processes that must
|
|
occur to transmit computerized information over telephone
|
|
lines. At the present time, the modem is normally either a
|
|
small box set next to the computer and connected by cables,
|
|
or a small printed circuit card physically installed inside
|
|
the PC. In either instance the modem must be connected to
|
|
the telephone system for the bulletin board to operate.
|
|
Kahn, Defamation Liability of Computerized Bulletin Board
|
|
Operators and Problems of Proof 6 (1989) (electronically
|
|
distributed, available from the author of this paper).
|
|
|
|
FN11. Becker, supra n. 8 at 203 n. 2.
|
|
|
|
FN12. Becker, supra n. 8. See also, Soma, Smith and
|
|
Sprague, supra n. 8.
|
|
|
|
FN13. Attached to this paper are a partial current combined
|
|
system list for FidoNet, MetroNet and OPCN, and a list of
|
|
"echo" areas, by somewhat cryptic but at the same time
|
|
somewhat understand area "tags," that are available to him
|
|
as a system operator. Also attached is a brief description
|
|
of "echomail," and sample printouts of some recent discus-
|
|
sions. The cost of long distance transmission is usually
|
|
absorbed by the system operator as part of the cost of the
|
|
hobby. Occasional "pooling" arrangements allow for the
|
|
economical transmission between cities (several operators in
|
|
the Omaha area do this, for example).
|
|
|
|
FN14. Note, FORDHAM L. REV., supra.
|
|
|
|
FN15. Id.
|
|
|
|
FN16. Id., at 439, n. 4.
|
|
|
|
FN17. Soma, Smith and Sprague, Legal Analysis of Electronic
|
|
Bulletin board Activities, 7 W. NEW ENG. L. REV. 571, 572-
|
|
575 (1985). See also note 19, infra.
|
|
|
|
FN18. UPI, May 5, 1990, Computer hacker gets probation,
|
|
fine, LEXIS, NEXIS library, Current file.
|
|
|
|
FN19. Westbrook, User to user: the comms column; Bulletin
|
|
boards helpful for communication, PC User, LEXIS, NEXIS
|
|
library, Current file (1990).
|
|
|
|
Consider the following equation: Computer + Modem
|
|
= Illegal Activity. This is the basic formula
|
|
used by non-expert TV and radio programme editors
|
|
when examining the subject of data communications
|
|
and it's a view which has been encouraged by a few
|
|
pundits who're only too happy to take money to
|
|
talk about children playing noughts and crosses
|
|
with military computers. This attitude seems to
|
|
be the result of a few celebrated cases where
|
|
illegal activity has been brought to light involv-
|
|
ing a hacker, his computer and a modem. Yet the
|
|
same principle might be applied to all drivers of
|
|
Mk II Jaguars to identify them as getaway drivers
|
|
for bank robbers.
|
|
The suspicion that the modem/computer combination
|
|
can generate is nowhere more apparent than in the
|
|
public view of the bulletin board. To read, see
|
|
or hear the popular media in action, you could be
|
|
forgiven for thinking that bulletin boards are
|
|
used exclusively to disseminate pornography or
|
|
recipes for Molotov cocktails. At the very least,
|
|
such services are seen as havens for spotty,
|
|
adolescent, sex-mad anarchists rather than serious
|
|
computer users.
|
|
|
|
Id. Westbrook goes on to suggest that bulletin boards have
|
|
valuable uses as sources of information and discussion, but
|
|
that the general public can be forgiven for not realizing
|
|
this, given the nature of press coverage of computer crime.
|
|
|
|
FN20. In fact, the Internet/Usenet system, with which the
|
|
University of Nebraska is affiliated, carries a "newsgroup"
|
|
somewhat misleadingly labelled the "Computer Underground
|
|
Digest," which devotes a great deal of space to known cur-
|
|
rent investigations and debunking rumors and myths surround-
|
|
ing them. CuD Volumes 1.22 through 1.28, available from the
|
|
author.
|
|
|
|
FN21. Electronic mail is specially protected by 18 U.S.C.
|
|
2701 et seq., the Electronic Communications Privacy Act
|
|
of 1986 (ECPA). There is no indication that the officers
|
|
requesting any warrants or the judge or magistrate that
|
|
issued them paid any attention to the requirements of the
|
|
ECPA. See generally, CuD Vol. 1.23, available from the
|
|
author. A limited discussion of electronic mail privacy
|
|
issues as they interact with bulletin board systems will
|
|
follow infra.
|
|
|
|
FN22. The following electronic note was published in the
|
|
newsgroup comp.dcom.telecom (Telecommunications Digest) on
|
|
Saturday, August 11, 1990. The accompanying header and
|
|
routing control information is deliberately left in place so
|
|
one may get a sense of the complexity and pervasiveness of
|
|
the electronic world:
|
|
|
|
From comp.dcom.telecom Sat Aug 11 09:47:24 1990
|
|
Path: hoss!maverick.ksu.ksu.edu!ux1.cso.uiuc.edu!
|
|
brutus.cs.uiuc.edu!wuarchive!cs.utexas.edu!mailrus!
|
|
accuvax.nwu.edu!nucsrl!telecom-request
|
|
From: colin@array.uucp (Colin Plumb)
|
|
Newsgroups: comp.dcom.telecom
|
|
Subject: Dial 1-800 ... For Bellsouth `Secrets'
|
|
Message-ID: <10698@accuvax.nwu.edu>
|
|
Date: 10 Aug 90 17:41:07 GMT
|
|
Sender: news@accuvax.nwu.edu
|
|
Organization: Array Systems Computing, Inc., Toronto,
|
|
Ontario, CANADA
|
|
Lines: 71
|
|
Approved: Telecom@eecs.nwu.edu
|
|
X-Submissions-To: telecom@eecs.nwu.edu
|
|
X-Administrivia-To: telecom-request@eecs.nwu.edu
|
|
X-Telecom-Digest: Volume 10, Issue 558, Message 5 of 11
|
|
|
|
|
|
{Computerworld}, August 6, 1990, Vol. XXIV, No. 32,
|
|
Page 8.
|
|
|
|
Dial 1-800...for Bellsouth `Secrets'
|
|
|
|
BY MICHAEL ALEXANDER
|
|
CW STAFF
|
|
CHICAGO --- The attorney for Craig Neidorf, a 20-year-
|
|
old electronic newsletter editor, said last week that
|
|
he plans to file a civil lawsuit against Bellsouth
|
|
Corp. as a result of the firm's ``irresponsible''
|
|
handling of a case involving the theft of a computer
|
|
text file from the firm.
|
|
|
|
Federal prosecutors dismissed charges against Neidorf
|
|
four days into the trial, after the prosecution wit-
|
|
nesses conceded in cross-examination that much of the
|
|
information in the text was widely available.
|
|
|
|
Neidorf, the co-editor of ``Phrack,'' a newsletter for
|
|
computer hackers, was accused by federal authorities of
|
|
conspiring to steal and publish a text file that de-
|
|
tailed the inner workings of Bellsouth's enhanced 911
|
|
emergency telephone system across none states in the
|
|
southeast [CW, July 30].
|
|
|
|
``What happened in this case is that the government
|
|
accepted lock, stock, and barrel everything that
|
|
Bellsouth told them without an independent
|
|
assessment.'' said Sheldon Zenner, Neidorf's attorney.
|
|
|
|
One witness, a Bellsouth service manager, acknowledged
|
|
that detailed information about the inner workings of
|
|
the 911 system could be purchased from Bellsouth for a
|
|
nominal fee using a toll-free telephone number.
|
|
|
|
A Bellcore security expert who was hired by Bellsouth
|
|
to investigate intrusions into its computer systems
|
|
testified that the theft of the file went unreported
|
|
for nearly a year.
|
|
|
|
Last week, a Bellsouth spokesman said the firm's secu-
|
|
rity experts delayed reporting the theft because they
|
|
were more intent on monitoring and preventing intru-
|
|
sions into the company's computer systems. ``There are
|
|
only so much resources in the data security arena, and
|
|
we felt that it was more urgent to investigate,'' he
|
|
said.
|
|
|
|
He also disputed assertions that the document was of
|
|
little value. ``It is extremely proprietary and con-
|
|
tained routing information on 911 calls through our
|
|
none-state [sic -cmk] territory as well as entry points into the
|
|
system,'' he said.
|
|
|
|
A quick ending:
|
|
|
|
The case unraveled after Robert Riggs, a prosecution
|
|
witness who had already pleaded guilty for his role in
|
|
the theft of the document, testified that he had acted
|
|
alone and Neidorf had merely agreed to publish the text
|
|
file in ``Phrack.''
|
|
|
|
Neidorf and his attorney agreed to a pretrial diver-
|
|
sion, a program under which the government voluntarily
|
|
dismisses the indictment but could reinstate it if
|
|
Neidorf commits a similar crime within a year.
|
|
|
|
The case has stirred up national debate on the rights
|
|
of computer users in the age of electronic information.
|
|
The Electronic Frontier Foundation, a civil liberties
|
|
group set up by Mitch Kapor, founder of Lotus Develop-
|
|
ment Corp., may participate in the filing of a lawsuit
|
|
against Bellsouth, and Terry Gross, an attorney at the
|
|
New York law firm of Rabinowitz Boudin Standard Krinsky
|
|
& Lieberman.
|
|
|
|
``The Electronic Frontier Foundation is concerned by
|
|
the
|
|
irresponsibility of Bellsouth of claiming from the
|
|
outset that this was confidential information when it
|
|
should have known that it was not,'' Gross said.
|
|
|
|
FN23. The unsettled state of the law may be discovered by
|
|
reviewing the current writing on the subject, at least some
|
|
of which is listed in note 28, infra.
|
|
|
|
FN24. Legi-Tech, Inc., v. Keiper, 766 F.2d 728 (2d Cir.
|
|
1985).
|
|
|
|
FN25. Id.
|
|
|
|
FN26. The narrow holding in Legi-Tech was that an electron-
|
|
ic information and retrieval service is "press" for the
|
|
purpose of access to government information. The commenta-
|
|
tor extends this holding from information retrieval to
|
|
bulletin boards, and suggests that it would extend at least
|
|
as far as defamation actions. He then appears to abandon
|
|
this line, as he reads Dun & Bradstreet, note 30, infra, and
|
|
accompanying text, as negating the need for such a distinc-
|
|
tion.
|
|
|
|
FN27. Comment, An Electronic Soapbox: Computer Bulletin
|
|
Boards and the First Amendment, 39 FED. COMM. L.J. 217
|
|
(1987) (authored by Eric L. Jensen).
|
|
|
|
FN28. The Jensen article, supra note 27, for example pays a
|
|
great deal of attention to the libel question. Liability
|
|
for defamation is also discussed in Soma, Smith & Sprague,
|
|
Legal Analysis of Electronic Bulletin Board Activities, 7 W.
|
|
NEW ENG. L. REV. 571 (1985); Becker, The Liability of Com-
|
|
puter Bulletin Board Operators for Defamation Posted by
|
|
Others, 22 CONN. L. REV. 203 (1989); and Comment, Computer
|
|
Bulletin Board Operator Liability for User Misuse, 54
|
|
FORDHAM L. REV. 439 (1985). The subject is frequently
|
|
discussed within the framework of bulletin board systems,
|
|
particularly in those message areas devoted to system opera-
|
|
tors, and at least one paper on the subject is electronical-
|
|
ly distributed: Kahn, Defamation Liability of Computerized
|
|
Bulletin Board Operators and Problems of Proof (1989),
|
|
available by anonymous ftp from the archives of the Internet
|
|
Telecommunications Digest, lcs.mit.edu, directory telecom-
|
|
archives, as sysop.libel.liability. It is also available
|
|
from the author of this paper.
|
|
|
|
FN29. New York Times v. Sullivan, 376 U.S. 254 (1964).
|
|
|
|
FN30. Dun & Bradstreet, Inc. v. Greenmoss Builders, Inc.,
|
|
105 S. Ct. 2939 (1985).
|
|
|
|
FN31. Robert Welch, Inc., v. Gertz, 418 U.S. 323 (1974).
|
|
|
|
FN32. 376 U.S. 254 (1964).
|
|
|
|
FN33. Id.
|
|
|
|
FN34. 390 U.S. 727 (1968). In St. Amant, a candidate read
|
|
on television statements received from a union official that
|
|
had been made under oath. The court found that the candi-
|
|
date's failure to investigate the statements' truth was not
|
|
reckless disregard for the purpose of "New York Times"
|
|
malice.
|
|
|
|
FN35. There "must be sufficient evidence to permit the
|
|
conclusion that the defendant in fact entertained serious
|
|
doubts as to the truth of his publication." 390 U.S. 727
|
|
(1968).
|
|
|
|
FN36. See generally, the samples from the POLITICS and
|
|
SERIOUS SIDE echoes attached at the end of this paper.
|
|
|
|
FN37. 418 U.S. 323 (1974).
|
|
|
|
FN38. The case was remanded for retrial, as the jury had
|
|
found liability without fault being established and had
|
|
awarded $50,000 without proof of damages. Id.
|
|
|
|
FN39. 376 U.S. 254.
|
|
|
|
FN40. 418 U.S. 323.
|
|
|
|
FN41. 472 U.S. 749 (1985).
|
|
|
|
FN42. 472 U.S. 749.
|
|
|
|
FN43. Gertz.
|
|
|
|
FN44. Dun & Bradstreet.
|
|
|
|
FN45. Dare I say, "amorphous void?"
|
|
|
|
FN46. See generally,the discussionof republication,notes 57
|
|
- 77, infra, and accompanying text.
|
|
|
|
FN47. See generally, Jensen, supra note 27.
|
|
|
|
FN48. Smith v. California, 361 U.S. 147 (1959).
|
|
|
|
FN49. See both Jensen and Soma, supra note 28.
|
|
|
|
FN50. Smith v. California, 361 U.S. at 153-4.
|
|
|
|
FN51. Interview with Professor John Snowden, University of
|
|
Nebraska College of Law, August 4, 1990.
|
|
|
|
FN52. See Comment, Computer Bulletin Board Operator Liabil-
|
|
ity for User Misuse, 54 FORDHAM L. REV. 439, 447-9 (1985).
|
|
Attached at the end of this paper is a sample of the debates
|
|
recently carried in message echoes available in the Omaha
|
|
area.
|
|
|
|
FN53. Smith v. California, 361 U.S. 147 (1959).
|
|
|
|
FN54. United States v. Mishkin, 317 F.2d 634 (2d Cir.),
|
|
cert denied, 375 U.S. 827 (1963).
|
|
|
|
FN55. In Gold v. United States, 378 F.2d 588 (9th Cir.
|
|
1967), the defendant knew the detailed shipping identifica-
|
|
tion of the parcel in question; in United States v. Mishkin,
|
|
317 F.2d 634 (2d Cir.), cert denied, 375 U.S. 827 (1963),
|
|
the defendant was held to have scienter of obscene contents
|
|
based on the clandestine nature of the transaction.
|
|
|
|
FN56. The hypothetical becomes real in the electronic
|
|
world. "Dr. Ripco" operated a bulletin board in Chicago,
|
|
one which included electronic mail (see generally, the
|
|
limited discussion of electronic mail, infra), which in-
|
|
cluded a restricted access sub called "phone phun." The
|
|
Secret Service recently executed a search warrant and seized
|
|
his system in an ongoing investigation, the details of which
|
|
have not yet been released. While Dr. Ripco has not yet
|
|
been charged, he relates the existence of the "phone phun"
|
|
sub was prominent when he was interrogated at the time of
|
|
the search and seizure. CuD, Vol. 1.28 (1990), distributed
|
|
electronically and available from the author. While Dr.
|
|
Ripco's knowledge, if any, was about illegal activities, one
|
|
can easily see a similar argument being made about libel.
|
|
If system operators carefully control access to an area, or
|
|
if the operators frequently participate in the discussion
|
|
where a libel is committed, then activities of the operator
|
|
could lead to a presumption of knowledge of the libel and
|
|
liability at least for failure to promptly remove, absent
|
|
some privilege. See the discussion of a possible Edwards
|
|
privilege, infra.
|
|
|
|
FN57. RESTATEMENT (SECOND) OF TORTS 612 (1977).
|
|
|
|
FN58. 533 F.2d 601 (D.C. Cir. 1976).
|
|
|
|
FN59. See Jensen, supra note 27, at 251.
|
|
|
|
FN60. See Soma, Smith & Sprague, supra n. 8.
|
|
|
|
FN61. "The Restatement privilege recognizes `that a [common
|
|
carrier], which with very limited exceptions extends its
|
|
facilities to all users, has exhibited no actual or implied
|
|
"malice" when it merely refuses to censor a particular
|
|
communication.'" 39 FED. COMM. L.J. 217 at 250, n. 173,
|
|
citing Anderson v. New York Telephone Co., 42 A.D.2d 151,
|
|
345 N.Y.S.2d 745 (1973) (dissenting opinion), rev'd 35
|
|
N.Y.2d 746, 361 N.Y.S.2d 913 (1974) (emphasis added). See
|
|
also note 59, supra.
|
|
|
|
FN62. 553 F.2d 601.
|
|
|
|
FN63. See generally, the listing attached to this paper of
|
|
message echo areas available to system operators in the
|
|
Omaha, Nebraska, vicinity.
|
|
|
|
FN64. Notwithstanding the ultimate holding adverse to the
|
|
FCC, the court in National Ass'n of Reg. Util. Comm'rs v.
|
|
F.C.C. went to some lengths to acknowledge the principle,
|
|
and then to distinguish it on the facts in the case at bar.
|
|
553 F.2d 601.
|
|
|
|
FN65. 47 U.S.C. 151 (1982).
|
|
|
|
FN66. They are connected in the logical sense, if not the
|
|
physical sense, as computer theorists use the terms.
|
|
|
|
FN67. June 19, 1934, c. 652, 48 Stat. 1064.
|
|
|
|
FN68. Comment, An Electronic Soapbox: Computer Bulletin
|
|
Boards and the First Amendment, 39 FED. COMM. L.J. 217, 220.
|
|
|
|
FN69. Second Computer Inquiry, Final Decision, 77 F.C.C.2d
|
|
384, 47 R.R.2d 669 (1980), reconsidered 84 F.C.C.2d 512, 50
|
|
R.R.2d 629 (1981), aff'd sub nom. Computer and Communica-
|
|
tions Indus. Assn'n v. F.C.C., 693 F.2d 198 (D.C. Cir.
|
|
1982), cert. den., 461 U.S. 938 (1983).
|
|
|
|
FN70. "In an enhanced service the content of the informa-
|
|
tion need not be changed and may simply involve subscribed
|
|
interaction with stored information. Many enhanced services
|
|
feature voice or data storage and retrieval applications,
|
|
such as in a 'mail box' service." Id. at 421.
|
|
|
|
FN71. 556 F.2d 113 (2d Cir. 1977), cert. den. sub nom.
|
|
Edwards v. New York Times Co., 434 U.S. 1002 (1977).
|
|
|
|
FN72. The pesticide DDT had been criticized as harmful to
|
|
many kinds of wildlife, particularly following the publica-
|
|
tion of Rachel Carson's book Silent Spring. The National
|
|
Audubon Society had for many years conducted periodic bird
|
|
counts. The counts could be interpreted to show that,
|
|
contrary to the anti-DDT concerns, bird life was increasing.
|
|
The Audubon Society felt that statistical reasons, not
|
|
actual wildlife increases, were responsible for the anoma-
|
|
lous count data and opposed the use of its data to support
|
|
DDT. 556 F.2d 113.
|
|
|
|
FN73. Id.
|
|
|
|
FN74. Magnetti, "In the End the Truth Will Out" . . . Or
|
|
Will It?, 52 MISS. L. REV. 299, 329-331 (1987).
|
|
|
|
FN75. Id.
|
|
|
|
FN76. The privilege of fair reporting, after all, should at
|
|
the minimum include the actual words of the original author,
|
|
nothing more and nothing less being said, which is exactly
|
|
what the bulletin board republishes.
|
|
|
|
FN77. The question would arise of what judgment was exer-
|
|
cised if anyone could post a message. The judgment arguably
|
|
would in the first instance be the exercise of discretion in
|
|
awarding access to the system. See Soma, Smith & Sprague,
|
|
supra. The final exercise of judgment would be when the
|
|
editor/system operator removed or left in place a potential-
|
|
ly offending message. Removal would be the exercise of
|
|
editorial judgment, leaving in place an exercise of neutral-
|
|
ly reporting what the individual already had said.
|
|
|
|
FN78. A Mr. Len Rose was recently indicted for the theft of
|
|
American Telephone and Telegraph Company software detailing
|
|
the operation of the "E911" emergency telephone system.
|
|
Several other individuals were charged because the software,
|
|
either without their knowledge, or with their knowledge but
|
|
without their knowing it was stolen, was stored or trans-
|
|
mitted by their systems. (This is the same theft where Mr.
|
|
Biggs was convicted. See n. 21, supra, and accompanying
|
|
text.) A final decision has not been reached in Mr. Rose's
|
|
case. A copy of the Rose indictment is available from the
|
|
author. Various versions of the other charges are available
|
|
in issues of the Computer Underground Digest available from
|
|
the author.
|
|
|
|
FN79. Soma, Smith & Sprague, Legal Analysis of Electronic
|
|
Bulletin Board Activities, 7 W. NEW ENG. L. REV. 571, 605
|
|
(1985).
|
|
|
|
FN80. Computer Underground Digest, various electronic
|
|
editions, available from the author. The parallel to a
|
|
pamphleteer would be the seizure of his printing press.
|
|
Particularly troublesome is that the warrants, apparently,
|
|
did not specify seizure of the electronic mail stored on the
|
|
system. An action is pending in a California case.
|
|
|
|
FN81. Public importance might not be the only First Amend-
|
|
ment concern--the Speech Clause, on its face, does not limit
|
|
itself to public importance--but would be applicable to most
|
|
bulletin board systems with which the author is familiar.
|
|
|
|
FN82. Hernandez, ECPA and Online Computer Privacy, 41 FED.
|
|
COMM. L.J. 17 (1989).
|
|
|
|
FN83. Copies of most of the pleadings to date in the ALCOR
|
|
case are available from the author.
|
|
|
|
FN84. The relevant portions of the Electronic Communica-
|
|
tions Privacy Act as recorded in the United States Code are
|
|
set out in an attachment to this paper.
|
|
|
|
FN85. Complaint, Thompson v. Predaina, No. 88-93C (S.D.
|
|
Indiana 1988), dismissed August 10th, 1988. One source
|
|
relates the dismissal was voluntary. Hernandez, ECPA and
|
|
Online Computer Privacy, 41 FED. COMM. L.J. 17 (1989).
|
|
Another source indicates the dismissal was caused by the
|
|
defendant's filing bankruptcy, thereby automatically staying
|
|
the prosecution of the suit. Wilson, message in Fidonet:LAW
|
|
echo (1990). An electronic copy of the complaint is avail-
|
|
able from the author.
|
|
|
|
FN86. By "empirical data" the author means that he continu-
|
|
ally receives questions from fellow sysops who, knowing him
|
|
to be a law student, verbalize questions about their liabil-
|
|
ity exposure over the range of issues discussed in this
|
|
paper.
|
|
|
|
Downloaded From P-80 International Information Systems 304-744-2253
|