987 lines
50 KiB
Plaintext
987 lines
50 KiB
Plaintext
|
|
|
|
Computer underground Digest Sun Jul 8, 1995 Volume 7 : Issue 57
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
la Triviata: Which wine goes best with Unix?
|
|
|
|
CONTENTS, #7.57 (Sun, Jul 8, 1995)
|
|
|
|
File 1--Text of Jake Baker Decison
|
|
File 2--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Sun, 9 Jul 1995 02:21:42 -0500
|
|
From: jthomas@SUN.SOCI.NIU.EDU(Jim Thomas)
|
|
Subject: File 1--Text of Jake Baker Decison
|
|
|
|
((From: http://ic.net/~sberaha/baker.html--Jake Baker is the
|
|
University of Michigan student who was indicted under federal law for
|
|
stories he wrote on alt.sex.stories. The case has been summarized in
|
|
previous CuD issues. The judge dismissed the case. Below is the
|
|
ruling)).
|
|
|
|
UNITED STATES DISTRICT COURT
|
|
EASTERN DISTRICT OF MICHIGAN
|
|
SOUTHERN DIVISION
|
|
|
|
|
|
UNITED STATES OF AMERICA,
|
|
|
|
|
|
|
|
Plaintiff,
|
|
|
|
|
|
|
|
v. Criminal No. 95-80106
|
|
|
|
Honorable Avern Cohn
|
|
|
|
|
|
JAKE BAKER and ARTHUR GONDA,
|
|
|
|
|
|
|
|
|
|
|
|
Defendants.
|
|
|
|
|
|
|
|
|
|
|
|
___________________________________/
|
|
|
|
|
|
|
|
|
|
|
|
OPINION
|
|
|
|
"It is not the policy of the law to punish those unsuccessful
|
|
threats which it is not presumed would terrify ordinary persons
|
|
excessively; and there is so much opportunity for magnifying or
|
|
misunderstanding undefined menaces that probably as much mischief
|
|
would be caused by letting them be prosecuted as by refraining from
|
|
it."
|
|
|
|
|
|
|
|
The People v. B. F. Jones, 62 Mich. 304 (1886).
|
|
|
|
|
|
|
|
|
|
|
|
I. Introduction
|
|
|
|
This is a criminal prosecution under 18 U.S.C. $ 875(c). Defendant
|
|
Jake Baker (Baker) is charged in a superseding indictment with five
|
|
counts of transmitting threats to injure or kidnap another, in
|
|
electronic mail (e-mail) messages transmitted via the Internet.[1] Now
|
|
before the Court is Baker's motion to quash the superseding
|
|
indictment.[2] For the reasons that follow, the motion will be
|
|
granted.
|
|
|
|
II. Background
|
|
|
|
The e-mail messages that form the basis of the charges in this case
|
|
were exchanged in December, 1994 between Baker in Ann Arbor, Michigan,
|
|
and defendant Arthur Gonda (Gonda), who sent and received e-mail
|
|
through a computer in Ontario, Canada. Gonda's identity and
|
|
whereabouts are unknown. The messages excerpted in the superseding
|
|
indictment are drawn from a larger e-mail exchange between Gonda and
|
|
Baker began on November 29, 1994, and ended on January 25, 1995. The
|
|
specific language of the messages excerpted in the superseding
|
|
indictment will be discussed in detail below. They all express a
|
|
sexual interest in violence against women and girls.
|
|
|
|
Baker first appeared before a United States Magistrate Judge on a
|
|
criminal complaint alleging violation of 18 U.S.C. $ 875(c), on
|
|
February 9, 1995. The complaint was based on an FBI agent's affidavit
|
|
which cited language taken from a story Baker posted to an Internet
|
|
newsgroup entitled "alt.sex.stories," and from e-mail messages he sent
|
|
to Gonda. The story graphically described the torture, rape, and
|
|
murder of a woman who was given the name of a classmate of Baker's at
|
|
the University of Michigan. The "alt.sex.stories" newsgroup to which
|
|
Baker's story was posted is an electronic bulletin board, the contents
|
|
of which are publicly available via the Internet. Much of the
|
|
attention this case garnered centered on Baker's use of a real
|
|
student's name in the story.[3] The e-mail messages exchanged between
|
|
Gonda and Baker were private, and not available in any publicly
|
|
accessible portion of the Internet.[4]
|
|
|
|
Baker was arrested on the complaint and warrant on February 9, 1995,
|
|
and detained overnight. The complaint and warrant is dated the same
|
|
day. The following day, February 10, 1995, after holding a hearing a
|
|
Magistrate Judge ordered Baker detained as a danger to the community.
|
|
His detention was affirmed by a United States District Judge later
|
|
that day. On March 8, 1995, this Court held a hearing on Baker's
|
|
motion to be released on bond, and ordered that a psychological
|
|
evaluation of Baker be performed. The psychological evaluation was
|
|
received on March 10, 1995. The evaluation concluded that Baker did
|
|
not pose a threat, and the Court ordered him released that day.[5]
|
|
|
|
On February 14, 1995 the government charged Baker with violating 18
|
|
U.S.C. $ 875(c) in a one count indictment based on unspecified
|
|
communications transmitted in interstate and foreign commerce from
|
|
December 2, 1994 through January 9, 1995. Presumably included in the
|
|
communications was the story Baker posted. On March 15, 1995, the
|
|
government charged Baker and Gonda in a superseding indictment with
|
|
five counts of violating 18 U.S.C. $ 875(c). The story on which the
|
|
initial complaint was partially based is not mentioned in the
|
|
superseding indictment, which refers only to e-mail messages exchanged
|
|
between Gonda and Baker.[6] The government has filed a bill of
|
|
particulars identifying who it perceives to be the objects of the
|
|
allegedly threatening transmissions, as well as witness and exhibit
|
|
lists.
|
|
|
|
Baker, who is named in all five of the superseding indictment's
|
|
counts, has filed a motion seeking dismissal of all the counts of the
|
|
superseding indictment. He contends that application of 18 U.S.C. $
|
|
875(c) to the e-mail transmissions pushes the boundaries of the
|
|
statute beyond the limits of the First Amendment. The government
|
|
responds that the motion must be denied because the First Amendment
|
|
does not protect "true threats," and because whether a specific
|
|
communication constitutes a true threat is a question for the jury.
|
|
|
|
III. The Law
|
|
|
|
Eighteen U.S.C. $ 875(c) reads:
|
|
|
|
Whoever transmits in interstate or foreign commerce any
|
|
communication containing any threat to kidnap any person or any
|
|
threat to injure the person of another, shall be fined under this
|
|
title or imprisoned not more than five years, or both.
|
|
|
|
The government must allege and prove three elements to support a
|
|
conviction under $ 875(c): "(1) a transmission in interstate [or
|
|
foreign] commerce; (2) a communication containing a threat; and (3)
|
|
the threat must be a threat to injure [or kidnap] the person of
|
|
another." United States v. DeAndino, 958 F.2d 146, 148 (6th Cir.),
|
|
cert. denied, 112 S. Ct. 2997 (1992). The Court of Appeals for the
|
|
Sixth Circuit, like most others, has held that $ 875(c) requires only
|
|
general intent. Id. at 149. But see, United States v. Twine, 853 F.2d
|
|
676 (9th Cir. 1988) (finding a specific intent requirement in $
|
|
875(c)).[7] Because $ 875(c) is a general intent crime, intent must be
|
|
proved by "objectively looking at the defendant's behavior in the
|
|
totality of the circumstances," rather than by "probing the
|
|
defendant's subjective state of mind." DeAndino, 958 F.2d at 149. The
|
|
Sixth Circuit has also held that "a specific individual as a target of
|
|
the threat need not be identified." United States v. Cox, 957 F.2d
|
|
264, 266 (6th Cir. 1992). Even so, the threat must be aimed as some
|
|
discrete, identifiable group. See id. (involving threat to "hurt
|
|
people" at a specific bank); United States v. Lincoln, 589 F.2d 379
|
|
(8th Cir. 1979) (involving letters threatening to kill judges of the
|
|
Eighth Circuit, under 18 U.S.C. $ 876). The threat need not be
|
|
communicated to the person or group identified as its target. See
|
|
United States v. Schroeder, 902 F.2d 1469, 1470-71 (10th Cir.), cert.
|
|
denied,, 498 U.S. 867 (1990) (affirming $ 875(c) conviction for a
|
|
threat against people at a post office made to an Assistant United
|
|
States Attorney); United States v. Kosma, 951 F.2d 549, 555 (3rd Cir.
|
|
1991) (listing cases in which threats against the President were made
|
|
to third persons, under 18 U.S.C. $ 871).
|
|
|
|
Because prosecution under 18 U.S.C. $ 875(c) involves punishment of
|
|
pure speech,[8] it necessarily implicates and is limited by the First
|
|
Amendment. Although the Supreme Court has not addressed the
|
|
constitutionally permissible scope of $ 875(c), it has considered a
|
|
similar statute concerning threats against the President, 18 U.S.C. $
|
|
871(a),[9] in Watts v. United States, 394 U.S. 705. In Watts, the
|
|
Supreme Court recognized that:
|
|
|
|
a statute such as this one, which makes criminal a form of pure
|
|
speech, must be interpreted with the commands of the First Amendment
|
|
clearly in mind. What is a threat must be distinguished from what is
|
|
constitutionally protected speech.
|
|
|
|
Id. at 707. Under Watts, to pass constitutional muster the government
|
|
must initially prove "a true 'threat.'" Id. Factors mentioned in Watts
|
|
as bearing on whether a specific statement can be taken as a true
|
|
threat include the context of the statement, including whether the
|
|
statement has a political dimension; whether the statement was
|
|
conditional; and the reaction of the listeners. Id.[10] Watts also
|
|
makes clear that the question of whether a statement constitutes a
|
|
true threat in light of the First Amendment is distinct from the
|
|
question of the defendant's intent: "whatever the 'willfulness'
|
|
requirement implies, the statute initially requires the Government to
|
|
prove a true 'threat.'" Id.[11]
|
|
|
|
The distinction between the two questions of whether a statement is a
|
|
"true threat" for the purposes of First Amendment limitation, and the
|
|
intention of the statement's maker, is important but unfortunately
|
|
often confused. The confusion results from too loose a use of the
|
|
phrase "true threat."
|
|
|
|
The only extended discussion of the constitutional dimension of the
|
|
"true threat" requirement with regard to $ 875(c) is found in United
|
|
States v. Kelner, 534 F.2d 1020 (2d Cir.), cert. denied, 429 U.S. 1022
|
|
(1976). In Kelner, the Second Circuit drew on Watts to illuminate the
|
|
constitutional limits of a prosecution under $ 875(c):
|
|
|
|
The purpose and effect of the Watts constitutionally-limited
|
|
definition of the term "threat" is to insure that only unequivocal,
|
|
unconditional and specific expressions of intention immediately to
|
|
inflict injury may be punished--only such threats, in short, as are
|
|
of the same nature as those threats which are . . . "properly
|
|
punished every day under statutes prohibiting extortion, blackmail
|
|
and assault without consideration of First Amendment issues." Watts,
|
|
402 F.2d at 690.
|
|
|
|
|
|
|
|
* * *
|
|
|
|
So long as the threat on its face and in the circumstances in which
|
|
it is made is so unequivocal, unconditional, immediate and specific
|
|
as to the person threatened, as to convey a gravity of purpose and
|
|
imminent prospect of execution, the statute may properly be applied.
|
|
This clarification of the scope of 18 U.S.C. $ 875(c) is, we trust,
|
|
consistent with a rational approach to First Amendment construction
|
|
which provides for governmental authority in instances of inchoate
|
|
conduct, where a communication has become "so interlocked with
|
|
violent conduct as to constitute for all practical purposes part of
|
|
the [proscribed] action itself."
|
|
|
|
Kelner, 534 F.2d at 1027 (quoting T. Emerson, The System of Freedom of
|
|
Expression, 329 (1970)). Cf. Brandenburg v. Ohio, 395 U.S. 444, 447
|
|
(1969) ("the constitutional guarantees of free speech and free press
|
|
do not permit a State to forbid or proscribe advocacy of the use of
|
|
force or of law violation except where such advocacy is directed to
|
|
inciting or producing imminent lawless action and is likely to incite
|
|
or produce such action.")
|
|
|
|
The government argues that the standard announced in Kelner is "far
|
|
more stringent" than the governing standard in the Sixth Circuit. For
|
|
the Sixth Circuit "true threat" standard, the government refers the
|
|
Court to United States v. Lincoln, 462 F.2d 1368, cert. denied, 409
|
|
U.S. 952 (1972). In citing Lincoln for the "true threat" standard, the
|
|
government confuses the constitutional "true threat" requirement with
|
|
the statutory intent requirement. In relevant part, Lincoln reads:
|
|
|
|
This Court therefore construes the willfulness requirement of the
|
|
statute to require only that the defendant intentionally make a
|
|
statement, written or oral, in a context or under such circumstances
|
|
wherein a reasonable person would foresee that the statement would
|
|
be interpreted by those to whom the maker communicates the statement
|
|
as a serious expression of an intention to inflict bodily harm upon
|
|
or take the life of the President, and that the statement not be the
|
|
result of mistake, duress, or coercion. The statute does not require
|
|
that the defendant actually intend to carry out the threat.
|
|
|
|
Lincoln, 462 F.2d at 1368 (quoting and adopting standard from Roy v.
|
|
United States, 416 F.2d 874, 877-78 (9th Cir. 1969)) (emphasis added).
|
|
Lincoln addresses the statute's intent requirement, and adopts the
|
|
Ninth Circuit's formulation of the intent required.[12] It does not
|
|
speak to the constitutional "true threat" requirement imposed by the
|
|
First Amendment and elucidated in Watts and Kelner. United States v.
|
|
Glover, 846 F.2d 339, 343-44 (6th Cir.), cert. denied, 488 U.S. 982
|
|
(1988) and United States v. Vincent, 681 F.2d 462, 464 (6th Cir.
|
|
1982), also cited by the government, quote the same language from Roy
|
|
and also address the statutory intent requirement rather than the
|
|
constitutional limits of the statute. None of these cases indicate
|
|
that a different constitutional standard for prosecution under $
|
|
875(c) applies in the Sixth Circuit than in the Second Circuit.[13]
|
|
|
|
The confusion between the two requirements is understandable, because
|
|
the phrase "true threat" has been used in the context of both
|
|
requirements. Both the Ninth and Seventh Circuits have stated that the
|
|
government must meet the Roy general intent standard in order to make
|
|
out a "true threat." Melugin v. Hames, 38 F.3d 1478, 1484 (9th Cir.
|
|
1994) (under Alaska statute AS 11.56.510(a)(1)); United States v.
|
|
Khorrami, 895 F.2d 1186, 1193 (7th Cir.), cert. denied, 498 U.S. 986
|
|
(1990). That the phrase "true threat" has been used to describe both
|
|
the statutory intent requirement and the constitutional
|
|
"unconditional, unequivocal, immediate and specific" requirement does
|
|
not imply that the two requirements are identical, or that any
|
|
statement which meets the intent requirement may be prosecuted under $
|
|
875(c) without running afoul of the First Amendment. Typically, in the
|
|
cases focussing on the intent requirement, there is no dispute that
|
|
the statement satisfies the constitutional standard, and the defendant
|
|
seeks dismissal or reversal of his conviction on the ground that he or
|
|
she lacked the requisite intent. See, e.g., United States v. Lincoln,
|
|
462 F.2d at 1369 ("[a]pellant contends that the statute is violated
|
|
only when a threat is uttered with a willful intent to carry it
|
|
out."); United States v. Hoffman, 806 F.2d 703, 712 (7th Cir. 1986)
|
|
(concluding that "it was reasonable for the jury to conclude that
|
|
Hoffman intended the letter as a serious expression of his intent to
|
|
harm the President.") (quoted in Khorrami, 895 F.2d 1186).[14]
|
|
|
|
Kelner's standard for a prosecution under 18 U.S.C. $ 875(c) is not
|
|
only constitutionally required, but also is consistent with the
|
|
statute's legislative history. The law which was eventually codified
|
|
as 18 U.S.C. $ 875(c) was first passed in 1932, Pub. L. No. 72-274
|
|
(1932), and criminalized use of the mail to transmit a threat to
|
|
injure or kidnap any person (or to injure a person's property or
|
|
reputation), or to accuse a person of a crime or demand ransom for a
|
|
kidnapped person. Id. The communication had to be sent "with intent to
|
|
extort . . . money or any thing of value" to fall under the act. Id. A
|
|
motivating factor for passage of the 1932 act was the kidnapping of
|
|
Charles Lindbergh's son, and the concomitant use of the mail to convey
|
|
the kidnappers' threats and demands. H.R. Rep. No. 602, 72d Congress,
|
|
1st Sess. (1932).
|
|
|
|
The act was addressed to the constitutionally unproblematic case, like
|
|
the Lindbergh case, identified in Kelner: "where a communication has
|
|
become 'so interlocked with violent conduct as to constitute for all
|
|
practical purposes part of the [proscribed] action itself.'" Kelner,
|
|
534 F.2d at 1027. The act was modified in 1934, Pub. L. No. 73-231
|
|
(1934), as increasingly sophisticated criminals had taken to using
|
|
means other than the mail, such as the telephone and telegraph, to
|
|
transmit their threats. S. Rep. No. 1456, 73d Congress, 2d Sess.
|
|
(1934). As modified, it applied to threats transmitted "by any means
|
|
whatsoever," but still required extortionate intent. Pub. L. No.
|
|
73-231 (1934). In 1939 the act, Pub. L. No. 76-76 (1939), was expanded
|
|
to apply to threats to kidnap or injure that were not made with
|
|
extortionate intent. Id. The act's expansion was prompted by the
|
|
recognition that many threats "of a very serious and socially harmful
|
|
nature" were not covered by the existing law because "the sender of
|
|
the threat did not intend to extort money or other thing of value for
|
|
himself." H.R. Rep. No. 102, 76th Congress, 1st Sess. (1939). An
|
|
example of such a threat mentioned in the in the Report was one
|
|
directed to a governor, threatening to blow up the governor's home if
|
|
certain defendants in a criminal case were not released. As modified,
|
|
while an "extortionate" intent was no longer required, the act was
|
|
still intended to address threats aimed at accomplishing some coercive
|
|
purpose, such as the release of the defendants in the given example.
|
|
The modified statute still targets threats which, like the example,
|
|
are unlikely to offend the constitutional standard articulated in
|
|
Kelner.
|
|
|
|
Threats aimed at achieving some coercive end remain the typical
|
|
subject of more contemporary cases. In Cox, for instance, the
|
|
defendant's truck was repossessed while it contained items of his
|
|
personal property. The defendant telephoned the bank that had had the
|
|
truck repossessed and stated "I tell you what, you all better have my
|
|
personal items to me by five o'clock today or it[']s going to be a lot
|
|
of hurt people there." Cox, 957 F.2d at 265. The threat was designed
|
|
to effect the return of the defendant's property, it targeted the
|
|
people at the bank, and it was found not to be conditional (in part
|
|
because his property could not have been returned by the five o'clock
|
|
deadline). It falls within Kelner's requirement of a threat that is
|
|
"so unequivocal, unconditional, immediate and specific as to the
|
|
person threatened, as to convey a gravity of purpose and imminent
|
|
prospect of execution." 534 F.2d at 1027.
|
|
|
|
Similarly, in Schroeder, the defendant had sued the government for
|
|
denial of employment preference under a veterans benefit program. 902
|
|
F.2d at 1470. After losing his civil suits, the defendant called an
|
|
Assistant United States Attorney and threatened to shoot people at a
|
|
post office if he did not obtain satisfaction from the government; he
|
|
stated that "the government either gives [him] money or people would
|
|
get hurt." Id. Schroeder involves an explicitly extortionate threat
|
|
aimed at people in post offices. Although the case appears to strain
|
|
the constitutional standard, particularly with regard to the
|
|
requirement of immediacy, the defendant did not raise a constitutional
|
|
challenge on appeal.
|
|
|
|
While coercive or extortionate threats are paradigmatic subjects of a
|
|
prosecution under 18 U.S.C. $ 875(c), a threat which is neither
|
|
coercive nor extortionate may still satisfy the constitutional test
|
|
from Kelner; indeed, Kelner itself involved a non-coercive threat to
|
|
assassinate the PLO leader Yasser Arafat. Kelner, 534 F.2d at 1025.
|
|
See also, DeAndino, 958 F.2d at 146 (regarding threat that defendant
|
|
was going to "blow [the victim's] brains out," and the victim was
|
|
"going to die.") Nevertheless, a coercive or extortionate threat is
|
|
particularly likely to be a constitutionally prosecutable "true
|
|
threat" because it is particularly likely to be intimately bound up
|
|
with proscribed activity.
|
|
|
|
Another important factor in analyzing a threat under 18 U.S.C. $
|
|
875(c) is the recipient of the communication in question. As the Sixth
|
|
Circuit stated in Lincoln (in the context of $ 871(a)), the statutory
|
|
general intent element requires that "a reasonable person would
|
|
foresee that the statement would be interpreted by those to whom the
|
|
maker communicates the statement as a serious expression of an intent
|
|
to inflict bodily harm" or kidnap a person. 462 F.2d at 1368. Thus in
|
|
Cox, the Sixth Circuit looked to the reaction of the recipient of the
|
|
defendant's telephone call, as well as that of the person to whom the
|
|
defendant asked to speak.[15] Cox, 957 F.2d at 266. In Schroeder, the
|
|
appropriate focus in considering the defendant's statements is how
|
|
they would be interpreted by the Assistant United States Attorney who
|
|
heard them, and by those to whom we could foreseeably relay them. A
|
|
statement which would not be interpreted by any foreseeable recipient
|
|
as expressing a serious intention to injure or kidnap simply is not a
|
|
threat under the statute. While it is not necessary that the statement
|
|
prosecuted under 18 U.S.C. $ 875(c) be communicated to the would-be
|
|
target of the alleged threat, the statement must be evaluated in light
|
|
of foreseeable recipients of the communication.
|
|
|
|
Evaluating a statement charged under 18 U.S.C. $ 875(c) in light of
|
|
its foreseeable recipients is consistent with the aims of the statute
|
|
and the First Amendment. In the case of a coercive or extortionate
|
|
threat, the maker of the statement obviously cannot achieve his or her
|
|
end if the recipient of the statement does not take it as expressing a
|
|
serious intention to carry out the threatened acts. If the coercive or
|
|
extortionate threat is likely to be taken seriously by its recipient,
|
|
then the threat is "so interlocked with violent conduct as to
|
|
constitute for all practical purposes part of the [proscribed] action
|
|
itself." Kelner, 534 F.2d at 1027. A communication containing an
|
|
alleged non-coercive threat may be regulated consonant with the First
|
|
Amendment, under the analysis in R.A.V. v. City of St. Paul, ___ U.S.
|
|
___, ___, 120 L.Ed.2d 305, 321 (1992), in order to "protect[]
|
|
individuals from the fear of violence, from the disruption that fear
|
|
engenders, and from the possibility that the threatened violence will
|
|
occur." If the alleged threat would not be interpreted by its
|
|
foreseeable recipients as a serious expression of an intention to do
|
|
the "threatened" acts, it does not implicate fear of violence or the
|
|
disruption that fear engenders, and does not suggest a real
|
|
possibility that the "threatened" violence will occur. The statement
|
|
thus would not be a "true threat" for the purposes of the First
|
|
Amendment.
|
|
|
|
Whether or not a prosecution under $ 875(c) encroaches on
|
|
constitutionally protected speech is a question appropriately decided
|
|
by the Court as a threshold matter. In the context of the Smith Act,
|
|
18 U.S.C. $ 2381 et seq., which makes it a crime knowingly or
|
|
willfully to advocate the overthrow or destruction of the United
|
|
States government by force or violence, the Supreme Court has held
|
|
that "[w]hen facts are found that establish the violation of a
|
|
statute, the protection against conviction afforded by the First
|
|
Amendment is a matter of law" requiring a judicial determination.
|
|
Dennis v. United States, 341 U.S. 494, 513 (1951) (construing Act as
|
|
codified at 18 U.S.C. (1946 ed.) $ 11, 54 Stat. 671). In the context
|
|
of $ 875(c), the Second Circuit has recognized that "[m]ost cases are
|
|
within a broad expanse of varying fact patterns which may not be
|
|
resolved as a matter of law, but should be left to a jury," but has
|
|
said that where the factual proof of a "'true' threat" is
|
|
"insufficient as a matter of law," the indictment is properly
|
|
dismissed before reaching the jury. United States v. Carrier, 672 F.2d
|
|
300, 306 (2d Cir.), cert. denied, 457 U.S. 1139 (1982). Although the
|
|
government argues that "whether a statement is a true threat is to be
|
|
decided by the trier of fact," it recognizes that where "the language
|
|
set forth . . . is so facially insufficient that it cannot possibly
|
|
amount to a true threat," the Court may properly dismiss the
|
|
indictment. Id.; accord Kosma, 951 F.2d at 555; United States v.
|
|
Gilbert, 884 F.2d 454, 458 (9th Cir. 1989), cert. denied, 493 U.S.
|
|
1082 (1990); United States v. Howell, 719 F.2d 1258, 1260 (5th Cir.
|
|
1983), cert. denied, 467 U.S. 1228 (1984); Lincoln, 589 F.2d at 382.
|
|
Whether the language set forth in the superseding indictment could
|
|
possibly constitute a "true threat" must be determined in accord with
|
|
Kelner's articulation of the constitutional requirement of a
|
|
|
|
threat which on its face and in the circumstances in which it is
|
|
made is so unequivocal, unconditional, immediate and specific as to
|
|
the person threatened, as to convey a gravity of purpose and
|
|
imminent prospect of execution.
|
|
|
|
Kelner, 534 F.2d at 1027. Whether or not Baker actually intended to
|
|
carry out the actions described in the communications is irrelevant to
|
|
the constitutional inquiry.
|
|
|
|
IV. The Communications
|
|
|
|
The government characterizes the e-mail dialogue between Gonda and
|
|
Baker in December, 1994 as reflecting "the evolution of their activity
|
|
from shared fantasies to a firm plan of action." The government's
|
|
characterization of the ongoing dialogue suggests that at least some
|
|
of the counts in the superseding indictment should be dismissed;
|
|
messages constituting "shared fantasies" fall short of the Kelner
|
|
standard of an unequivocal, unconditional, immediate and specific
|
|
threat conveying an imminent prospect of execution and therefore are
|
|
not "true threats" unprotected by the First Amendment.
|
|
|
|
As the Court construes the law as discussed above, the constitutional
|
|
standard enunciated in Kelner requires, at the very least, that a
|
|
statement charged under $ 875(c) contain some language construable as
|
|
a serious expression of an intent imminently to carry out some
|
|
injurious act. The language of the statement must be considered as it
|
|
would be interpreted by the foreseeable recipients of the
|
|
communication containing it. Statements expressing musings,
|
|
considerations of what it would be like to kidnap or injure someone,
|
|
or desires to kidnap or injure someone, however unsavory, are not
|
|
constitutionally actionable under $ 875(c) absent some expression of
|
|
an intent to commit the injury or kidnapping.[16] In addition, while
|
|
the statement need not identify a specific individual as its target,
|
|
it must be sufficiently specific as to its potential target or targets
|
|
to render the statement more than hypothetical.
|
|
|
|
Before addressing the specific language quoted in the indictment,
|
|
several observations pertain to all of the government's charges.
|
|
First, all of the language for which Baker is charged was contained in
|
|
private e-mail messages he sent to Gonda. The messages were not
|
|
available in any publicly accessible part of the Internet, and there
|
|
is no allegation that they were ever distributed in any format,
|
|
electronic or hardcopy, to anyone other than Gonda. Nothing in these
|
|
private messages suggests that they would be further distributed. It
|
|
is only as a result of this prosecution and the ensuing publicity that
|
|
the content of the messages has been publicly aired.
|
|
|
|
The focus of the inquiry here, therefore, is how a reasonable person
|
|
would expect Gonda to interpret the e-mail messages. Gonda's identity
|
|
is entirely unknown; "he" could be a ten year old girl, an eighty year
|
|
old man, or a committee in a retirement community playing the role of
|
|
Gonda gathered around a computer.[17] All that is known about Gonda is
|
|
that he used a computer account based in Ontario, Canada, and that he
|
|
apparently enjoyed exchanging with Baker what he referred to in an
|
|
e-mail message dated January 3, 1995, as "REAL sex talk" concerning
|
|
violence against women and girls. The language referred to by the
|
|
government clearly does not constitute threats of a coercive or
|
|
extortionate nature. It would be patently unreasonable after reading
|
|
his messages to think that Baker's communications caused their only
|
|
foreseeable recipient, Gonda, to fear violence, or caused him any
|
|
disruption due to fear of violence. Of the grounds for prosecution of
|
|
threats identified in R.A.V., the only one that could apply here is
|
|
protection from the possibility that threatened violence will occur.
|
|
___ U.S. at ___, 120 L.Ed.2d at 321.
|
|
|
|
The government characterizes the communications between Gonda and
|
|
Baker as evolving into "a firm plan of action." Section 875(c),
|
|
though, does not address planning crimes, per se, but transmitting
|
|
threats to injure or kidnap. At oral argument, the government agreed
|
|
the exchange between Gonda and Baker could be characterized as an
|
|
exchange between coconspirators. In order to prove the existence of a
|
|
conspiracy, generally, the government must prove an agreement between
|
|
two or more people to act together in committing an offense, and also
|
|
an overt act in furtherance of the conspiracy. E.g., United States v.
|
|
Reifsteck, 841 F.2d 701, 704 (6th Cir. 1988); 18 U.S.C. $ 371; Sixth
|
|
Circuit Pattern Criminal Jury Instructions 3.01A, 3.04. The charges
|
|
here could not support a conspiracy prosecution because no overt act
|
|
is alleged. The only actions involved in this prosecution are
|
|
speech--"the outward expression of what a person thinks in his mind."
|
|
Vance v. Judas Priest, et al., 1990 WL 130920, *28 (Nev. Dist. Ct.
|
|
1990). In an e-mail exchange not quoted in the superseding
|
|
indictment,[18] Baker and Gonda discuss sharing their thoughts, a
|
|
classically protected activity. Baker had said to Gonda, in part: "I'd
|
|
love to meet with you. There's no one else I can share my thoughts
|
|
with." On November 29, 1994, Gonda responded in part: "I would really
|
|
love to meet with you. I find that I am going insane trying to keep
|
|
all these thoughts to myself. . . maybe we could even try to pick up
|
|
some chicks and share our thoughts with them. . . what do you think?"
|
|
|
|
Even if Gonda and Baker were conspiring, it does not follow that they
|
|
are guilty of transmitting a threat to injure or kidnap under 18
|
|
U.S.C. $ 875(c). Section 875(c) is not simply a conspiracy statute
|
|
minus the overt act requirement. In order to be constitutionally
|
|
sanctionable, the statements Baker made must meet Kelner's
|
|
"unequivocal, unconditional, immediate, and specific" standard. As
|
|
Justice Brandeis wrote:
|
|
|
|
Fear of serious injury cannot alone justify suppression of free
|
|
speech. . . To justify suppression of free speech there must be
|
|
reasonable ground to fear that serious evil will result if free
|
|
speech is practiced. There must be reasonable ground to believe that
|
|
the danger apprehended is imminent.
|
|
|
|
Whitney v. California, 274 U.S. 357, 376 (1927) (Brandeis, J.,
|
|
concurring).[19]
|
|
|
|
A.
|
|
|
|
Count I charges Baker and Gonda with transmitting a threat to injure,
|
|
and quotes from three e-mail messages. In the first message quoted,
|
|
dated December 1, 1994, Baker responds to a message he had received
|
|
from Gonda:
|
|
|
|
I highly agree with the type of woman you like to hurt. You seem to
|
|
have the same tastes I have. When you come down, this'll be fun!
|
|
|
|
Also, I've been thinking. I want to do it to a really young girl
|
|
first. !3 or 14.[20] There innocence makes them so much more fun ---
|
|
and they'll be easier to control. What do you think? I haven't read
|
|
your entire mail yet. I've saved it to read later, in private. I'll
|
|
try to write another short phantasy and send it. If not tomorrow,
|
|
maybe by Monday. No promises.
|
|
|
|
|
|
|
|
On December 2, Gonda responded:
|
|
|
|
I would love to do a 13 or 14 year old. I think you are right...not
|
|
only their innocence but their young bodies would really be fun to
|
|
hurt. As far as being easier to control...you may be right, however
|
|
you can control any bitch with rope and a gag...once tey are tieed
|
|
up and struggling we could do anything we want to them...to any
|
|
girl. The trick is to be very careful in planning. I will keep my
|
|
eye out for young girls, and relish the fantasy...BTW[21] how about
|
|
your neighbour at home, youm may get a chance to see her...?...?
|
|
|
|
The same day, Baker responded:
|
|
|
|
True. But young girls still turn me on more. Likely to be nice and
|
|
tight. Oh.they'd scream nicely too!
|
|
|
|
Yeah. I didn't see her last time I was home. She might have moved.
|
|
But she'd be a great catch. She's real pretty. with nice long legs.
|
|
and a great girly face ... I'd love to make her cry ...
|
|
|
|
The bill of particulars identifies the targets of these statements as:
|
|
|
|
13 and 14-year old girls who reside in Defendant Jake Baker's
|
|
neighborhood in Ann Arbor, Michigan, and teen-age girls who reside
|
|
in Defendant Jake Baker's neighborhood in Boardman, Ohio.
|
|
|
|
This Count falls short of the constitutional "true threat"
|
|
requirement. As an initial matter, it does not refer to a sufficiently
|
|
specific class of targets. The more limited class identified in the
|
|
bill of particulars is not apparent from the face of the
|
|
communications. Nothing in the exchange quoted in Count I implicitly
|
|
or explicitly refers to 13 or 14 year old girls in Ann Arbor, nothing
|
|
in the exchange identifies Boardman, Ohio (Baker's actual home) as the
|
|
"home" referred to, and nothing in the exchange allows one to
|
|
determine that the neighbor discussed is a teen-age girl. In reality,
|
|
the only class of people to whom the messages can be taken to refer is
|
|
13 or 14 year old girls, anywhere. This class is too indeterminate to
|
|
satisfy Kelner's requirement of specificity as to the person
|
|
threatened, even under the liberal interpretation given the
|
|
requirement by some courts. Cf. Schroeder, 902 F.2d at 1470 (targeting
|
|
people at an unidentified post office).
|
|
|
|
As to the content of the messages, Baker's discussing his "tastes" in
|
|
the first paragraph of his December 1 message does not involve any
|
|
identifiable threatened action. In the second paragraph of the
|
|
December 1 message, he expresses a desire "to do it to" a 13 or 14
|
|
year old girl. Even assuming that more context would clarify the
|
|
phrase "to do it to," the second paragraph also fails to mention an
|
|
intention to do anything. Rather, it seeks Gonda's reaction to Baker's
|
|
desire, asking: "What do you think?" Discussion of desires, alone, is
|
|
not tantamount to threatening to act on those desires. Absent such a
|
|
threat to act, a statement is protected by the First Amendment.
|
|
|
|
As to Baker's message of December 2, the first paragraph again
|
|
discusses a predilection toward "young girls," and what it would be
|
|
like, presumably, "to do it to" "young girls." It does not mention any
|
|
intention to act in accordance with the expressed predilection. The
|
|
second paragraph responds to Gonda's question about a neighbor "at
|
|
home." It says "she'd be a great catch," but expresses no intention to
|
|
"catch" her, and indicates a desire to "make her cry," but, again,
|
|
expresses no intention to take any action in accordance with that
|
|
desire. It is not constitutionally permissible under Kelner to infer
|
|
an intention to act on a desire from a simple expression of the
|
|
desire. The intention (whether or not actually held) must itself be
|
|
expressed in the statement. Count I fails to meet this standard, and
|
|
must be dismissed.
|
|
|
|
B.
|
|
|
|
Counts II and III are based on the same statement made by Baker in an
|
|
e-mail message dated December 9, 1994, and charge Baker with making a
|
|
threat to kidnap and a threat to injure, respectively. The statement
|
|
for which Baker is charged in the two counts reads:
|
|
|
|
I just picked up Bllod Lust and have started to read it. I'll look
|
|
for "Final Truth" tomorrow (payday). One of the things I've started
|
|
doing is going back and re-reading earlier messages of yours. Each
|
|
time I do. they turn me on more and more. I can't wait to see you in
|
|
person. I've been trying to think of secluded spots. but my
|
|
knowledge of Ann Arbor is mostly limited to the campus. I don't want
|
|
any blood in my room, though I have come upon an excellent method to
|
|
abduct a bitch ---
|
|
|
|
As I said before, my room is right across from the girl's bathroom.
|
|
Wiat until late at night. grab her when she goes to unlock the dorr.
|
|
Knock her unconscious. and put her into one of those portable
|
|
lockers (forget the word for it). or even a duffle bag. Then hurry
|
|
her out to the car and take her away ... What do you think?
|
|
|
|
The bill of particulars identifies the target of the statement as:
|
|
"Female college students who lived in Defendant Jake Baker's dormitory
|
|
at the University of Michigan in Ann Arbor, Michigan." Apart from
|
|
concerns about equating Baker's online persona with his real person,
|
|
the class of would-be targets here is identified with sufficient
|
|
specificity.
|
|
|
|
Presumably, the government offers this statement as a threat to carry
|
|
out the "method to abduct" it describes. Under Kelner, discussion of a
|
|
method of kidnapping or injuring a person is not punishable unless the
|
|
statement includes an unequivocal and specific expression of intention
|
|
immediately to carry out the actions discussed. Baker's e-mail message
|
|
cannot reasonably be read as satisfying this standard. As in Count I,
|
|
the language with which Baker is charged here lacks any expression of
|
|
an intention to act, and concludes with a request for Gonda's
|
|
reaction: "What do you think?" Discussing the commission of a crime is
|
|
not tantamount to declaring an intention to commit the crime. To find
|
|
an expression of unequivocal intention in this language would require
|
|
the drawing of an inference not grounded in any specific language of
|
|
the statement and would exceed the bounds of the First Amendment.
|
|
Counts II and III must be dismissed.
|
|
|
|
C.
|
|
|
|
Count IV charges Baker and Gonda with transmitting a threat to injure.
|
|
The Count is based on a message from Gonda to Baker, and Baker's
|
|
response. Both e-mail messages are dated December 10, 1994. Gonda
|
|
wrote:
|
|
|
|
Hi Jake. I have been out tonight and I can tell you that I am
|
|
thinking more and more about 'doing' a girl. I can picture it so
|
|
well...and I can think of no better use for their flesh. I HAVE to
|
|
make a bitch suffer!
|
|
|
|
As far as the Teale-homolka killings, well I can think of no tastier
|
|
crimes...BTW have you seen any pictures of the girls? You have to
|
|
see these cunts! They must have been so much fun...please let me
|
|
know any details that I cannot get here. I would love to see what
|
|
you think about it....
|
|
|
|
As far as the asian bitch story, there is only one possible
|
|
ending....
|
|
|
|
|
|
|
|
Baker responded:
|
|
|
|
Are tastes are so similar. it scares me :-) When I lay down at
|
|
night. all I think of before I sleep is how I'd torture a bitch I
|
|
get my hands on. I have some pretty vivid near dreams too. I wish I
|
|
could remember them when I get up.
|
|
|
|
The bill of particulars identifies the target of these statements as:
|
|
|
|
Women who were the subject of Defendant Jake Baker's E-mail
|
|
transmissions and Internet postings, including -- but not limited to
|
|
-- Jane Doe, whose true name is known to Defendant Jake Baker and
|
|
this Honorable Court.
|
|
|
|
This Count presents the weakest of all the government's charges
|
|
against Baker. While the government identifies the class of targets
|
|
here as women Baker discussed on the Internet, there is nothing in the
|
|
language quoted here to so limit the class. In addition, since Baker's
|
|
e-mail often refers simply to "a girl," a class composed of women
|
|
Baker discussed in his e-mail and stories essentially is a class
|
|
composed of any woman or girl about whom Baker has ever thought. Such
|
|
a class is obviously not sufficiently specific.
|
|
|
|
With regard to the content of Baker's communication, Baker's statement
|
|
here consists only of an expression of his thoughts before sleeping
|
|
and of "near dreams" he cannot remember upon waking. To infer an
|
|
intention to act upon the thoughts and dreams from this language would
|
|
stray far beyond the bounds of the First Amendment, and would amount
|
|
to punishing Baker for his thoughts and desires. Count IV must be
|
|
dismissed.
|
|
|
|
D.
|
|
|
|
Count V charges Baker and Gonda with transmitting a threat to injure.
|
|
It is based on an exchange between Gonda and Baker on December 11-12,
|
|
1994. On December 11, Gonda wrote to Baker:
|
|
|
|
It's always a pleasure hearing back from you...I had a great orgasm
|
|
today thinking of how you and I would torture this very very petite
|
|
and cute south american girl in one of my classes...BTW speaking of
|
|
torture, I have got this great full length picture of the Mahaffy
|
|
girl Paul Bernardo killed, she is wearing this short skirt!
|
|
|
|
|
|
|
|
The same day, Baker responded:
|
|
|
|
Just thinking about it anymore doesn't do the trick ... I need TO DO
|
|
IT.
|
|
|
|
|
|
|
|
The next day, Gonda wrote:
|
|
|
|
My feelings exactly! We have to get together...I will give you more
|
|
details as soon as I find out my situation...
|
|
|
|
|
|
|
|
Baker responded:
|
|
|
|
Alrighty then. If not next week. or in January. then definatly
|
|
sometime in the Summer. Pickings are better then too. Although it's
|
|
more crowded.
|
|
|
|
The bill of particulars identifies the target of these statements, as
|
|
in Count IV, as:
|
|
|
|
Women who were the subject of Defendant Jake Baker's E-mail
|
|
transmissions and Internet postings, including -- but not limited to
|
|
-- Jane Doe, whose true name is known to Defendant Jake Baker and
|
|
this Honorable Court.
|
|
|
|
This Count, too, fails to meet Kelner's constitutional "true threat"
|
|
standard. The class of potential targets, as discussed with regard to
|
|
Count IV, is far too vague. As to the content of the communications,
|
|
Baker indicates his "need TO DO IT." Like his earlier statements, this
|
|
language indicates a desire to do something. While use of the word
|
|
"need" indicates a strong desire, it still falls short "unequivocal,
|
|
unconditional and specific expression of intention immediately to
|
|
inflict injury," Kelner, 534 F.2d at 1027; "needs" go unmet everyday.
|
|
Baker next indicates, at most, an intention to meet Gonda at some
|
|
indefinite point in the future--in the next week, month, or several
|
|
months later. This statement does not express an unequivocal intention
|
|
immediately to do anything. Also, nothing in the language on which the
|
|
Count is based indicates any intention to commit specific acts if
|
|
Baker and Gonda ever were to meet. Like the preceding four Counts,
|
|
Count V fails to state a charge under $ 875(c) that can survive a
|
|
First Amendment challenge, and must be dismissed. This prosecution
|
|
presents the rare case in which, in the government's words, "the
|
|
language set forth . . . is so facially insufficient that it cannot
|
|
possibly amount to a true threat."
|
|
|
|
V. Coda
|
|
|
|
This case in its initial stage generated a good deal of public
|
|
interest.[22] Now that the case will be concluded by an order rather
|
|
than by a jury verdict, it is important to assure the public that such
|
|
a conclusion is not by fiat. In United States v. Carrier, 672 F.2d
|
|
300, 306 (2d Cir.), cert. denied, 457 U.S. 1139 (1982), while the
|
|
Second Circuit said "that whether words used are a true threat is
|
|
generally best left to the triers of fact," it went on to say "[o]nly
|
|
where the factual proof is insufficient as a matter of law should the
|
|
indictment be dismissed." This is such a case. The communications
|
|
which form the basis of the superseding indictment, the many preceding
|
|
and subsequent communications, the names of the witnesses and the
|
|
general nature of their testimony, and the exhibits are all in the
|
|
record. All of this evidence, viewed in the light most favorable to
|
|
the prosecution, leads to one inevitable conclusion: based on the
|
|
applicable rules of law there is no case for a jury because the
|
|
factual proof is insufficient as a matter of law. The government's
|
|
enthusiastic beginning petered out to a salvage effort once it
|
|
recognized that the communication which so much alarmed the University
|
|
of Michigan officials was only a rather savage and tasteless piece of
|
|
fiction. Why the government became involved in the matter is not
|
|
really explained in the record.[23]
|
|
|
|
Baker is being prosecuted under 18 U.S.C. $ 875(c) for his use of
|
|
words, implicating fundamental First Amendment concerns. Baker's words
|
|
were transmitted by means of the Internet, a relatively new
|
|
communications medium that is itself currently the subject of much
|
|
media attention. The Internet makes it possible with unprecedented
|
|
ease to achieve world-wide distribution of material, like Baker's
|
|
story, posted to its public areas. When used in such a fashion, the
|
|
Internet may be likened to a newspaper with unlimited distribution and
|
|
no locatable printing press--and with no supervising editorial
|
|
control. But Baker's e-mail messages, on which the superseding
|
|
indictment is based, were not publicly published but privately sent to
|
|
Gonda. While new technology such as the Internet may complicate
|
|
analysis and may sometimes require new or modified laws,[24] it does
|
|
not in this instance qualitatively change the analysis under the
|
|
statute or under the First Amendment. Whatever Baker's faults, and he
|
|
is to be faulted, he did not violate 18 U.S.C. $ 875(c). The case
|
|
would have been better handled as a disciplinary matter, as the
|
|
University of Victoria proceeded in a similar situation,[25] despite
|
|
whatever difficulties inhere in such a course.[26] What the Court said
|
|
at the conclusion of oral argument bears repeating: "[T]he Court is
|
|
very skeptical, and about the best thing the government's got going
|
|
for it at this moment is the sincerity of purpose exhibited by [the
|
|
Assistant United States Attorneys prosecuting the case]. I am not sure
|
|
that sincerity of purpose is either synonymous with a good case under
|
|
the law, or even the exercise of good judgment."
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
_______________________________
|
|
|
|
AVERN COHN
|
|
|
|
UNITED STATES DISTRICT JUDGE
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
DATED: June 21, 1995
|
|
|
|
|
|
Detroit, Michigan
|
|
|
|
|
|
|
|
|
|
|
|
_________________________________________________________________
|
|
|
|
|
|
|
|
Baker Opinion / Stuart Beraha / sberaha@ic.net
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 19 Apr 1995 22:51:01 CDT
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 2--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CUDIGEST
|
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|
In ITALY: Bits against the Empire BBS: +39-464-435189
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu:80/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #7.57
|
|
************************************
|
|
|