1037 lines
55 KiB
Plaintext
1037 lines
55 KiB
Plaintext
|
|
Computer underground Digest Wed Aug 9, 1995 Volume 7 : Issue 66
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
|
|
CONTENTS, #7.66 (Wed, Aug 9, 1995)
|
|
|
|
|
|
FIle 1--CINCINNATI ELECTRONIC BULLETIN BOARD SYSTEM USERS
|
|
FIle 2--Cincinatti Computer Connection Users lawsuit against Police
|
|
FIle 3--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Tue, 08 Aug 1995 20:15:27 -0400
|
|
From: john.bailey@CCCBBS.CINCINNATI.OH.US(JOHN BAILEY)(by way of
|
|
Subject: File 1--CINCINNATI ELECTRONIC BULLETIN BOARD SYSTEM USERS
|
|
|
|
|
|
- - - - - - - - - P R E S S R E L E A S E - - - - - - - -
|
|
|
|
For IMMEDIATE Release 8/7/95 Contact: Scott T. Greenwood
|
|
Peter D. Kennedy
|
|
513/684-0101
|
|
Computer Users Fight Back:
|
|
|
|
CINCINNATI ELECTRONIC BULLETIN BOARD SYSTEM USERS
|
|
FILE CLASS ACTION LAWSUIT AGAINST SHERIFF SIMON LEIS
|
|
|
|
Seven subscribers to a Cincinnati electronic bulletin board system filed
|
|
a class action lawsuit today in federal court against Sheriff Simon L Leis,
|
|
Jr., and other law enforcement officials. On June 16, 1995, members of the
|
|
Hamilton County Computer Crimes Task Force raided the offices of the
|
|
Cincinnati Computer Connection BBS and seized the entire computer system,
|
|
including all the private electronic mail of the subscribers. This is the
|
|
first user class action challenging a government seizure of computer
|
|
material.
|
|
|
|
According to the search warrant used to justify the raid, the Task Force
|
|
was seeking 45 computer image files on a system that contained hundreds of
|
|
thousands of public and private messages.
|
|
|
|
The seven subscribers represent a class of thousands of users of the
|
|
Cincinnati Computer Connection electronic bulletin board. The lead
|
|
plaintiff is Steve Guest, a 36-year old computer system analyst who runs
|
|
his own business, in large part using the Cincinnati Computer Connection
|
|
BBS. Other plaintiffs include Denise and Ben Kelley, active bulletin board
|
|
users and grandparents of seven; Nelda Sturgill, a registered nurse who
|
|
used the bulletin board to keep up with medical news and to swap recipes;
|
|
and Randy Bowling, who suffers from a speech impediment caused by a head
|
|
injury, who used CCC BBS as his primary way to communicate and to study
|
|
computer science.
|
|
|
|
"The faces of the CCC subscribers were the faces of Greater Cincinnati -
|
|
working men and women, retirees, mothers, fathers, grandparents and
|
|
children, Republicans, Democrats and Independents," the lawsuit alleges.
|
|
The users of the system claim that the wholesale seizure of the computer
|
|
bulletin board system violated their constitutional right to free speech
|
|
and association and that the seizure of their private e-mail violated their
|
|
right to privacy and federal law.
|
|
|
|
"The Task Force used a drift net to troll for a tiny amount of supposed
|
|
'computer porn,'" said Cincinnati civil rights lawyer Scott T. Greenwood,
|
|
who represents the plaintiffs. "In the process, they netted an enormous
|
|
amount of entirely irrelevant material, and shut down a
|
|
constitutionally-protected forum for speech and association."
|
|
|
|
"We believe that the law prohibits the indiscriminate seizure of private
|
|
electronic communications," said Peter D. Kennedy, an Austin, Texas
|
|
attorney who also represents the plaintiffs, and who represented Steve
|
|
Jackson Games when that company sued the U.S. Secret Service for illegally
|
|
seizing its electronic bulletin board system in 1990. "It is a fundamental
|
|
principle of law that, even during legitimate investigations, the
|
|
government must limit its searches and seizures to things related to the
|
|
crime under investigation. Here, the Task Force took everything, including
|
|
thousands of innocent persons' private mail and public notices."
|
|
|
|
Greenwood added, "Whether the sheriff and the computer 'net police' like
|
|
it or not, the Bill of Rights is not optional just because they don't like
|
|
it or understand it. Shutting down a computer system and seizing people's
|
|
private communications makes a mockery of the First Amendment."
|
|
|
|
The lawsuit claims that Sheriff Leis and the Task Force violated the
|
|
First Amendment, the Fourth Amendment, several provisions of the federal
|
|
Electronic Communications Privacy Act of 1986, and Ohio common law privacy
|
|
rights, and seeks actual damages, statutory damages, and punitive damages
|
|
on behalf of the seven plaintiffs and the entire class.
|
|
|
|
For further information, contact:
|
|
|
|
Scott T. Greenwood Peter D. Kennedy
|
|
Greenwood & Associates George, Donaldson & Ford LLP
|
|
2301 Carew Tower, 441 Vine St 114 W. 7th Street, Suite 1000
|
|
Cincinnati, Ohio 45202 Austin, Texas 78701
|
|
(513) 684-0101 (512) 495-1400
|
|
stgrnwd@iac.net pkennedy@io.com
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 09 Aug 1995 22:18:15 -0400
|
|
From: pstemari@ERINET.COM(Paul J. Ste. Marie)
|
|
Subject: File 2--Cincinatti Computer Connection Users lawsuit against Police
|
|
|
|
UNITED STATES DISTRICT COURT
|
|
SOUTHERN DISTRICT OF OHIO
|
|
WESTERN DIVISION
|
|
|
|
|
|
STEVEN GUEST,
|
|
[home address removed] CIVIL ACTION NO.
|
|
|
|
and
|
|
|
|
DENISE B. KELLEY,
|
|
[home address removed]
|
|
|
|
and
|
|
|
|
BEN S. KELLEY,
|
|
[home address removed]
|
|
|
|
and
|
|
|
|
NELDA STURGILL,
|
|
[home address removed]
|
|
|
|
and
|
|
|
|
DEBORAH CUMMINGS,
|
|
[home address removed]
|
|
|
|
and
|
|
|
|
RANDY BOWLING,
|
|
[home address removed]
|
|
|
|
and
|
|
CLASS ACTION
|
|
RICHARD E. KRAMER, COMPLAINT
|
|
[home address removed] (JURY DEMAND
|
|
ENDORSED
|
|
and HEREON)
|
|
|
|
all others similarly situated,
|
|
|
|
Plaintiffs,
|
|
|
|
vs.
|
|
|
|
SIMON L. LEIS, JR.,
|
|
Hamilton County Justice Center
|
|
1000 Sycamore Street
|
|
Cincinnati, Ohio 45202
|
|
|
|
and
|
|
|
|
Hamilton County :
|
|
Sheriff's Department, :
|
|
Hamilton County Justice Center :
|
|
1000 Sycamore Street :
|
|
Cincinnati, Ohio 45202 :
|
|
:
|
|
and :
|
|
:
|
|
Hamilton County Regional :
|
|
Computer Crimes Task Force, :
|
|
Hamilton County Justice Center :
|
|
1000 Sycamore Street :
|
|
Cincinnati, Ohio 45202 :
|
|
:
|
|
and :
|
|
:
|
|
Dale Menkaus, :
|
|
Hamilton County Justice Center :
|
|
1000 Sycamore Street :
|
|
Cincinnati, Ohio 45202 :
|
|
:
|
|
and :
|
|
:
|
|
ROBERT SWISSHELM, :
|
|
Hamilton County Justice Center :
|
|
1000 Sycamore Street :
|
|
Cincinnati, Ohio 45202 :
|
|
:
|
|
and :
|
|
|
|
|
|
|
|
JANE/JOHN DOES 1 THROUGH 10, :
|
|
Addresses Presently Unknown :
|
|
:
|
|
Defendants. :
|
|
|
|
|
|
I. INTRODUCTION
|
|
|
|
1. The Plaintiffs bring this lawsuit on behalf of themselves and the
|
|
thousands of subscribers to the Cincinnati Computer Connection electronic
|
|
bulletin board system, in order to redress the violation of their civil
|
|
rights by Hamilton County Sheriff Simon L. Leis, Jr. and the other
|
|
Defendants.
|
|
2. On June 16, 1995, the Hamilton County Regional Computer Task Force
|
|
(the "Task Force") raided at least five electronic bulletin board systems
|
|
in the Cincinnati area, in a search for allegedly obscene materials.
|
|
3. During these raids, the Task Force seized the entire computer
|
|
network comprising the Cincinnati Computer Connection BBS, a computer
|
|
bulletin board service with thousands of subscribers in Southern Ohio,
|
|
Northern Kentucky, and beyond. Robert Emerson owns and operates the
|
|
Cincinnati Computer Connection BBS. The target of the raid was some 45
|
|
computer image files allegedly stored on the Cincinnati Computer Connection
|
|
BBS. According to the search warrant, the Task Force already had obtained
|
|
copies of these image files from the Cincinnati Computer Connection BBS.
|
|
4. In pursuit of these 45 image files, the Sheriff and Task Force
|
|
raided and seized the entire bulletin board system. In the process,
|
|
Sheriff Leis and his Task Force seized the private electronic mail and
|
|
communications of thousands of entirely innocent subscribers, they shut
|
|
down an active, thriving, electronic community of average citizens, and
|
|
they denied thousands of people access to their friends, neighbors, and
|
|
business associates.
|
|
5. The named Plaintiffs bring this lawsuit on behalf of themselves and
|
|
the thousands of subscribers to the Cincinnati Computer Connection and all
|
|
those whose electronic communications were seized and intercepted during
|
|
the raid, in order to remedy this violation of their civil rights
|
|
guaranteed by the First Amendment, the Fourth Amendment, the Fourteenth
|
|
Amendment, the Ohio Constitution, the Electronic Communications Privacy Act
|
|
of 1986 (18 U.S.C. 2510 et seq. and 2701 et seq.) and Ohio common law.
|
|
|
|
|
|
II. JURISDICTION
|
|
|
|
6. This action seeks to enforce rights guaranteed by the Constitution
|
|
and laws of the United States and is brought pursuant to 42 U.S.C. 1983
|
|
and 1985. Jurisdiction is based upon 28 U.S.C. 1331 and 1343(3). The
|
|
substantive federal claims are brought pursuant to 42 U.S.C. 1983 and
|
|
1985, and 18 U.S.C. 2707 and 2520. Declaratory relief is sought pursuant
|
|
to 28 U.S.C. 2201-2202. Authority to hear the pendent state claims is
|
|
conferred by the Court's supplemental jurisdiction under 28 U.S.C. 1367.
|
|
This action does not raise novel or complex issues of state law, and the
|
|
state law claims do not predominate over the federal law claims.
|
|
7. Venue is proper in the Southern District of Ohio, Western Division,
|
|
under 28 U.S.C. 1391(b), because at least one Defendant resides in this
|
|
District and Division and because a substantial part of the events or
|
|
omissions giving rise to the claims occurred within this District and
|
|
Division.
|
|
|
|
|
|
III. PARTIES
|
|
|
|
|
|
A. PLAINTIFFS
|
|
8. PLAINTIFF STEVEN GUEST is a thirty-six year old resident of
|
|
Clermont County, Ohio. Mr. Guest is a computer consultant who uses the
|
|
Cincinnati Computer Connection BBS to send and receive electronic
|
|
communications, to conduct his consulting business, to exchange files with
|
|
his business partners, to access shareware, and otherwise to engage in
|
|
expressive and associational activity.
|
|
9. PLAINTIFF DENISE KELLEY is a sixty-nine year old resident of
|
|
Hamilton County, Ohio. She is employed by the Hamilton County Department
|
|
of Human Services as an investigation coordinator and serves as the chief
|
|
union steward for AFSCME Local 1768. Mrs. Kelley, mother of three and
|
|
grandmother of seven, uses the Cincinnati Computer Connection BBS for
|
|
political discussion, to download shareware files, to play some games, to
|
|
send and receive electronic mail communications across the Internet, to
|
|
"chat" with users, to write stories in an on-line conference, and otherwise
|
|
to engage in expressive and associational activity.
|
|
10. PLAINTIFF BEN S. KELLEY is Mrs. Kelley's husband, a seventy-six
|
|
year old retired machinist who resides in Hamilton County, Ohio. Mr.
|
|
Kelley, father of three and grandfather of seven, uses the Cincinnati
|
|
Computer Connection BBS to send and receive electronic communications, play
|
|
games, to read the discussions going on in various conferences, and
|
|
otherwise to engage in expressive and associational activity.
|
|
11. PLAINTIFF NELDA STURGILL is a registered nurse in a local hospital
|
|
who resides in Hamilton County. In her thirties, Ms. Sturgill uses the
|
|
Cincinnati Computer Connection BBS to send and receive electronic
|
|
communications across the Internet, to access shareware programs, to keep
|
|
abreast of information through the use of the Usenet newsgroups, and
|
|
otherwise to engage in expressive and associational activity. Ms. Sturgill
|
|
particularly participates in the health-related conferences newsgroups, and
|
|
has exchanged recipes and ideas with people from Australia, England and the
|
|
United States.
|
|
12. PLAINTIFF DEBORAH CUMMINGS is a resident of Kenton County,
|
|
Kentucky. Ms. Cummings uses the Cincinnati Computer Connection BBS to send
|
|
and receive electronic communications, to conduct her business, and to
|
|
otherwise engage in expressive and associational activity.
|
|
13. PLAINTIFF RANDY BOWLING is a resident of Butler County, Ohio. Mr.
|
|
Bowling suffers from a head injury that makes speaking very difficult.
|
|
Mr. Bowling uses the Cincinnati Computer Connection BBS to send and receive
|
|
electronic communications, to supplement his limited ability to speak, and
|
|
to discuss his head injury and therapy, and to engage in the majority of
|
|
his expressive and associational activity. Mr. Bowling also uses the
|
|
Cincinnati Computer Connection BBS to facilitate his current study of
|
|
computer systems.
|
|
14. PLAINTIFF RICHARD KRAMER is a retired insurance agent who resides
|
|
in Butler County, Ohio. Mr. Kramer, who uses a wheelchair, uses the
|
|
Cincinnati Computer Connection BBS to send and receive electronic
|
|
communications, to supplement his sometimes restricted access to more
|
|
traditional fora for expressive and associational activity, to access
|
|
file-management and utility shareware, and to study computer systems.
|
|
15. Each named Plaintiff is a citizen of the United States.
|
|
16. At all times relevant herein, Plaintiffs were users of the
|
|
Cincinnati Computer Connection BBS.
|
|
Class Action Allegations
|
|
17. The named Plaintiffs are proper representatives of a class within
|
|
the meaning of Rule 23(a) and 23(b) (3) of the Federal Rules of Civil
|
|
Procedure.
|
|
18. The members of the class are so numerous that the joinder of all of
|
|
them is impractical. Upon information and belief, the class consists of at
|
|
least several thousand persons. The exact size of the class is unknown
|
|
because the Defendants have seized and failed to return the computer and/or
|
|
documentary records needed to determine the exact number and identity of
|
|
the class members.
|
|
19. The members of the class should be readily identifiable from
|
|
records seized by the Defendants.
|
|
20. There are questions of law and fact common to the class; their
|
|
class claims predominate over any individual claims. Each class member
|
|
shares the same federal and state constitutional protections of their right
|
|
to speak, publish and associate. Each class member shares the same federal
|
|
and state constitutional right to be free from unreasonable searches and
|
|
seizures. Each class member shares the same federal and state rights
|
|
protecting the privacy of their electronic communications and subscriber
|
|
records.
|
|
21. The claims of the named Plaintiffs are typical of the claims of the
|
|
class. All class members suffered a similar violation of their common
|
|
rights when the Defendants seized and shut down the Cincinnati Computer
|
|
Connection BBS, and, upon information and belief, reviewed their private
|
|
electronic communications and subscriber records. As alleged in greater
|
|
detail above, the Plaintiffs' uses of the Cincinnati Computer Connection
|
|
BBS typify the uses of the class members generally.
|
|
22. The named Plaintiffs will fairly and adequately protect the
|
|
interests of the class. As of June 16, 1995, each named Plaintiff was a
|
|
user of the Cincinnati Computer Connection BBS. The named Plaintiffs are
|
|
represented by counsel experienced in litigating federal and state civil
|
|
rights lawsuits, including class actions, and who are familiar with the
|
|
technology involved and experienced in litigating computer communications
|
|
cases. The representative Plaintiffs know of no conflict of interest among
|
|
class members. Plaintiffs will vigorously prosecute this action.
|
|
23. The class consists of all persons who, on June 16, 1995, were
|
|
users, subscribers, or customers of the Cincinnati Computer Connection
|
|
electronic bulletin board service, and all persons whose private electronic
|
|
communications were resident on the Cincinnati Computer Connection BBS when
|
|
it was seized by the Defendants, but not including the actual provider of
|
|
that electronic bulletin board service.
|
|
24. Plaintiffs do not propose class notice at this time, but belief
|
|
that class certification and notice can and should be achieved promptly.
|
|
|
|
B. DEFENDANTS
|
|
25. Defendant Simon L. Leis, Jr., is and was at all relevant times the
|
|
Sheriff of Hamilton County, Ohio. For the constitutional and common law
|
|
claims, Defendant Leis is sued in his official capacity with respect to the
|
|
declaratory and injunctive relief sought herein, and in his individual
|
|
capacity with respect to the request for damages and attorney's fees in
|
|
this action. For the federal statutory claims, Defendant Leis is sued in
|
|
his individual and official capacities.
|
|
26. Defendant Hamilton County Sheriff's Department is a sheriff's
|
|
department organized under the laws of the State of Ohio.
|
|
27. Defendant Hamilton County Regional Computer Crimes Task Force is a
|
|
division of the Hamilton County Sheriff's Department organized under Ohio
|
|
law to develop and use special skills and expertise in investigating
|
|
suspected computer crimes.
|
|
28. Defendant Dale Menkaus is and was at all relevant times the
|
|
Commander of the Regional Computer Crimes Task Force. For the
|
|
constitutional and common law claims, Defendant Menkaus is sued in his
|
|
official capacity with respect to the declaratory and injunctive relief
|
|
sought herein, and in his individual capacity with respect to the request
|
|
for damages and attorney's fees in this action. For the federal statutory
|
|
claims, Defendant Menkaus is sued in his individual and official
|
|
capacities.
|
|
29. Defendant Robert Swisshelm is and was at all times referred to
|
|
herein a member of the Regional Computer Crimes Task Force. For the
|
|
constitutional and common law claims, Defendant Swisshelm is sued in his
|
|
official capacity with respect to the declaratory and injunctive relief
|
|
sought herein, and in his individual capacity with respect to the request
|
|
for damages and attorney's fees in this action. For the federal statutory
|
|
claims, Defendant Swisshelm is sued in his individual and official
|
|
capacities.
|
|
30. Defendants Jane/John Doe 1-10 are private individuals; members,
|
|
representatives, or agents of the Regional Computer Crimes Task Force; or
|
|
individuals from other law enforcement agencies whose names are currently
|
|
unknown, but whom the Plaintiffs believe acted under color of state law or
|
|
clothed with official authority, and who violated or conspired to violate
|
|
the Plaintiffs' and the class members' civil rights. For the
|
|
constitutional and common law claims, Defendant Does are sued in their
|
|
official capacities with respect to the declaratory and injunctive relief
|
|
sought herein, and in their individual capacities with respect to the
|
|
request for damages and attorney's fees in this action. For the federal
|
|
statutory claims, Defendant Does are sued in their individual and official
|
|
capacities.
|
|
31. At all times relevant herein, each named individual Defendant was
|
|
acting under color of state law.
|
|
32. At all times relevant herein, Defendants, and each of them,
|
|
separately and in concert, acted under color of state law. At all times
|
|
relevant herein, Defendants, and each of them, separately and in concert,
|
|
engaged in the illegal and unconstitutional conduct described herein and
|
|
deprived Plaintiffs of the rights, privileges, and immunities secured to
|
|
Plaintiffs by the First, Fourth, and Fourteenth Amendments to the United
|
|
States Constitution, the laws of the United States, and the Constitution
|
|
and laws of the State of Ohio.
|
|
|
|
IV. FACTS
|
|
|
|
A. The Cincinnati Computer Connection Community.
|
|
33. On June 16, 1995, and for many years before that, the Cincinnati
|
|
Computer Connection ("CCC") was a thriving community. The bulletin board
|
|
system ("BBS") provided a forum for its users to speak and publish
|
|
privately and publicly, to debate, to associate and recreate, and to
|
|
exchange ideas and information. On June 16, 1995, the faces of the CCC
|
|
subscribers were the faces of Greater Cincinnati -- working men and women,
|
|
retirees, mothers, fathers, grandparents and children, Republicans,
|
|
Democrats and Independents. The CCC community even included subscribers
|
|
from around the United States and overseas.
|
|
34. Many of the subscribers to the CCC BBS have made personal
|
|
acquaintances through the bulletin board community. Subscribers have held
|
|
dinner get-togethers to meet personally, to socialize, and to discuss
|
|
matters of interest to the BBS community. These meetings were organized by
|
|
using the BBS itself.
|
|
35. On June 16, 1995, the CCC community included thousands of users and
|
|
subscribers. Because the CCC computers and subscriber records remain in
|
|
the hands of the Defendants, the exact number remains unknown.
|
|
36. At all relevant times, the CCC BBS affected and operated in the
|
|
stream of interstate commerce.
|
|
|
|
B. The Cincinnati Computer Connection BBS.
|
|
37. Each user or subscriber to the CCC BBS selected a private password,
|
|
which secured the privacy of his or her account. The subscriber contacted
|
|
the CCC BBS by using his or her personal computer, a modem, and a phone
|
|
line. The user's computer would call the CCC BBS over a phone line, and
|
|
after "logging in" by using the confidential password, the user was given
|
|
access to the CCC BBS. Once connected to the BBS, the subscriber could do
|
|
a whole range of things, including:
|
|
i. Private electronic mail or "e-mail."
|
|
38. The CCC BBS provided subscribers the ability to send and receive
|
|
private electronic communications, typically known as e-mail. A subscriber
|
|
could compose private electronic messages either before "logging on" to the
|
|
CCC, or while connected to the bulletin board system. Just like First
|
|
Class mail, e-mail messages are addressed to a specific person, and are
|
|
confidential.
|
|
39. E-mail was sent and received in two manners on the CCC BBS. E-mail
|
|
exchanged between persons who had accounts on the CCC BBS was sent within
|
|
the many conference areas on the BBS (see below). If the sender designated
|
|
a conference message "confidential," the message remained inaccessible to
|
|
any user except the designated recipient. The CCC BBS also provided an
|
|
"Internet mail gateway." This feature allowed subscribers to send and
|
|
receive confidential electronic communications from persons who did not
|
|
have an account on the CCC BBS, but who had an Internet address. This
|
|
Internet mail gateway allowed the users of the CCC BBS to send confidential
|
|
electronic communications to, and receive them from, tens of millions of
|
|
persons around the world.
|
|
40. This e-mail was not readily accessible to the public. The users of
|
|
the CCC BBS, and those who sent electronic mail to the CCC BBS from the
|
|
Internet, had a reasonable expectation of privacy in those communications.
|
|
41. When Defendant Leis and the other Defendants seized the CCC BBS,
|
|
they seized all of the private electronic communications contained on the
|
|
system, and cut off the subscribers' ability to send and receive e-mail.
|
|
ii. Conference areas.
|
|
42. In addition to e-mail, the Cincinnati Computer Connection provided
|
|
its subscribers access to thousands of "conferences." These conferences,
|
|
like the sections of a library, are the main organizational units of the
|
|
BBS. Each conference area had a name and a topic. For example, the CCC
|
|
BBS had conference areas dedicated to writers, game players, and computer
|
|
professionals. When a subscriber accessed the bulletin board system, he or
|
|
she could "enter" an conference area. Once in a conference area, the
|
|
subscriber could read all the public messages posted by other visitors to
|
|
the conference, post public reply messages or begin new public discussions
|
|
on new topics. The user could also send and receive private electronic
|
|
communications within the conference. The CCC BBS provided literally
|
|
thousands of conferences for its users, including:
|
|
a. Local conference areas.
|
|
43. These conferences were unique to the CCC BBS, and included
|
|
discussions and debates on topics ranging from local and national politics
|
|
to sports and computers. These conferences were the heart of the local CCC
|
|
community interaction.
|
|
b. Private local conference areas.
|
|
44. The CCC BBS also provided conference areas that were restricted to
|
|
particular users. These restricted conference areas were used by
|
|
subscribers for confidential business purposes, including exchanging
|
|
confidential information.
|
|
c. BBS network conferences.
|
|
45. On June 16, 1995, the CCC BBS also provided to its users "feeds"
|
|
from networks of similar dial-up bulletin board systems. These networks
|
|
provided dozens of additional conference areas, and allowed the users of
|
|
the CCC BBS to engage in discussion on topics with users of a whole network
|
|
of BBSs beyond the subscribers to the CCC BBS.
|
|
d. Usenet newsgroups.
|
|
46. The CCC BBS also received, via satellite feed, thousands of
|
|
additional conferences from an Internet network known as Usenet. Usenet is
|
|
essentially a bulletin board system for the Internet. Usenet is organized
|
|
into thousands of separate "newsgroups" where people from all around the
|
|
world can engage in discussion and debate on a huge variety of topics,
|
|
ranging from computer science, philosophy, and law to pop music. The CCC
|
|
subscribers could read and participate in these newsgroups.
|
|
47. When Defendant Leis and the other Defendants seized the CCC BBS,
|
|
they seized all of the contents of all of these thousands of conference
|
|
areas, and denied the subscribers to the CCC any access to the conferences.
|
|
iii. Live "chat."
|
|
48. The Cincinnati Computer Connection BBS also featured live chat
|
|
"channels." Similar to CB radio channels, the "chat" function allowed
|
|
subscribers to converse in "real time" with other subscribers who were
|
|
logged into the BBS. One subscriber could invite another person to chat,
|
|
and the two subscribers could exchange confidential messages by typing them
|
|
in sequence to each other.
|
|
49. When Defendant Leis and the other Defendants seized the CCC BBS,
|
|
they shut down any chat taking place on the board and seized any captured
|
|
chat file sessions.
|
|
iv. Games.
|
|
50. The game areas on the CCC were very popular. Subscribers could
|
|
play a variety of on-line games against the computer or against other
|
|
subscribers. Some "games" were more like interactive creative writing,
|
|
with different users of the BBS taking on personas and interacting with
|
|
each other in a fictional world.
|
|
51. The Defendants' seizure of the bulletin board system of course
|
|
included seizure of all the games, and cut off the subscribers' access to
|
|
the games.
|
|
v. File transfer.
|
|
52. The CCC BBS offered its subscribers the ability to "upload"
|
|
computer files from their home computer to the bulletin board system, and
|
|
to "download" computer files from the bulletin board to their home
|
|
computers. Computer files can consist of anything from computer programs
|
|
and other software, to the text of written material (such as this
|
|
Complaint), to picture files and sound files. The CCC BBS had an enormous
|
|
library of computer files for its users to access and use. The Defendants
|
|
seized this entire library of thousands of computer files when they seized
|
|
the 45 allegedly obscene images they were after.
|
|
vi. The restricted adult file area.
|
|
53. Among the thousands of conferences on the CCC, there was a single
|
|
conference area dedicated to adult-oriented computer image files. Access
|
|
to this area was extremely limited. In order to gain access to this
|
|
conference, a subscriber was required to verify his age and identity in
|
|
person to the CCC system operator, Mr. Emerson. After verifying the
|
|
subscriber's age, Emerson would configure that user's account to give that
|
|
subscriber access to the adult file area. Only after a subscriber's age
|
|
and identity was verified, and the subscriber's account given access to the
|
|
adult file area, would the existence of the adult file area even appear on
|
|
the user's screen when logged in to the CCC. The "menu" of choices
|
|
available to a subscriber who had not been verified and given access would
|
|
not even show that an adult file area existed.
|
|
54. Even for those with access to the restricted adult file area, the
|
|
adult image files could not be viewed "on-line." In order to view a file,
|
|
a subscriber with access would have to log onto the BBS, enter the
|
|
restricted adult area, designate a file for downloading, download that file
|
|
to the user's home computer, log off the system, and then run a separate
|
|
computer program on the home computer that interprets the image and
|
|
displays it on the user's home computer screen.
|
|
55. The restricted adult file area comprised a very small percentage of
|
|
the material on the CCC BBS -- no more than 3%, and upon information and
|
|
belief far less than that. The number of users with access to this area
|
|
was also very small -- no more than 3% of the subscribers, and upon
|
|
information and belief far less than that. Many, if not most, of the CCC
|
|
subscribers had no idea that an adult file area even existed.
|
|
56. Compared to the Cincinnati Computer Connection as a whole, the
|
|
adult file area was like a tiny, locked, and largely unknown private room
|
|
within a huge, bustling convention center.
|
|
C. Defendants Obtain A Search Warrant And Go Trolling for Computer
|
|
Porn.
|
|
57. On or about June 15, 1995, the Defendants applied to the Municipal
|
|
Court of Clermont Count for a search warrant for the premises containing
|
|
the CCC BBS computers. Municipal Court Judge James A. Shriver signed the
|
|
search warrant at 11:30 p.m. that evening. Upon information and belief,
|
|
Judge Shriver had never reviewed an application for the search or for the
|
|
seizure of an electronic communication system such as the CCC BBS, and had
|
|
never issued a search warrant for such a system. The search warrant itself
|
|
listed 45 particular image files, by name and description, that were the
|
|
target of the search.
|
|
58. The Defendants obtained an order sealing from public scrutiny the
|
|
search warrant affidavit that allegedly justified their application for the
|
|
search warrant. Plaintiffs have not obtained a copy of the affidavit or
|
|
affidavits that allegedly supported the search warrant. However, upon
|
|
information and belief, Plaintiffs allege that the Defendants failed to
|
|
inform Judge Shriver of the following material facts: (1) that the CCC BBS
|
|
was a forum for protected speech, publication and association, and that the
|
|
Defendants intended to shut down that forum and seize all the publications
|
|
contained on that forum; (2) that the CCC BBS contained thousands of
|
|
private electronic communications to and from the subscribers of the CCC
|
|
BBS, and that the Defendants intended to shut down that communication
|
|
system, and seize, intercept and read these private communications; (3)
|
|
that the electronic communications Defendants sought were protected by
|
|
federal and state law from interception, seizure and disclosure; and (4)
|
|
that the Defendants had no probable cause to believe that these private
|
|
communications of the thousands of subscribers to the CCC BBS were relevant
|
|
to any investigation of any alleged criminal activity.
|
|
D. Defendants Shut Down the Cincinnati Computer Connection BBS and
|
|
Indiscriminately Seize Everything On It.
|
|
59. On June 16, 1995, purportedly acting under the authority of the
|
|
search warrant signed by Judge Shriver, the Defendants seized the entire
|
|
CCC BBS. The Defendants made no effort to limit their seizure to materials
|
|
or information related to the alleged offense under investigation; rather,
|
|
they seized the entire system, shutting it down completely. If not for a
|
|
significant personal financial commitment by Mr. Emerson after the raid,
|
|
the CCC BBS would have been permanently shut down.
|
|
60. As of the date of this filing, the Defendants have made no effort
|
|
to return to the Plaintiffs or any other user of the CCC BBS their private
|
|
electronic communications, or to assure that such communications reach
|
|
their intended recipients. Upon information and belief, the Defendants
|
|
have already, or have every intention to, read the private electronic
|
|
communications of the CCC BBS subscribers.
|
|
61. The Defendants made no effort to limit the scope of their seizure.
|
|
Prior to the raid, the Defendants knew the exact file names of the computer
|
|
image files they were searching for. In fact, the Defendants had already
|
|
obtained those files prior to the raid. The Defendants consciously chose
|
|
not to use means at their disposal that would have allowed for a limited
|
|
search and seizure of evidence relevant to the alleged offense. The
|
|
Defendants consciously refused to use narrower means of obtaining their
|
|
investigative objectives that would have protected the privacy of the
|
|
subscribers' communications and the integrity of their forum.
|
|
62. The Defendants knew, or should have known, that the CCC BBS was a
|
|
forum for protected speech, publication and communication. The Defendants
|
|
knew, or should have known, that the CCC BBS contained materials being
|
|
published electronically that were protected by the First Amendment to the
|
|
U.S. Constitution and the Ohio Constitution. The Defendants knew, or
|
|
should have known, that the BBS contained the private electronic
|
|
communications of its users, and that such communications were not readily
|
|
accessible to the public. The Defendants knew, or should have known, that
|
|
the users of the CCC BBS had a reasonable expectation of privacy in their
|
|
electronic communications.
|
|
63. Reasonable law enforcement officers in the position of the
|
|
Defendants, with the information available to the Defendants, would have
|
|
known that the CCC BBS was a forum for speech, publication and
|
|
communication protected by the First Amendment and the Ohio Constitution,
|
|
and that the electronic communications on the CCC BBS were protected by the
|
|
Fourth Amendment, the Ohio Constitution and federal statutory law from
|
|
search and seizure and interception unless the officers had probable cause
|
|
to believe that those communications were relevant to the law enforcement
|
|
inquiry.
|
|
|
|
V. FIRST CLAIM - FIRST AMENDMENT
|
|
(FREEDOM OF SPEECH, PRESS, AND ASSOCIATION)
|
|
|
|
64. The allegations in paragraphs 1-63 are incorporated herein by
|
|
reference.
|
|
65. At all relevant times, the Cincinnati Computer Connection BBS
|
|
published, in electronic form, magazines, periodicals, non-fiction,
|
|
fiction, images and other materials protected by the First Amendment.
|
|
66. The Cincinnati Computer Connection BBS was a forum for speech,
|
|
publication and association protected by the First and Fourteenth
|
|
Amendments.
|
|
67. The Plaintiffs and the class members at all relevant times used the
|
|
Cincinnati Computer Connection BBS to exercise their constitutional rights
|
|
to speak, publish and associate.
|
|
68. The Defendants' search, seizure, and retention of the Cincinnati
|
|
Computer Connection BBS, and the materials contained on the BBS, violated
|
|
the Plaintiffs' and class members' clearly established constitutional
|
|
rights to speak, publish and associate.
|
|
69. The Defendants' seizure and retention of computer hardware and
|
|
software used by Cincinnati Computer Connection BBS constituted a prior
|
|
restraint on the Plaintiffs' constitutional rights of freedom of speech, of
|
|
the press, and of association.
|
|
70. Defendants knew or reasonably should have known that their conduct
|
|
violated the Plaintiffs' and the class members' clearly established First
|
|
Amendment rights of freedom of speech, freedom of the press, and freedom of
|
|
association.
|
|
71. Defendants acted with intent to violate, or with reckless
|
|
indifference to, the Plaintiffs and class members' clearly established
|
|
First Amendment rights to freedom of speech, freedom of the press, and
|
|
freedom of association.
|
|
72. At all relevant times, Defendants were acting under color of state
|
|
law.
|
|
73. The Defendants' actions have caused the Plaintiffs and class
|
|
members a real and palpable fear that their future electronic
|
|
communications will be seized and reviewed by law enforcement agents,
|
|
without justification or excuse. As a result, the Plaintiffs and class
|
|
members have suffered a distinct and actual diminution of their willingness
|
|
to speak, publish and associate freely and openly without fear of
|
|
government intrusion and reprisal.
|
|
74. As a direct result of Defendants' conduct, the Plaintiffs and class
|
|
members have suffered a distinct and actual restriction on their freedom of
|
|
speech, press and association.
|
|
75. As a direct result of the Defendants' conduct, the Plaintiffs have
|
|
suffered actual damages, attorneys' fees, and costs.
|
|
|
|
VI. SECOND CLAIM - OHIO CONSTITUTION ARTICLE I, SECTION 11
|
|
(FREEDOM TO SPEAK, WRITE, PUBLISH, AND ASSOCIATE)
|
|
76. The allegations in paragraphs 1-75 are incorporated herein by
|
|
reference.
|
|
77. In the same manner that the Defendants' actions violated the
|
|
Plaintiffs and the class members' rights under the First Amendment, the
|
|
Defendants' acts violated the Plaintiffs' and class members' clearly
|
|
established right to speak, write, publish, and associate guaranteed by
|
|
Article I, Section 11 of the Constitution of the State of Ohio.
|
|
78. The Defendants' actions have caused the Plaintiffs and class
|
|
members a real and palpable fear that their future electronic
|
|
communications and publications will be seized and reviewed by law
|
|
enforcement agents, without justification or excuse. As a result, the
|
|
Plaintiffs and class members have suffered a distinct and actual diminution
|
|
of their willingness to speak, publish and associate freely and openly
|
|
without fear of government intrusion and reprisal.
|
|
79. As a direct result of Defendants' conduct, the Plaintiffs and class
|
|
members have suffered a distinct and actual restriction on their freedom of
|
|
speech, press and association.
|
|
80. As a direct result of the Defendants' conduct, the Plaintiffs have
|
|
suffered actual damages, attorneys' fees, and costs.
|
|
|
|
VII. THIRD CLAIM - FOURTH AMENDMENT
|
|
(FREEDOM FROM UNREASONABLE SEARCHES AND SEIZURES)
|
|
81. The allegations in paragraphs 1-80 are incorporated herein by
|
|
reference.
|
|
82. The Plaintiffs and class members had a reasonable expectation of
|
|
privacy in their private electronic communications and subscriber records
|
|
resident on the Cincinnati Computer Connection BBS.
|
|
83. The Defendants' actions violated the Plaintiffs' and class members'
|
|
clearly established right to be free from unreasonable searches and
|
|
seizures as guaranteed by the Fourth Amendment and Fourteenth Amendments to
|
|
the United States Constitution and 42 U.S.C. 1983.
|
|
84. The search and seizure at the location of the Cincinnati Computer
|
|
Connection BBS was a illegal and unwarranted general search.
|
|
85. The search and seizure of the Cincinnati Computer Connection BBS
|
|
was not authorized by a valid warrant particularly describing the place to
|
|
be searched and the things to be seized.
|
|
86. The search warrant did not authorize the seizure of the Cincinnati
|
|
Computer Connection BBS or any of its contents, including the Plaintiffs'
|
|
and class members' private electronic communications and subscriber
|
|
records.
|
|
87. The search warrant failed to establish probable cause to believe
|
|
that any of the Plaintiffs' or the class members' private electronic
|
|
communications was relevant to a legitimate law enforcement inquiry.
|
|
88. The search warrant failed to establish probable cause to believe
|
|
that the Plaintiffs' and class members' private electronic communications
|
|
contained evidence of the offense listed in the search warrant, or any
|
|
offense, for that matter.
|
|
89. The Defendants knew, or reasonably should have known, that their
|
|
conduct violated the Plaintiffs' and class members' clearly established
|
|
constitutional right to be free from unreasonable searches and seizures.
|
|
90. The Defendants acted with intent to violate, or with reckless
|
|
indifference to, the Plaintiffs' and class members' clearly established
|
|
Fourth Amendment rights.
|
|
91. At all times relevant herein, Defendants were acting under color of
|
|
state law.
|
|
92. As a direct result of the Defendants' conduct, the Plaintiffs have
|
|
suffered actual damages, attorneys' fees, and costs.
|
|
|
|
VIII. FOURTH CLAIM - OHIO CONSTITUTION ARTICLE I, SECTION 11
|
|
(FREEDOM FROM UNREASONABLE SEARCHES AND SEIZURES)
|
|
93. The allegations in paragraphs 1-92 are incorporated herein by
|
|
reference.
|
|
94. In the same manner that the Defendants' actions violated the
|
|
Plaintiffs and the class members' rights under the Fourth Amendment, the
|
|
Defendants' acts violated the Plaintiffs' and class members' clearly
|
|
established right to be free from unreasonable searches and seizures
|
|
guaranteed by Article I, Section 11 of the Constitution of the State of
|
|
Ohio.
|
|
95. As a direct result of the Defendants' conduct, the Plaintiffs have
|
|
suffered actual damages, attorneys' fees, and costs.
|
|
|
|
IX. FIFTH CLAIM - ELECTRONIC COMMUNICATIONS PRIVACY ACT
|
|
(UNLAWFUL SEIZURE OF STORED COMMUNICATIONS,18 U.S.C. 2703 (a) & (b))
|
|
96. The allegations in paragraphs 1-95 are incorporated herein by
|
|
reference.
|
|
97. At all relevant times, Mr. Emerson and the Cincinnati Computer
|
|
Connection were the providers of an electronic communication service within
|
|
the meaning of 18 U.S.C. 2510(15) and 2707.
|
|
98. At all relevant times, Mr. Emerson and the Cincinnati Computer
|
|
Connection were the providers of a remote computing service within the
|
|
meaning of 18 U.S.C. 2711(2).
|
|
99. At all relevant times, Plaintiffs and the class members were
|
|
subscribers to, users of, or customers of the electronic communication
|
|
service and remote computing service provided by Mr. Emerson and the
|
|
Cincinnati Computer Connection, within the meaning of 18 U.S.C. 2510
|
|
and 2707.
|
|
100. At all relevant times, Plaintiffs and some or all of the class
|
|
members had electronic communications in electronic storage on the
|
|
Cincinnati Computer Connection that were not accessible to the general
|
|
public.
|
|
101. Upon information and belief, when Defendants applied for a warrant
|
|
to search and seize the computer operating the Cincinnati Computer
|
|
Connection BBS and all data stored thereon, they failed to inform the
|
|
issuing Judge that the computer contained stored electronic communications
|
|
that were not accessible to the general public and that were protected by
|
|
18 U.S.C. 2501, et seq. and 18 U.S.C. 2701, et seq.
|
|
102. The search warrant obtained by Defendants failed to state or be
|
|
supported by any probable cause to believe that the Plaintiffs or class
|
|
members' private electronic communications constituted evidence of any
|
|
offense named in the warrant, or any criminal offense whatsoever.
|
|
103. The search warrant obtained by Defendants failed to state, or be
|
|
supported by, reason to believe that the Plaintiffs or class members'
|
|
private electronic communications were relevant to a legitimate law
|
|
enforcement inquiry, in violation of 18 U.S.C. 2703(d).
|
|
104. Defendants, acting without a valid warrant, and without a court
|
|
order, subpoena or consent of the Plaintiffs or class members, and without
|
|
providing prior notice of their intentions, required Mr. Emerson and the
|
|
Cincinnati Computer Connection to disclose the contents of electronic
|
|
communications that were not accessible to the general public, in violation
|
|
of 18 U.S.C. 2703(a) & (b).
|
|
105. At all times relevant herein, Defendants were acting under color of
|
|
state law.
|
|
106. At all times relevant herein, Defendants acted knowingly and
|
|
intentionally.
|
|
107. At all times relevant herein, Defendants did not act in good faith.
|
|
108. As a direct result of the Defendants' conduct, the Plaintiffs have
|
|
suffered actual damages, attorneys' fees, and costs.
|
|
|
|
X. SIXTH CLAIM - ELECTRONIC COMMUNICATIONS PRIVACY ACT
|
|
(UNLAWFUL SEIZURE OF SUBSCRIBER RECORDS, 18 U.S.C. 2703)
|
|
109. The allegations in paragraphs 1-108 are incorporated herein by
|
|
reference.
|
|
110. At all relevant times, Mr. Emerson and the Cincinnati Computer
|
|
Connection had in electronic and hard-copy storage records and other
|
|
information pertaining to the Plaintiffs and the class members, within the
|
|
meaning of 18 U.S.C. 2703(c).
|
|
111. The search warrant obtained by Defendants failed to state or be
|
|
supported by any probable cause to believe that the Plaintiffs or class
|
|
members' subscriber records constituted evidence of any offense named in
|
|
the warrant, or any criminal offense whatsoever.
|
|
112. The search warrant obtained by Defendants failed to state, or be
|
|
supported by, reason to believe that the Plaintiffs or class members'
|
|
subscription records were relevant to a legitimate law enforcement inquiry,
|
|
in violation of 18 U.S.C. 2703(d).
|
|
113. Defendants, acting without a valid warrant, and without a subpoena,
|
|
court order or consent of the subscribers or customers, required Mr.
|
|
Emerson and the Cincinnati Computer Connection to disclose subscriber
|
|
records and information to the government, in violation of 18 U.S.C.
|
|
2703(c).
|
|
114. At all times relevant herein, Defendants were acting under color of
|
|
state law.
|
|
115. At all times relevant herein, Defendants acted knowingly and
|
|
intentionally.
|
|
116. At all times relevant herein, Defendants did not act in good faith.
|
|
117. As a direct result of the Defendants' conduct, the Plaintiffs have
|
|
suffered actual damages, attorneys' fees, and costs.
|
|
|
|
|
|
|
|
XI. SEVENTH CLAIM - ELECTRONIC COMMUNICATIONS PRIVACY ACT
|
|
(UNLAWFUL INTERCEPTION OF ELECTRONIC COMMUNICATIONS, U.S.C. 2511 et seq.)
|
|
118. The allegations in paragraphs 1-117 are incorporated herein by
|
|
reference.
|
|
119. At all relevant times, Plaintiffs and/or some or all of the class
|
|
members had electronic communications in transit on the Cincinnati Computer
|
|
Connection that were not accessible to the general public. Such
|
|
communications had been written, addressed, and sent, but not yet received
|
|
and read by the addressees.
|
|
120. Defendants intercepted, disclosed, or intentionally used such
|
|
electronic communications, without the consent of the Plaintiffs or the
|
|
class members, in violation of 18 U.S.C. 2510 et seq. and 2520.
|
|
121. Defendants intentionally intercepted, endeavored to intercept, or
|
|
procured others to intercept or endeavor to intercept, the Plaintiffs'
|
|
and/or class members' electronic communications, without the consent of the
|
|
Plaintiffs or the class members, in violation of 18 U.S.C. 2511(1)(a).
|
|
122. The warrant application was not authorized by the appropriate
|
|
federal or state law enforcement officials as required by 18 U.S.C. 2516.
|
|
123. The Defendants did not comply with the standards and procedures
|
|
prescribed in 18 U.S.C. 2518, or any procedures provided under state law
|
|
for the interception of electronic communications.
|
|
124. At all times relevant herein, Defendants were acting under color of
|
|
state law.
|
|
125. At all times relevant herein, Defendants acted knowingly and
|
|
intentionally.
|
|
126. At all times relevant herein, Defendants did not act in good faith.
|
|
127. As a direct result of the Defendants' conduct, the Plaintiffs have
|
|
suffered actual damages, attorneys' fees, and costs.
|
|
|
|
XII. EIGHTH CLAIM - COMMON LAW INVASION OF PRIVACY
|
|
128. The allegations in paragraphs 1-127 are incorporated herein by
|
|
reference.
|
|
129. The Defendants intercepted and seized, without legal justification
|
|
or right, the Plaintiffs' private electronic communications. Upon
|
|
information and belief, the Defendants reviewed and read some or all of
|
|
these private communications. The Defendants have failed and refused to
|
|
return any such private communications, and have failed to provide for the
|
|
delivery to the intended recipients of the electronic communications they
|
|
unlawfully seized.
|
|
130. The Defendants' acts constitute an invasion of the Plaintiffs' and
|
|
class members' privacy by intruding upon their seclusion.
|
|
131. At all times relevant herein, Defendants were acting under color of
|
|
state law.
|
|
132. At all times relevant herein, Defendants acted knowingly and
|
|
intentionally.
|
|
133. At all times relevant herein, Defendants did not act in good faith.
|
|
134. As a direct result of Defendants' conduct, Plaintiffs and the class
|
|
members suffered damages, attorneys' fees and costs.
|
|
|
|
|
|
XIII. DAMAGES
|
|
135. The allegations in paragraphs 1-134 are incorporated herein by
|
|
reference.
|
|
136. On account of the Defendants' actions and violations of their
|
|
rights as set forth above, the Plaintiffs and class members have suffered
|
|
actual damages and incurred attorney's fees and costs.
|
|
137. Plaintiffs are entitled to recover their damages, attorney's fees
|
|
and costs, liquidated damages as provided by statute, and punitive damages.
|
|
|
|
XIV. PRAYER FOR RELIEF
|
|
|
|
WHEREFORE Plaintiffs request that this Court:
|
|
A. Assume jurisdiction of this action;
|
|
B. Certify this lawsuit as a class action on behalf of the class as
|
|
defined above;
|
|
C. Declare that Defendants' actions violate the Constitution and Laws
|
|
of the United States and the Constitution and Laws of the State of Ohio;
|
|
D. Enter judgment against the Defendants and in favor of the
|
|
Plaintiffs and class members;
|
|
E. Enter an injunction ordering the Defendants to return all
|
|
electronic communications and subscriber records seized from the premises
|
|
of the Cincinnati Computer Connection, all copies and print-outs of such
|
|
data, and all computer files necessary to read and interpret such records;
|
|
46. Award the Plaintiffs and the class members their actual, liquidated
|
|
and punitive damages;
|
|
G. Award the Plaintiffs and each class member $1,000 statutory damages
|
|
per violation of their rights guaranteed under 18 U.S.C. 2703, et seq., or
|
|
their actual damages, whichever is greater, as provided in 18 U.S.C.
|
|
2707(c);
|
|
H. Award the Plaintiffs and each class member $10,000 statutory
|
|
damages per violation of their rights guaranteed under 18 U.S.C. 2511, et
|
|
seq., or their actual damages, whichever is greater, as provided in 18
|
|
U.S.C. 2520(c)(2)(B), plus punitive damages, as provided in 18 U.S.C.
|
|
2520(b)(2);
|
|
I. Award Plaintiffs all costs incurred in the prosecution of this
|
|
action, including reasonable attorney's fees under 42 U.S.C. 1988 and
|
|
other statutes; and
|
|
J. Enter such other and further relief as the Court deems just and
|
|
proper.
|
|
|
|
|
|
|
|
|
|
|
|
Scott T. Greenwood (0042558) Peter D. Kennedy
|
|
Trial Attorney for Plaintiffs (Texas Bar No. 11296650)
|
|
2301 Carew Tower Attorney for Plaintiffs
|
|
441 Vine Street 114 W. 7th Street, Suite 1000
|
|
Cincinnati, Ohio 45202 Austin, Texas 78701
|
|
(513) 684-0101 (512) 495-1400
|
|
(513) 684-0077 fax (512) 499-0094 fax
|
|
Internet: stgrnwd@iac.net Internet: pkennedy@io.com
|
|
|
|
Of Counsel:
|
|
|
|
GREENWOOD & ASSOCIATES
|
|
2301 Carew Tower
|
|
441 Vine Street
|
|
Cincinnati, Ohio 45202
|
|
(513) 684-0101
|
|
|
|
George, Donaldson & Ford
|
|
1000 Norwood Tower
|
|
114 W. 7th Street
|
|
Austin, Texas 78701
|
|
(512) 495-1400
|
|
|
|
|
|
DEMAND FOR TRIAL BY JURY
|
|
Pursuant to Rule 38(b) of the Federal Rules of Civil Procedure, Plaintiffs,
|
|
individually and on behalf of a class of others similarly situated, hereby
|
|
demand a jury trial on all issues so triable.
|
|
|
|
|
|
|
|
|
|
Scott T. Greenwood (0042558)
|
|
Trial Attorney for Plaintiffs
|
|
|
|
|
|
Scott T. Greenwood Attorney
|
|
stgrnwd@iac.net Greenwood & Associates
|
|
(513) 684-0101 (voice) 2301 Carew Tower, 441 Vine Street
|
|
(513) 684-0077 (fax) Cincinnati, Ohio 45202
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 19 Apr 1995 22:51:01 CDT
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 3--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CUDIGEST
|
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|
In ITALY: Bits against the Empire BBS: +39-464-435189
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu:80/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #7.66
|
|
************************************
|
|
|