home *** CD-ROM | disk | FTP | other *** search
Text File | 1992-07-14 | 56.1 KB | 1,194 lines | [TEXT/EDIT] |
-
-
-
- THE ELECTRONIC PAMPHLET--COMPUTER
- BULLETIN BOARDS AND THE LAW
-
-
- Submitted in Partial Fulfillment
- Of the Requirements of
- Mass Communications
-
- by
- Michael H. Riddle
- 72446.3241@compuserve.com
- Sysop on 1:285/27@fidonet
-
-
- (c) Copyright 1990, by Michael H. Riddle. All Rights Reserved.
- This paper may be freely distributed via electronic media
- provided that the entire text remains intact, including this
- first page,notice, and disclaimer, and further provided that
- full credit is given.
-
- DISCLAIMER: This paper was prepared by a law student as part
- of a course of study, and should not be construed to represent a
- legal opinion. Anyone with a need for a current legal opinion
- relating to this material should contact an attorney licensed
- to practice in their state.
- ---
-
-
-
- THE ELECTRONIC PAMPHLET--COMPUTER
- BULLETIN BOARDS AND THE LAW
-
-
- Introduction--Bulletin Boards Then and Now
-
- In 1517, Martin Luther nailed his 95 theses to the door
- of the church in Wittenberg, Germany, an act which is gener-
- ally considered the start of the Reformation, the Protestant
- religious movement (Protesting aspects of the Catholic
- church as it then existed). [FN1] The author remembers how
- outrageous it seemed to him, the first time he heard the
- story, that anyone would have the effrontery to nail even
- one, let alone 95, documents to a church door. It was only
- later, after much study of history and theology, that he
- came to learn that the church door was routinely used for
- this purpose. At a time before widespread publication of
- newspapers, before telegraph, telephone, television, or CB
- radio, the church door was the acknowledged location for
- important notes or topics of discussion. [FN2]
-
- Students at the University of Nebraska College of Law
- use the "kiosk" inside the main entrance to the college to
- pass notes to each other. Hexagonal in shape, one side of
- the kiosk is reserved for general announcements and bulle-
- tins. Sometimes the postings are as routine as announcement
- of a meeting; at other times, they might be a call to action
- to save the trees in a local park from the bulldozer.
- Students are cautioned, during their first formal orienta-
- tion at the College, to check the kiosk daily. [FN3]
-
- Just inside the door at Baker's Supermarket in LaVista,
- Nebraska, is a board where customers (and presumably others)
- may post notes about items for sale, offers of employment,
- and the like. Similar boards are found in other locations
- around town, provided either as a public service by a busi-
- ness, or perhaps as yet another advertising "gimmick,"
- another way of increasing business at the store. [FN4]
-
- During the Revolution, and when the Founding
- Fathers [FN5] wrote the Constitution and the Bill of
- Rights, similar functions were often fulfilled by "pamphle-
- teers." Anyone with an idea and a little loose change could
- buy or borrow a printing press, and soon be distributing
- their ideas around the town. [FN6]
-
- Today, another forum is increasingly available for
- notices, reminders and discussions--the computer bulletin
- board. [FN7] Listings of items for sale, notices of meet-
- ings, and discussion about matters important or trivial may
- be found in the world of electronics as well as groceries.
- At one time the province of the technically and financially
- gifted, bulletin boards are increasing available to Every-
- man. [FN8] At least one commentator has directly compared
- the bulletin board system of today with the pamphlet of
- yesterday. [FN9]
-
- In the simplest form, a bulletin board is a computer,
- often a small personal computer (PC), connected to a tele-
- phone line by a device called a modem. [FN10] While large
- and expensive systems are possible, a person desiring to
- enter the bulletin board arena may do so for a total invest-
- ment less than $500. [FN11] At the simplest, the bulletin
- board system acts as a "store and forward" system. Individ-
- uals call the BBS one at a time, "log on" (typically using
- some sort of entry code and password protection to insure
- identity), read messages that have been left and post any
- messages they desire. They then log off, and the system is
- available to the next caller. [FN12]
-
- "Networked" systems add an additional step, one which
- greatly expands the nature of the forum. At pre-designated
- times, the BBS scans the messages to see what has been
- posted on the board since the last similar event, and pre-
- pares "mail packets" with those messages. It then calls
- other systems and forwards the packets to those systems,
- receiving in turn any mail designated for it. In this
- manner, messages may be entered in Lincoln or Omaha at no
- expense to the user, and be sent literally around the
- world. [FN13]
-
- Static on the Lines?
-
- While bulletin board systems may facilitate communica-
- tion, they have a potential for misuse as well. Several
- positive benefits of bulletin boards are that users may
- express their opinions on matters of public interest, may
- look for reviews of products they are considering buying,
- and might ask specific questions about any number of mat-
- ters. [FN14] Potential for abuse exists in both civil and
- criminal areas, particularly for defamation (libel or slan-
- der), theft of intellectual property (particularly software
- piracy and copyright violations), and theft (credit card
- abuse, telephone system fraud, and similar actions). [FN15]
- Press coverage of this type of activity inevitably refers to
- the use of bulletin boards, [FN16] and in the public mind
- all bulletin board operators and users become associated
- with "hackers" and "phreakers." [FN17] Recent news events
- covered at some length the "Internet worm" propagated by
- Robert Morris, which brought several national computer
- networks almost to a complete halt. [FN18] The press
- treatment of the event once again tended toward the sensa-
- tional, using what have come to be pejorative terms, such as
- "hacker," "phreaker", and the like. These reports also
- frequently included what could easily interpreted as deroga-
- tory references to bulletinboard systems ingeneral. [FN19] -
-
- The United States Secret Service has been charged with
- enforcement of federal laws relating to computer crime, and
- a recent investigation known as "Sun Devil" has received
- some publicity in the traditional media, and even more in
- the electronic fora. [FN20] In the zealous pursuit of
- their goal to eliminate computer crime, the Secret Service
- is often trampling on toes and arguably chilling the free
- expression of ideas. An example of what can happen occurred
- recently when someone illegally (meaning without authoriza-
- tion) entered a Bellsouth computer and downloaded (arguably
- "stole") documentation about the "E911" enhanced emergency
- communications system. (E911 is the system that calls the
- emergency dispatcher when someone dials 9-1-1 and automati-
- cally displays for the dispatcher the calling number and
- address, and any other information that has previously been
- filed, such as hazardous chemicals, invalids or small chil-
- dren, etc.) One Robert Biggs plead guilty to the actual
- theft, and a Craig Neidorf was charged along with Biggs.
- Neidorf apparently was not charged directly with the theft
- (assuming, arguendo, theft had occurred), but rather with
- publishing the data in an electronic newsletter. Neidorf's
- computer equipment, including that use for a bulletin board
- system, was seized, even though it contained electronic
- mail. [FN21]
-
- The case against Neidorf was suddenly dismissed on the
- fourth day, after it became apparent that nothing of value
- (in the sense that it was already publicly available) had
- been published by Neidorf. [FN22]
-
- Legal Issues Relating to Bulletin Board Systems
-
- Several legal issues remain unresolved, at least as
- they pertain to bulletin board systems. [FN23] This paper
- will survey what appear to be the most obvious ones at the
- moment, briefly review the law as it appears to be on the
- subject, and may occasionally suggest what the author advo-
- cates as the "proper" rule on the issue. Briefly stated,
- the emerging issues appear to be whether bulletin board
- systems are protected by either the Speech or Press Clauses
- of the First Amendment, and to what extent; whether the
- bulletin board system operators are or should be liable for
- illegal or actionable misdeeds of their users; what the
- expected duty of care should be for the system operators as
- a defense to such liability, and what protections might be
- extended to bulletin board systems, directly or indirectly
- through their operators, under the Fourth Amendment. This
- paper will discuss four areas bearing on the legal rights
- and responsibilities of system operators: whether a bulle-
- tin board system is "press" for First Amendment purposes,
- what rules of decision ought to apply for system operator
- liability for defamation originally published by users, what
- other liability might attach for contents of messages on the
- system, and some limited concerns about privacy of electron-
- ic mail vis-a-vis search and seizure rules.
-
- Bulletin Board Systems and the First Amendment
-
- In assessing what vicarious liability, for defamation
- or for illegal or illegally obtained information, system
- operators might have for information posted on their bulle-
- tin boards by users, one is drawn to a comparison with the
- press. While the analogy, like most analogies, breaks down
- at some point, it is still helpful. At least one reported
- decision has held that electronic information storage and
- retrieval systems may in some circumstances be considered
- "press." [FN24]
-
- Access to Information
-
- In Legi-Tech, Inc., v. Keiper, [FN25] a computerized
- legislative information retrieval service was denied access
- to a state-owned computer database of legislative materials.
- In deciding for Legi-Tech, the court treated the service as
- if it were a form of press, in that it existed to collect
- and disseminate information about issues of public impor-
- tance and interest. While Legi-Tech did not directly ad-
- dress a bulletin board system, at least not in the sense
- that the term is generally used, the comparison is clear
- when the bulletin board system contains message areas of
- public discussion in traditional areas of public concern,
- such as government, politics, and laws. At least one com-
- mentator, citing Legi-Tech, has concluded that for some
- purposes [FN26] bulletins boards should be considered
- press. [FN27]
-
- Liability for Defamation
-
- Deciding that a bulletin board system is "press" for
- some purposes begs the question, what does it mean about
- anything? One of the more common concerns among system
- operators appears to be vicarious liability for libels
- published by users. [FN28] While the seminal modern case
- discussing liability of the press for libel, New York Times
- v. Sullivan, [FN29] might suggest a stringent standard for
- press liability, more recent cases call that into question.
- Dun & Bradstreet, Inc. v. Greenmoss Builders, Inc., [FN30]
- might fairly be read to suggest there is no difference, in
- the libel context, between press and non-press, but rather
- the true distinction is between what is and is not a matter
- of public concern worthy of heightened protection. Such an
- interpretation would arguably be consistent with the interim
- case of Robert Welch, Inc., v. Gertz, [FN31] which also
- appeared to rest its holding on a public-private distinc-
- tion.
-
- Assuming, arguendo, that the New York Times v. Sulli-
- van [FN32] decision established a special level of protec-
- tion for the press, then the BBS operator clearly would
- benefit from the extension of such a privilege. At the time
- the message is entered by the user, the operator has no
- knowledge whatsoever of the contents of the message, and
- therefore cannot know it to be false. Later, when the
- operator sees the message, the operator might arguably have
- a duty to remove it if it were blatantly false; otherwise,
- the issue would appear to become when failure to remove or
- challenge a message would be "reckless disregard of whether
- it was false or not." [FN33] In considering the question,
- one might expect normally to find dispositive the holding in
- St. Amant v. Thompson [FN34] that failure to investigate,
- without more, could not establish reckless disregard for the
- truth. [FN35]
-
- The astute reader recognizes, of course, that the New
- York Times holding concerned statements about public offi-
- cials. The commentary found on bulletin boards certainly
- talks about politics and public officials. [FN36] The
- question remains, however, about private parties. Robert
- Welch, Inc., v. Gertz [FN37] is generally cited as the
- decision next addressing the subject. In Gertz, an attorney
- had representing police officer's family in a murder inves-
- tigation. The defendant made false statements about the
- attorney in its monthly publication American Opinion. The
- judge having ruled the attorney was not a public figure, the
- jury returned a plaintiff's verdict for $50,000. The trial
- judge later reconsidered his ruling, and entered a judgment
- not withstanding the verdict on the theory that a discussion
- about a matter of public concern deserved protection. The
- issue on appeal appeared to be whether the attorney was a
- public figure, not whether the issue was of public concern.
- The Court ruled that the fact he was not a public figure
- controlled. He had not "thrust himself into the vortex of
- this public issue, nor did he engage the public's attention
- in an attempt to influence the outcome." The Court then held
- that as long as liability was not imposed without some basis
- of fault, the states could write their own rules for "pri-
- vate" libels. [FN38]
-
- If New York Times [FN39] established a new standard of
- "malice" for press publishing on public matters, and
- Gertz [FN40] refused to extend that standard to private
- parties, even when matters of public concern might be at
- stake, then what about Dun & Bradstreet? [FN41] Dun &
- Bradstreet, a private credit-reporting firm, published false
- information about Greenmoss Builders, suggesting Greenmoss
- had filed bankruptcy when in fact it was an Greenmoss em-
- ployee who had filed. The Vermont Supreme Court found Gertz
- inapplicable to nonmedia defamation actions, and sustained
- damages to Greenmoss. The Supreme Court affirmed, but on a
- different basis not involving a distinction between media
- and nonmedia. The plurality opinion suggested that the
- crucial distinction was whether the speech involved a "pub-
- lic issue," "public speech," or an "issue of public con-
- cern." While Gertz did not clearly draw the distinction, it
- was clear to the plurality from the facts of Gertz that such
- a limitation was implied. [FN42]
-
- As applied to bulletin board systems, it would appear
- then that if the BBS is press, New York Times malice would
- be the rule for defamation involving public issues or public
- officials. As long as the defamation was by one user about
- another user, the defamed party could be held to have delib-
- erately "thrust himself into the vortex of this public
- issue" in an "attempt to influence the outcome." [FN43]
- That the issue was of public concern [FN44] could fairly be
- implied from the fact of discussion on a public message
- base, subject to rebuttal. Of course, the possibility
- always exists that a user inserted a defamatory statement
- into a void, [FN45] in which case the system operator would
- arguably at least have a duty to remove the offending state-
- ment, absent a privilege to republish. [FN46]
-
- One of the difficulties in discussing the defamation
- issue lies in distinguishing the system operator as "vic-
- tim," i.e., the innocent republisher of a defamation, from
- the system operator as initial defamer. The operator may
- be, but usually is not, the original publisher of an alleged
- defamation. [FN47] The system operator is more generally a
- republisher of information and, like the bookseller in Smith
- v. California, [FN48] may not fairly be held to know in
- advance the contents of messages left on the bulletin board,
- let alone whether they are true or false. [FN49] In Smith,
- the issue was whether the bookseller, absent knowledge of
- the contents, could be held liable for obscene material in
- his store. The Court held that he could not. "Every book-
- seller would be placed under an obligation to make himself
- aware of the contents of every book in his shop. It would
- be altogether unreasonable to demand so near an approach to
- omniscience...." [FN50] One must be careful, however, when
- discussing the impact of Smith. At least one commentator
- has suggested that the typical application of Smith is that,
- in the totality of the circumstances surrounding an "adult"
- bookstore, the bookseller can be inferred to know the con-
- tents of his merchandise. [FN51] One could suggest that
- the factual situation would be critical in the context of a
- bulletin board system.
-
- In manner similar to the Smith bookseller, the system
- operator is not aware of the contents of a message at the
- moment it is posted. While most system operators review the
- contents of most messages left on their bulletin boards most
- of the time, it is not always practical to do so, and to the
- extent that the discussion centers on issues of obvious
- public importance, such prescreening implicates serious
- First Amendment concerns regarding censorship and chilling
- debate on issues of public importance. [FN52]
-
- While it is not reasonable to expect system operators
- to be aware of the contents of every message, particularly
- as it is posted, the question still remains of what duty
- they owe once they become aware of an offending message.
- Courts interpreting Smith [FN53] generally have applied
- some element of scienter. Once system operators are aware
- that offending messages have been posted on the board, they
- arguably have a duty to remove the message. [FN54] Proof
- of scienter might arguably be shown by the totality of the
- circumstances surrounding the operation, such as limited
- access, extensive password protection, or previous pattern
- of abuse. [FN55]
-
- Such a pattern might be shown if a bulletin board
- system has, for example, 16 message areas, 15 of which are
- generally available to the public at large, but one of which
- is "hidden" and available only to close friends and associ-
- ates of the system operator. Such a restricted sub-area
- ("sub"), if used for questionable activities, might more
- easily be distinguishable from the generally accessible
- subs. The operator, by exercising the control necessary to
- keep the sub restricted and to grant access to the "chosen
- few," could arguably be inferred to have personal knowledge
- of the questionable activities. [FN56]
-
- A question also arises about whether the system opera-
- tors might be able to claim a privilege of republication.
- The primary privilege normally mentioned in bulletin board
- circles is that of the common carrier. The Restatement
- (Second) of Torts acknowledges a privilege for a common
- carrier to republish a defamation if the "public utility
- [is] under a duty to transmit messages...." [FN57] A
- careful examination suggests that a common carrier privi-
- lege, however, is neither warranted nor wise. In National
- Ass'n of Reg. Util. Comm'rs v. F.C.C., [FN58] the court
- formulated a two-part test that would appear to apply to
- bulletin boards and one which they could arguably pass. The
- case involved cable television. The coaxial cable installed
- for distribution of cable television is capable of carrying
- signals in the reverse direction. FCC regulations required
- such a reverse channel to be available. The FCC originally
- had not completely foreclosed state and local regulation of
- the reverse channel. When it acted to preempt such regula-
- tion, the plaintiffs in this action sued to void the preemp-
- tion. The court ruled that the reverse channel was an
- intrastate common carrier, holding that to be a common
- carrier an entity must first provide indifferent service to
- all who request it. Many bulletin board systems will nor-
- mally accept as a user anyone who applies, and many more
- accept anyone who applies whose registration information is
- not facially false; e.g., anyone who might provide a name
- listed in the applicable telephone directory at the number
- provided. Second, the system must be such that the custom-
- ers can transmit information of their own choice. In the
- case of the bulletin board system, by definition the infor-
- mation is of the customer's own choice. The difficulty with
- this approach, probably fatal if ever adjudicated, is that
- no one has yet suggested a duty of bulletin board operators
- to transmit any or all messages submitted to them, or even
- to open their boards to the public. [FN59] Most bulletin
- board systems, after all, are run as a hobby at a
- loss. [FN60] It would be an absurd result to decide that
- merely by operating a bulletin board system as a hobby, that
- an operator mustprovide service to anyonewho asked. [FN61] -
- Additionally, most system operators reserve the right to
- edit or delete questionable messages, an action certainly
- incompatible with the requirement that on a common carrier,
- the information be of the customer's own choice. [FN62]
- (Such a reservation of rights, however, is entirely consis-
- tent with the editorial discretion inherent in a Press
- Clause model, as is the discretion concerning which few
- echoes or message areas, out of the extensive possibilities,
- should be carried on the system. [FN63] ) In addition, the
- bulletin board is not a common carrier as that term has been
- interpreted by the FCC, and the courts will normally give
- "great deference" to the interpretation given by the admin-
- istrative agency. [FN64] The Federal Communications Com-
- mission is authorized to regulate interstate commerce by
- wire or radio. [FN65] Since bulletin board systems operate
- by connection to the interstate telephone system, and since
- many of them actually are connected [FN66] to an interstate
- network of computerized bulletin board systems, and since it
- seems well-settled that the term "interstate commerce" has
- an extremely broad meaning, then it would follow that the
- FCC could assert jurisdiction. While it would logically
- follow, it seems to this author that it would exceed the
- probable intent of the Congress which enacted the Communi-
- cations Act of 1934. [FN67]
-
- The FCC appears to agree with the author. In response
- to the "increasing complexity and overlap of communications
- systems in the 1970s," [FN68] the FCC conducted a series of
- hearings which has become known as the Second Computer
- Inquiry. [FN69] The Commission distinguished between
- "basic" and "enhanced" services. Basic services act as a
- pipe for information without significantly altering it--a
- transparent path. Enhanced services combine basic service
- with some sort of processing. The Commission retained its
- traditional jurisdiction over basic services, but left
- enhanced services essentially unregulated. Computerized
- bulletin board services were specifically mentioned as
- enhanced services. [FN70]
-
- If it seems likely that bulletin board systems are not
- common carriers, it also seems wise. We saw in the discus-
- sion of defamation, supra, that bulletin boards might argu-
- ably be characterized as press. While the discussion was
- based on access to information, it was noted that a logical
- extension could be made. One such likely extension is to a
- privilege of republication. In 1977, the United States
- Supreme Court denied certiorari to Edwards v. National
- Audubon Society, Inc. [FN71] In Edwards, the editor of an
- Audubon Society magazine characterized scientists using
- Society data to support the continued use of the pesticide
- DDT as "paid liars." [FN72] The New York Times accurately
- reported the charges. Five scientists sued both Audubon
- Society and the Times. The Second Circuit dismissed the
- judgment against the Times, finding a privilege of neutral
- reporting essential to the operation of the Press Clause of
- the First Amendment. [FN73] While the precedential value
- of "cert. denied" is of uncertain value, the decision stands
- in the Second Circuit. The courts are split about whether
- the "neutral reporting" privilege is valid. [FN74] Many
- have accepted it and many have refused to accept it. [FN75]
- If there is any validity to it, however, it should apply to
- bulletin boards. The editors of the New York Times, after
- all, had the option (editorial discretion) not to publish.
- In contrast, inherent in the nature of the bulletin board is
- immediate republication. The operator may only, once he
- becomes aware of the libel, remove it. No editorial choice
- is exercised immediately, and in the case of networked
- systems, an intervening mail event will cause the question-
- able matter to be republished widely before the system
- operator has the reasonable opportunity to take any action.
- At least to the extent that bulletin board systems facili-
- tate discussion of matters of public importance, and at
- least to the extent that the Edwards privilege is ever
- valid, the neutral (fair) reporting privilege should apply
- to bulletin boards. [FN76] This application of the
- neutral/fair reporting privilege would, it seems to the
- author, be a better solution to the problem of republication
- than common carrier recognition, as it would leave the
- system operator with the independence and discretion implic-
- it in a hobby. [FN77]
-
- Civil and Criminal Liability for Contents of Messages
-
- In a similar manner, system operators have been charged
- with various criminal violations based on the contents of
- messages left on their bulletin boards. [FN78] One of the
- earliest reported cases involved a Mr. Tcimpidis, who was
- charged solely because of information posted on his bulletin
- board containing stolen telephone credit card numbers. The
- exact basis of the charge is missing from the reviews;
- however, one can surmise that it was for aiding and abetting
- or some similar theory, in that charges were later dropped
- for lack of evidence of knowledge or intent. [FN79] Re-
- cently, the "Sun Devil" investigation by the United States
- Secret Service has resulted in the seizure of computer
- equipment and at least the temporary cessation of activities
- at several bulletin board systems. Boards operated by Mr.
- Craig Neidorf and one outside Chicago, called "JOLNET" have,
- for example, ceased operations. The JOLNET operator, a Mr.
- Rich Andrews, initiated contact with the Secret Service when
- he became aware of potentially illegal activity on his
- board. Notwithstanding 18 U.S.C. 2703 et seq., which
- appear to prefer solicitation of archival copies and backup
- records of such systems, the Secret Service seized the
- actual computer equipment as evidence, shutting down the
- system. [FN80]
-
- Such seizures would appear to be troublesome to the
- extent that a bulletin board system may fairly be said to be
- some kind of a forum provided for the public discussion of
- matters of importance. [FN81] One cannot foresee a more
- "chilling" effect on free speech than to be frozen to death-
- -or shut down by seizure.
-
- Privacy Concerns and the Fourth Amendment
-
- The discussion above briefly mentioned that some bulle-
- tin board systems had been seized, apparently without regard
- to the presence of electronic mail. While search and sei-
- zure and privacy issues are not directly pertinent to a
- paper on mass communications law, they seem to the author to
- be inextricably combined in any discussion of bulletin
- boards. Virtually every bulletin board system provides
- facilities forsome sort ofprivate, electronic mail. [FN82] -
- One case in California involved a foundation known as
- ALCOR, which practiced cryogenic preservation of people who
- died from what they hoped would, in the future, be a treat-
- able disease. ALCOR came under investigation on charges
- they had preserved some people a little hastily, essentially
- a charge of some kind of homicide. While no serious commen-
- tator has suggested that the case should not have been
- investigated, the problem appears to be that the founda-
- tion's electronic mail system was seized with undelivered
- mail still in storage. The system was apparently accessible
- to the public. [FN83] ALCOR sued under 42 U.S.C. 1983
- for the return of the system and damages, alleging, inter
- alia, that the government violated the provisions of the
- Electronic Communication Privacy Act of 1986 (ECPA). [FN84]
- A decision has not yet been reached in the case.
-
- The only other known action involving the privacy
- provisions of the ECPA is Thompson v. Predaina. [FN85] A
- user accused a system operator, inter alia, of causing
- private messages to be made public without the permission of
- the sender or intended recipient, thereby violating the act.
- The complaint was voluntarily dismissed prior to trial on
- the merits. Predaina would have been an ideal opportunity
- for judicial construction of the latest Congressional at-
- tempt to define the privacy protections of the electronic
- world.
-
- As the technological complexity of society increasingly
- draws us into the electronic world, privacy issues become of
- more concern to more people. The responsibilities and duty
- of care of a system operator to the users of the system,
- regarding whatever reasonable expectation of privacy they
- may have, would seem to be something each system operator
- would want to know. Experience in both this class and in
- the real world tells the prudent observer of the legal scene
- that Congress passing an Act is but the first step in an
- area filled with First and Fourth Amendment concerns. It
- would have been helpful for a judicial construction of the
- ECPA, but that will of necessity wait for another time.
-
- There is, from empirical data, [FN86] a connec-
- tion between the earlier discussion of liability for defama-
- tion and illegal activities and liability for privacy. Many
-
- From kadie Sat Oct 12 09:51:10 1991
- To: cafb-mail
- ~Subject: Computers and Academic Freedom mailing list (batch edition)
- Status: R
-
-
- Computers and Academic Freedom mailing list (batch edition)
- Sat Oct 12 09:50:57 EDT 1991
-
- [For information on how to get a much smaller edited version of the
- list, send email to archive-server@eff.org. Include the line:
- send acad-freedom caf
- - Carl ]
-
- In this issue:
-
- :
-
- The addresses for the list are now:
- comp-academic-freedom-talk@eff.org - for contributions to the list
- or caf-talk@eff.org
- listserv@eff.org - for automated additions/deletions
- (send email with the line "help" for details.)
- caf-talk-request@eff.org - for administrivia
-
- -------------------
-
- sysops have difficulty in separating the two, and it seems
- that to "normal" sysops "liability is liability." The
- distinction as to the form of the action, and whether it is
- brought by a citizen or the state, either eludes or does not
- concern them.
-
- Conclusion
-
- The ever-increasing rate of change in the world around
- us has eclipsed the state of the law in many ways. As we
- have progressed from Luther's church door, to Paine's pam-
- phlet, to the supermarket bulletin board, and to the comput-
- erized BBS, the lines between mail and press and telephony
- and public and private have often become unclear. The
- application of traditional legal lines of demarcation and
- tests for responsibility for defamation and criminal liabil-
- ity appears unclear as well. The computerized bulletin
- board system has become a fixture in a small but increasing
- segment of our society, and that society needs the legal
- system to sort out the rules so that everyone in it can play
- the game on a level playing field--so that they both know
- what they may reasonably expect of others and what others
- may reasonably expect of them.
-
- [Footnotes -cmk]
-
- FN1. LINDBERG, MARTIN LUTHER: JUSTIFIED BY GRACE 24 (1988)
-
- FN2. Id.
-
- FN3. The author remembers well his orientation at the
- beginning of the fall semester, 1988, and the admonition
- given by (now assistant dean) Anne Lange. His experience
- since then has borne out the wisdom of her words.
-
- FN4. The author sees the board at Baker's all too frequent-
- ly, as his meager income outgoes to the provider of suste-
- nance.
-
- FN5. In the spirit of inclusive language, should one, with
- tongue in cheek, refer to them as the "Precipitating Par-
- ents"? On a more serious note, to make the sentence struc-
- ture as short and direct as possible, and consistent with
- the generally accepted rules of construction for statutes
- and legal texts, we have used the pronouns "he", "his," in
- lieu of "he or she," or "his or hers," etc. Unless the
- context clearly indicates otherwise, masculine pronouns
- should be read as inclusive.
-
- FN6. Pamphleteers were pervasive and almost certainly
- within the intended coverage of the First Amendment's Press
- Clause. Lange, The Speech and Debate Clauses, 23 U.C.L.A.
- L. REV. 77, 106 (1975).
-
- FN7. The terminology is far from standardized in discussing
- computer bulletin board systems. The author, in researching
- this paper and in general experience, has experienced com-
- puter bulletin board systems (CBBS), remote bulletin board
- system (RBBS), electronic bulletin board system, and just
- "bulletin board system: (BBS). For simplicity, this paper
- will use bulletin board, bulletin board system, or BBS as
- the context dictates.
-
- FN8. A 1985 law review article cited sources indicating
- there were some 1500 active bulletin board systems in the
- United States as of 1984; however, the authors indicated
- some skepticism as the source cited 15 in the Denver area
- and they personally knew of 50-60. Soma, Smith & Sprague,
- Legal Analysis of Electronic Bulletin Board Activities, 7 W.
- NEW ENG. L. REV. 571, 572 n. 3 (1985). Another article
- suggests the number is between 1000 and 5000. Note, Comput-
- er Bulletin Board Operator Liability for User Misuse, 54
- FORDHAM L. REV. 439, 441 n. 12 (1985). The author is cur-
- rently system operator ("sysop") of an bulletin board system
- affiliated with networks known as "Fidonet," "Metronet," and
- "OPCN." The current combined "nodelists," or addressing
- information, list over 8500 independent bulletin boards
- worldwide. Nodelist 222, Fidonet, available electronically
- and from the author. In addition, several large commercial
- networks exist. While it is apparently difficult to obtain
- information about their subscriber base, one source lists
- them as CompuServe (500,000 +), Dow Jones/News Retrieval
- (275,000), and GEnie (General Electric Network for Informa-
- tion Exchange) (150,000). Becker, Liability of Computer
- Bulletin Board Operators for Defamation Posted by Others, 22
- CONN. L. REV. 203, 204 n. 4 (1989).
-
- FN9. Dembart, The Law Versus Computers: A Confounding
- Terminal Case, L.A. Times, Aug. 11, 1985, at 3, col. 1.
-
- FN10. "Modem" is a contraction of two terms, modulator and
- demodulator, referring to two separate processes that must
- occur to transmit computerized information over telephone
- lines. At the present time, the modem is normally either a
- small box set next to the computer and connected by cables,
- or a small printed circuit card physically installed inside
- the PC. In either instance the modem must be connected to
- the telephone system for the bulletin board to operate.
- Kahn, Defamation Liability of Computerized Bulletin Board
- Operators and Problems of Proof 6 (1989) (electronically
- distributed, available from the author of this paper).
-
- FN11. Becker, supra n. 8 at 203 n. 2.
-
- FN12. Becker, supra n. 8. See also, Soma, Smith and
- Sprague, supra n. 8.
-
- FN13. Attached to this paper are a partial current combined
- system list for FidoNet, MetroNet and OPCN, and a list of
- "echo" areas, by somewhat cryptic but at the same time
- somewhat understand area "tags," that are available to him
- as a system operator. Also attached is a brief description
- of "echomail," and sample printouts of some recent discus-
- sions. The cost of long distance transmission is usually
- absorbed by the system operator as part of the cost of the
- hobby. Occasional "pooling" arrangements allow for the
- economical transmission between cities (several operators in
- the Omaha area do this, for example).
-
- FN14. Note, FORDHAM L. REV., supra.
-
- FN15. Id.
-
- FN16. Id., at 439, n. 4.
-
- FN17. Soma, Smith and Sprague, Legal Analysis of Electronic
- Bulletin board Activities, 7 W. NEW ENG. L. REV. 571, 572-
- 575 (1985). See also note 19, infra.
-
- FN18. UPI, May 5, 1990, Computer hacker gets probation,
- fine, LEXIS, NEXIS library, Current file.
-
- FN19. Westbrook, User to user: the comms column; Bulletin
- boards helpful for communication, PC User, LEXIS, NEXIS
- library, Current file (1990).
-
- Consider the following equation: Computer + Modem
- = Illegal Activity. This is the basic formula
- used by non-expert TV and radio programme editors
- when examining the subject of data communications
- and it's a view which has been encouraged by a few
- pundits who're only too happy to take money to
- talk about children playing noughts and crosses
- with military computers. This attitude seems to
- be the result of a few celebrated cases where
- illegal activity has been brought to light involv-
- ing a hacker, his computer and a modem. Yet the
- same principle might be applied to all drivers of
- Mk II Jaguars to identify them as getaway drivers
- for bank robbers.
- The suspicion that the modem/computer combination
- can generate is nowhere more apparent than in the
- public view of the bulletin board. To read, see
- or hear the popular media in action, you could be
- forgiven for thinking that bulletin boards are
- used exclusively to disseminate pornography or
- recipes for Molotov cocktails. At the very least,
- such services are seen as havens for spotty,
- adolescent, sex-mad anarchists rather than serious
- computer users.
-
- Id. Westbrook goes on to suggest that bulletin boards have
- valuable uses as sources of information and discussion, but
- that the general public can be forgiven for not realizing
- this, given the nature of press coverage of computer crime.
-
- FN20. In fact, the Internet/Usenet system, with which the
- University of Nebraska is affiliated, carries a "newsgroup"
- somewhat misleadingly labelled the "Computer Underground
- Digest," which devotes a great deal of space to known cur-
- rent investigations and debunking rumors and myths surround-
- ing them. CuD Volumes 1.22 through 1.28, available from the
- author.
-
- FN21. Electronic mail is specially protected by 18 U.S.C.
- 2701 et seq., the Electronic Communications Privacy Act
- of 1986 (ECPA). There is no indication that the officers
- requesting any warrants or the judge or magistrate that
- issued them paid any attention to the requirements of the
- ECPA. See generally, CuD Vol. 1.23, available from the
- author. A limited discussion of electronic mail privacy
- issues as they interact with bulletin board systems will
- follow infra.
-
- FN22. The following electronic note was published in the
- newsgroup comp.dcom.telecom (Telecommunications Digest) on
- Saturday, August 11, 1990. The accompanying header and
- routing control information is deliberately left in place so
- one may get a sense of the complexity and pervasiveness of
- the electronic world:
-
- From comp.dcom.telecom Sat Aug 11 09:47:24 1990
- Path: hoss!maverick.ksu.ksu.edu!ux1.cso.uiuc.edu!
- brutus.cs.uiuc.edu!wuarchive!cs.utexas.edu!mailrus!
- accuvax.nwu.edu!nucsrl!telecom-request
- From: colin@array.uucp (Colin Plumb)
- Newsgroups: comp.dcom.telecom
- Subject: Dial 1-800 ... For Bellsouth `Secrets'
- Message-ID: <10698@accuvax.nwu.edu>
- Date: 10 Aug 90 17:41:07 GMT
- Sender: news@accuvax.nwu.edu
- Organization: Array Systems Computing, Inc., Toronto,
- Ontario, CANADA
- Lines: 71
- Approved: Telecom@eecs.nwu.edu
- X-Submissions-To: telecom@eecs.nwu.edu
- X-Administrivia-To: telecom-request@eecs.nwu.edu
- X-Telecom-Digest: Volume 10, Issue 558, Message 5 of 11
-
-
- {Computerworld}, August 6, 1990, Vol. XXIV, No. 32,
- Page 8.
-
- Dial 1-800...for Bellsouth `Secrets'
-
- BY MICHAEL ALEXANDER
- CW STAFF
- CHICAGO --- The attorney for Craig Neidorf, a 20-year-
- old electronic newsletter editor, said last week that
- he plans to file a civil lawsuit against Bellsouth
- Corp. as a result of the firm's ``irresponsible''
- handling of a case involving the theft of a computer
- text file from the firm.
-
- Federal prosecutors dismissed charges against Neidorf
- four days into the trial, after the prosecution wit-
- nesses conceded in cross-examination that much of the
- information in the text was widely available.
-
- Neidorf, the co-editor of ``Phrack,'' a newsletter for
- computer hackers, was accused by federal authorities of
- conspiring to steal and publish a text file that de-
- tailed the inner workings of Bellsouth's enhanced 911
- emergency telephone system across none states in the
- southeast [CW, July 30].
-
- ``What happened in this case is that the government
- accepted lock, stock, and barrel everything that
- Bellsouth told them without an independent
- assessment.'' said Sheldon Zenner, Neidorf's attorney.
-
- One witness, a Bellsouth service manager, acknowledged
- that detailed information about the inner workings of
- the 911 system could be purchased from Bellsouth for a
- nominal fee using a toll-free telephone number.
-
- A Bellcore security expert who was hired by Bellsouth
- to investigate intrusions into its computer systems
- testified that the theft of the file went unreported
- for nearly a year.
-
- Last week, a Bellsouth spokesman said the firm's secu-
- rity experts delayed reporting the theft because they
- were more intent on monitoring and preventing intru-
- sions into the company's computer systems. ``There are
- only so much resources in the data security arena, and
- we felt that it was more urgent to investigate,'' he
- said.
-
- He also disputed assertions that the document was of
- little value. ``It is extremely proprietary and con-
- tained routing information on 911 calls through our
- none-state [sic -cmk] territory as well as entry points into the
- system,'' he said.
-
- A quick ending:
-
- The case unraveled after Robert Riggs, a prosecution
- witness who had already pleaded guilty for his role in
- the theft of the document, testified that he had acted
- alone and Neidorf had merely agreed to publish the text
- file in ``Phrack.''
-
- Neidorf and his attorney agreed to a pretrial diver-
- sion, a program under which the government voluntarily
- dismisses the indictment but could reinstate it if
- Neidorf commits a similar crime within a year.
-
- The case has stirred up national debate on the rights
- of computer users in the age of electronic information.
- The Electronic Frontier Foundation, a civil liberties
- group set up by Mitch Kapor, founder of Lotus Develop-
- ment Corp., may participate in the filing of a lawsuit
- against Bellsouth, and Terry Gross, an attorney at the
- New York law firm of Rabinowitz Boudin Standard Krinsky
- & Lieberman.
-
- ``The Electronic Frontier Foundation is concerned by
- the
- irresponsibility of Bellsouth of claiming from the
- outset that this was confidential information when it
- should have known that it was not,'' Gross said.
-
- FN23. The unsettled state of the law may be discovered by
- reviewing the current writing on the subject, at least some
- of which is listed in note 28, infra.
-
- FN24. Legi-Tech, Inc., v. Keiper, 766 F.2d 728 (2d Cir.
- 1985).
-
- FN25. Id.
-
- FN26. The narrow holding in Legi-Tech was that an electron-
- ic information and retrieval service is "press" for the
- purpose of access to government information. The commenta-
- tor extends this holding from information retrieval to
- bulletin boards, and suggests that it would extend at least
- as far as defamation actions. He then appears to abandon
- this line, as he reads Dun & Bradstreet, note 30, infra, and
- accompanying text, as negating the need for such a distinc-
- tion.
-
- FN27. Comment, An Electronic Soapbox: Computer Bulletin
- Boards and the First Amendment, 39 FED. COMM. L.J. 217
- (1987) (authored by Eric L. Jensen).
-
- FN28. The Jensen article, supra note 27, for example pays a
- great deal of attention to the libel question. Liability
- for defamation is also discussed in Soma, Smith & Sprague,
- Legal Analysis of Electronic Bulletin Board Activities, 7 W.
- NEW ENG. L. REV. 571 (1985); Becker, The Liability of Com-
- puter Bulletin Board Operators for Defamation Posted by
- Others, 22 CONN. L. REV. 203 (1989); and Comment, Computer
- Bulletin Board Operator Liability for User Misuse, 54
- FORDHAM L. REV. 439 (1985). The subject is frequently
- discussed within the framework of bulletin board systems,
- particularly in those message areas devoted to system opera-
- tors, and at least one paper on the subject is electronical-
- ly distributed: Kahn, Defamation Liability of Computerized
- Bulletin Board Operators and Problems of Proof (1989),
- available by anonymous ftp from the archives of the Internet
- Telecommunications Digest, lcs.mit.edu, directory telecom-
- archives, as sysop.libel.liability. It is also available
- from the author of this paper.
-
- FN29. New York Times v. Sullivan, 376 U.S. 254 (1964).
-
- FN30. Dun & Bradstreet, Inc. v. Greenmoss Builders, Inc.,
- 105 S. Ct. 2939 (1985).
-
- FN31. Robert Welch, Inc., v. Gertz, 418 U.S. 323 (1974).
-
- FN32. 376 U.S. 254 (1964).
-
- FN33. Id.
-
- FN34. 390 U.S. 727 (1968). In St. Amant, a candidate read
- on television statements received from a union official that
- had been made under oath. The court found that the candi-
- date's failure to investigate the statements' truth was not
- reckless disregard for the purpose of "New York Times"
- malice.
-
- FN35. There "must be sufficient evidence to permit the
- conclusion that the defendant in fact entertained serious
- doubts as to the truth of his publication." 390 U.S. 727
- (1968).
-
- FN36. See generally, the samples from the POLITICS and
- SERIOUS SIDE echoes attached at the end of this paper.
-
- FN37. 418 U.S. 323 (1974).
-
- FN38. The case was remanded for retrial, as the jury had
- found liability without fault being established and had
- awarded $50,000 without proof of damages. Id.
-
- FN39. 376 U.S. 254.
-
- FN40. 418 U.S. 323.
-
- FN41. 472 U.S. 749 (1985).
-
- FN42. 472 U.S. 749.
-
- FN43. Gertz.
-
- FN44. Dun & Bradstreet.
-
- FN45. Dare I say, "amorphous void?"
-
- FN46. See generally,the discussionof republication,notes 57
- - 77, infra, and accompanying text.
-
- FN47. See generally, Jensen, supra note 27.
-
- FN48. Smith v. California, 361 U.S. 147 (1959).
-
- FN49. See both Jensen and Soma, supra note 28.
-
- FN50. Smith v. California, 361 U.S. at 153-4.
-
- FN51. Interview with Professor John Snowden, University of
- Nebraska College of Law, August 4, 1990.
-
- FN52. See Comment, Computer Bulletin Board Operator Liabil-
- ity for User Misuse, 54 FORDHAM L. REV. 439, 447-9 (1985).
- Attached at the end of this paper is a sample of the debates
- recently carried in message echoes available in the Omaha
- area.
-
- FN53. Smith v. California, 361 U.S. 147 (1959).
-
- FN54. United States v. Mishkin, 317 F.2d 634 (2d Cir.),
- cert denied, 375 U.S. 827 (1963).
-
- FN55. In Gold v. United States, 378 F.2d 588 (9th Cir.
- 1967), the defendant knew the detailed shipping identifica-
- tion of the parcel in question; in United States v. Mishkin,
- 317 F.2d 634 (2d Cir.), cert denied, 375 U.S. 827 (1963),
- the defendant was held to have scienter of obscene contents
- based on the clandestine nature of the transaction.
-
- FN56. The hypothetical becomes real in the electronic
- world. "Dr. Ripco" operated a bulletin board in Chicago,
- one which included electronic mail (see generally, the
- limited discussion of electronic mail, infra), which in-
- cluded a restricted access sub called "phone phun." The
- Secret Service recently executed a search warrant and seized
- his system in an ongoing investigation, the details of which
- have not yet been released. While Dr. Ripco has not yet
- been charged, he relates the existence of the "phone phun"
- sub was prominent when he was interrogated at the time of
- the search and seizure. CuD, Vol. 1.28 (1990), distributed
- electronically and available from the author. While Dr.
- Ripco's knowledge, if any, was about illegal activities, one
- can easily see a similar argument being made about libel.
- If system operators carefully control access to an area, or
- if the operators frequently participate in the discussion
- where a libel is committed, then activities of the operator
- could lead to a presumption of knowledge of the libel and
- liability at least for failure to promptly remove, absent
- some privilege. See the discussion of a possible Edwards
- privilege, infra.
-
- FN57. RESTATEMENT (SECOND) OF TORTS 612 (1977).
-
- FN58. 533 F.2d 601 (D.C. Cir. 1976).
-
- FN59. See Jensen, supra note 27, at 251.
-
- FN60. See Soma, Smith & Sprague, supra n. 8.
-
- FN61. "The Restatement privilege recognizes `that a [common
- carrier], which with very limited exceptions extends its
- facilities to all users, has exhibited no actual or implied
- "malice" when it merely refuses to censor a particular
- communication.'" 39 FED. COMM. L.J. 217 at 250, n. 173,
- citing Anderson v. New York Telephone Co., 42 A.D.2d 151,
- 345 N.Y.S.2d 745 (1973) (dissenting opinion), rev'd 35
- N.Y.2d 746, 361 N.Y.S.2d 913 (1974) (emphasis added). See
- also note 59, supra.
-
- FN62. 553 F.2d 601.
-
- FN63. See generally, the listing attached to this paper of
- message echo areas available to system operators in the
- Omaha, Nebraska, vicinity.
-
- FN64. Notwithstanding the ultimate holding adverse to the
- FCC, the court in National Ass'n of Reg. Util. Comm'rs v.
- F.C.C. went to some lengths to acknowledge the principle,
- and then to distinguish it on the facts in the case at bar.
- 553 F.2d 601.
-
- FN65. 47 U.S.C. 151 (1982).
-
- FN66. They are connected in the logical sense, if not the
- physical sense, as computer theorists use the terms.
-
- FN67. June 19, 1934, c. 652, 48 Stat. 1064.
-
- FN68. Comment, An Electronic Soapbox: Computer Bulletin
- Boards and the First Amendment, 39 FED. COMM. L.J. 217, 220.
-
- FN69. Second Computer Inquiry, Final Decision, 77 F.C.C.2d
- 384, 47 R.R.2d 669 (1980), reconsidered 84 F.C.C.2d 512, 50
- R.R.2d 629 (1981), aff'd sub nom. Computer and Communica-
- tions Indus. Assn'n v. F.C.C., 693 F.2d 198 (D.C. Cir.
- 1982), cert. den., 461 U.S. 938 (1983).
-
- FN70. "In an enhanced service the content of the informa-
- tion need not be changed and may simply involve subscribed
- interaction with stored information. Many enhanced services
- feature voice or data storage and retrieval applications,
- such as in a 'mail box' service." Id. at 421.
-
- FN71. 556 F.2d 113 (2d Cir. 1977), cert. den. sub nom.
- Edwards v. New York Times Co., 434 U.S. 1002 (1977).
-
- FN72. The pesticide DDT had been criticized as harmful to
- many kinds of wildlife, particularly following the publica-
- tion of Rachel Carson's book Silent Spring. The National
- Audubon Society had for many years conducted periodic bird
- counts. The counts could be interpreted to show that,
- contrary to the anti-DDT concerns, bird life was increasing.
- The Audubon Society felt that statistical reasons, not
- actual wildlife increases, were responsible for the anoma-
- lous count data and opposed the use of its data to support
- DDT. 556 F.2d 113.
-
- FN73. Id.
-
- FN74. Magnetti, "In the End the Truth Will Out" . . . Or
- Will It?, 52 MISS. L. REV. 299, 329-331 (1987).
-
- FN75. Id.
-
- FN76. The privilege of fair reporting, after all, should at
- the minimum include the actual words of the original author,
- nothing more and nothing less being said, which is exactly
- what the bulletin board republishes.
-
- FN77. The question would arise of what judgment was exer-
- cised if anyone could post a message. The judgment arguably
- would in the first instance be the exercise of discretion in
- awarding access to the system. See Soma, Smith & Sprague,
- supra. The final exercise of judgment would be when the
- editor/system operator removed or left in place a potential-
- ly offending message. Removal would be the exercise of
- editorial judgment, leaving in place an exercise of neutral-
- ly reporting what the individual already had said.
-
- FN78. A Mr. Len Rose was recently indicted for the theft of
- American Telephone and Telegraph Company software detailing
- the operation of the "E911" emergency telephone system.
- Several other individuals were charged because the software,
- either without their knowledge, or with their knowledge but
- without their knowing it was stolen, was stored or trans-
- mitted by their systems. (This is the same theft where Mr.
- Biggs was convicted. See n. 21, supra, and accompanying
- text.) A final decision has not been reached in Mr. Rose's
- case. A copy of the Rose indictment is available from the
- author. Various versions of the other charges are available
- in issues of the Computer Underground Digest available from
- the author.
-
- FN79. Soma, Smith & Sprague, Legal Analysis of Electronic
- Bulletin Board Activities, 7 W. NEW ENG. L. REV. 571, 605
- (1985).
-
- FN80. Computer Underground Digest, various electronic
- editions, available from the author. The parallel to a
- pamphleteer would be the seizure of his printing press.
- Particularly troublesome is that the warrants, apparently,
- did not specify seizure of the electronic mail stored on the
- system. An action is pending in a California case.
-
- FN81. Public importance might not be the only First Amend-
- ment concern--the Speech Clause, on its face, does not limit
- itself to public importance--but would be applicable to most
- bulletin board systems with which the author is familiar.
-
- FN82. Hernandez, ECPA and Online Computer Privacy, 41 FED.
- COMM. L.J. 17 (1989).
-
- FN83. Copies of most of the pleadings to date in the ALCOR
- case are available from the author.
-
- FN84. The relevant portions of the Electronic Communica-
- tions Privacy Act as recorded in the United States Code are
- set out in an attachment to this paper.
-
- FN85. Complaint, Thompson v. Predaina, No. 88-93C (S.D.
- Indiana 1988), dismissed August 10th, 1988. One source
- relates the dismissal was voluntary. Hernandez, ECPA and
- Online Computer Privacy, 41 FED. COMM. L.J. 17 (1989).
- Another source indicates the dismissal was caused by the
- defendant's filing bankruptcy, thereby automatically staying
- the prosecution of the suit. Wilson, message in Fidonet:LAW
- echo (1990). An electronic copy of the complaint is avail-
- able from the author.
-
- FN86. By "empirical data" the author means that he continu-
- ally receives questions from fellow sysops who, knowing him
- to be a law student, verbalize questions about their liabil-
- ity exposure over the range of issues discussed in this
- paper.
-