home *** CD-ROM | disk | FTP | other *** search
-
-
- ****************************************************************************
- >C O M P U T E R U N D E R G R O U N D<
- >D I G E S T<
- *** Volume 3, Issue #3.09 (March 19, 1991) **
- ****************************************************************************
-
- MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
- ARCHIVISTS: Bob Krause / Alex Smith / Bob Kusumoto
- RESIDENT GAEL: Brendan Kehoe
-
- USENET readers can currently receive CuD as alt.society.cu-digest.
- Back issues are also available on Compuserve (in: DL0 of the IBMBBS sig),
- PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on
- FIDOnet. Anonymous ftp sites: (1) ftp.cs.widener.edu (or
- 192.55.239.132) (back up and running) and (2)
- cudarch@chsun1.uchicago.edu E-mail server:
- archive-server@chsun1.uchicago.edu.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source is
- cited. Some authors, however, do copyright their material, and those
- authors should be contacted for reprint permission. It is assumed
- that non-personal mail to the moderators may be reprinted unless
- otherwise specified. Readers are encouraged to submit reasoned
- articles relating to the Computer Underground. Articles are preferred
- to short responses. Please avoid quoting previous posts unless
- absolutely necessary.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Contributors assume all
- responsibility for assuring that articles submitted do not
- violate copyright protections.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- CONTENTS THIS ISSUE:
- File 1: "Hollywood Hacker" or More Media and LE Abuse?
- File 2: Computer Publication and the First Amendment
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- ----------------------------------------------------------------------
-
- ********************************************************************
- *** CuD #3.09, File 1 of 2: Hollywood Hacker or Media Hype? ***
- ********************************************************************
-
- From: Jim Thomas / CuD
- Subject: "Hollywood Hacker" or More Media and LE Abuse?
- Date: March 20, 1991
-
- In CuD 3.08 we asked for information on the Hollywood Hacker.
- Here's what we've learned so far.
-
- Stuart Goldman, a freelance investigative reporter, was raided on
- March 8, 1990, by Secret Service agents and the Los Angeles Police.
- According to news stories in the Los Angeles Times and elsewhere,
- Goldman was working on an expose of "sleaze-tv" shows such as Current
- Affair and Hard Copy, shows for which he had also provided written
- material. According to the news accounts, Goldman was caught
- attempting to access Fox computers in New York and Los Angeles
- containing files relevant to Current Affair. He was charged with the
- usual litany of allegations (fraud, theft, etc) under Section
- 502(c)(2) of the California Penal Code. Section 502(c)(2) is
- sufficiently vague to make any number of acts a felony:
-
- s 502 (c) Except as provided in subdivision (h), any person
- who commits any of the following acts is guilty of a public
- offense:
- (1) Knowingly accesses and without permission alters,
- damages, deletes, destroys, or otherwise uses any data,
- computer, computer system, or computer network in order to
- either (A) devise or execute any scheme or artifice to
- defraud, deceive, or extort, or (B) wrongfully control or
- obtain money, property, or data.
- (2) Knowingly accesses and without permission takes, copies,
- or makes use of any data from a computer, computer system,
- or computer network, or takes or copies any supporting
- documentation, whether existing or residing internal or
- external to a computer, computer system, or computer
- network.
-
- Conviction carries the following:
-
- (d) (1) Any person who violates any of the provisions of
- paragraph (1), (2), (4), or (5) of subdivision (c) is
- punishable by a fine not exceeding ten thousand dollars
- ($10,000), or by imprisonment in the state prison for 16
- months, or two or three years, or by both that fine and
- imprisonment, or by a fine not exceeding five thousand
- dollars ($5,000), or by imprisonment in the county jail not
- exceeding one year, or by both that fine and imprisonment.
-
- WHAT IS THE CASE ABOUT?
-
- Piecing together the various news accounts and info from some of the
- legal documents we have obtained, the following seems to be the
- gist of the matter:
-
- --Goldman had contributed material both to Fox's Current Affair and
- Paramount's Hard Copy, two competitors in the "sleaze-tv" school of
- journalism.
-
- --According to various news articles, he was an articulate gadfly,
- specializing in "expose" pieces for both tv and hardcopy media. He
- was working on a story about tabloid tv, including the content and
- practices of Hard Copy and Current Affair when arrested.
-
- --As near as can be interpreted from the search affidavit and news
- accounts, it appears that Goldman possessed access to a computer
- account at Fox, which he may or may not have had legitimate (or
- believed he had legitimate) access to. If we are interpreting the
- public information correctly, it appears that no password was required
- to access the accounts, only the log-on id. Tracey Miller, of KFI's
- Live Line in Los Angeles, described Goldman as some one who "had
- managed to infiltrate the world of tabloid journalism and then got
- caught up in a sting operation involving Fox Television computers."
-
- --The search affidavit indicates that Paul Smirnoff, of Fox tv in New
- York, noticed attempted logins to the Fox computer in New York used by
- Current Affair writers. The account had a null password (meaning no
- password is required to gain access to the system) and the person to
- whom the account belonged indicated that she had not changed the
- password "for sometime." Smirnoff directed that a "bait" story be left
- in the LA computer. Using a phone trap and caller logs, investigators
- gathered evidence for their allegations against Goldman. On March 8,
- 1990, local police and Secret Service agents burst into Goldman's
- apartment. However, unlike other raids, of which we have had
- second-hand reports, there was an added twist to this one: FOX
- TELEVISION WAS PRESENT WITH REPORTERS AND CAMERA CREW!
-
- HACKING OR MEDIA HYPE?
-
- Why was Fox tv present on this raid? The Secret Service has been
- surprisingly reticent about their procedures to the point of
- revealing little information in interviews, let alone allowing
- video tapes to be made. We are repeatedly told that the time and dates
- of raids are "secret." Yet, not only was Fox present, but they seemed
- to have full cooperation from the agents present. Is collusion in
- media events a standard practice between law enforcement and the
- media? Were other news agencies invited? How does Fox rate? If CuD
- asked to participate and report on a raid, my guess is that the
- response would be less than enthusiastic. The video was hyped on Fox
- on March 8 and shown on the news, teasing the audience with
- sensationalistic promos and dubbing Goldman "The Hollywood Hacker." In
- the current climate of media hyperbole and so-called crackdowns, this
- strikes us has highly prejudicial.
-
- The news broadcast of the tape comes across like a segment from
- "COPS" or a Geraldo Rivera segment. There are the usual
- teases "Its not military espionage and it's not corporate
- spying," and the caption "HOLLYWOOD HACKER" graphically frames
- for the audience how to interpret the events: This is not simply
- a suspect, it is....THE HOLLYWOOD HACKER. Not "alleged" HH, but
- the real McCoy!
-
- The tape opens with agents outside a door in bullet proof vests
- with guns drawn, hanging menacingly in a "hacker's might be
- dangerous so we'd better be ready to blow the suck fuck away"
- position. Granted, this was not as dramatic as the tapes of the
- magnum-force beating of a Black LA motorist, but the sources of
- such violence are more readily understandable when the force
- of a raid is graphically depicted. One wonders whether Keating,
- Ollie North, and others more preferentially situated stared down
- a phallus surrogate when they were arrested. LE agents tell us
- drawn weapons are standard procedure, because they never know
- what may lie on the other side of the door. But, in case after
- case of hacker raids, one wonders how many computerists shot it
- out with the cops? And, if the situation was so dangerous, one
- wonders why the tv crowd was allowed to charge in amidst the
- officers.
-
- On the tape, loud voices can be heard yelling: "Open the Door!!!!"
- several times, and police and camera crowd enter, police with guns
- drawn, Fox Folk with cameras rolling. Agents are yelling "Hands up!!
- Against the Wall!" several times. The cameras are panning around and
- focus on Goldman sitting on a couch, reading the arrest warrant.
- Goldman's face was not, as it seems to be in shows such as COPS,
- blocked out, and from all appearances, he could pass for an IBM senior
- executive in his mid 40s.
-
- WHY SHOULD THE CU CARE?
-
- As with so many of the so-called hacker raids in the past year, it is
- neither guilt nor innocence, but the questions raised by procedure
- that should bother us:
-
- 1. The role of the media in inflaming public conceptions of hacking
- seems, in this case, to exceed even the cynical view of
- sensationalistic vested interests. The presence of a Fox news team and
- the subsequent hacker hyperbole for what the indictment suggests is a
- trivial offense at worst, makes one wonder whether some other motive
- other than computer access might not have led to the raid. We have
- seen from the events of 1990 that "victims" of computer intruders tend
- to grossly over-state losses. Only further inquiry will reveal
- whether Fox had motives for challenging an investigative journalist
- doing exposes on the type of tabloid tv they have made popular. It
- is worth noting that the Secret Service was involved in part because
- of a claim of a "federal interest computer," but, according to news
- accounts, they withdrew from the case almost immediately. Given the
- tenacity with which they have pursued other cases on less evidence
- (such as Steve Jackson Games, where part of the "evidence" was an
- employing explaining in a BBS post that Kermit is a 7-bit protocol),
- one wonders why they apparently ducked this case so quickly?
-
- 2. A second issue of relevance for the CU is the definition of
- "hacker." By no stretch of the imagination can the acts of whoever
- allegedly accessed the Fox computers be called hacking. From the few
- legal documents we have obtained and from media accounts, the action
- seems more akin to a graduate student using the account of another grad
- student without "official" authorization. We do not defend computer
- trespass, but we do strongly argue that there must be some distinction
- between types of trespass and what is done once a trespass occurs.
-
- 3. We have not yet contacted Ralph Greer, the apparent attorney of
- record in this case, so we can only surmise on a few possible issues.
- We wonder if the case is being treated as a typical criminal case or
- whether it is recognized that there are issues here that extend far
- beyond the "normal" crime of "theft," "fraud," and other metaphoric
- definitions brought to bear on computer cases? We also wonder if,
- like some others, there is any pressure to "cop a plea" because of the
- lack of a creative defense that Sheldon Zenner, The EFF and others
- have introduced in some other cases? Again, for us the concern is not
- who is or is not guilty in this case, but with the problem of
- defending against charges that seem far in excess of the act.
-
- 4. The matter of defense also raises the issue of California law.
- Parts of Section 502 and 502.7, as we (and others) have argued
- previously, see overly vague, excessively punitive, and could make
- even the most trivial form of trespass a felony. To non-lawyers such
- as ourselves, it seems that the alleged acts would, in most states, at
- worst be a misdemeanor and not subject a potential offender to three
- or more years in prison.
-
- 5. We have argued long and loud against the current tactics employed
- by agents on computer raids. Yes, we recognize that there are standard
- procedures and we recognize that police do face potential danger in
- raids. However, to raid an alleged computer offender in the same way
- that a crack house is raided seems over-kill and dangerous. There are
- many ways to arrest suspects, and raids, although dramatic, do not
- seem justified in any single case of which we are aware. The tv tape
- suggests that, if the suspect made an improper move (especially in the
- confusion of everybody yelling at once, the suspect perhaps responding
- to one set of commands and ignoring another, tv camera people in the
- thick of things), a tragic consequence could have occured. We should
- all be concerned with the "police state" mentality in such instances.
- Yes, there may be times when caution and full operative procedures on
- computer criminals is justified, but suspected hackers are not your
- typical computer criminals. One wonders what the response will be if a
- young teenager makes a "furtive gesture" and is blown away. One
- credible teenager once told us that when he was arrested, the police
- burst into his room with guns drawn. He was at the keyboard of his
- computer, and the agent in charge, perhaps to impress her male
- colleagues, allegedly pointed the gun to his head and said, "Touch
- that keyboard and die!"
-
- 6. The search warrant for Goldman's apartment authorizes seizure of a
- variety of material that seems--as it has in other cases--far in
- excess of what could even by a computer illiterate be used for any
- related offenses. This raises the issue of what constitutes "evidence"
- in such cases. We have seen from other raids that posters, personal
- letters unrelated to computers, news clippings, telephones, video
- tapes, science fiction books, research notes, and other artifacts were
- taken. Law enforcement agents readily justify this, but when raiding
- forgers, car thiefs, or even drug dealers, the scope of seized
- equipment is much narrower. Police, to our knowledge, do not
- confiscate all the spoons in the house, the matches, or the stove,
- when arresting suspected junkies. Yet, this is the mentality that
- seems to guide their seizures of equipment in computer cases.
-
- In a recent issue of RISKS Digest, moderator Peter G. Neumann observed
- "that there is still a significant gap between what it is thought the
- laws enforce and what computer systems actually enforce." I interpret
- this to mean simply that the law has not caught up to changing
- technology, and old, comfortable legal metaphors are inappropriately
- applied to new, qualitatively different conditions. Calling simple
- computer trespass (even if files are perused) a heavy-duty felony
- subjecting the offender to many years in prison does not seem
- productive.
-
- The point seems to be that emerging computer laws are archaic. Neither
- those who write the laws nor those who implement them have a clear
- understanding of what is involved or at stake. When mere possession
- (not use, but possession) of "forbidden knowledge" can be a felony (as
- it is in California), we must begin to question what the law thinks
- it's enforcing.
-
- Few objected to the enactment of RICO laws, and fewer still to the
- laws allowing confiscation of property of drug suspects. The attitude
- seemed to be that harsh measures were justified because of the nature
- of the problem. Yet, those and similar laws have been expanded and
- applied to those suspected of computer abuse as we see in the cases of
- Steve Jackson Games, RIPCO BBS, the "Hollywood Hacker," and others
- have been raided under questionable circumstances.
-
- I'm wondering: What does law think it's enforcing? What is the
- appropriate metaphor for computer trespass? What distinctions should
- be made between types of offense? Please remember, nobody is
- justifying trespass, so continual harangues on its dangers miss the
- point. I am only suggesting that there is a greater risk from
- misapplication of law, which--like a virus--has a historical tendency
- to spread to other areas, than from computer hackers. It's easier to
- lock out hackers than police with guns and the power of the state
- behind them, and we have already seen the risks to people that result
- from over-zealous searches, prosecution, and sentencing.
-
- And, at the moment, I suggest that it's law enforcement agents who are
- the greatest danger to the computer world, not hackers. Why? Because
- "there is still a significant gap between what it is thought the laws
- enforce and what computer systems actually enforce." As Edmund Burke
- once (presumably) said, the true danger is when liberty is nibbled way
- for expedience and by parts.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- Date: Thu, 28 Feb 91 09:53:50 EST
- From: "Brian J. Peretti" <PERETTI@AUVM.BITNET>
- Subject: Computer Publication and the First Amendment
-
- ********************************************************************
- *** CuD #3.09: File 2 of 2: Computers & First Amendment ***
- ********************************************************************
-
- Computer Publication and The First Amendment
-
-
- Copyright Brian J. Peretti
- Computers and the Law
-
-
- Since their introduction, personal computers have had a tremendous impact
- on society. Computer, printers and their software have replaced
- accountants, secretaries and even typewriters in many offices across the
- United States. With the advent of this new way to gather, process and
- distribute information, new problems, many that could never have been
- perceived by the Framers of the Constitution, have developed. The
- Constitution is the basis of law in the United States. Although created in
- 1787, it still governs the manner in which legal decisions are made with
- very few changes. It, along with the Bill of Rights and other amendments,
- has established what may or may not be done to a person, group,
- organization or business without infringing on its rights. The broad
- language was created so that the Constitution would be able to change and
- expand with the times. Although the founding fathers did have an idea of
- what the press was in their day, it has been expanded to cover television
- and radio. This coverage should be expanded to encompass the new media of
- computer publications. By deciding that computer publications will have
- the same rights under the first amendment as newspapers, information will
- be dispersed throughout the nation in a more efficient manner so that the
- goal of the first amendment will become reality.
-
- I. What is a computer publication
-
- Computer publications can take many forms. It has been
- argued that bulletin boards should be considered computer
- publications. The reason is that since the people who are in
- contact with the bulletin boards must communicate with the boards
- through the written word, that these communications should thus
- be considered publications.
- This paper is concerned with publications that are created
- exclusively on a computer or computer system. There have been
- only a few such computer publications.1
- There has not been a definition defining what is a computer
- publication. However, there are many similarities between the
- various newsletters that will give us a definition of what one
- is. First, all of the material which makes up the publication
- must have been created on a computer. This is to say, that
- although the information may have been written on paper as rough
- drafts or may have been gleaned from printed books or newspaper,
- the articles that compose the publication must have been written
- IN FINAL FORM ON THE COMPUTER.
- The production of the newsletter must also occur exclusively
- on the computer. This includes the editing, the check for
- spelling and formatting errors and the actual production of what
- the newsletter will look like, including the letterhead of the
- publication, if there is to be one.
- The transportation of the material that is to be contained
- in the newsletter must occur via a computer network2 or by an
- exchange of magnetic disk3, magnetic tape4, electrical impulses
- or other non-print media. This includes not only the gathering
- of the stories, but also the distribution of the newsletter to
- its subscribers.
- The computer magazines or newsletters that have existed in
- the past also had a common denominator in that they almost
- exclusively were published by computer users, for computer users
- and concerned computer topics. Although this could be a
- criteria, it would be to restrictive. It is very likely, with
- the continued proliferation of computers in our society, that
- publications with a much different orientations will emerge. If
- computer publications are to be protected, the topic of their
- publication should not be determinative of whether they fall
- under the definition of a computer publication.
- There are other publications that address the same issues
- that have been published in "Phrack". An example is 2600 on Long
- Island, New York which publishes material in printed form
- concerning generally the same information.5 However, it is the
- form in which "Phrack" was published and not the content of the
- magazine that is the issue of this paper.
-
- II. Phrack6
-
- Craig Neidorf is a student at the University of Missouri.
- At sixteen, he and a friend started to publish Phrack7. The
- way in which he went about creating his newsletter was to accept
- articles written by persons throughout the country. These
- articles would be left in his mailbox at the university or to
- retrieve articles written on computer bulletin boards. After he
- logged on to the system, he would then mail the articles from the
- mainframe computer to his person computer at his residence. If
- these articles would need to be edited, he would then do any
- necessary editing. Once he complied a large enough group of
- articles, he would then send the articles to the mainframe
- computer along with a heading and send it to his 250 subscribers.
- There was no charge for the newsletter.8
-
- III. The Historic Rights of the Press
-
- In order to discover whether or not the protections afforded
- to the press in the first amendment should be extended to this
- new form of information distribution, a look to the past is
- essential. Originally, control of the press by government was
- total. However, as time passed, both the monarch of Great
- Britain and their rulers in the American Colonies allowed greater
- freedom to publish.
-
- A. The English Experience.
-
- At first, England was an absolute monarchy, in which the
- king could do as he pleased. In 1215, the Magna Carta was
- signed, whereby the lords of England put restrictions on the
- King, which he pledged not to violate.9 The document, although
- not seen as an admission of the King that there were civil right,
- he did acknowledge that there were some basic human rights.10
- In 1275, the De Scandalis Magnatum was enacted which
- punished anyone who disseminated untrue information or "tales"
- that could disrupt the atmosphere between the king and his
- people.11 Over time this statute was gradually expanded. In
- 1378, it was broadened to cover "peers, prelates, justices and
- various other officials and in the 1388 reenactment, offenders
- could be punished "by the advice of said council."12
- The first printing presses were established in Great Britain
- toward the end of the 15th century. When the De Scandalis
- Magnatum was reenacted in 1554 and 1559, "seditious words" were
- included as words that could bring punishment.13 This law,
- enforced by the Court of the Star Chamber, was a criminal statute
- to punish political scandal.14
- Regulations placed upon printers soon followed. In 1585,
- the Star Chamber required that in order to print a book, the
- publisher would have to get a license.15 A monopoly was created
- in the Stationers' Company, which had 97 London stationers, that
- could seize the publications of all outsiders.16 A 1637 ordnance
- limited the number of printers, presses and apprentices.17
- Punishment, at the time, was not limited to just printing, but
- also to "epigram[s] or rhyme[s] in writing sung and repeated in
- the presence of others . . . [or] an ignominious or shameful
- painting or sign."18
- Although the Star Chamber had been abolished in 1641, the
- licensing system remained through the orders of 1642 and 1643.19
- The Licensing Act of 1662 was a temporary statute which kept the
- licensing provisions until 1679, when it expired.20 During the
- reign of James II, licensing was renewed only to expire and not
- be reenacted in 1695.21
- Having realized that licensing was not the answer, Queen
- Anne in 1711 enacted a Stamp Act, by which a duty was imposed on
- all newspapers and advertisements.22 The purpose was to both
- restrain the press and destroy all but the larger newspapers.23
- Blackstone summed up the state of the law Great Britain
- concerning the press in his Commentaries by writing:
- The liberty of the press is indeed essential to the
- nature of a free state; but this consists in laying no
- previous restraints upon publications, and not in freedom
- from censure for criminal matter when published. Every
- freeman has an undoubted right to lay what sentiments he
- pleases before the public; to forbid this, is to destroy
- the freedom of the press; but if he publishes what is
- improper, mischievous, or illegal, he must take the
- consequences of his own temerity.24
-
- B. The Colonial Experience
- The first presses arrived at Harvard University in 1638 and
- were used to disseminate church information.25 Aside from this
- purpose the colonial governments, when still under the power of
- Great Britain did not look favorably upon the press. However,
- with power in the colony moving toward the people, the press
- gained more freedom from the strict control imposed by the
- government.
- Each colony treated the press differently, although each did
- restrict the press. In 1671, Governor Berkeley of Virginia wrote
- "But I thank God, there are no free schools nor printing, and I
- hope we shall not have these hundred years; for learning has
- brought disobedience, and heresy, and sects into the world, and
- printing has divulged them, and libels against the best
- government. God keep us from both!"26 In New York, until 1719,
- all governors "had been instructed to permit no press, book,
- pamphlets or other printed matter %without your especial leave &
- license first obtained.'"27
- Gradually, state controls of the press gradually
- diminished.28 The Trial of John Peter Zenger, 17 Howell's St. Tr.
- 675 (1735) illustrates how much the colonists were opposed to
- restrictions on the press. Zenger had printed material in his
- New York Weekly Journal a satiric article critical of New York
- Governor William Cosby. The governor had Zenger charged with
- seditious liable by the Attorney General after neither a Grand
- Jury would indict nor the General Assembly take action.29
- Although all the jury had to do was find him guilty was to
- declare that he published the paper, Zenger's attorney, Andrew
- Hamilton of Philadelphia argued a much larger issue. He put
- before the jury the argument that truth is a defense to liable,
- although the court rejected it.30 He was able to win an
- acquittal of Zenger by requesting that the jury give a general
- verdict of not guilty instead of a special verdict, which the
- court requested, and which the jury did.31
-
- C. The Adoption of the First Amendment
- "The struggle for the freedom of the press was primarily
- directed against the power of the licensor. . . . And the liberty
- of the press became initially a right to publish %without a
- license what formerly could be published only with one.' While
- this freedom from previous restraint upon publication cannot be
- regarded as exhausting the guaranty of liberty, the prevention of
- that restraint was a leading purpose in the adoption of the
- constitutional provision."32 The purpose of the first amendment
- is "to prevent all such previous restraints upon publication as
- had been practiced by other government."33
- The first amendment states "Congress shall make no law
- respecting an establishment of religion, or prohibiting the free
- exercise thereof; or abridging the freedom of speech, or of the
- press; or the right of the people peaceably to assemble, and to
- petition the Government for a redress of grievances."34 It was
- originally proposed as part of twelve amendments to the United
- States Constitution during the first session of Congress in 1789.
- On December 15, 1791, the Bill of Rights, minus the first two
- amendments, became part of the Constitution.
- What the first amendment means as applied to the press has
- never been completely set forth. The only statement in Congress
- as to what the press and speech clause was to stand for was
- express by James Madison: "The right of freedom of speech is
- secured; the liberty of the press is expressly declared to be
- beyond the reach of this government."35 This, however, will be
- of little help for us when considering whether computer
- publications should receive first amendment protections.
-
- IV. Does Computer Publications fall within the meaning of
- Press as stated in the first Amendment.
-
- Since the legislative history of the First Amendment will
- not lead to a discovery concerning what is covered under it, we
- must look to how it has been interpreted by the courts. An
- examination must be undertook to determine what the courts have
- decided concerning both the purpose of the amendment and whether
- any physical manifestation guidelines on what fall within the
- definition of the "press".
- By examining what the drafters of the first amendment
- thought that press was during their time, the only media which
- would receive first amendment protections the printed press,
- which would include newspapers, handbills and leaflets.
- However, the court has not held the clause so narrowly.
- The United States Supreme Court has taken a broad view in
- considering what is the "press".36 "The liberty of the press is
- not confined to newspapers and periodicals. It necessarily
- embraces pamphlets and leaflets. . . . The press in its
- historical connotation comprehends every sort of publication
- which affords a vehicle of information and opinion."37 Thus, the
- Court has ruled that motion pictures38 also deserve such
- protection. Lower courts have held that the protection applies
- to doctor directories,39 college newspapers40 and computer
- bulletin boards.41
- Computer publications satisfy the definition that the Court
- has given to what is to be covered by the first amendment. By
- their very nature, computer publications are a vehicle by which
- information can be disseminated. In Phrack's first issue, the
- purpose was to gather "philes [which] may include articles on
- telcom (phreaking/hacking), anarchy (guns and death &
- destruction) or kracking. Other (sic) topics will be allowed
- also to a certain extent."42 These articles were to be
- distributed to members of the community who wished to obtain
- information on the topics in the "newsletter-type project".43
- Since this publication passes the Lovell test,44 because of it
- allows information to be distributed, these publication deserve
- the protection given to the media by the first amendment.45
-
- VI. Freedom of Newspapers and Broadcasting Media46
-
-
- Currently there can be called two separate first amendment
- doctrines. The first applies to newspapers. Newspapers can have
- only a few restrictions placed on them. The second applies to
- radio and television, which can have many types of controls
- placed upon them. Computer publications, because of their
- similarity to the former, should have the least amount of
- restriction necessary placed upon them.
- As stated, supra, the first amendment had no legislative
- history that came along with it. Courts have had to interpret
- how it should be applied to the "press" since they had no
- guidance from the Congress. Although not to be applied in an
- absolute sense, Breard v. City of Alexandria, La.,47 the Supreme
- Court has only set forth three exceptions where prior restraint
- of the newspapers are allowed. These restrictions, as stated in
- dictum in Near v. Minnesota48 are 1) when it is necessary in
- order that "a government might prevent actual obstruction to its
- recruiting service or the publication of the sailing dates of
- transports or the number and location of troops", 2) the
- requirements of decency to prevent publication of obscene
- materials, and 3) "[t]he security of the community life may be
- protected against incitement to acts of violence and the
- overthrow of force of orderly government." These exceptions,
- although not having the force of law when stated, have been the
- only exceptions allowed.
- In the electronic realm, the Supreme Court has allowed
- greater restraints to be placed on radio and television.
- Licenses, although never allowed on newspapers,49 possibly as a
- result of the English experience,50 have been allowed on
- broadcast communication.51 Broadcaster must be fair to all sides
- of an issue,52 whereas newspapers may be bias.53 Broadcaster are
- required to meet the need of their community.54 However no court
- has held that this may be applied to a newspaper.55
- The main difference between these two groups is that
- "[u]nlike other modes of expression, radio inherently is not
- available to all. That is its unique characteristic, and that is
- why, unlike other modes of expression, it is subject to
- government regulation."56 This reasoning has been followed by
- the court on many occasions.57
- In the case concerning computer publishers, the less
- restrictive newspaper limitations should be used. A computer
- publisher does not send his information over a limited band or
- airwaves. Any individual or group can become a computer publish
- by obtaining a computer or access to a computer and a modem an
- information to publish. The amount of these newsletters are not
- limited by technology.
- Because of the large number of publications that can appear,
- there is no need to require that these publications be responsive
- to the public. The dissemination of the information can be
- terminated if the reader wants to by asking for his name to be
- removed from the subscription list, similar to that of a magazine
- or newspaper.58
-
- V. Conclusion
- Computer based publications are a new development in the
- traditional way in which information is disseminated. The
- history of the United States and the first amendment has been
- against placing restrictions on the press. These new types of
- publications, because of their similarity to other types of
- media, should be granted first amendment protection.
- The rational for placing restrictions on radio and
- television should not apply to computer publications. Anyone who
- has access to this technology, which is becoming more prevalent
- in society, can publish in this manner. The least amount of
- restrictions on their publication, similar to those placed on
- newspapers, should be applied to this new media.
- BIBLIOGRAPHY
-
- Freedom of Speech and Press in America, Edward G. Hudon (Public
- Affairs Press, Washington, D.C. 1963)
-
- MacMillan Dictionary of Personal Computing & Communications
- Dennis Longley and Michael Shain, eds. (MacMillan Press Ltd,
- London 1986)
-
- Shaping the First Amendment: The Development of Free Expression,
- John D. Stevens (Sage Publications, Beverly Hills, 1982)
-
- Freedom of Speech and Press in Early American History: Legacy of
- Suppression, Leonard W. Levy (Harvard Press, Cambridge 1960)
-
- American Broadcasting and the First Amendment, Lucas A. Powe, Jr.
- (University of California Press, Berkeley 1987)
-
- Printers and Press Freedom: The Ideology of Early American
- Journalism, Jeffery A. Smith (Oxford University Press, New York
- 1988).
-
-
- Seven Dirty Words and Six Other Stories: Controlling the Content
- of Print and Broadcast, Matthew L. Spitzer (Yale University
- Press, New Haven 1986).
-
- Emergence of a Free Press, Leonard W. Levy (Oxford University
- Press, New York 1985).
-
- Computer Underground Digest, volume 2, Issue #2.12, file 1
- (November 17, 1990).
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Endnotes
-
- 1. Phrack, see infra, CCCAN, a Canadian publication, The
- LEGION OF DOOM TECHNICAL JOURNAL, COMPUTER UNDERGROUND DIGEST AND VIRUS-L
- DIGEST ARE A FEW OF THE MANY PUBLICATIONS.
-
- 2. MacMillan Dictionary of Personal Computing &
- Communication (1986 ed) defines it as: "A network of computer
- systems that allow the fast and easy flow of data between the
- systems and users of the system." Id. at 68.
-
- 3. "[A] flat disk with a magnetizable surface layer on
- which data can be stored by magnetic recording." Id. at 215
-
- 4. "A plastic tape having a magnetic surface for storing
- data in a code of magnetized spots." Webster's NewWorld
- Dictionary of Computer Terms (1988 3 ed.) at 223.
-
- 5. Frenzy over Phrack; First Amendment concerns raised in
- computer hacker case, Communications Daily, June 29, 1990, at 6.
-
- 6. Information from this section was gathered in part from
- Dorothy Denning's paper The United States vs. Craig Neidorf: A
- Viewpoint on Electronic Publishing, Constitutional Rights, and
- Hacking." [hereinafter Denning] and Interview with Craig Neidorf,
- editor of Phrack (Oct. 16, 1990).
-
- 7. The name of the publication was derived from two words,
- phrack (telecommunication systems) and hack (from computer
- hacking). Denning. Hacking has been defined as "one who gains
- unauthorized, use non-fraudulent access to another's computer
- system." Webster's II New Riverside University Dictionary (1984)
- at 557. For other definitions, see United States v. Riggs, 739
- F. Supp. 414, 423-24 (N.D. Ill. 1990).
-
- 8. Mr. Neidorf was indicted after he published a Bell South
- E911 document which was downloaded from the Bell South computer
- system in Atlanta, Georgia. Determining if Mr. Neidorf should be
- punished for publishing such information is beyond the scope of
- this paper.
-
- 9. John Stevens, Shaping the First Amendment: The
- Development of Free Expression at 27 (1982). [hereinafter
- Stevens]
-
- 10. Id.
-
- 11. Edward Hudon, Freedom of Speech and Press in America,
- 8-9 (1963).
- 12. Id. at 9.
-
- 13. Id.
-
- 14. Id.
-
- 15. Id. at 10.
-
- 16. Id.
-
- 17. Id.
-
- 18. Id.
-
- 19. Id. at 11.
-
- 20. Id.
-
- 21. Id.
-
- 22. Id.
-
- 23. Id.
-
- 24. Leonard Levy, Freedom of Speech and Press in Early
- American History: Legacy of Suppression, 14 (1963) [hereinafter
- Levy] citing Sir William Blackstone, Commentaries on the Laws of
- England 2:112-113 (1936).
-
- 25. Stevens, at 29.
-
- 26. Levy, at 21-22, quoting William Waller Hening, The
- Statutes at Large Being a Collection of All the Laws of Virginia
- (1619-1792) (Richmond, 1809-1823), 2:517. [emphasis in original]
-
- 27. Levy, at 24, quoting "Instructions to Governor Dongan,"
- 1686, in E.B. O'Callaghan and B. Fernow, eds., Documents Relative
- to the Colonial History of the State of New York 3:375 (Albany,
- 1856-1887).
-
- 28. By 1721, Massachusetts effectively ended censorship by
- licensing. Levy, at 36.
-
- 29. Edward Hudson, Freedom of Speech and Press in America
- (1963) 19.
-
- 30. John D. Stevens, Shaping the First Amendment: The
- Development of Free Expression (1982), 31.
-
- 31. Hudson, at 19.
-
- 32. Lovell v. City of Griffen, Ga., 303 U.S. 444, 451-52
- (1938) [footnotes omitted].
-
- 33. Patterson v. Colorado, 205 U.S. 454, 462 (1907),
- quoting Commonwealth v. Blanding, 3 Pick. [Mass.] 304, 313-14.
- [emphasis in original]
-
- 34. U.S. Const. amend. I.
-
- 35. Leonard W. Levy, Freedom of Speech and Press in Early
- American History: Legacy of Suppression (1960), quoting The
- Debates and Proceedings in the Congress of the United States
- (Washington, 1834 ff.) I:766, 1st Cong., 1st Sess.
-
- 36. "The Protection of the First Amendment, mirrored in the
- Fourteenth, is not limited to the Blackstonian idea that freedom
- of the press means only freedom from restraint prior to
- publication." Chaplinsky v. New Hampshire, 315 U.S. 572, n.3,
- (1941) citing Near v. Minnesota, 283 U.S. 697 (1931).
-
- 37. Lovell v. City of Griffin, Ga. 303 U.S. 444, 452
- (1938).
-
- 38. "We have no doubt that moving pictures, like newspapers
- and radio, are included in the press whose freedom is guaranteed
- by the First Amendment." 334 U.S. 131, 166 (1948). "Expression
- by means of motion pictures in included within the free speech
- and speech and free press guaranty of the First and Fourteenth
- Amendments." Joseph Burstyn, Inc. v. Wilson, 343 U.S. 495, 502
- (1952).
-
- 39. "The propose directory [of physicians] contains
- information of interest to people who need physicians. The
- directory, therefore, is embraced by the term "press" as used in
- the first amendment." Health Systems Agency of Northern Virginia
- v. Virginia State Board of Medicine, 424 F. Supp. 267, 272 (E.D.
- Va. 1976).
-
- 40. "A campus newspaper is part of the "press" for the
- purpose of the First Amendment to the Constitution of the United
- States." Arrington v. Taylor, 380 F.Supp. 1348, 1365 (M.D.N.C.
- 1974).
-
- 41. Legi-Tech v. Keiper, 766 F.2d 728, 734-35 (2d Cir.
- 1985).
-
- 42. Phrack, volume 1, issue 1, phile 1, reprinted in
- Computer Underground Digest, volume 2, Issue #2.12, file 1
- (November 17, 1990).
-
- 43. Id.
- 44. See, infra, note 35 and text.
-
- 45. This is not to say that publication of information in
- furtherance of a crime or criminal activity should receive the
- protection of the first amendment.
-
- 46. This section has been completed with the help of
- Spitzer, Seven Dirty Words and Six Other Stories (1986).
-
- 47. 341 U.S. 622, 642 (1951), "The First and Fourteenth
- Amendments have never been treated as absolutes."
-
- 48. 283 U.S. 697, 716.
-
- 49. Near v. Minnesota, 283 U.S. 697 (1931), New York Times
- Co. v. Sullivan, 403 U.S. 713 (1971), Minneapolis Star and
- Tribune Co. v. Minnesota Comm'r of Revenue, 460 U.S. 575 (1983).
-
- 50. See, supra, notes 9 through 24 and text.
-
- 51. Communications Act of 1934. 47 U.S.C. % 301 et. seq.
- (1988) (Requiring that radio stations and television stations
- obtain licenses).
-
- 52. Red Lion Broadcasting Co. v. F.C.C., 395 U.S. 367
- (1969).
-
- 53. See, e.g., Evans v. American Federation of Television
- and Radio Artists, 354 F.Supp 823, 838 (S.D.N.Y. 1973), rev'd on
- other grounds, 496 F.2d 305 (2nd Cir. 1974), cert. denied, 419
- U.S. 1093. ("In editorial comment, the New York Times and the
- Washington Post may be unreservedly liberal, while the
- Indianapolis News or the Manchester Union Leader may be
- unremittingly conservative.")
-
- 54. 47 U.S.C. % 309(a). Trinity Methodist Church v. Federal
- Radio Commission, 62 F.2d 850, (D.C. Cir. 1932), cert. denied,
- 288 U.S. 599 (1933). (holding that if radio broadcasts were not
- in the public interest, a license could be revoked and not
- violate the first amendment.)
-
- 55. Of course, if a newspaper is not responsive to its
- readers, it may lose subscribers and either be forced to change
- or go out of business. However, since in that hypothetical there
- would be no state action, there would be no first amendment
- issue.
-
- 56. National Broadcasting Co. v. United States, 319 U.S.
- 190, 226 (1943). The dissenting opinion also followed similar
- reasoning. "Owing to its physical characteristics radio, unlike
- the other methods of conveying information, must be regulated and
- rationed by the government." Id. at 319.
-
- 57. Red Lion Broadcasting v. Federal Communication
- Commission, 395 U.S. 367 (1969), and Federal Communication
- Commission v. League of Women Voters, 468 U.S. 364 (1984).
-
- 58. For the same reason, the fairness doctrine should not
- be applied to these types of publications.
-
- ********************************************************************
-
- ------------------------------
-
- **END OF CuD #3.09**
- ********************************************************************
-
-