home *** CD-ROM | disk | FTP | other *** search
- Civil Liberties in Cyberspace:
- When does hacking turn from an exercise
- of civil liberties into crime?
-
- by Mitchell Kapor
-
- published in Scientific American,
- September, 1991.
-
-
- On March 1, 1990, the U.S. Secret Service raided the offices of Steve
- Jackson, an entrepreneurial publisher in Austin, Tex. Carrying a
- search warrant, the authorities confiscated computer hardware and
- software, the drafts of his about-to-be-released book and many business
- records of his company, Steve Jackson Games. They also seized the
- electronic bulletin-board system used by the publisher to communicate
- with customers and writers, thereby seizing all the private electronic
- mail on the system.
-
-
- The Secret Service held some of the equipment and material for months,
- refusing to discuss their reasons for the raid. The publisher was forced
- to reconstruct his book from old manuscripts, to delay filling orders
- for it and to lay off half his staff. When the warrant application was
- finally unsealed months later, it confirmed that the publisher was
- never suspected of any crime.
-
-
- Steve Jackson's legal difficulties are symptomatic of a widespread
- problem. During the past several years, dozens of individuals have been
- the subject of similar searches and seizures. In any other context, this
- warrant might never have been issued. By many interpretations, it
- disregarded the First and Fourth Amendments to the U. S. Constitution,
- as well as several existing privacy laws. But the government proceeded
- as if civil liberties did not apply. In this case, the government was
- investigating a new kind of crime -- computer crime.
-
-
- The circumstances vary, but a disproportionate number of cases share a
- common thread: the serious misunderstanding of computer-based communi-
- cation and its implications for civil liberties. We now face the task
- of adapting our legal institutions and societal expectations to the
- cultural phenomena that even now are springing up from communications
- technology.
-
-
- Our society has made a commitment to openness and to free
- communication. But if our legal and social institutions fail to adapt
- to new technology, basic access to the global electronic media could be
- seen as a privilege, granted to those who play by the strictest rules,
- rather than as a right held by anyone who needs to communicate. To
- assure that these freedoms are not compromised, a group of computer
- experts, including myself, founded the Electronic Frontier Foundation
- (EFF) in 1990.
-
-
- In many respects, it was odd that Steve Jackson Games got caught up in a
- computer crime investigation at all. The company publishes a popular,
- award-winning series of fantasy roleplaying games, produced in the
- form of elaborate rule books. The raid took place only because law
- enforcement officials misunderstood the technologies -- computer
- bulletin-board systems (BBSs) and on-line forums -- and misread the
- cultural phenomena that those technologies engender.
-
-
- Like a growing number of businesses, Steve Jackson Games operated an
- electronic bulletin board to facilitate contact between players of its
- games and their authors. Users of this bulletin-board system dialed in
- via modem from their personal computers to swap strategy tips, learn
- about game upgrades, exchange electronic mail and discuss games and
- other topics.
-
-
- Law enforcement officers apparently became suspicious when a Steve
- Jackson Games employee -- on his own time and on a BBS he ran from his
- house -- made an innocuous comment about a public domain protocol for
- transferring computer files called Kermit. In addition, officials
- claimed that at one time the employee had had on an electronic
- bulletin board a copy of Phrack, a widely disseminated electronic publi-
- cation, that included information they believed to have been stolen from
- a BellSouth computer.
-
-
- The law enforcement officials interpreted these facts as unusual
- enough to justify not only a search and seizure at the employee's
- residence but also the search of Steve Jackson Games and the seizure of
- enough equipment to disrupt the business seriously. Among the items
- confiscated were all the hard copies and electronically stored copies of
- the manuscript of a rule book for a role-playing game called GURPS
- Cyberpunk, in which inhabitants of so-called cyberspace invade
- corporate and government computer systems and steal sensitive data.
- Law enforcement agents regarded the book, in the words of one, as "a
- handbook for computer crime."
-
-
- A basic knowledge of the kinds of computer intrusion that are
- technically possible would have enabled the agents to see that GURPS
- Cyberpunk was nothing more than a science fiction creation and that
- Kermit was simply a legal, frequently used computer program.
- Unfortunately, the agents assigned to investigate computer crime did not
- know what -- if anything -- was evidence of criminal activity.
- Therefore, they intruded on a small business without a reasonable
- basis for believing that a crime had been committed and conducted a
- search and seizure without looking for "particular" evidence, in vi-
- olation of the Fourth Amendment of the Constitution.
-
-
- Searches and seizures of such computer systems affect the rights of
- not only their owners and operators but also the users of those systems.
- Although most BBS users have never been in the same room with the
- actual computer that carries their postings, they legitimately expect
- their electronic mail to be private and their lawful associations to
- be protected.
-
-
- The community of bulletin-board users and computer networkers may be
- small, but precedents must be understood in a greater context. As
- forums for debate and information exchange, computer-based bulletin
- boards and conferencing systems support some of the most vigorous
- exercise of the First Amendment freedoms of expression and association
- that this country has ever seen. Moreover, they are evolving rapidly
- into large-scale public information and communications utilities.
-
-
- These utilities will probably converge into a digital national public
- network that will connect nearly all homes and businesses in the U.S.
- This network will serve as a main conduit for commerce, learning,
- education and entertainment in our society, distributing images and
- video signals as well as text and voice. Much of the content of this
- network will be private messages serving as "virtual" town halls,
- village greens and coffeehouses, where people post their ideas in public
- or semipublic forums.
-
-
- Yet there is a common perception that a defense of electronic civil
- liberties is somehow opposed to legitimate concerns about the
- prevention of computer crime. The conflict arises, in part, because
- the popular hysteria about the technically sophisticated youths known as
- hackers has drowned out reasonable discussion.
-
-
- Perhaps inspired by the popular movie _WarGames_, the general public
- began in the 1980s to perceive computer hackers as threats to the
- safety of this country's vital computer systems. But the image of
- hackers as malevolent is purchased at the price of ignoring the
- underlying reality -- the typical teenage hacker is simply tempted by
- the prospect of exploring forbidden territory. Some are among our best
- and brightest technological talents: hackers of the 1960s and 1970s,
- for example, were so driven by their desire to master, understand and
- produce new hardware and software that they went on to start companies
- called Apple, Microsoft and Lotus.
-
-
- How do we resolve this conflict? One solution is ensure that our scheme
- of civil and criminal laws provides sanctions in proportion to the
- offenses. A system in which an exploratory hacker receives more time in
- jail than a defendant convicted of assault violates our sense of
- justice. Our legal tradition historically has shown itself capable of
- making subtle and not-so-subtle distinctions among criminal offenses.
-
-
- There are, of course, real threats to network and system security. The
- qualities that make the ideal network valuableQits popularity, its
- uniform commands, its ability to handle financial transactions and its
- international access -- also make it vulnerable to a variety of
- abuses and accidents. It is certainly proper to hold hackers
- accountable for their offenses, but that accountability should never
- entail denying defendants the safeguards of the Bill of Rights,
- including the rights to free expression and association and to free-
- dom from unreasonable searches and seizures.
-
-
- We need statutory schemes that address the acts of true computer crim-
- inals (such as those who have created the growing problem of toll and
- credit-card fraud) while distinguishing between those criminals and
- hackers whose acts are most analogous to noncriminal trespass. And we
- need educated law enforcement officials who will be able to recognize
- and focus their efforts on the real threats.
-
-
- The question then arises: How do we help our institutions, and
- perceptions, adapt? The first step is to articulate the kinds of values
- we want to see protected in the electronic society we are now shaping
- and to make an agenda for preserving the civil liberties that are
- central to that society. Then we can draw on the appropriate legal
- traditions that guide other media. The late Ithiel de Sola Pool argued
- in his influential book Technologies of Freedom that the medium of
- digital communications is heir to several traditions of control: the
- press, the common carrier and the broadcast media.
-
-
- The freedom of the press to print and distribute is explicitly
- guaranteed by the First Amendment. This freedom is somewhat limited,
- particularly by laws governing obscenity and defamation, but the thrust
- of First Amendment law, especially in this century, prevents the
- government from imposing "prior restraint" on publications.
-
-
- Like the railroad networks, the telephone networks follow common-car-
- rier principles -- they do not impose content restrictions on the
- "cargo" they carry. It would be unthinkable for the telephone company to
- monitor our calls routinely or cut off conversations because the
- subject matter was deemed offensive.
-
-
- Meanwhile the highly regulated broadcast media are grounded in the
- idea, arguably mistaken, that spectrum scarcity and the pervasiveness
- of the broadcast media warrant government allocation and control of
- access to broadcast frequencies (and some control of content). Access
- to this technology is open to any consumer who can purchase a radio or
- television set, but it is nowhere near as open for information
- producers.
-
-
- Networks as they now operate contain elements of publishers,
- broadcasters, bookstores and telephones, but no one model fits. This
- hybrid demands new thinking or at least a new application of the old
- legal principles. As hybrids, computer networks also have some features
- that are unique among the communications media. For example, most
- conversations on bulletin boards, chat lines and conferencing systems
- are both public and private at once. The electronic communicator speaks
- to a group of individuals, only some of whom are known personally, in a
- discussion that may last for days or months.
-
-
- But the dissemination is controlled, because the membership is limited
- to the handful of people who are in the virtual room, paying attention.
- Yet the result may also be "published" -- an archival textual or voice
- record can be automatically preserved, and newcomers can read the
- backlog. Some people tend to equate on-line discussions with party (or
- party-line) conversations, whereas others compare them to newspapers
- and still others think of citizens band radio.
-
-
- In this ambiguous context, freespeech controversies are likely to
- erupt. Last year an outcry went up against the popular Prodigy comput-
- er service, a joint venture of IBM and Sears, Roebuck and Co. The
- problem arose because Prodigy management regarded their service as
- essentially a newspaper" or "magazine," for which a hierarchy of
- editorial control is appropriate. Some of Prodigy's customers, in
- contrast, regarded the service as more of a forum or meeting place.
-
-
- When users of the system tried to protest Prodigy's policy, its editors
- responded by removing the discussion. then the protestors tried to
- use electronic mail as a substitute for electron- assembly,
- communicating through huge mailing lists. Prodigy placed a limit on the
- number of messages each individual could send.
-
-
- The Prodigy controversy illustrates important principle that belongs on
- civil liberties agenda for the future: freedom-of-speech issues will not
- disappear simply because a service provider has tried to impose a
- metaphor on its service. Subscribers sense, I believe, that freedom of
- speech on the networks is central for individuals to use electronic
- communications. Science fiction writer William Gibson once remarked
- that "the street finds its own uses for things." Network service pro-
- viders will continue to discover that their customers will always find
- their own best uses for new media.
-
-
- Freedom of speech on networks will be promoted by limiting content-based
- regulations and by promoting competition among providers of network
- services. The first is necessary because governments will be tempted
- to restrict the content of any information service they subsidize or
- regulate. The second is necessary because market competition is the
- most efficient means of ensuring that needs of network users will be
- met.
-
-
- The underlying network should essentially be a "carrier" -- it should
- operate under a content-neutral regime in which access is available to
- any entity that can pay for it. The information and forum services would
- be "nodes" on this network. (Prodigy, like GEnie and CompuServe,
- currently maintains its own proprietary infrastructure, but a future
- version of Prodigy might share the same network with services like
- CompuServe.)
-
-
- Each service would have its own unique character and charge its own
- rates. If a Prodigy-like entity correctly perceives a need for an
- electronic "newspaper" with strong editorial control, it will draw an
- audience. Other less hierarchical services will share the network with
- that "newspaper" yet find their own market niches, varying by format and
- content.
-
-
- The prerequisite for this kind of competition is a carrier capable of
- highbandwidth traffic that is accessible to individuals in every
- community. Like common carriers, these network carriers should be seen
- as conduits for the distribution of electronic transmissions. They
- should not be allowed to change the content of a message or to discrim-
- inate among messages.
-
- This kind of restriction will require shielding the carriers from legal
- liabilities for libel, obscenity and plagiarism. Today the ambiguous
- state of liability law has tempted some computer network carriers to
- reduce their risk by imposing content restrictions. This could be
- avoided by appropriate legislation. Our agenda requires both that the
- law shield carriers from liability based on content and that carriers
- not be allowed to discriminate.
-
-
- All electronic "publishers" should be allowed equal access to networks.
- Ultimately, there could be hundreds of thousands of these information
- providers, as there are hundreds of thousands of print publishers
- today. As "nodes," they will be considered the conveners of the
- environments within which on-line assembly takes place.
-
-
- None of the old definitions will suffice for this role. For example,
- to safeguard the potential of free and open inquiry, it is desirable
- to preserve each electronic publisher's control over the general flow
- and direction of material under his or her imprimaturQin effect, to give
- the "sysop," or system operator, the prerogatives and protections of a
- publisher.
-
-
- But it is unreasonable to expect the sysop of a node to review every
- message or to hold the sysop to a publish er's standard of libel.
- Message traffic on many individually owned services is already too
- great for the sysop to review. We can only expect the trend to grow.
- Nor is it appropriate to compare nodes to broadcasters (an analogy
- likely to lead to licensing and content-based regulation). Unlike the
- broadcast media, nodes do not dominate the shared resource of a public
- community, and they are not a pervasive medium. To take part in a
- controversial discussion, a user must actively seek entry into the
- appropriate node, usually with a subscription and a password.
-
-
- Anyone who objects to the content of a node can find hundreds of other
- systems where they might articulate their ideas more freely. The danger
- is if choice is somehow restricted: if all computer networks in the
- country are restrained from allowing discussion on particular subjects
- or if a publicly sponsored computer network limits discussion.
-
-
- This is not to say that freedom-of-speech principles ought to protect
- all electronic communications. Exceptional cases, such as the BBS used
- primarily to traffic in stolen long-distance access codes or credit-card
- numbers, will always arise and pose problems of civil and criminal
- liability. We know that electronic freedom of speech, whether in public
- or private systems, cannot be absolute. In face-to-face conversation and
- printed matter today, it is commonly agreed that freedom of speech
- does not cover the communications inherent in criminal conspiracy,
- fraud, libel, incitement to lawless action and copyright infringement.
-
-
- If there are to be limits on electronic freedom of speech, what
- precisely should those limits be? One answer to this question is the
- U.S. Supreme Court's 1969 decision in Brandenburg v. Ohio. The court
- ruled that no speech should be subject to prior restraint or criminal
- prosecution unless it is intended to incite and is likely to cause
- imminent lawless action.
-
-
- In general, little speech or publication falls outside of the
- protections of the Brandenburg case, since most people are able to
- reflect before acting on a written or spoken suggestion. As in
- traditional media, any on-line messages should not be the basis of
- criminal prosecution unless the Brandenburg standard is met.
-
-
- Other helpful precedents include cases relating to defamation and
- copyright infringement. Free speech does not mean one can damage a
- reputation or appropriate a copyrighted work without being called to
- account for it. And it probably does not mean that one can release a
- virus across the network in order to "send a message" to network
- subscribers. Although the distinction is trickier than it may first
- appear, the release of a destructive program, such as a virus, may be
- better analyzed as an act rather than as speech.
-
-
- Following freedom of speech on our action agenda is freedom from unrea-
- sonable searches and seizures. The Steve Jackson case was one of many
- cases in which computer equipment and disks were seized and held some-
- times for months -often without a specific charge being filed. Even when
- only a few files were relevant to an investigation, entire computer
- systems, including printers, have been removed with their hundreds of
- files intact.
-
-
- Such nonspecific seizures and searches of computer data allow "rummag-
- ing," in which officials browse through private files in search of
- incriminating evidence. In addition to violating the Fourth Amendment
- requirement that searches and seizures be "particular," these searches
- often run afoul of the Electronic Communications Privacy Act of 1986.
- This act prohibits the government from seizing or intercepting elec-
- tronic communications without proper authorization. They also contravene
- the Privacy Protection Act of 1980, which prohibits the government from
- searching the offices of Dublishers for documents, including
- materials that are electronically stored.
-
-
- We can expect that law enforcement agencies and civil libertarians
- will agree over time about the need to establish procedures for
- searches and seizures of "particular" computer data and hardware. Law
- enforcement officials will have to adhere to guidelines in the above
- statutes to achieve Fourth Amendment "particularity" while maximizing
- the efficiency of their searches. They also will have to be trained to
- make use of software tools that allow searches for particular files or
- particular information within files on even the most capacious hard
- disk or optical storage device.
-
-
- Still another part of the solution will be law enforcement's abandonment
- of the myth of the clever criminal hobbyist. Once law enforcement no
- longer assumes worst-case behavior but looks instead for real evidence
- of criminal activity, its agents will learn to search and seize only
- what they need.
-
-
- Developing and implementing a civil liberties agenda for computer net-
- works will require increasing participation by technically trained
- people. Fortunately, there are signs that this is begining to happen.
- The Computers, Freedom and Privacy Conference, held last spring in San
- Francisco, along with electronic conferences on the WELL (Whole Earth
- 'Lectronic Link) and other computer networks, have brought law
- enforcement officials, supposed hackers and interested members of the
- computer community together in a spirit of free and frank discussion.
- Such gatherings are beginning to work out the civil liberties guidelines
- for a networked society.
-
-
- There is general agreement, for example, that a policy on electronic
- crime should offer protection for security and privacy on both
- individual and institutional systems. Defining a measure of damages
- and setting proportional punishment will require further goodfaith
- deliberations by the community involved with electronic freedoms, in-
- cluding the Federal Bureau of Investigation, the Secret Service, the
- bar associations, technology groups, telephone companies and civil
- libertarians. It will be especially important to represent the damage
- caused by electronic crime accurately and to leave room for the valuable
- side of the hacker spirit: the interest in increasing legitimate under-
- standing through exploration.
-
-
- We hope to see a similar emerging consensus on security issues. Network
- systems should be designed not only to provide technical solutions to
- security problems but also to allow system operators to use them
- without infringing unduly on the rights of users. A security system
- that depends on wholesale monitoring of traffic, for example, would
- create more problems than it would solve.
-
-
- Those parts of a system where damage would do the greatest harm --
- financial records, electronic mail, military data -- should be
- protected. This involves installing more effective computer security
- measures, but it also means redefining the legal interpretations of
- copyright, intellectual property, computer crime and privacy so that
- system users are protected against individual criminals and abuses by
- large institutions. These policies should balance the need for civil
- liberties against the need for a secure, orderly, protected electronic
- society.
-
-
- As we pursue that balance, of course, confrontations will continue to
- take place. In May of this year, Steve Jackson Games, with the support
- of the EFF, filed suit against the Secret Service, two individual Secret
- Service agents, an assistant U.S. attorney and others.
-
-
- The EFF is not seeking confrontation for its own sake. One of the
- realities of our legal system is that one often has to fight for a legal
- or constitutional right in the courts in order to get it recognized
- outside the courts. One goal of the lawsuit is to establish clear
- grounds under which search and seizure of electronic media is
- "unreasonable" and unjust. Another is to establish the clear
- applicability of First Amendment principles to the new medium.
-
-
- But the EFF's agenda extends far beyond liagation. Our larger agenda
- includes sponsoring a range of educational initiatives aimed at the
- public's general lack of familiarity with the technology and its
- potential. That is why there is an urgent need for technologically
- knowledgeable people to take part in the public debate over communica-
- tions policy and to help spread their understanding of these issues.
- Fortunately, the very technology at stake -- electronic conferencing
- -- makes it easier than ever before to get involved in the debate.
-
-
-
-
-
-