home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun Nov 3, 1996 Volume 8 : Issue 77
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #8.77 (Sun, Nov 3, 1996)
- File 1--Class Action Notice in CCC BBS lawsuit
- File 2--Excerpts from the CCC BBS Lawsuit
- File 3--Cu Digest Header Info (unchanged since 7 Apr, 1996)
-
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Sat, 19 Oct 1996 12:18:00 -0400
- From: Pete Kennedy <PKENNEDY@gdf.com>
- Subject: File 1--Class Action Notice in CCC BBS lawsuit
-
- Editors -- I would appreciate it if you could include the following
- notice in an upcoming edition of CUD. I believe this lawsuit is the
- first of its kind -- a class action brought by users of a 5,500-user
- BBS against the government officials who seized it in a pornography
- raid on June 16, 1995. The Judge (at our suggestion) has ordered
- that notice be distributed electronically, as there are some 500 plus
- non-subscribers whose mail was seized from the BBS Internet gateway.
- We have modelled this lawsuit after the Steve Jackson Games lawsuit
- which I participated in back in 1993, but expanded it to a class
- action on behalf of all users of the system.
-
- --------------------------------------------------------------
- Peter D. Kennedy George Donaldson & Ford, L.L.P.
- pkennedy@gdf.com 114 West 7th Street, Suite 1000
- (512) 495-1416 (voice) Austin, Texas 78701
- (512) 499-0094 (fax) http://www.gdf.com
- --------------------------------------------------------------
-
- NOTICE OF CLASS ACTION LAWSUIT
-
- TO: All persons who, on June 16, 1995, were users,
- subscribers, or customers of the Cincinnati
- Computer Connection electronic bulletin board
- service, and all persons whose private electronic
- communications were resident on the Cincinnati
- Computer Connection BBS when it was seized by the
- Defendants, but not including the actual provider
- of that electronic bulletin board service or any
- law enforcement agencies or personnel investigating
- that electronic bulletin board service.
-
- NOTICE IS HEREBY GIVEN that a lawsuit has been filed in this
- court that may affect your legal rights. This case has been
- certified by the Court as a class action. A class action is a
- lawsuit in which one or more persons can sue on behalf of other
- persons in the same or similar situation. If you are a person who
- falls within the group of persons described above, you are a member
- of the class that the named Plaintiffs represent. The Court has
- ruled that the named Plaintiffs, Steven Guest, Denise Kelley, Ben
- Kelley, Nelda Sturgill, Deborah Cummings, Randy Bowling and Richard
- Kramer, may bring this lawsuit on behalf of all those persons
- described in the group above.
-
- YOU ARE NOT BEING SUED. THERE IS NO REQUIREMENT THAT YOU
- ATTEND COURT, HIRE A LAWYER, OR PAY ANY OF THE COSTS OF
- THIS LAWSUIT. IF YOU CHOOSE, HOWEVER, YOU MAY HIRE YOUR
- OWN LAWYER, AND, IF YOU DO SO, YOU WILL BE RESPONSIBLE
- FOR PAYING YOUR LAWYER'S FEES.
-
- AS A MEMBER OF THE CLASS, YOU ARE HEREBY FURTHER GIVEN
- NOTICE OF THE FOLLOWING MATTERS:
-
- 1. On December 5, 1995, the individual Plaintiffs, Steven
- Guest, Denise Kelley, Ben Kelly, Nelda Sturgill, Deborah Cummings,
- Randy Bowling and Richard Kramer, sought certification of this
- lawsuit as a class action, against the following Defendants: Simon
- L. Leis, Jr., Hamilton County (Ohio) Sheriff's Department, Hamilton
- County (Ohio) Regional Electronics Computer Intelligence Task
- Force, Dale Menkhaus, David Ausdenmoore, and James Nerlinger.
-
- 2. The named Plaintiffs have brought this action not only on
- their own behalf, but on behalf of all the following group of
- persons ("the Class"):
-
- All persons who, on June 16, 1995, were users, subscribers, or
- customers of the Cincinnati Computer Connection electronic
- bulletin board service, and all persons whose private
- electronic communications were resident on the Cincinnati
- Computer Connection BBS when it was seized by the Defendants,
- but not including the actual provider of that electronic
- bulletin board service or any law enforcement agencies or
- personnel investigating that electronic bulletin board
- service.
-
- 3. The named Plaintiffs generally allege that the
- Defendants' seizure, on June 16, 1995, of the Cincinnati Computer
- Connection electronic bulletin board system violated the civil
- rights of the subscribers and users of that system. This lawsuit
- has been filed, alleging that the Defendants' seizure and retention
- of the contents of the Cincinnati Computer Connection BBS violated
- the Electronic Communications Privacy Act of 1986, the First
- Amendment Privacy Protection Act of 1980, the First Amendment, the
- Fourth Amendment, and Ohio law.
-
- 4. The Defendants have denied the Plaintiffs' allegations.
-
- YOU ARE ADVISED THAT IF YOU ARE A MEMBER OF THE CLASS, and
- that if you do not wish to be considered a member of this class and
- represented by the above-named Plaintiffs, you may be excluded from
- this lawsuit by notifying the Court in this cause in writing of
- that wish, within 60 days of the date of this Notice. If you wish
- exclusion, you should send written correspondence notifying the
- Court of your wish to be excluded from the lawsuit to:
-
- Kenneth J. Murphy
- Office of the District Clerk
- United States District Court
- Southern District of Ohio
- 100 E. Fifth Street
- Cincinnati, Ohio 45202
- (513) 583-4210
-
- Re: Guest, et al., v. Leis, et al., No. C-1-95-673; U.S.
- District Court, Southern District of Ohio, Western
- Division
-
- If you are excluded from the class, you will not receive
- payment from any settlement or judgment entered in this lawsuit.
- You will not be bound by the terms of any settlement or judgment
- entered in this lawsuit, and you will be free to pursue any legal
- rights you may have on your own behalf.
-
- YOU ARE FURTHER ADVISED THAT IF YOU ARE A MEMBER OF THE CLASS
- and you do not elect to be excluded from the class, under Ohio and
- federal law:
-
- 1. You will be bound by the terms of the judgment in this
- cause, whether such judgment is favorable or not.
-
- 2. You may be subjected to a cross complaint or some other
- affirmative action by the Defendants.
-
- 3. Although this action is pending, the Defendants are not
- prevented in any way from exercising all remedies available to them
- by contract or law.
-
- 4. The named Plaintiffs and the Class in this lawsuit are
- represented by:
-
- Scott T. Greenwood
- Greenwood & Associates
- 2301 Carew Tower
- 441 Vine Street
- Cincinnati, Ohio 45202
- (513) 684-0101 (phone)
- (513) 684-0077 (fax)
- stgrnwd@iac.net (internet)
-
- Peter D. Kennedy
- George, Donaldson & Ford, L.L.P.
- 114 W. 7th Street, Suite 1000
- Austin, Texas 78701
- (512) 495-1400 (phone)
- (512) 499-0094 (fax)
- pkennedy@gdf.com (internet)
-
- 5. You may contact the attorneys for the Plaintiffs listed
- above for further information concerning this action.
-
- 6. Be aware that the Court, by initially certifying this
- lawsuit as a class action, has not expressed any option as to the
- merits of this lawsuit.
-
- SIGNED this 10th day of September, 1996.
-
-
-
- _____________/S/____________________
- JACK SHERMAN JR., UNITED STATES
- MAGISTRATE JUDGE
-
- ------------------------------
-
- Date: Sat, 19 Oct 1996 12:18:00 -0400
- From: Pete Kennedy <PKENNEDY@gdf.com>
- Subject: File 2--Excerpts from the CCC BBS Lawsuit
-
- ((MODTERATORS' NOTE: Following are some excerpts from the
- complaint by Cincinnati Computer Connection BBS Lawsuit against
- law enforcement officials. The full text can be found at:
- http://www.soci.niu.edu/~cudigest/docs/cccsuit))
-
- -1-
-
-
- UNITED STATES DISTRICT COURT
- SOUTHERN DISTRICT OF OHIO
- WESTERN DIVISION
-
-
- STEVEN GUEST,
- 1513 Denny Drive:CIVIL ACTION NO. C-1-95-673
- Amelia, Ohio 45102
- Judge Weber
- and
- Magistrate Judge Sherman
- DENISE B. KELLEY,
- 2814 Topview Place
- Cincinnati, Ohio 45251
-
- and
-
- BEN S. KELLEY,
- 2814 Topview Place
- Cincinnati, Ohio 45251
-
- and
-
- NELDA STURGILL,
- 5629 Homer Avenue
- Cincinnati, Ohio 45212
-
- and
-
- DEBORAH CUMMINGS,
- 912 Ravine Drive
- Villa Hills, Kentucky 41017
-
- and
-
- RANDY BOWLING,
- P.O. Box 13425
- Hamilton, Ohio 45013
-
- and CLASS ACTION
-
- RICHARD E. KRAMER,:SECOND AMENDED
- 998 Highland Avenue:COMPLAINT
- Hamilton, Ohio 45013:(JURY DEMAND
- ENDORSED
- and HEREON)
-
- all others similarly situated,
-
- Plaintiffs,
-
- vs.
-
- SIMON L. LEIS, JR.,
- Hamilton County Justice Center
- 1000 Sycamore Street
- Cincinnati, Ohio 45202
-
- and
-
- Hamilton County
- Sheriff's Department,
- Hamilton County Justice Center
- 1000 Sycamore Street
- Cincinnati, Ohio 45202
-
- and
-
- Hamilton County Regional
- ELECTRONIC Computer
- INTELLIGENCE Task Force,
- Hamilton County Justice Center
- 1000 Sycamore Street
- Cincinnati, Ohio 45202
-
- and
-
- Dale MenkHaus,
- Hamilton County Justice Center
- 1000 Sycamore Street
- Cincinnati, Ohio 45202
-
- and
-
- DAVID L. AUSDENMOORE,
- Hamilton County Justice Center
- 1000 Sycamore Street
- Cincinnati, Ohio 45202
-
- and
-
-
- JAMES NERLINGER,
- Hamilton County Justice Center
- 1000 Sycamore Street
- Cincinnati, Ohio 45202
-
- Defendants.
-
-
- I. INTRODUCTION
-
- 1.The Plaintiffs bring this lawsuit on behalf of themselves and the thousands
- of subscribers to the Cincinnati Computer Connection electronic bulletin board
- system, in order to redress the violation of their civil rights by Hamilton
- County Sheriff Simon L. Leis, Jr. and the other Defendants.
- 2.On June 16, 1995, the Hamilton County Regional Electronic Computer
- Intelligence Task Force (the "Task Force") raided at least five electronic
- bulletin board systems in the Cincinnati area, in a search for allegedly
- obscene materials.
- 3.During these raids, the Task Force seized the entire computer network
- comprising the Cincinnati Computer Connection BBS, a computer bulletin board
- service with thousands of subscribers in Southern Ohio, Northern Kentucky, and
- beyond. Robert Emerson owns and operates the Cincinnati Computer Connection
- BBS. The target of the raid was some 45 computer image files allegedly stored
- on the Cincinnati Computer Connection BBS. According to the search warrant,
- the Task Force already had obtained copies of these image files from the
- Cincinnati Computer Connection BBS.
- 4.In pursuit of these 45 image files, the Sheriff and Task Force raided and
- seized the entire bulletin board system. In the process, Sheriff Leis and his
- Task Force seized the private electronic mail and communications of thousands
- of entirely innocent subscribers, they shut down an active, thriving,
- electronic community of average citizens, and they denied thousands of people
- access to their friends, neighbors, and business associates.
- 5.The named Plaintiffs bring this lawsuit on behalf of themselves and the
- thousands of subscribers to the Cincinnati Computer Connection and all those
- whose electronic communications were seized and intercepted during the raid, in
- order to remedy this violation of their civil rights guaranteed by the First
- Amendment, the Fourth Amendment, the Fourteenth Amendment, the Ohio
- Constitution, the Electronic Communications Privacy Act of 1986 (18 U.S.C. '
- 2510 et seq. and ' 2701 et seq.), the First Amendment Privacy Protection Act of
- 1980 ( 42 U.S.C. ' 2000aa et seq.), and Ohio common law.
-
-
- II. JURISDICTION
-
- 6.This action seeks to enforce rights guaranteed by the Constitution and laws
- of the United States and is brought pursuant to 42 U.S.C. '' 1983 and 1985.
- Jurisdiction is based upon 28 U.S.C. '' 1331 and 1343(3). The substantive
- federal claims are brought pursuant to 42 U.S.C. ''1983 and 1985, 18 U.S.C.
- ''2707 and 2520, and 42 U.S.C. ' 2000aa-7. Declaratory relief is sought
- pursuant to 28 U.S.C. ''2201-2202. Authority to hear the pendent state claims
- is conferred by the Court's supplemental jurisdiction under 28 U.S.C. '1367.
- This action does not raise novel or complex issues of state law, and the state
- law claims do not predominate over the federal law claims.
- 7.Venue is proper in the Southern District of Ohio, Western Division, under 28
- U.S.C. '1391(b), because at least one Defendant resides in this District and
- Division and because a substantial part of the events or omissions giving rise
- to the claims occurred within this District and Division.
-
-
- III. PARTIES
-
-
- A.PLAINTIFFS
- 8.PLAINTIFF STEVEN GUEST is a thirty-two year old resident of Clermont County,
- Ohio. Mr. Guest is a computer consultant who uses the Cincinnati Computer
- Connection BBS to send and receive electronic communications, to conduct his
- consulting business, to exchange files with his business partners, to access
- shareware, and otherwise to engage in expressive and associational activity.
- 9.PLAINTIFF DENISE KELLEY is a sixty-nine year old resident of Hamilton County,
- Ohio. She is employed by the Hamilton County Department of Human Services as
- an investigation coordinator and serves as the chief union steward for AFSCME
- Local 1768. Mrs. Kelley, mother of three and grandmother of seven, uses the
- Cincinnati Computer Connection BBS for political discussion, to download
- shareware files, to play some games, to send and receive electronic mail
- communications across the Internet, to "chat" with users, to write stories in
- an on-line conference, and otherwise to engage in expressive and associational
- activity.
- 10.PLAINTIFF BEN S. KELLEY is Mrs. Kelley's husband, a seventy-six year old
- retired machinist who resides in Hamilton County, Ohio. Mr. Kelley, father of
- three and grandfather of seven, uses the Cincinnati Computer Connection BBS to
- send and receive electronic communications, play games, to read the discussions
- going on in various conferences, and otherwise to engage in expressive and
- associational activity.
- 11.PLAINTIFF NELDA STURGILL is a registered nurse in a local hospital who
- resides in Hamilton County. In her thirties, Ms. Sturgill uses the Cincinnati
- Computer Connection BBS to send and receive electronic communications across
- the Internet, to access shareware programs, to keep abreast of information
- through the use of the Usenet newsgroups, and otherwise to engage in expressive
- and associational activity. Ms. Sturgill particularly participates in the
- health-related conferences newsgroups, and has exchanged recipes and ideas with
- people from Australia, England and the United States.
- 12.PLAINTIFF DEBORAH CUMMINGS is a resident of Kenton County, Kentucky. Ms.
- Cummings uses the Cincinnati Computer Connection BBS to send and receive
- electronic communications, to conduct her business, and to otherwise engage in
- expressive and associational activity.
- 13.PLAINTIFF RANDY BOWLING is a resident of Butler County, Ohio. Mr. Bowling
- suffers from a head injury that makes speaking very difficult. Mr. Bowling
- uses the Cincinnati Computer Connection BBS to send and receive electronic
- communications, to supplement his limited ability to speak, and to discuss his
- head injury and therapy, and to engage in the majority of his expressive and
- associational activity. Mr. Bowling also uses the Cincinnati Computer
- Connection BBS to facilitate his current study of computer systems.
- 14.PLAINTIFF RICHARD KRAMER is a retired insurance agent who resides in Butler
- County, Ohio. Mr. Kramer, who uses a wheelchair, uses the Cincinnati Computer
- Connection BBS to send and receive electronic communications, to supplement his
- sometimes restricted access to more traditional fora for expressive and
- associational activity, to access file-management and utility shareware, and to
- study computer systems.
- 15.Each named Plaintiff is a citizen of the United States.
- 16.At all times relevant herein, Plaintiffs were users of the Cincinnati
- Computer Connection BBS.
- Class Action Allegations
- 17.The named Plaintiffs are proper representatives of a class within the
- meaning of Rule 23(a) and 23(b) (3) of the Federal Rules of Civil Procedure.
- 18.The members of the class are so numerous that the joinder of all of them is
- impractical. Upon information and belief, the class consists of at least
- several thousand persons. The exact size of the class is unknown because the
- Defendants have seized and failed to return the computer and/or documentary
- records needed to determine the exact number and identity of the class members.
- 19.The members of the class should be readily identifiable from records seized
- by the Defendants.
- 20.There are questions of law and fact common to the class; their class claims
- predominate over any individual claims. Each class member shares the same
- federal and state constitutional protections of their right to speak, publish
- and associate. Each class member shares the same federal and state
- constitutional right to be free from unreasonable searches and seizures. Each
- class member shares the same federal and state rights protecting the privacy of
- their electronic communications and subscriber records.
- 21.The claims of the named Plaintiffs are typical of the claims of the class.
- All class members suffered a similar violation of their common rights when the
- Defendants seized and shut down the Cincinnati Computer Connection BBS, and,
- upon information and belief, reviewed their private electronic communications
- and subscriber records. As alleged in greater detail above, the Plaintiffs'
- uses of the Cincinnati Computer Connection BBS typify the uses of the class
- members generally.
- 22.The named Plaintiffs will fairly and adequately protect the interests of the
- class. As of June 16, 1995, each named Plaintiff was a user of the Cincinnati
- Computer Connection BBS. The named Plaintiffs are represented by counsel
- experienced in litigating federal and state civil rights lawsuits, including
- class actions, and who are familiar with the technology involved and
- experienced in litigating computer communications cases. The representative
- Plaintiffs know of no conflict of interest among class mem.bers. Plaintiffs
- will vigorously prosecute this action.
- 23.The class consists of all persons who, on June 16, 1995, were users,
- subscribers, or customers of the Cincinnati Computer Connection electronic
- bulletin board service, and all persons whose private electronic communications
- were resident on the Cincinnati Computer Connection BBS when it was seized by
- the Defendants, but not including the actual provider of that electronic
- bulletin board service.
- 24.Plaintiffs do not propose class notice at this time, but belief that class
- certification and notice can and should be achieved promptly.
-
- B.DEFENDANTS
- 25.Defendant Simon L. Leis, Jr., is and was at all relevant times the Sheriff
- of Hamilton County, Ohio. For the constitutional and common law claims,
- Defendant Leis is sued in his official capacity with respect to the declaratory
- and injunctive relief sought herein, and in his individual capacity with
- respect to the request for damages and attorney's fees in this action. For the
- federal statutory claims, Defendant Leis is sued in his individual and official
- capacities.
- 26.Defendant Hamilton County Sheriff's Department is a sheriff's department
- organized under the laws of the State of Ohio.
- 27.Defendant Hamilton County Regional ELECTRONIC Computer INTELLIGENCE Task
- Force was at all relevant times a division of the Hamilton County Sheriff's
- Department purportedly organized to develop and use special skills and
- expertise in investigating suspected computer crimes.
- 28.Defendant Dale MenkHaus is and was at all relevant times the Commander and
- /or a member of the Regional Electronic Computer Intelligence Task Force. For
- the constitutional and common law claims, Defendant Menkhaus is sued in his
- official capacity with respect to the declaratory and injunctive relief sought
- herein, and in his individual capacity with respect to the request for damages
- and attorney's fees in this action. For the federal statutory claims,
- Defendant Menkhaus is sued in his individual and official capacities.
- 29.Defendant DAVID L. AUSDENMOORE is and was at all times referred to herein a
- member of the Regional Electronic Computer Intelligence Task Force. For the
- constitutional and common law claims, Defendant Ausdenmoore is sued in his
- official capacity with respect to the declaratory and injunctive relief sought
- herein, and in his individual capacity with respect to the request for damages
- and attorney's fees in this action. For the federal statutory claims,
- Defendant Ausdenmoore is sued in his individual and official capacities.
- 30.Defendant JAMES NERLINGER is and was at all times referred to herein a
- member of the Regional Electronic Computer Intelligence Task Force. For the
- constitutional and common law claims, Defendant Nerlinger is sued in his
- official capacity with respect to the declaratory and injunctive relief sought
- herein, and in his individual capacity with respect to the request for damages
- and attorney's fees in this action. For the federal statutory claims,
- Defendant Nerlinger is sued in his individual and official capacities.
- 31.At all times relevant herein, each named individual Defendant was acting
- under color of state law.
- 32.At all times relevant herein, Defendants, and each of them, separately and
- in concert, acted under color of state law. At all times relevant herein,
- Defendants, and each of them, separately and in concert, engaged in the illegal
- and unconstitutional conduct described herein and deprived Plaintiffs of the
- rights, privileges, and immunities secured to Plaintiffs by the First, Fourth,
- and Fourteenth Amendments to the United States Constitution, the laws of the
- United States, and the Constitution and laws of the State of Ohio.
-
- IV. FACTS
-
- A.The Cincinnati Computer Connection Community.
- 33.On June 16, 1995, and for many years before that, the Cincinnati Computer
- Connection ("CCC") was a thriving community. The bulletin board system ("BBS")
- provided a forum for its users to speak and publish privately and publicly, to
- debate, to associate and recreate, and to exchange ideas and information. On
- June 16, 1995, the faces of the CCC subscribers were the faces of Greater
- Cincinnati -- working men and women, retirees, mothers, fathers, grandparents
- and children, Republicans, Democrats and Independents. The CCC community even
- included subscribers from around the United States and overseas.
- 34.Many of the subscribers to the CCC BBS have made personal acquaintances
- through the bulletin board community. Subscribers have held dinner
- get-togethers to meet personally, to socialize, and to discuss matters of
- interest to the BBS community. These meetings were organized by the
- subscribers by using the BBS itself.
- 35.On June 16, 1995, the CCC community included thousands of users and
- subscribers. Because the CCC computers and subscriber records remain in the
- hands of the Defendants, the exact number remains unknown.
- 36.At all relevant times, the CCC BBS affected and operated in the stream of
- interstate commerce.
-
- B.The Cincinnati Computer Connection BBS.
- 37.Each user or subscriber to the CCC BBS selected a private password, which
- secured the privacy of his or her account. The subscriber contacted the CCC
- BBS by using his or her personal computer, a modem, and a phone line. The
- user's computer would call the CCC BBS over a phone line, and after "logging
- in" by using the confidential password, the user was given access to the CCC
- BBS. Once connected to the BBS, the subscriber could do a whole range of
- things, including:
- i.Private electronic mail or "e-mail."
- 38.The CCC BBS provided subscribers the ability to send and receive private
- electronic communications, typically known as e-mail. A subscriber could
- compose private electronic messages either before "logging on" to the CCC, or
- while connected to the bulletin board system. Just like First Class mail,
- e-mail messages are addressed to a specific person, and are confidential.
- 39.E-mail was sent and received in two manners on the CCC BBS. E-mail
- exchanged between persons who had accounts on the CCC BBS was sent within the
- many conference areas on the BBS (see below). If the sender designated a
- conference message "confidential," the message remained inaccessible to any
- user except the designated recipient. The CCC BBS also provided an "Internet
- mail gateway." This feature allowed subscribers to send and receive
- confidential electronic communications from persons who did not have an account
- on the CCC BBS, but who had an Internet address. This Internet mail gateway
- allowed the users of the CCC BBS to send confidential electronic communications
- to, and receive them from, tens of millions of persons around the world.
- 40.This e-mail was not readily accessible to the public. The users of the CCC
- BBS, and those who sent electronic mail to the CCC BBS from the Internet, had a
- reasonable expectation of privacy in those communications.
- 41.When Defendant Leis and the other Defendants seized the CCC BBS, they seized
- all of the private electronic communications contained on the system, and cut
- off the subscribers' ability to send and receive e-mail.
- ii.Conference areas.
- 42.In addition to e-mail, the Cincinnati Computer Connection provided its
- subscribers access to thousands of "conferences." These conferences, like the
- sections of a library, are the main organizational units of the BBS. Each
- conference area had a name and a topic. For example, the CCC BBS had
- conference areas dedicated to writers, game players, and computer
- professionals. When a subscriber accessed the bulletin board system, he or she
- could "enter" an conference area. Once in a conference area, the subscriber
- could read all the public messages posted by other visitors to the conference,
- post public reply messages or begin new public discussions on new topics. The
- user could also send and receive private electronic communications within the
- conference. The CCC BBS provided literally thousands of conferences for its
- users, including:
- a.Local conference areas.
- 43.These conferences were unique to the CCC BBS, and included discussions and
- debates on topics ranging from local and national politics to sports and
- computers. These conferences were the heart of the local CCC community
- interaction.
- b.Private local conference areas.
- 44.The CCC BBS also provided conference areas that were restricted to
- particular users. These restricted conference areas were used by subscribers
- for confidential business purposes, including exchanging confidential
- information.
- c.BBS network conferences.
- 45.On June 16, 1995, the CCC BBS also provided to its users "feeds" from
- networks of similar dial-up bulletin board systems. These networks provided
- dozens of additional conference areas, and allowed the users of the CCC BBS to
- engage in discussion on topics with users of a whole network of BBSs beyond the
- subscribers to the CCC BBS.
- d.Usenet newsgroups.
- 46.The CCC BBS also received, via satellite feed, thousands of additional
- conferences from an Internet network known as Usenet. Usenet is essentially a
- bulletin board system for the Internet. Usenet is organized into thousands of
- separate "newsgroups" where people from all around the world can engage in
- discussion and debate on a huge variety of topics, ranging from computer
- science, philosophy, and law to pop music. The CCC subscribers could read and
- participate in these newsgroups.
- 47.When Defendant Leis and the other Defendants seized the CCC BBS, they seized
- all of the contents of all of these thousands of conference areas, and denied
- the subscribers to the CCC any access to the conferences.
- iii.Live "chat."
- 48. The Cincinnati Computer Connection BBS also featured live chat "channels."
- Similar to CB radio channels, the "chat" function allowed subscribers to
- converse in "real time" with other subscribers who were logged into the BBS.
- One subscriber could invite another person to chat, and the two subscribers
- could exchange confidential messages by typing them in sequence to each other.
- 49.When Defendant Leis and the other Defendants seized the CCC BBS, they shut
- down any chat taking place on the board and seized any captured chat file
- sessions.
- iv.Games.
- 50.The game areas on the CCC were very popular. Subscribers could play a
- variety of on-line games against the computer or against other subscribers.
- Some "games" were more like interactive creative writing, with different users
- of the BBS taking on personas and interacting with each other in a fictional
- world.
- 51.The Defendants' seizure of the bulletin board system of course included
- seizure of all the games, and cut off the subscribers' access to the games.
- v.File transfer.
- 52.The CCC BBS offered its subscribers the ability to "upload" computer files
- from their home computer to the bulletin board system, and to "download"
- computer files from the bulletin board to their home computers. Computer files
- can consist of anything from computer programs and other software, to the text
- of written material (such as this Complaint), to picture files and sound files.
- The CCC BBS had an enormous library of computer files for its users to access
- and use. The Defendants seized this entire library of thousands of computer
- files when they seized the 45 allegedly obscene images they were after.
- vi.The restricted adult file area.
- 53.Among the thousands of conferences on the CCC, there was a single conference
- area dedicated to adult-oriented computer image files. Access to this area was
- extremely limited. In order to gain access to this conference, a subscriber
- was required to verify his age and identity in person to the CCC system
- operator, Mr. Emerson. After verifying the subscriber's age, Emerson would
- configure that user's account to give that subscriber access to the adult file
- area. Only after a subscriber's age and identity was verified, and the
- subscriber's account given access to the adult file area, would the existence
- of the adult file area even appear on the user's screen when logged in to the
- CCC. The "menu" of choices available to a subscriber who had not been verified
- and given access would not even show that an adult file area existed.
- 54.Even for those with access to the restricted adult file area, the adult
- image files could not be viewed "on-line." In order to view a file, a
- subscriber with access would have to log onto the BBS, enter the restricted
- adult area, designate a file for downloading, download that file to the user's
- home computer, log off the system, and then run a separate computer program on
- the home computer that interprets the image and displays it on the user's home
- computer screen.
- 55.The restricted adult file area comprised a very small percentage of the
- material on the CCC BBS -- no more than 3%, and upon information and belief far
- less than that. The number of users with access to this area was also very
- small -- no more than 3% of the subscribers, and upon information and belief
- far less than that. Many, if not most, of the CCC subscribers had no idea that
- an adult file area even existed.
- 56.Compared to the Cincinnati Computer Connection as a whole, the adult file
- area was like a tiny, locked, and largely unknown private room within a huge,
- bustling convention center.
- C.Defendants Obtain A Search Warrant And Go Trolling for Computer Porn.
- 57.On or about June 15, 1995, the Defendants applied to the Municipal Court of
- Clermont Count for a search warrant for the premises containing the CCC BBS
- computers. Municipal Court Judge James A. Shriver signed the search warrant at
- 11:30 p.m. that evening. Upon information and belief, Judge Shriver had never
- reviewed an application for the search or for the seizure of an electronic
- communication system such as the CCC BBS, and had never issued a search warrant
- for such a system. The search warrant itself listed 45 particular image files,
- by name and description, that were the target of the search.
- 58.The Defendants obtained an order sealing from public scrutiny the search
- warrant affidavit that allegedly justified their application for the search
- warrant. Plaintiffs have now obtained a copy of the single affidavit that was
- used to support the application for search warrant.
- 59.The warrant filed in support of the application for search warrant was
- signed by David L. Ausdenmoore. The affidavit was false and/or misleading in
- at least the following respects:
- a)The affidavit failed to inform Judge Shriver that the CCC BBS was a forum for
- speech, publication and associated protected by the Privacy Protection Act of
- 1980, the First Amendment to the United States Constitution, and the Ohio
- Constitution;
- b)The affidavit failed to inform Judge Shriver that the Defendants intended to
- shut down that protected forum, and seize all the publications on that forum;
- c)The affidavit failed to inform Judge Shriver that the CCC BBS contained
- thousands of private electronic communications to and from the subscribers of
- the CCC BBS protected from unauthorized interception, seizure and disclosure by
- the Electronic Communications Privacy Act of 1986;
- d)The affidavit failed to inform Judge Shriver that the Defendants intended to
- shut down this protected electronic communications system;
- e)The affidavit failed to inform Judge Shriver that the Defendants intended to
- seize, intercept and read these protected, private communications;
- f)The affidavit failed to inform Judge Shriver that the Defendants had no
- probable cause to believe that these private communications were relevant to
- the investigation of any criminal activity, let alone the criminal activity
- alleged in the Affidavit;
- g)The affidavit failed to inform Judge Shriver that the Defendants had no
- probable cause to believe that the public communications contained on the
- system of the Plaintiffs were related to any criminal activity, let alone the
- criminal activity alleged in the Affidavit;
- h)The affidavit failed to inform Judge Shriver that far less intrusive means of
- searching for the allegedly offending material were readily available to the
- Defendants, means that would not have involved the seizure of either the
- private electronic messages of the Plaintiffs or their publicly posted
- messages;
- i)The affidavit falsely stated and/or implied that the allegedly obscene
- material on the CCC BBS was "concealed in violation of law," when, according to
- the Affidavit itself, the Defendants had already obtained copies of the images
- by accessing the CCC BBS themselves; and
- j)The affidavit falsely stated that the images sought to be seized by the
- Defendants were downloaded from the CCC BBS "as a regular user of the BBS,"
- falsely implying that all users of the BBS had access to these images, rather
- than a very small number of users.
- D.Defendants Shut Down the Cincinnati Computer Connection BBS and
- Indiscriminately Seize Everything On It.
- 60.On June 16, 1995, purportedly acting under the authority of the search
- warrant signed by Judge Shriver, the Defendants seized the entire CCC BBS. The
- Defendants made no effort to limit their seizure to materials or information
- related to the alleged offense under investigation; rather, they seized the
- entire system, shutting it down completely. If not for a significant personal
- financial commitment by Mr. Emerson after the raid, the CCC BBS would have been
- permanently shut down.
- 61.The Defendants made no effort to return to the Plaintiffs or any other user
- of the CCC BBS their private electronic communications, or to assure that such
- communications reach their intended recipients. Upon information and belief,
- the Defendants have already, or have every intention to, read the private
- electronic communications of the CCC BBS subscribers.
- 62.The Defendants made no effort to limit the scope of their seizure. Prior to
- the raid, the Defendants knew the exact file names of the computer image files
- they were searching for. In fact, the Defendants had already obtained those
- files prior to the raid. The Defendants consciously chose not to use means at
- their disposal that would have allowed for a limited search and seizure of
- evidence relevant to the alleged offense. The Defendants consciously refused
- to use narrower means of obtaining their investigative objectives that would
- have protected the privacy of the subscribers' communications and the integrity
- of their forum.
- 63.The Defendants knew, or should have known, that the CCC BBS was a forum for
- protected speech, publication and communication. The Defendants knew, or
- should have known, that the CCC BBS contained materials being published
- electronically that were protected by the First Amendment to the U.S.
- Constitution, the Ohio Constitution, and the Privacy Protection Act. The
- Defendants knew, or should have known, that the BBS contained the private
- electronic communications of its users, and that such communications were not
- readily accessible to the public. The Defendants knew, or should have known,
- that the users of the CCC BBS had a reasonable expectation of privacy in their
- electronic communications.
- 64.Reasonable law enforcement officers in the position of the Defendants, with
- the information available to the Defendants, would have known that the CCC BBS
- was a forum for speech, publication and communication protected by the First
- Amendment and the Ohio Constitution, and that the electronic communications on
- the CCC BBS were protected by the Fourth Amendment, the Ohio Constitution and
- federal statutory law from search and seizure and interception unless the
- officers had probable cause to believe that those communications were relevant
- to the law enforcement inquiry.
- 65.The raid on the home of Bob Emerson, the seizure of the entire CCC BBS
- system, and the examination and review of the contents of that system, were
- conducted under the direction of Defendant Leis, who is the policymaker for the
- Hamilton County Sheriff's Department, and/or pursuant to a policy or custom
- authorized, permitted and tolerated by Defendants Leis, Hamilton County
- Sheriff's Department, and the Task Force to, among other things:
- a)indiscriminately seize and shut down entire electronic bulletin board systems
- without legal authority or probable cause;
- b)seize and intercept public and private electronic communications and other
- private information of persons without legal authorization or probable cause;
- c)deny innocent persons access to their public and private electronic
- communications, without legal authorization or probable cause;
- d)apply for and obtain search warrants purportedly authorizing the seizure of
- computers, without informing the issuing magistrate or judge that the computer
- system operates an electronic communication system, contains public and private
- communications unrelated to the investigation, and that seizure of the system
- will result in the seizure and interception of electronic communications and
- the complete shutting down of an electronic communication system;
- e)apply for and obtain search warrants purportedly authorizing the seizure of
- computers operating electronic communications systems, without informing the
- issuing magistrate or judge that the computers contain communications protected
- by the Electronic Communications Privacy Act, the Privacy Protection Act of
- 1980, the First and Fourth Amendments to the United States Constitution, and
- Ohio statutory and constitutional law;
- f)exceed the authorization of search warrants in the seizure and examination of
- seized BBSs;
- g)seize and examine BBSs and computer systems in order to search for evidence
- of suspected crimes without legal authorization or probable cause;
- h)conduct searches and seizures outside the territorial jurisdiction of
- Hamilton County without legal authority;
- i)seize and shut down BBSs in order to prevent further publication and
- distribution of materials presumptively protected by the federal and state
- constitutions, without any adversarial determination of the legality of such
- materials; and
- j)knowingly fail and refuse to conduct investigations into suspected computer
- crimes without intercepting, seizing, or denying access to, the private and
- public communications and private information of innocent citizens.
- 66.The Class Members' injuries and deprivation of constitutional, statutory and
- common law rights were proximately caused by Defendants Leis, Hamilton County
- Sheriff's Department, and the Task Force's failure to adequately train their
- officers in the proper manner of conducting investigations of alleged computer
- crime, so that such investigations would be made without the violation of
- innocent persons' rights, and such failure to train amounted to a deliberate
- indifference to the Class Members' constitutional, statutory and common law
- rights.
-
-
- ((The full text of the suit can be obtained at:
- law enforcement officials. The full text can be found at:
-
- ------------------------------
-
- Date: Thu, 21 Mar 1996 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 3--Cu Digest Header Info (unchanged since 7 Apr, 1996)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #8.77
- ************************************
-
-
-