**************************************************************************** >C O M P U T E R U N D E R G R O U N D< >D I G E S T< *** Volume 3, Issue #3.09 (March 19, 1991) ** **************************************************************************** MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet) ARCHIVISTS: Bob Krause / Alex Smith / Bob Kusumoto RESIDENT GAEL: Brendan Kehoe USENET readers can currently receive CuD as alt.society.cu-digest. Back issues are also available on Compuserve (in: DL0 of the IBMBBS sig), PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet. Anonymous ftp sites: (1) ftp.cs.widener.edu (or 192.55.239.132) (back up and running) and (2) cudarch@chsun1.uchicago.edu E-mail server: archive-server@chsun1.uchicago.edu. COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted as long as the source is cited. Some authors, however, do copyright their material, and those authors should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to the Computer Underground. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Contributors assume all responsibility for assuring that articles submitted do not violate copyright protections. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ CONTENTS THIS ISSUE: File 1: "Hollywood Hacker" or More Media and LE Abuse? File 2: Computer Publication and the First Amendment ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ---------------------------------------------------------------------- ******************************************************************** *** CuD #3.09, File 1 of 2: Hollywood Hacker or Media Hype? *** ******************************************************************** From: Jim Thomas / CuD Subject: "Hollywood Hacker" or More Media and LE Abuse? Date: March 20, 1991 In CuD 3.08 we asked for information on the Hollywood Hacker. Here's what we've learned so far. Stuart Goldman, a freelance investigative reporter, was raided on March 8, 1990, by Secret Service agents and the Los Angeles Police. According to news stories in the Los Angeles Times and elsewhere, Goldman was working on an expose of "sleaze-tv" shows such as Current Affair and Hard Copy, shows for which he had also provided written material. According to the news accounts, Goldman was caught attempting to access Fox computers in New York and Los Angeles containing files relevant to Current Affair. He was charged with the usual litany of allegations (fraud, theft, etc) under Section 502(c)(2) of the California Penal Code. Section 502(c)(2) is sufficiently vague to make any number of acts a felony: s 502 (c) Except as provided in subdivision (h), any person who commits any of the following acts is guilty of a public offense: (1) Knowingly accesses and without permission alters, damages, deletes, destroys, or otherwise uses any data, computer, computer system, or computer network in order to either (A) devise or execute any scheme or artifice to defraud, deceive, or extort, or (B) wrongfully control or obtain money, property, or data. (2) Knowingly accesses and without permission takes, copies, or makes use of any data from a computer, computer system, or computer network, or takes or copies any supporting documentation, whether existing or residing internal or external to a computer, computer system, or computer network. Conviction carries the following: (d) (1) Any person who violates any of the provisions of paragraph (1), (2), (4), or (5) of subdivision (c) is punishable by a fine not exceeding ten thousand dollars ($10,000), or by imprisonment in the state prison for 16 months, or two or three years, or by both that fine and imprisonment, or by a fine not exceeding five thousand dollars ($5,000), or by imprisonment in the county jail not exceeding one year, or by both that fine and imprisonment. WHAT IS THE CASE ABOUT? Piecing together the various news accounts and info from some of the legal documents we have obtained, the following seems to be the gist of the matter: --Goldman had contributed material both to Fox's Current Affair and Paramount's Hard Copy, two competitors in the "sleaze-tv" school of journalism. --According to various news articles, he was an articulate gadfly, specializing in "expose" pieces for both tv and hardcopy media. He was working on a story about tabloid tv, including the content and practices of Hard Copy and Current Affair when arrested. --As near as can be interpreted from the search affidavit and news accounts, it appears that Goldman possessed access to a computer account at Fox, which he may or may not have had legitimate (or believed he had legitimate) access to. If we are interpreting the public information correctly, it appears that no password was required to access the accounts, only the log-on id. Tracey Miller, of KFI's Live Line in Los Angeles, described Goldman as some one who "had managed to infiltrate the world of tabloid journalism and then got caught up in a sting operation involving Fox Television computers." --The search affidavit indicates that Paul Smirnoff, of Fox tv in New York, noticed attempted logins to the Fox computer in New York used by Current Affair writers. The account had a null password (meaning no password is required to gain access to the system) and the person to whom the account belonged indicated that she had not changed the password "for sometime." Smirnoff directed that a "bait" story be left in the LA computer. Using a phone trap and caller logs, investigators gathered evidence for their allegations against Goldman. On March 8, 1990, local police and Secret Service agents burst into Goldman's apartment. However, unlike other raids, of which we have had second-hand reports, there was an added twist to this one: FOX TELEVISION WAS PRESENT WITH REPORTERS AND CAMERA CREW! HACKING OR MEDIA HYPE? Why was Fox tv present on this raid? The Secret Service has been surprisingly reticent about their procedures to the point of revealing little information in interviews, let alone allowing video tapes to be made. We are repeatedly told that the time and dates of raids are "secret." Yet, not only was Fox present, but they seemed to have full cooperation from the agents present. Is collusion in media events a standard practice between law enforcement and the media? Were other news agencies invited? How does Fox rate? If CuD asked to participate and report on a raid, my guess is that the response would be less than enthusiastic. The video was hyped on Fox on March 8 and shown on the news, teasing the audience with sensationalistic promos and dubbing Goldman "The Hollywood Hacker." In the current climate of media hyperbole and so-called crackdowns, this strikes us has highly prejudicial. The news broadcast of the tape comes across like a segment from "COPS" or a Geraldo Rivera segment. There are the usual teases "Its not military espionage and it's not corporate spying," and the caption "HOLLYWOOD HACKER" graphically frames for the audience how to interpret the events: This is not simply a suspect, it is....THE HOLLYWOOD HACKER. Not "alleged" HH, but the real McCoy! The tape opens with agents outside a door in bullet proof vests with guns drawn, hanging menacingly in a "hacker's might be dangerous so we'd better be ready to blow the suck fuck away" position. Granted, this was not as dramatic as the tapes of the magnum-force beating of a Black LA motorist, but the sources of such violence are more readily understandable when the force of a raid is graphically depicted. One wonders whether Keating, Ollie North, and others more preferentially situated stared down a phallus surrogate when they were arrested. LE agents tell us drawn weapons are standard procedure, because they never know what may lie on the other side of the door. But, in case after case of hacker raids, one wonders how many computerists shot it out with the cops? And, if the situation was so dangerous, one wonders why the tv crowd was allowed to charge in amidst the officers. On the tape, loud voices can be heard yelling: "Open the Door!!!!" several times, and police and camera crowd enter, police with guns drawn, Fox Folk with cameras rolling. Agents are yelling "Hands up!! Against the Wall!" several times. The cameras are panning around and focus on Goldman sitting on a couch, reading the arrest warrant. Goldman's face was not, as it seems to be in shows such as COPS, blocked out, and from all appearances, he could pass for an IBM senior executive in his mid 40s. WHY SHOULD THE CU CARE? As with so many of the so-called hacker raids in the past year, it is neither guilt nor innocence, but the questions raised by procedure that should bother us: 1. The role of the media in inflaming public conceptions of hacking seems, in this case, to exceed even the cynical view of sensationalistic vested interests. The presence of a Fox news team and the subsequent hacker hyperbole for what the indictment suggests is a trivial offense at worst, makes one wonder whether some other motive other than computer access might not have led to the raid. We have seen from the events of 1990 that "victims" of computer intruders tend to grossly over-state losses. Only further inquiry will reveal whether Fox had motives for challenging an investigative journalist doing exposes on the type of tabloid tv they have made popular. It is worth noting that the Secret Service was involved in part because of a claim of a "federal interest computer," but, according to news accounts, they withdrew from the case almost immediately. Given the tenacity with which they have pursued other cases on less evidence (such as Steve Jackson Games, where part of the "evidence" was an employing explaining in a BBS post that Kermit is a 7-bit protocol), one wonders why they apparently ducked this case so quickly? 2. A second issue of relevance for the CU is the definition of "hacker." By no stretch of the imagination can the acts of whoever allegedly accessed the Fox computers be called hacking. From the few legal documents we have obtained and from media accounts, the action seems more akin to a graduate student using the account of another grad student without "official" authorization. We do not defend computer trespass, but we do strongly argue that there must be some distinction between types of trespass and what is done once a trespass occurs. 3. We have not yet contacted Ralph Greer, the apparent attorney of record in this case, so we can only surmise on a few possible issues. We wonder if the case is being treated as a typical criminal case or whether it is recognized that there are issues here that extend far beyond the "normal" crime of "theft," "fraud," and other metaphoric definitions brought to bear on computer cases? We also wonder if, like some others, there is any pressure to "cop a plea" because of the lack of a creative defense that Sheldon Zenner, The EFF and others have introduced in some other cases? Again, for us the concern is not who is or is not guilty in this case, but with the problem of defending against charges that seem far in excess of the act. 4. The matter of defense also raises the issue of California law. Parts of Section 502 and 502.7, as we (and others) have argued previously, see overly vague, excessively punitive, and could make even the most trivial form of trespass a felony. To non-lawyers such as ourselves, it seems that the alleged acts would, in most states, at worst be a misdemeanor and not subject a potential offender to three or more years in prison. 5. We have argued long and loud against the current tactics employed by agents on computer raids. Yes, we recognize that there are standard procedures and we recognize that police do face potential danger in raids. However, to raid an alleged computer offender in the same way that a crack house is raided seems over-kill and dangerous. There are many ways to arrest suspects, and raids, although dramatic, do not seem justified in any single case of which we are aware. The tv tape suggests that, if the suspect made an improper move (especially in the confusion of everybody yelling at once, the suspect perhaps responding to one set of commands and ignoring another, tv camera people in the thick of things), a tragic consequence could have occured. We should all be concerned with the "police state" mentality in such instances. Yes, there may be times when caution and full operative procedures on computer criminals is justified, but suspected hackers are not your typical computer criminals. One wonders what the response will be if a young teenager makes a "furtive gesture" and is blown away. One credible teenager once told us that when he was arrested, the police burst into his room with guns drawn. He was at the keyboard of his computer, and the agent in charge, perhaps to impress her male colleagues, allegedly pointed the gun to his head and said, "Touch that keyboard and die!" 6. The search warrant for Goldman's apartment authorizes seizure of a variety of material that seems--as it has in other cases--far in excess of what could even by a computer illiterate be used for any related offenses. This raises the issue of what constitutes "evidence" in such cases. We have seen from other raids that posters, personal letters unrelated to computers, news clippings, telephones, video tapes, science fiction books, research notes, and other artifacts were taken. Law enforcement agents readily justify this, but when raiding forgers, car thiefs, or even drug dealers, the scope of seized equipment is much narrower. Police, to our knowledge, do not confiscate all the spoons in the house, the matches, or the stove, when arresting suspected junkies. Yet, this is the mentality that seems to guide their seizures of equipment in computer cases. In a recent issue of RISKS Digest, moderator Peter G. Neumann observed "that there is still a significant gap between what it is thought the laws enforce and what computer systems actually enforce." I interpret this to mean simply that the law has not caught up to changing technology, and old, comfortable legal metaphors are inappropriately applied to new, qualitatively different conditions. Calling simple computer trespass (even if files are perused) a heavy-duty felony subjecting the offender to many years in prison does not seem productive. The point seems to be that emerging computer laws are archaic. Neither those who write the laws nor those who implement them have a clear understanding of what is involved or at stake. When mere possession (not use, but possession) of "forbidden knowledge" can be a felony (as it is in California), we must begin to question what the law thinks it's enforcing. Few objected to the enactment of RICO laws, and fewer still to the laws allowing confiscation of property of drug suspects. The attitude seemed to be that harsh measures were justified because of the nature of the problem. Yet, those and similar laws have been expanded and applied to those suspected of computer abuse as we see in the cases of Steve Jackson Games, RIPCO BBS, the "Hollywood Hacker," and others have been raided under questionable circumstances. I'm wondering: What does law think it's enforcing? What is the appropriate metaphor for computer trespass? What distinctions should be made between types of offense? Please remember, nobody is justifying trespass, so continual harangues on its dangers miss the point. I am only suggesting that there is a greater risk from misapplication of law, which--like a virus--has a historical tendency to spread to other areas, than from computer hackers. It's easier to lock out hackers than police with guns and the power of the state behind them, and we have already seen the risks to people that result from over-zealous searches, prosecution, and sentencing. And, at the moment, I suggest that it's law enforcement agents who are the greatest danger to the computer world, not hackers. Why? Because "there is still a significant gap between what it is thought the laws enforce and what computer systems actually enforce." As Edmund Burke once (presumably) said, the true danger is when liberty is nibbled way for expedience and by parts. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ Date: Thu, 28 Feb 91 09:53:50 EST From: "Brian J. Peretti" Subject: Computer Publication and the First Amendment ******************************************************************** *** CuD #3.09: File 2 of 2: Computers & First Amendment *** ******************************************************************** Computer Publication and The First Amendment Copyright Brian J. Peretti Computers and the Law Since their introduction, personal computers have had a tremendous impact on society. Computer, printers and their software have replaced accountants, secretaries and even typewriters in many offices across the United States. With the advent of this new way to gather, process and distribute information, new problems, many that could never have been perceived by the Framers of the Constitution, have developed. The Constitution is the basis of law in the United States. Although created in 1787, it still governs the manner in which legal decisions are made with very few changes. It, along with the Bill of Rights and other amendments, has established what may or may not be done to a person, group, organization or business without infringing on its rights. The broad language was created so that the Constitution would be able to change and expand with the times. Although the founding fathers did have an idea of what the press was in their day, it has been expanded to cover television and radio. This coverage should be expanded to encompass the new media of computer publications. By deciding that computer publications will have the same rights under the first amendment as newspapers, information will be dispersed throughout the nation in a more efficient manner so that the goal of the first amendment will become reality. I. What is a computer publication Computer publications can take many forms. It has been argued that bulletin boards should be considered computer publications. The reason is that since the people who are in contact with the bulletin boards must communicate with the boards through the written word, that these communications should thus be considered publications. This paper is concerned with publications that are created exclusively on a computer or computer system. There have been only a few such computer publications.1 There has not been a definition defining what is a computer publication. However, there are many similarities between the various newsletters that will give us a definition of what one is. First, all of the material which makes up the publication must have been created on a computer. This is to say, that although the information may have been written on paper as rough drafts or may have been gleaned from printed books or newspaper, the articles that compose the publication must have been written IN FINAL FORM ON THE COMPUTER. The production of the newsletter must also occur exclusively on the computer. This includes the editing, the check for spelling and formatting errors and the actual production of what the newsletter will look like, including the letterhead of the publication, if there is to be one. The transportation of the material that is to be contained in the newsletter must occur via a computer network2 or by an exchange of magnetic disk3, magnetic tape4, electrical impulses or other non-print media. This includes not only the gathering of the stories, but also the distribution of the newsletter to its subscribers. The computer magazines or newsletters that have existed in the past also had a common denominator in that they almost exclusively were published by computer users, for computer users and concerned computer topics. Although this could be a criteria, it would be to restrictive. It is very likely, with the continued proliferation of computers in our society, that publications with a much different orientations will emerge. If computer publications are to be protected, the topic of their publication should not be determinative of whether they fall under the definition of a computer publication. There are other publications that address the same issues that have been published in "Phrack". An example is 2600 on Long Island, New York which publishes material in printed form concerning generally the same information.5 However, it is the form in which "Phrack" was published and not the content of the magazine that is the issue of this paper. II. Phrack6 Craig Neidorf is a student at the University of Missouri. At sixteen, he and a friend started to publish Phrack7. The way in which he went about creating his newsletter was to accept articles written by persons throughout the country. These articles would be left in his mailbox at the university or to retrieve articles written on computer bulletin boards. After he logged on to the system, he would then mail the articles from the mainframe computer to his person computer at his residence. If these articles would need to be edited, he would then do any necessary editing. Once he complied a large enough group of articles, he would then send the articles to the mainframe computer along with a heading and send it to his 250 subscribers. There was no charge for the newsletter.8 III. The Historic Rights of the Press In order to discover whether or not the protections afforded to the press in the first amendment should be extended to this new form of information distribution, a look to the past is essential. Originally, control of the press by government was total. However, as time passed, both the monarch of Great Britain and their rulers in the American Colonies allowed greater freedom to publish. A. The English Experience. At first, England was an absolute monarchy, in which the king could do as he pleased. In 1215, the Magna Carta was signed, whereby the lords of England put restrictions on the King, which he pledged not to violate.9 The document, although not seen as an admission of the King that there were civil right, he did acknowledge that there were some basic human rights.10 In 1275, the De Scandalis Magnatum was enacted which punished anyone who disseminated untrue information or "tales" that could disrupt the atmosphere between the king and his people.11 Over time this statute was gradually expanded. In 1378, it was broadened to cover "peers, prelates, justices and various other officials and in the 1388 reenactment, offenders could be punished "by the advice of said council."12 The first printing presses were established in Great Britain toward the end of the 15th century. When the De Scandalis Magnatum was reenacted in 1554 and 1559, "seditious words" were included as words that could bring punishment.13 This law, enforced by the Court of the Star Chamber, was a criminal statute to punish political scandal.14 Regulations placed upon printers soon followed. In 1585, the Star Chamber required that in order to print a book, the publisher would have to get a license.15 A monopoly was created in the Stationers' Company, which had 97 London stationers, that could seize the publications of all outsiders.16 A 1637 ordnance limited the number of printers, presses and apprentices.17 Punishment, at the time, was not limited to just printing, but also to "epigram[s] or rhyme[s] in writing sung and repeated in the presence of others . . . [or] an ignominious or shameful painting or sign."18 Although the Star Chamber had been abolished in 1641, the licensing system remained through the orders of 1642 and 1643.19 The Licensing Act of 1662 was a temporary statute which kept the licensing provisions until 1679, when it expired.20 During the reign of James II, licensing was renewed only to expire and not be reenacted in 1695.21 Having realized that licensing was not the answer, Queen Anne in 1711 enacted a Stamp Act, by which a duty was imposed on all newspapers and advertisements.22 The purpose was to both restrain the press and destroy all but the larger newspapers.23 Blackstone summed up the state of the law Great Britain concerning the press in his Commentaries by writing: The liberty of the press is indeed essential to the nature of a free state; but this consists in laying no previous restraints upon publications, and not in freedom from censure for criminal matter when published. Every freeman has an undoubted right to lay what sentiments he pleases before the public; to forbid this, is to destroy the freedom of the press; but if he publishes what is improper, mischievous, or illegal, he must take the consequences of his own temerity.24 B. The Colonial Experience The first presses arrived at Harvard University in 1638 and were used to disseminate church information.25 Aside from this purpose the colonial governments, when still under the power of Great Britain did not look favorably upon the press. However, with power in the colony moving toward the people, the press gained more freedom from the strict control imposed by the government. Each colony treated the press differently, although each did restrict the press. In 1671, Governor Berkeley of Virginia wrote "But I thank God, there are no free schools nor printing, and I hope we shall not have these hundred years; for learning has brought disobedience, and heresy, and sects into the world, and printing has divulged them, and libels against the best government. God keep us from both!"26 In New York, until 1719, all governors "had been instructed to permit no press, book, pamphlets or other printed matter `without your especial leave & license first obtained.'"27 Gradually, state controls of the press gradually diminished.28 The Trial of John Peter Zenger, 17 Howell's St. Tr. 675 (1735) illustrates how much the colonists were opposed to restrictions on the press. Zenger had printed material in his New York Weekly Journal a satiric article critical of New York Governor William Cosby. The governor had Zenger charged with seditious liable by the Attorney General after neither a Grand Jury would indict nor the General Assembly take action.29 Although all the jury had to do was find him guilty was to declare that he published the paper, Zenger's attorney, Andrew Hamilton of Philadelphia argued a much larger issue. He put before the jury the argument that truth is a defense to liable, although the court rejected it.30 He was able to win an acquittal of Zenger by requesting that the jury give a general verdict of not guilty instead of a special verdict, which the court requested, and which the jury did.31 C. The Adoption of the First Amendment "The struggle for the freedom of the press was primarily directed against the power of the licensor. . . . And the liberty of the press became initially a right to publish `without a license what formerly could be published only with one.' While this freedom from previous restraint upon publication cannot be regarded as exhausting the guaranty of liberty, the prevention of that restraint was a leading purpose in the adoption of the constitutional provision."32 The purpose of the first amendment is "to prevent all such previous restraints upon publication as had been practiced by other government."33 The first amendment states "Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances."34 It was originally proposed as part of twelve amendments to the United States Constitution during the first session of Congress in 1789. On December 15, 1791, the Bill of Rights, minus the first two amendments, became part of the Constitution. What the first amendment means as applied to the press has never been completely set forth. The only statement in Congress as to what the press and speech clause was to stand for was express by James Madison: "The right of freedom of speech is secured; the liberty of the press is expressly declared to be beyond the reach of this government."35 This, however, will be of little help for us when considering whether computer publications should receive first amendment protections. IV. Does Computer Publications fall within the meaning of Press as stated in the first Amendment. Since the legislative history of the First Amendment will not lead to a discovery concerning what is covered under it, we must look to how it has been interpreted by the courts. An examination must be undertook to determine what the courts have decided concerning both the purpose of the amendment and whether any physical manifestation guidelines on what fall within the definition of the "press". By examining what the drafters of the first amendment thought that press was during their time, the only media which would receive first amendment protections the printed press, which would include newspapers, handbills and leaflets. However, the court has not held the clause so narrowly. The United States Supreme Court has taken a broad view in considering what is the "press".36 "The liberty of the press is not confined to newspapers and periodicals. It necessarily embraces pamphlets and leaflets. . . . The press in its historical connotation comprehends every sort of publication which affords a vehicle of information and opinion."37 Thus, the Court has ruled that motion pictures38 also deserve such protection. Lower courts have held that the protection applies to doctor directories,39 college newspapers40 and computer bulletin boards.41 Computer publications satisfy the definition that the Court has given to what is to be covered by the first amendment. By their very nature, computer publications are a vehicle by which information can be disseminated. In Phrack's first issue, the purpose was to gather "philes [which] may include articles on telcom (phreaking/hacking), anarchy (guns and death & destruction) or kracking. Other (sic) topics will be allowed also to a certain extent."42 These articles were to be distributed to members of the community who wished to obtain information on the topics in the "newsletter-type project".43 Since this publication passes the Lovell test,44 because of it allows information to be distributed, these publication deserve the protection given to the media by the first amendment.45 VI. Freedom of Newspapers and Broadcasting Media46 Currently there can be called two separate first amendment doctrines. The first applies to newspapers. Newspapers can have only a few restrictions placed on them. The second applies to radio and television, which can have many types of controls placed upon them. Computer publications, because of their similarity to the former, should have the least amount of restriction necessary placed upon them. As stated, supra, the first amendment had no legislative history that came along with it. Courts have had to interpret how it should be applied to the "press" since they had no guidance from the Congress. Although not to be applied in an absolute sense, Breard v. City of Alexandria, La.,47 the Supreme Court has only set forth three exceptions where prior restraint of the newspapers are allowed. These restrictions, as stated in dictum in Near v. Minnesota48 are 1) when it is necessary in order that "a government might prevent actual obstruction to its recruiting service or the publication of the sailing dates of transports or the number and location of troops", 2) the requirements of decency to prevent publication of obscene materials, and 3) "[t]he security of the community life may be protected against incitement to acts of violence and the overthrow of force of orderly government." These exceptions, although not having the force of law when stated, have been the only exceptions allowed. In the electronic realm, the Supreme Court has allowed greater restraints to be placed on radio and television. Licenses, although never allowed on newspapers,49 possibly as a result of the English experience,50 have been allowed on broadcast communication.51 Broadcaster must be fair to all sides of an issue,52 whereas newspapers may be bias.53 Broadcaster are required to meet the need of their community.54 However no court has held that this may be applied to a newspaper.55 The main difference between these two groups is that "[u]nlike other modes of expression, radio inherently is not available to all. That is its unique characteristic, and that is why, unlike other modes of expression, it is subject to government regulation."56 This reasoning has been followed by the court on many occasions.57 In the case concerning computer publishers, the less restrictive newspaper limitations should be used. A computer publisher does not send his information over a limited band or airwaves. Any individual or group can become a computer publish by obtaining a computer or access to a computer and a modem an information to publish. The amount of these newsletters are not limited by technology. Because of the large number of publications that can appear, there is no need to require that these publications be responsive to the public. The dissemination of the information can be terminated if the reader wants to by asking for his name to be removed from the subscription list, similar to that of a magazine or newspaper.58 V. Conclusion Computer based publications are a new development in the traditional way in which information is disseminated. The history of the United States and the first amendment has been against placing restrictions on the press. These new types of publications, because of their similarity to other types of media, should be granted first amendment protection. The rational for placing restrictions on radio and television should not apply to computer publications. Anyone who has access to this technology, which is becoming more prevalent in society, can publish in this manner. The least amount of restrictions on their publication, similar to those placed on newspapers, should be applied to this new media. BIBLIOGRAPHY Freedom of Speech and Press in America, Edward G. Hudon (Public Affairs Press, Washington, D.C. 1963) MacMillan Dictionary of Personal Computing & Communications Dennis Longley and Michael Shain, eds. (MacMillan Press Ltd, London 1986) Shaping the First Amendment: The Development of Free Expression, John D. Stevens (Sage Publications, Beverly Hills, 1982) Freedom of Speech and Press in Early American History: Legacy of Suppression, Leonard W. Levy (Harvard Press, Cambridge 1960) American Broadcasting and the First Amendment, Lucas A. Powe, Jr. (University of California Press, Berkeley 1987) Printers and Press Freedom: The Ideology of Early American Journalism, Jeffery A. Smith (Oxford University Press, New York 1988). Seven Dirty Words and Six Other Stories: Controlling the Content of Print and Broadcast, Matthew L. Spitzer (Yale University Press, New Haven 1986). Emergence of a Free Press, Leonard W. Levy (Oxford University Press, New York 1985). Computer Underground Digest, volume 2, Issue #2.12, file 1 (November 17, 1990). Endnotes 1. Phrack, see infra, CCCAN, a Canadian publication, The LEGION OF DOOM TECHNICAL JOURNAL, COMPUTER UNDERGROUND DIGEST AND VIRUS-L DIGEST ARE A FEW OF THE MANY PUBLICATIONS. 2. MacMillan Dictionary of Personal Computing & Communication (1986 ed) defines it as: "A network of computer systems that allow the fast and easy flow of data between the systems and users of the system." Id. at 68. 3. "[A] flat disk with a magnetizable surface layer on which data can be stored by magnetic recording." Id. at 215 4. "A plastic tape having a magnetic surface for storing data in a code of magnetized spots." Webster's NewWorld Dictionary of Computer Terms (1988 3 ed.) at 223. 5. Frenzy over Phrack; First Amendment concerns raised in computer hacker case, Communications Daily, June 29, 1990, at 6. 6. Information from this section was gathered in part from Dorothy Denning's paper The United States vs. Craig Neidorf: A Viewpoint on Electronic Publishing, Constitutional Rights, and Hacking." [hereinafter Denning] and Interview with Craig Neidorf, editor of Phrack (Oct. 16, 1990). 7. The name of the publication was derived from two words, phrack (telecommunication systems) and hack (from computer hacking). Denning. Hacking has been defined as "one who gains unauthorized, use non-fraudulent access to another's computer system." Webster's II New Riverside University Dictionary (1984) at 557. For other definitions, see United States v. Riggs, 739 F. Supp. 414, 423-24 (N.D. Ill. 1990). 8. Mr. Neidorf was indicted after he published a Bell South E911 document which was downloaded from the Bell South computer system in Atlanta, Georgia. Determining if Mr. Neidorf should be punished for publishing such information is beyond the scope of this paper. 9. John Stevens, Shaping the First Amendment: The Development of Free Expression at 27 (1982). [hereinafter Stevens] 10. Id. 11. Edward Hudon, Freedom of Speech and Press in America, 8-9 (1963). 12. Id. at 9. 13. Id. 14. Id. 15. Id. at 10. 16. Id. 17. Id. 18. Id. 19. Id. at 11. 20. Id. 21. Id. 22. Id. 23. Id. 24. Leonard Levy, Freedom of Speech and Press in Early American History: Legacy of Suppression, 14 (1963) [hereinafter Levy] citing Sir William Blackstone, Commentaries on the Laws of England 2:112-113 (1936). 25. Stevens, at 29. 26. Levy, at 21-22, quoting William Waller Hening, The Statutes at Large Being a Collection of All the Laws of Virginia (1619-1792) (Richmond, 1809-1823), 2:517. [emphasis in original] 27. Levy, at 24, quoting "Instructions to Governor Dongan," 1686, in E.B. O'Callaghan and B. Fernow, eds., Documents Relative to the Colonial History of the State of New York 3:375 (Albany, 1856-1887). 28. By 1721, Massachusetts effectively ended censorship by licensing. Levy, at 36. 29. Edward Hudson, Freedom of Speech and Press in America (1963) 19. 30. John D. Stevens, Shaping the First Amendment: The Development of Free Expression (1982), 31. 31. Hudson, at 19. 32. Lovell v. City of Griffen, Ga., 303 U.S. 444, 451-52 (1938) [footnotes omitted]. 33. Patterson v. Colorado, 205 U.S. 454, 462 (1907), quoting Commonwealth v. Blanding, 3 Pick. [Mass.] 304, 313-14. [emphasis in original] 34. U.S. Const. amend. I. 35. Leonard W. Levy, Freedom of Speech and Press in Early American History: Legacy of Suppression (1960), quoting The Debates and Proceedings in the Congress of the United States (Washington, 1834 ff.) I:766, 1st Cong., 1st Sess. 36. "The Protection of the First Amendment, mirrored in the Fourteenth, is not limited to the Blackstonian idea that freedom of the press means only freedom from restraint prior to publication." Chaplinsky v. New Hampshire, 315 U.S. 572, n.3, (1941) citing Near v. Minnesota, 283 U.S. 697 (1931). 37. Lovell v. City of Griffin, Ga. 303 U.S. 444, 452 (1938). 38. "We have no doubt that moving pictures, like newspapers and radio, are included in the press whose freedom is guaranteed by the First Amendment." 334 U.S. 131, 166 (1948). "Expression by means of motion pictures in included within the free speech and speech and free press guaranty of the First and Fourteenth Amendments." Joseph Burstyn, Inc. v. Wilson, 343 U.S. 495, 502 (1952). 39. "The propose directory [of physicians] contains information of interest to people who need physicians. The directory, therefore, is embraced by the term "press" as used in the first amendment." Health Systems Agency of Northern Virginia v. Virginia State Board of Medicine, 424 F. Supp. 267, 272 (E.D. Va. 1976). 40. "A campus newspaper is part of the "press" for the purpose of the First Amendment to the Constitution of the United States." Arrington v. Taylor, 380 F.Supp. 1348, 1365 (M.D.N.C. 1974). 41. Legi-Tech v. Keiper, 766 F.2d 728, 734-35 (2d Cir. 1985). 42. Phrack, volume 1, issue 1, phile 1, reprinted in Computer Underground Digest, volume 2, Issue #2.12, file 1 (November 17, 1990). 43. Id. 44. See, infra, note 35 and text. 45. This is not to say that publication of information in furtherance of a crime or criminal activity should receive the protection of the first amendment. 46. This section has been completed with the help of Spitzer, Seven Dirty Words and Six Other Stories (1986). 47. 341 U.S. 622, 642 (1951), "The First and Fourteenth Amendments have never been treated as absolutes." 48. 283 U.S. 697, 716. 49. Near v. Minnesota, 283 U.S. 697 (1931), New York Times Co. v. Sullivan, 403 U.S. 713 (1971), Minneapolis Star and Tribune Co. v. Minnesota Comm'r of Revenue, 460 U.S. 575 (1983). 50. See, supra, notes 9 through 24 and text. 51. Communications Act of 1934. 47 U.S.C.  301 et. seq. (1988) (Requiring that radio stations and television stations obtain licenses). 52. Red Lion Broadcasting Co. v. F.C.C., 395 U.S. 367 (1969). 53. See, e.g., Evans v. American Federation of Television and Radio Artists, 354 F.Supp 823, 838 (S.D.N.Y. 1973), rev'd on other grounds, 496 F.2d 305 (2nd Cir. 1974), cert. denied, 419 U.S. 1093. ("In editorial comment, the New York Times and the Washington Post may be unreservedly liberal, while the Indianapolis News or the Manchester Union Leader may be unremittingly conservative.") 54. 47 U.S.C.  309(a). Trinity Methodist Church v. Federal Radio Commission, 62 F.2d 850, (D.C. Cir. 1932), cert. denied, 288 U.S. 599 (1933). (holding that if radio broadcasts were not in the public interest, a license could be revoked and not violate the first amendment.) 55. Of course, if a newspaper is not responsive to its readers, it may lose subscribers and either be forced to change or go out of business. However, since in that hypothetical there would be no state action, there would be no first amendment issue. 56. National Broadcasting Co. v. United States, 319 U.S. 190, 226 (1943). The dissenting opinion also followed similar reasoning. "Owing to its physical characteristics radio, unlike the other methods of conveying information, must be regulated and rationed by the government." Id. at 319. 57. Red Lion Broadcasting v. Federal Communication Commission, 395 U.S. 367 (1969), and Federal Communication Commission v. League of Women Voters, 468 U.S. 364 (1984). 58. For the same reason, the fairness doctrine should not be applied to these types of publications. ******************************************************************** ------------------------------ **END OF CuD #3.09** ********************************************************************