⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 computer bulliten boards and the law.txt

📁 1000 HOWTOs for various needs [WINDOWS]
💻 TXT
📖 第 1 页 / 共 4 页
字号:
list, send email to archive-server@eff.org. Include the line:   send acad-freedom caf- Carl ]In this issue::                                                                             The addresses for the list are now:	comp-academic-freedom-talk@eff.org     - for contributions to the list		or	caf-talk@eff.org	listserv@eff.org    - for automated additions/deletions                (send email with the line "help" for details.)	caf-talk-request@eff.org    - for administrivia-------------------sysops have  difficulty in separating the two,  and it seemsthat  to   "normal" sysops  "liability is  liability."   Thedistinction as to the form of  the action, and whether it isbrought by a citizen or the state, either eludes or does notconcern them.                         Conclusion     The ever-increasing rate of change  in the world aroundus has eclipsed  the state of the law  in many ways.   As wehave progressed from  Luther's church door, to  Paine's pam-phlet, to the supermarket bulletin board, and to the comput-erized  BBS, the lines between mail  and press and telephonyand  public  and private  have  often become  unclear.   Theapplication of  traditional legal lines  of demarcation  andtests for responsibility for defamation and criminal liabil-ity  appears  unclear as  well.   The  computerized bulletinboard system has become a fixture  in a small but increasingsegment  of our society,  and that  society needs  the legalsystem to sort out the rules so that everyone in it can playthe game on  a level playing  field--so that they both  knowwhat  they may reasonably  expect of others  and what othersmay reasonably expect of them.[Footnotes -cmk]FN1.  LINDBERG, MARTIN LUTHER: JUSTIFIED BY GRACE 24 (1988)FN2.  Id.FN3.  The  author  remembers  well  his orientation  at  thebeginning of  the fall  semester, 1988,  and the  admonitiongiven by (now  assistant dean) Anne  Lange.  His  experiencesince then has borne out the wisdom of her words.FN4.  The author sees the board at Baker's all too frequent-ly, as his meager  income outgoes to the provider  of suste-nance.FN5.  In the spirit of inclusive  language, should one, withtongue  in cheek, refer  to them as  the "Precipitating Par-ents"?  On a more serious note, to make  the sentence struc-ture as  short and direct  as possible, and  consistent withthe  generally accepted  rules of construction  for statutesand legal texts, we  have used the pronouns "he",  "his," inlieu  of "he  or she," or  "his or  hers," etc.   Unless thecontext  clearly  indicates  otherwise,  masculine  pronounsshould be read as inclusive.FN6.  Pamphleteers  were  pervasive  and   almost  certainlywithin the intended coverage of  the First Amendment's PressClause.  Lange,  The Speech and Debate  Clauses, 23 U.C.L.A.L. REV. 77, 106 (1975).FN7.  The terminology is far from standardized in discussingcomputer bulletin board systems.  The author, in researchingthis paper and  in general experience, has  experienced com-puter  bulletin board systems  (CBBS), remote bulletin boardsystem (RBBS),  electronic bulletin  board system,  and just"bulletin board system:  (BBS).  For simplicity,  this paperwill use  bulletin board, bulletin  board system, or  BBS asthe context dictates.  FN8.  A  1985 law  review article  cited  sources indicatingthere were some  1500 active bulletin  board systems in  theUnited States  as of  1984; however,  the authors  indicatedsome skepticism as  the source cited  15 in the Denver  areaand they personally knew  of 50-60.  Soma, Smith  & Sprague,Legal Analysis of Electronic Bulletin Board Activities, 7 W.NEW  ENG. L.  REV. 571,  572 n. 3  (1985).   Another articlesuggests the number is between 1000 and 5000.  Note, Comput-er Bulletin  Board Operator  Liability for  User Misuse,  54FORDHAM L.  REV. 439, 441 n. 12 (1985).   The author is cur-rently system operator ("sysop") of an bulletin board systemaffiliated with networks known as "Fidonet," "Metronet," and"OPCN."   The current  combined  "nodelists," or  addressinginformation,  list  over  8500  independent bulletin  boardsworldwide.  Nodelist 222, Fidonet, available  electronicallyand from the author.   In addition, several large commercialnetworks exist.  While it is  apparently difficult to obtaininformation  about their subscriber  base, one  source liststhem  as CompuServe  (500,000 +),  Dow Jones/News  Retrieval(275,000), and GEnie (General Electric Network for  Informa-tion  Exchange) (150,000).   Becker,  Liability of  ComputerBulletin Board Operators for Defamation Posted by Others, 22CONN. L. REV. 203, 204 n. 4 (1989).FN9.  Dembart,  The  Law  Versus  Computers:  A  ConfoundingTerminal Case, L.A. Times, Aug. 11, 1985, at 3, col. 1.FN10.  "Modem" is a contraction of  two terms, modulator anddemodulator, referring to  two separate processes  that mustoccur  to transmit  computerized information  over telephonelines.  At  the present time, the modem is normally either asmall box set next to the  computer and connected by cables,or a small printed circuit  card physically installed insidethe  PC.  In either instance  the modem must be connected tothe  telephone  system for  the  bulletin board  to operate.Kahn,  Defamation Liability  of Computerized  Bulletin BoardOperators  and  Problems of  Proof 6  (1989) (electronicallydistributed, available from the author of this paper).FN11.  Becker, supra n. 8 at 203 n. 2.FN12.  Becker,  supra  n.  8.   See  also,  Soma,  Smith andSprague, supra n. 8.FN13.  Attached to this paper are a partial current combinedsystem list for  FidoNet, MetroNet and  OPCN, and a list  of"echo"  areas, by  somewhat  cryptic but  at  the same  timesomewhat understand area  "tags," that are available  to himas a system operator.  Also  attached is a brief descriptionof "echomail," and  sample printouts of some  recent discus-sions. The  cost of  long distance  transmission is  usuallyabsorbed  by the system operator as part  of the cost of thehobby.    Occasional  "pooling" arrangements  allow  for theeconomical transmission between cities (several operators inthe Omaha area do this, for example).FN14.  Note, FORDHAM L. REV., supra.FN15.  Id.FN16.  Id., at 439, n. 4.FN17.  Soma, Smith and Sprague, Legal Analysis of ElectronicBulletin board Activities, 7  W. NEW ENG. L. REV.  571, 572-575 (1985).  See also note 19, infra.FN18.  UPI, May  5,  1990, Computer  hacker gets  probation,fine, LEXIS, NEXIS library, Current file.FN19.  Westbrook, User  to user: the comms  column; Bulletinboards  helpful  for communication,  PC  User, LEXIS,  NEXISlibrary, Current file (1990).       Consider the following equation: Computer +  Modem     = Illegal  Activity.   This is  the basic  formula     used by non-expert TV and radio programme  editors     when examining the subject of data  communications     and it's a view which has been encouraged by a few     pundits who're  only too  happy to  take money  to     talk about  children playing  noughts and  crosses     with  military computers.   This attitude seems to     be  the  result of  a  few celebrated  cases where     illegal activity has been brought to light involv-     ing a hacker, his  computer and a modem.   Yet the     same principle might be applied  to all drivers of     Mk II Jaguars to identify  them as getaway drivers     for bank robbers.      The suspicion that the  modem/computer combination     can generate is nowhere more  apparent than in the     public view  of the bulletin board.   To read, see     or hear  the popular media in action, you could be     forgiven  for thinking  that  bulletin boards  are     used  exclusively  to  disseminate pornography  or     recipes for Molotov cocktails.  At the very least,     such  services  are  seen as  havens  for  spotty,     adolescent, sex-mad anarchists rather than serious     computer users.Id.  Westbrook goes on to  suggest that bulletin boards havevaluable uses as sources of  information and discussion, butthat the  general public can  be forgiven for  not realizingthis, given the nature of press coverage of computer crime.FN20.  In fact,  the Internet/Usenet system,  with which theUniversity of Nebraska is  affiliated, carries a "newsgroup"somewhat  misleadingly  labelled  the "Computer  UndergroundDigest," which devotes a  great deal of space to  known cur-rent investigations and debunking rumors and myths surround-ing them.  CuD Volumes 1.22 through 1.28, available from theauthor.FN21.  Electronic mail is  specially protected by 18  U.S.C.   2701 et  seq., the Electronic Communications  Privacy Actof 1986 (ECPA).   There is  no indication that the  officersrequesting  any  warrants or  the  judge or  magistrate thatissued  them paid any  attention to the  requirements of theECPA.   See  generally, CuD  Vol. 1.23,  available  from theauthor.   A limited  discussion of  electronic mail  privacyissues as  they interact  with bulletin  board systems  willfollow infra.FN22.  The following  electronic note  was published  in thenewsgroup comp.dcom.telecom  (Telecommunications Digest)  onSaturday,  August  11, 1990.    The accompanying  header androuting control information is deliberately left in place soone may get a  sense of the complexity and  pervasiveness ofthe electronic world:      From comp.dcom.telecom Sat Aug 11 09:47:24 1990      Path: hoss!maverick.ksu.ksu.edu!ux1.cso.uiuc.edu!         brutus.cs.uiuc.edu!wuarchive!cs.utexas.edu!mailrus!         accuvax.nwu.edu!nucsrl!telecom-request      From: colin@array.uucp (Colin Plumb)      Newsgroups: comp.dcom.telecom      Subject: Dial 1-800 ... For Bellsouth `Secrets'      Message-ID: <10698@accuvax.nwu.edu>      Date: 10 Aug 90 17:41:07 GMT      Sender: news@accuvax.nwu.edu      Organization: Array Systems  Computing, Inc.,  Toronto,      Ontario,    CANADA       Lines: 71      Approved: Telecom@eecs.nwu.edu      X-Submissions-To: telecom@eecs.nwu.edu      X-Administrivia-To: telecom-request@eecs.nwu.edu      X-Telecom-Digest: Volume 10, Issue 558, Message 5 of 11      {Computerworld},  August 6,  1990, Vol.  XXIV,  No. 32,      Page 8.      Dial 1-800...for Bellsouth `Secrets'        BY MICHAEL ALEXANDER                      CW STAFF       CHICAGO --- The attorney for  Craig Neidorf, a 20-year-      old  electronic newsletter editor,  said last week that      he  plans  to file  a  civil lawsuit  against Bellsouth      Corp.  as  a  result  of  the  firm's ``irresponsible''      handling  of a case  involving the theft  of a computer      text file from the firm.      Federal prosecutors dismissed  charges against  Neidorf      four days into  the trial,  after the prosecution  wit-      nesses conceded  in cross-examination that much  of the      information in the text was widely available.      Neidorf,  the co-editor of ``Phrack,'' a newsletter for      computer hackers, was accused by federal authorities of      conspiring to steal  and publish a  text file that  de-      tailed  the inner workings  of Bellsouth's enhanced 911      emergency telephone  system across  none states  in the      southeast [CW, July 30].      ``What happened  in this  case is  that the  government      accepted  lock,  stock,  and   barrel  everything  that      Bellsouth    told    them   without    an   independent      assessment.'' said Sheldon Zenner, Neidorf's attorney.      One witness, a Bellsouth service manager,  acknowledged      that detailed  information about the inner  workings of      the 911 system could be purchased  from Bellsouth for a      nominal fee using a toll-free telephone number.      A Bellcore security  expert who was hired  by Bellsouth      to  investigate intrusions  into  its computer  systems      testified that the  theft of  the file went  unreported      for nearly a year.      Last week, a Bellsouth spokesman  said the firm's secu-      rity experts delayed reporting  the theft because  they      were  more intent on  monitoring and  preventing intru-      sions into the company's computer systems.  ``There are      only so much  resources in the data security arena, and      we felt  that it was  more urgent to  investigate,'' he      said.      He also disputed  assertions that  the document was  of      little  value. ``It is  extremely proprietary  and con-      tained  routing information  on 911  calls through  our      none-state [sic -cmk] territory as  well as entry points  into the      system,'' he said.      A quick ending:      The case  unraveled after  Robert Riggs, a  prosecution      witness who  had already pleaded guilty for his role in      the theft of the document,  testified that he had acted      alone and Neidorf had merely agreed to publish the text      file in ``Phrack.''      Neidorf and his  attorney agreed  to a pretrial  diver-      sion, a  program under which the government voluntarily      dismisses the  indictment  but could  reinstate  it  if      Neidorf commits a similar crime within a year.      The case has  stirred up national debate  on the rights      of computer users in the age of electronic information.      The Electronic  Frontier Foundation, a  civil liberties      group  set up by Mitch Kapor, founder of Lotus Develop-

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -