⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 computer rights vs first and forth amentment right.txt

📁 黑客培训教程
💻 TXT
📖 第 1 页 / 共 3 页
字号:
words, the Secret Service should have known exactly what they werelooking for.) By taking all computer records, the Service not onlyeffectively shut Jackson down, but violated  the Fourth Amendment.        The only "probable cause" that the Secret Service had forseizing Jackson's computers was that Jackson had hired a former "hacker"to work on Gurps Cyberpunk.  A "hacker" is a member of an undergroundsubculture dedicated to breaking and entering computer systems.  Whilethis is illegal, the hacker community in general frowns upon thestealing of data for personal profit, but does it instead for braggingrights and the thrill of gaining illicit access to a "guarded" area ofcyberspace.  This is not unlike breaking the speed limit for kicks andthe excitement of defying authority.  If this is indeed why the Serviceraided Steve Jackson Games,  this sets another frightening precedentregarding privacy - will employers now check to see if applicants arehackers along with the "normal" checks for arrest records?  This may bean effect that the Service was looking for.  According to Steve Jackson,the Secret Service suspected this staff member of wrongdoing at home,not at Steve Jackson Games (Computer Underground Digest, 3.20).        At the time of this writing, the search warrant remained sealed.If the object of the search, according to the warrant, was evidence ofthe staffer's wrongdoing, only evidence of that crime should have beenretained. If the object was the game, the agents should have taken justthe hard copy and soft copy regarding Gurps Cyberpunk.  By taking thewhole computer system of Steve Jackson Games, the FBI seriously hinderedthe lawful commercial activities of the company.  By holding thecomputer equipment and software for three months, Steve Jackson Gameswas almost put out of business.  The non-relevant equipment and softwareshould have been returned promptly.        Along with the computer equipment and software seized, theagents disconnected and confiscated Steve Jackson Games' BBS.  A BBS,or Bulletin Board System, is a centralized, information gathering anddissemination point for many computer users.  The BBS contains e-mailfrom and for those users, who can access the system with their homecomputer's modem through normal phone lines.  Many users who don'thave network access through a university or the organization they workfor use a BBS to enter cyberspace.  The BBS stores personal mail forthese users and enables them to read it when they are logged on.  U.S.postal mail is considered private.  Electronic mail is the same asphysical mail in that it should be protected by the same privacy rightsthat physical mail is.  In the next section, the seizure of personalmail is explored in detail.        Even though Steve Jackson Games did eventually publish GurpsCyberpunk, the company was hit hard by the loss of its information.They had to recreate the game from rough drafts and memory.  But, apositive result did come out of the SJG case.  Mitch Kapor, founder ofLotus Development Corp, and associate John Perry Barlow, established theElectronic Frontier Foundation (EFF) with the purposes of educating thepublic about computer-based media and supporting litigation to extendFirst Amendment rights into the computer world.  The EFF intervened inthe Jackson case, pushing the government to restore SJG's equipment.  InApril, 1991 the EFF in conjunction with Steve Jackson Games filed acivil suit against the U.S. Secret Service and several of theindividuals responsible for the raid and the withholding of Jackson'sproperty.  Unfortunately, at the time of this writing, more detail aboutthis precedent setting case was unavailable.        Although it will not set a legal precedent, there is a similarcase on the books.  The Alcor Life Extension Foundation is anorganization that, for a large fee, will freeze an individual's bodyupon death.  In December, 1987, the Riverside County Coroner's Officeaccused Alcor of hastening the death of cryogenic participant Dora Kentby prescribing her a lethal dose of barbituates (Computer UndergroundDigest, 1.04).  In January 1988, law enforcement officers raided Alcor'sheadquarters and confiscated its computer equipment.  Like the SteveJackson Games case, the search warrant for the Alcor foundation did notspecify what information that should have specifically be confiscated.The section of the warrant pertaining to computer seizures follows:            All electronic storage devices, capable of storing        electronic data regarding the above records, including magnetic        tapes, disk (floppy or hard), and the complete hardware        necessary to retrieve electronic data including CPU (central        processing unit), CRT (viewing screen), disc or tape drives,        printer, software, and operation manuals for the above said        computer, together with all handwritten notes or printed        material describing the operation of the computer        (Computer Underground Digest, 1.04).        In other words, the officers were directed to seize allcomputers and computer equipment from the Alcor site.  Even though thewarrant states that only computer equipment  "...capable of storingelectronic data regarding the above records..."  should be seized, thiscan be interpreted as a warrant to seize all computer equipment becauseany equipment is capable of holding data about Dora Kent.  So onceagain, the warrant was very wide reaching and vague, exactly what theFourth Amendment is  supposed to protect against.        But in this case, the issue became more focused.  H. KeithHenson, a member of Alcor, claimed that personal e-mail belonging tohimself and 13 other Alcor members was "stolen" by the raiding officers.Although Henson repeatedly tried to get the court to turn over theprivate e-mail, on the account that it had no relevance to the Dora Kentcase, they would not return it.  So Henson and his group sued the FBIfor not intervening on their behalf in this case (Computer UndergroundDigest, 1.04).        The stealing of private e-mail like in the Alcor case is anotherprecedent that can have dangerous repercussions.  This is the equivalentof law enforcement officers obtaining a search warrant for a post officebecause some of its employees were suspected of illegal activities, andproceeding to seize all mail contained in the post office and readingit, and not returning it to its intended recipients.        At the time of this writing, Alcor case was settled out ofcourt. The result of the settlement was not available.        As we can see from these examples, there is a fundamentaldifference in how the legal community in the U.S. views printed andelectronic media.  Print media is protected by the First Amendment;electronic media is not.  This is a difference that should not exist.Almost all newspapers and magazines exist in electronic form before theyare printed.  Electronic digests follow the same process, but they leaveout the final step - the actual printing.  There have been cases ofelectronic hacker magazines being shut down for publishing hacked(stolen) documents.        However there is a hacker magazine called 2600 that doesn'tleave out the final step.  Printed, not electronic, copies are sent tosubscribers.  2600 has included similarly hacked documents, but hasnever been accosted. According to 2600 editor Emmanuel Goldstein, it isbecause of the physical printing, "I've got one advantage.  I come outon paper and the Constitution knows how to deal with paper." (Barlow).Computer based media and e-mail should have the same Constitutionalprotection as the written word.  But it doesn't.  Why not?        We can answer this question by tracing history back to the late1700's when the Framers were writing the Constitution. They had noconcept of computers or electronic communication at its current level.Because of this excusable lack of foresight, the Constitution and Billof Rights do not contain specific provisions for computer based speechand the computerized press.  In fact, the word "press" implies theprinted press, not actual process of disseminating information to largenumbers of people.  In the Fourth Amendment, an individual's "papers"are safe from unreasonable search and seizure.  Electronic, orunprinted, "papers" are not specifically protected.  In strictinterpretations of the Constitution, electronic media are not protected.Of course, this is nonsense since the only difference between an articlein a newspaper or magazine and an article stored electronically, that isintended to be printed, is the act of printing.        Using the Steve Jackson Games and Alcor cases as a basis,it is proposed that the following guidelines be legislated:        1) If computer information is to be seized, the search warrant           must explicitly describe the data sought.  The officers           carrying out the search should seize only the storage devices           (floppy disk, hard disk, magnetic tape) holding this           information.        2) If the storage device(s) seized contain other information as           well as the data described by the warrant, the wanted data           should be copied them the storage device should be promptly           returned.        3) If any electronic mail is confiscated, only the pieces from           or to suspects of the crime should be read.  The rest should           be promptly returned unread to the addressees.        By following these guidelines, we can avoid many violations ofindividual privacy that the Constitution, in its current wording,allows.  In the final section a somewhat radical step to help oursociety into the information age is recommended.IV: Where Do We Go From Here?        The untamed electronic frontier is an intimidating domain forthe computer illiterate.  Many view this mysterious technology asresponsible for whittling away their personal rights and privacy.  Thusthey find it fearful and intimidating.  Ironically, the only way thatthe electronic frontier can "dehumanize" an individual is if thatindividual is ignorant of what it really is.  We've seen that we can'tcontinue to function at our current level of society without computertechnology, but unless the users of this technology are monitored, theycan use it to invade the privacy of individuals.  If the generalpopulace is educated, they will have the background to challenge theseintruders.        But where do we start?  As we have seen before, the outdatedwording of the Constitution promotes this dread image of computers andelectronic media.  Perhaps a good place to start would be with theConstitution.  The current wording of the Bill of Rights is archaic, andit represents the mind-frame that many people still have.  Computertechnology and cyberspace must not be viewed as separate from or outsideof laws protecting free speech and privacy.        The First and Fourth Amendments don't explicitly mentionelectronic media. They should regard rights in the electronic world ofcyberspace as just as important as those in the physical world.  A newamendment stating that the rights guaranteed by the First, Fourth, andany other amendment for that matter, apply to cyberspace would preventmany of the violations we have discussed from happening. (As the finalrevision of this paper was about to be printed, word was received thatLaurence Tribe of Harvard Law School had proposed discussion of justsuch an amendment. However, this author's proposal was developedindependently of Tribe's.)       If a new amendment is a step too far, then legislation andprecedent setting legal decisions must be made.  There seems to be a rayof hope in the Steve Jackson Games case, but it will take several suchcases to approach the benefit of a Constitutional amendment.        The global village is just around the corner.  Whether it is atechnological utopia of peace and freedom or an aspect of Orwell's"1984" depends on decisions made now.                                 Bibliography      Article One: An Overview, (2600 Magazine, Spring 1990), pp.1-10.*      Burnham, David, The Rise of the Computer State, (1980, Vintage      Books).      Barlow, John Perry, Crime and Puzzlement. **      Computer Underground Digest, Volume 1.04, April 11th, 1990. *      Computer Underground Digest, Volume 3.20, May 12, 1991.*      Consumer Reports, "What Price Privacy," (May, 1991, pp. 356-360).      Epstein, Aaron, "The Shadow of Your File," The Progressive, (v47,      Jun., 1983), p. 17.      Fisher, Lawrence M., "Lotus Database Cancelled," (New York Times,      Jan 24, 1991), p. C3.      Gordon, Diana R. and Churchill, Mae, " 'Triple I' Will Be Tracking      Us," The Nation, (New York, v238, April 28, 1984), pp.  497, 513-      515.      Kleinfield, N.R., "The Man With All The Numbers," New York Times,      Sunday, April 14th, 1991.      Markoff, John, "Europe's Plan to Protect Privacy Worry Business,"      New York Times, Thursday, April 11th, pp. D1, D5.      Pool, Ithiel de Sola, Technologies of Freedom, "On free speech in      an electronic age," (1983, Harvard University Press).      Science Court Opinions - Case 6: Computer Privacy, Omni, (New      York, Jan. 1988, v10), pp. 99-100.      Wilson, Kevin, The Technologies of Control, (1988, University of      Wisconsin Press).        * These are electronic publications.  If copies cannot be found,          feel free to contact the author.       ** This document was originally disseminated electronically, then          was published in Harper's Magazine.  The author used the          original version.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -