⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 free speech in cyberspace.txt

📁 黑客培训教程
💻 TXT
📖 第 1 页 / 共 5 页
字号:
                                         12            crime.42  In particular, phreaking, the theft of long-            distance telephone service -- usually closely associated            with hacking -- has been a popular subject of discussion.            "While bulletin boards are usually not directly involved in            any of these crimes, they are used to receive and distribute            information by the computer enthusiasts who commit the            illegal acts," writes attorney Eric Jensen, who also            includes distribution of pornography and the formation of            pedophilia rings among the potential abuses of BBSs.43               Jensen similarly asks whether earlier models of media law            can accommodate BBSs.  Dividing older media into the            categories of publishers, republishers, and common carriers            -- and choosing republishers as the best analogy to BBSs --            Jensen ultimately reaches a conclusion much like Charles',            that sysop liability should be based upon the degree of the            sysop's participation in the illegal actions.44  He cautions            that direct regulation of BBSs, because of their nature,                                            42The term hacker originally meant a person with great             technical expertise with computers -- particularly with             programming -- and for whom computing was an end in             itself, even an art form. However, it has popularly come             to mean a person who, through stealing passwords and             otherwise exploiting security holes, gains unauthorized             access to computer systems, either maliciously or             mischievously.  See Chapter 2, notes 36-38 and surrounding             text.            43E. Jensen, "An Electronic Soapbox: Computer Bulletin             Boards and the First Amendment," 39 Fed. Comm. L.J. 217,             224-226 (1987).            44Id. at 257.                                         13            would be unenforceable.  Hobbyists could easily "go            underground," concealing their activities from regulators.45               Jensen provides one original analogy, what he calls "the            BBS as an association,"46 a place where "people from all            across the country gather electronically and exchange views,            recipes, or epithets, just as would the local Jaycees."47            Citing NAACP v. Alabama,48 he writes, "As an association            engaged in speech, a bulletin board is entitled to            constitutional protection."49                A slightly different approach to the sysop liability            question is taken by Edward Di Cato,50 who discusses a more            recent addition to the list of BBS hazards: the distribution            of computer viruses.51  Di Cato reaches a familiar            conclusion -- that a sysop would be liable only for            "recklessly" allowing a computer virus to spread through a                                            45              Id. at 232-3.            46Id. at 252.            47Id.            48357 U.S. 449 (1958).            49Id.            50E. Di Cato, "Operator Liability Associated With             Maintaining a Computer Bulletin Board," 4 Software L.J.             147 (1990).            51A virus is a computer program that is designed to             replicate itself by attaching itself surreptitiously to             other programs. Viruses may be fairly harmless, perhaps             popping up a mischievous message on the screen, or             destructive -- erasing files from a hard disk or perhaps             scrambling the disk's data irretrievably.                                         14            BBS.52  He also suggests that sysops could protect            themselves by exercising tight control over their BBSs,            verifying users' identities before giving them access.53  He            further suggests that a disclaimer clearly specifying the            responsibilities of users and specifically repudiating sysop            responsibility might further protect sysops from            liability.54               The sysop liability question has also been tackled by            John T. Soma, Paula J. Smith and Robert D. Sprague.55  Their            article, however, consists mostly of an extensive survey of            "computer crime" laws, engaging in little First Amendment            analysis.               One commentator reaches a conclusion quite different from            most others on the subject of BBS regulation.  Robert Beall            examines the liability of sysops for the posting of            illegally obtained information by phone phreakers.56  In            asking which model of media law will apply, Beall forces a            choice between the laws covering newspapers or the laws                                            52Di Cato, supra note 50, at 155.            53Id. at 156.            54Id. at 157.            55J. Soma, P. Smith, R. Sprague, "Legal Analysis of             Electronic Bulletin Board Activities," 7 W. New Eng. L.             Rev. 571 (1985).            56R. Beall, "Developing a Coherent Approach to the             Regulation of Computer Bulletin Boards," 7 Computer/Law             Journal 499 (1987).                                         15            covering telephone service;57 he ends up choosing elements            of each.  He agrees with other commentators that a sysop may            not be liable without affirmative involvement in the illegal            activity.58  While he seems to favor strong First Amendment            protection for BBSs, he is not satisfied with the resulting            lack of protection against phreaking activity.  He therefore            proposes a full-fledged system of licensing of BBSs by the            FCC, with licensees required to adhere to certain rules in            order to retain or renew their licenses.59  However, he            would rely upon the private sector for enforcement of these            rules; telephone companies, for instance, would be expected            to monitor BBSs for stolen credit card numbers.60               Besides the BBS, the only other related communication            media that have received significant attention in the legal            literature are the similar technologies of teletext and            videotex.   Teletext is a form of electronic text delivered            by television stations to subscribers' TV sets, either via            broadcasting or cable hookups but as part of a conventional            television signal.  Teletext presents a series of pages, or            frames, of text, from which the subscriber may select using            a special keypad.61  Videotex is a similar service,                                            57Id. at 509-10.            58Id. at 504-5.            59Id. at 513-15.            60Id. at 516.            61Freedman, supra note 7, at 689.                                         16            delivered to customers' TV sets via telephone lines.62            Neither service has been implemented on a large scale in the            United States, but despite their obscurity, they have            received much attention from legal commentators.               Jeffrey Hurwitz devotes his attention to teletext,            particularly broadcast teletext.63  He suggests that the            FCC's 1983 decision not to regulate teletext -- reasoning            that it is an "ancillary service" not subject to the            regulations applied to regular TV programming -- was            incorrect.64  Teletext, like traditional broadcasting, he            felt should be content regulated -- subject to the Fairness            Doctrine,65 the "equal opportunity" rule and the "reasonable            access" rule.66  Exempting teletext from such content            regulations provides an easy avenue for circumventing the            purpose of such regulations as applied to broadcasting, he            writes.67  Perhaps most troubling, however, is his argument            that the FCC, more than anything else, has simply            misconstrued the clear language of the statutes and                                            62Id. at 735.            63J. Hurwitz, "Teletext and the FCC: Turning the Content             Regulatory Clock Backwards," 64 Boston Univ. L. Rev. 1057             (1984).            64Id. at 1057.            65The Fairness Doctrine, no longer FCC policy, was still             applied to broadcasters when Hurwitz wrote his article.            66Hurwitz, supra note 63, at 1083.            67Id. at 1098.                                         17            regulations in question.68  Hurwitz's arguments suggest that            the existing statutes could pose a threat to the freedom of            computer communication.               Another writer, Richard Hindman, has a markedly different            view of teletext.69  "The first amendment," he writes,            "protects the right of every person to participate in the            marketplace of ideas."70  Most of Hindman's article is            devoted to an analysis of a consent decree that currently            bars telecommunications giant AT&T from entering the            teletext business.71  However, Hindman's comments about the            First Amendment issues underlying teletext regulation are            insightful:                    The history of broadcast and cable regulation                 suggests that as new communication technologies                 become available Congress and the courts will fail                 to fully comprehend how the first amendment limits                 government authority to regulate.  In fact, at                 first, the courts will attempt to characterize                 users of the new medium as someone other than a                 speaker entitled to full first amendment                 protection or, as a speaker entitled to some                 lessor [sic] protected right.... [U]ntil a new                 technology becomes familiar in its own right,                 courts generally attempt to impute the regulatory                 baggage of an existing medium, leaving unresolved                 the difficult constitutional issues.72                                            68Id. at 1083-1094.            69R. Hindman, "The Diversity Principle and the MFJ             Information Services Restriction: Applying Time-Worn First             Amendment Assumptions to New Technologies," 38 Catholic             Univ. L. Rev. 471 (1989).            70Id. at 471.            71U.S. v. AT&T, 552 F.Supp. 131 (D.C. Cir. 1982).            72Id. at 494-5.                                         18               Lynn Becker, in her survey of the confused state of the            law regarding teletext and videotex, agrees that the            technology of delivery should not be the decisive factor in            deciding its regulatory status.73  "A preferable            alternative," she writes, "would be to view all electronic            publishing as a single communications medium regardless of            the method of transmission.... The basis for distinguishing            between typeset and electronically transmitted            communications is not viable in 1985.  The regulatory            underpinnings are without merit."74  Instead, she calls for            the design of a new legal framework designed to accommodate            the new media and to recognize their true nature.  "[T]he            new media must be viewed according to their function rather            than through their methods of distribution.... When viewed            in this manner, the regulatory mandate is clear: Congress            shall make no laws abridging ... the freedom of the            press."75               What conclusions emerge from this body of literature?            It is clear that analogy to older media has been the method            of choice for deciding the legal status of computer            communication, whether BBS, teletext or videotex.  Almost            every author divides existing media into regulatory                                            73L. Becker, "Electronic Publishing: First Amendment Issues             in the Twenty-First Century," 13 Fordham Urban L.J. 801             (1985).            74Id. at 866.            75Id. at 868.                                         19            categories, generally classifying print media as most immune

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -