Skip to main content
Podcast Episode: Building a Tactile Internet

EFFector - Volume 1, Issue 1 - EFF Seeks Amicus Status in Len Rose Case


EFFector - Volume 1, Issue 1 - EFF Seeks Amicus Status in Len Rose Case

***           EFF News #1.01  (January 7, 1991)          ***
***       The Electronic Frontier Foundation, Inc.       ***

Editors:  Mitch Kapor  ( 
          Mike Godwin  (

REPRINT PERMISSION GRANTED: Material in EFF News may be reprinted if you 
cite the source.  Where an individual author has asserted copyright in 
an article, please contact her directly for permission to reproduce.

E-mail subscription requests:
Editorial submissions:

We can also be reached at:

Electronic Frontier Foundation
155 Second St.
Cambridge, MA 02141

(617) 864-0665
(617) 864-0866 (fax)
USENET readers are encouraged to read this publication in the moderated 
newsgroup  Unmoderated discussion of topics discussed 
here is found in

This publication is also distributed to members of the mailing list

***    EFF News #1.01: AMICUS BRIEF IN ROSE CASE         ***


The Electronic Frontier Foundation has been tracking closely the
cases in which Len Rose, a Baltimore Unix consultant, has been
charged with crimes relating to the transmission of Unix software.
The EFF believes that the federal prosecution pending against Rose
in Baltimore and scheduled to go to trial at the end of this month
raises important legal issues affecting the public interest in 
electronic communications. Accordingly, EFF has filed a motion seeking
*amicus curiae* ("friend of the court") stauts to be heard on the
important Constitutional and statutory issues raised by the

EFF has simultaneously filed a memorandum of law in support of
Len Rose's motion to dismiss the portion of the indictment charging
him with violating the Computer Fraud and Abuse Act, Title 18
United States Code, Section 1030(a)(6). EFF believes that this
statute, which appears to prohibit the communication of a broad
category of "information through which a computer may be accessed
without authorization," is unconstitutionally vague and overbroad,
and in violation of the First Amendment guarantees of freedom of
speech and association. EFF supports the goal of preventing 
unauthorized computer intrusion, but believes that this statute
sweeps too broadly, prohibiting constitutionally protected communications
and chilling discussions about computer technology.

An additional purpose of the brief is to introduce the trial court
to the world of electronic communication and to make the court aware
of the exciting possibilities it holds for speech and association.
To that end, the brief cites to the Well (attaching its conference
list as an addendum) and to EFF Co-founder John Perry Barlow's
concept of the "virtual town meeting," published by the WHOLE EARTH

The texts of the amicus motion, the amicus brief, and the
attachment follow.


     v.                            )  Criminal Case No. JSM-90-0202 
LEONARD ROSE                       )    
     The Electronic Frontier Foundation, through its undersigned
counsel, respectfully moves this Court for leave to appear as
amicus curiae in the above-captioned case for the limited purpose
of filing the attached memorandum of law in support of the
defendant's motion to dismiss the portions of his indictment
charging him with violations of the Computer Fraud and Abuse Act of
1986, 18 1030(a)(6).
     This case, which is being watched nationwide, presents a
constitutional question of first impression involving the CFAA that
will have a profound impact on the development of computer-based
communications technologies.   For the reasons set forth below, EFF
believes that the enclosed memorandum of law contains relevant
authority and arguments that are not likely to be raised by the
parties to this action and that would be of assistance to Court in
deciding this important issue.
   1.  The Electronic Frontier Foundation is a nonprofit
organization established in 1990 to promote the public interest in
the development of computer-based communication technology. 
   2.  The founders and directors of Electronic Frontier Foundation
include Mitchell Kapor and Steven Wozniak, two of our nation's
leading experts in the area of computer technology.  Mr. Kapor
founded the Lotus Development Corporation and designed and
developed the Lotus 1-2-3 spreadsheet software.  Mr. Wozniak was
one of the co-founders of Apple Computer, Incorporated.  These
individuals have comprehensive knowledge of the developing
computer-based technologies and the promises and threats they
   3.  The Foundation's goals, as set forth in its mission
statement, are as follows:
     Engage in and support educational activities which increase
     popular understanding of the opportunities and challenges
     posed by developments in computing and telecommunications.
     Develop among policy-makers a better understanding of the
     issues underlying free and open telecommunications, and
     support the creation of legal and structural approaches which
     will ease the assimilation of these new technologies by
     Raise public awareness about civil liberties issues arising
     from the rapid advancement in the area of new computer-based
     communications media.  Support litigation in the public
     interest to preserve, protect, and extend First Amendment
     rights within the realm of computing and telecommunications
     Encourage and support the development of new tools which will
     endow non-technical users with full and easy access to
     computer-based telecommunication.
   4.  While the Foundation regards unauthorized entry into
computer systems as wrong and deserving of punishment, it also
believes that legitimate law enforcement goals must be served by
means that do not violate the rights and interest of the users of
electronic technology and that do not chill use and development of
this technology.
   5.  This case presents a question of first impression that falls
squarely within the expertise and interest of the Electronic
Frontier Foundation -- whether the CFAA, which makes it a crime to
communicate "information through which a computer may be accessed
without authorization," is unconstitutionally overbroad and vague,
in violation of the First and Fifth Amendments.  The Court's ruling
on this issue could have important implications for speech and
publications relating to computer-based technologies, and,
ultimately, for the use and development of these technologies. 
     Accordingly, the Electronic Frontier Foundation respectfully
requests that this Court grant it leave to appear as amicus curiae
and to file the attached memorandum of law on this important
constitutional issue.
DATED: January 7, 1991
                          Respectfully submitted,
                          THE ELECTRONIC FRONTIER FOUNDATION      
                          by its Attorneys,
                          Harvey A. Silverglate
                          Sharon L. Beckman
                          Silverglate & Good
                          89 Broad St., 14th Floor
                          Boston, Massachusetts 02110
                          (617) 542-6663
                          Michael Godwin, Staff Attorney
                          Electronic Frontier Foundation
                          155 Second Street
                          Cambridge, Massachusetts 02141
                          (617) 864-0665



	v.                     ) Crim. Case No. JSM-90-0202 	
LEONARD ROSE		       )


    This is a case of first impression involving the Computer Fraud and 
Abuse Act of 1986 (CFAA), 18 U.S.C.  1030(a)(6), which makes it a crime 
to disseminate certain "information" relating to computers and 
computer security.*1*  Amicus curiae The Electronic Frontier 
Foundation*2* submits this memorandum of law in support of the 
defendant's motion to dismiss the two counts of the indictment 
charging him with violating section 1030(a)(6) on the ground that the 
law issubstantially overbroad and vague, in violation of the First and 
Fifth Amendments to the United States Constitution.


     Advances in computer technology have enabled new methods of 
communication, including computer conferencing systems (often 
referred to as electronic bulletin boards),  electronic mail, and online 
publications.  Note, An Electronic Soapbox:  Computer Bulletin Boards 
and the First Amendment, 39 Fed. Comm. L. J. 217 (1988).*3*   These 
media, still in their embryonic stages of development, offer great 
promise for a society that values freedom of speech and association, for 
they are inexpensive, easily accessible, and permit instantaneous 
communication and association without regard to geographic 
boundaries.  As Professor Tribe has observed, computers are fast 
becoming the printing presses of the future:  "As computer terminals 
become ubiquitous and electronic publishing expands, the once 
obvious boundaries between newspapers and television, telephones 
and printing pressed, become blurred."  L. Tribe, American 
Constitutional Law 1009 (1988).  EFF founder Mitchell Kapor has 
described how computer-based communications also facilitate freedom 
of association:

In the physical world, our sense of community withers.  Urban centers 
as places to live are being abandoned by all who can afford to leave.  In 
the global suburbs in which more and more of us live, one's horizon is 
limited to the immediate family.  Even close neighbors are often 

In the realities that can be created within digital media there are 
opportunities for the formation of virtual communities--voluntary 
groups who come together not on the basis of geographical proximity 
but throug a common interest.  Computer and telecommunications 
systems represent an enabling technology for the formation of 
community, but only if we make it so.

. Kapor, Why Defend Hackers?, 1 EFF News (December 10, 1990).*4*  
See I. de Sola Pool, Technologies of Freedom (1983); L. Becker, Jr., The 
Liability of Computer Bulletin Board Operators for Defamation Posted 
by Others, 22 Conn. L. Rev. 203 (1989) ("Many computers owners find 
these boards anew and exciting medium of communication."); Note, 
An Electronic Soapbox, 39 Fed. Comm. L.J. at 218P223.  
     The possibilities for communication and association through 
electronic conferencing are limited only by the inclinations and 
imaginations of systems operators and users.  While computer 
technology is one popular topic for discussion on bulletin board 
systems, these systems also facilitate wide-ranging discussions of 
literary, artistic, social and political issues.  Id. at 222.  See, e.g., 
Attachment A (a print out of the list of conferences available on the 
Whole Earth `Lectronic Link, popularly known as the WELL, a BBS 
operated out of Sausalito, California).  The analogies used to describe 
electronic conferencing systems -- ranging from a public bulletin 
board*5* to a virtual town meeting*6* --  indicate the richness of these 
fora for communication and association.
     Increasing reliance by individuals, businesses and government on 
computer technology has also given rise to other interests, including 
new permutations of privacy andproperty interests, in electronically 
stored information.  The protection of these new interests is a proper 
concern of government; but in creating new prohibitions and 
protections, the government ought not, indeed constitutionally may 
not, sweep so broadly as to prohibit the dissemination of information 
relating to the new technology.  
     The law is now struggling to catch up with changes in computer-
based technology.  Unless lawyers and judges appreciate the promises 
of computer-based technology for speech and association, and unless 
they afford electronic communications the full protections of the First 
Amendment,  the resulting law will stifle these developing 
communications media.  Tribe has described the problem and its 
consequences this way:

The rate of technological change has outstripped the ability of the law, 
lurching from one precedent to another, to address new realities.  
Novel communications are pressed into service while still in their 
infancy, and the legal system's initial encounters with these newborns 
have a lasting influence....`[t]echnical laymen, such as judges, perceived 
the new technology in that early, clumsy form, which then becomes 
their image of its nature, possibilities, and use.  This perception is an 
incubus on later understanding.'"

 L. Tribe, American Constitutional Law 1007 (1988) (quoting I. de Sola 
Pool, Technologies of Freedom 7 (1983).
     The Supreme Court has made clear that the Constitution is flexible 
enough to protect interests created by new technologies unimaginable 
to the framers.  We have seen this evolution, for example in response 
to developments in wiretap technology, which enabled the 
government to intercept communications without physical trespass.  
Recognizing that constitutional doctrine must evolve with interests 
created by new technology, the Supreme Court abandoned its trespass-
based analysis and ruled that the Fourth Amendment protects not only 
private physical areas but also communications in which an individual 
has an reasonable expectation of privacy.  Katz v. United States, 389 
U.S. 347 (1967).
     There is no question that speech and association accommodated by 
computer-based technologies are protected by the First Amendment.  
The question before this Court is whether, in its early attempts to 
regulate these new technologies, the government has swept too 
broadly, chilling the freedom of speech and association that the 
Constitution guarantees.

     A statute is unconstitutionally overbroad on its face if it "does not 
aim specifically at evils within the allowable area of [government] 
control, but ... sweeps within its ambit other activities that constitute an 
exercise" of protected expressive or associational rights.  Thornhill v. 
Alabama, 310 U.S. 88, 97 (1940) (holding statute prohibiting picketing 
facially invalid because it banned even peaceful picketingprotected by 
the First Amendment).*7*  Section 1030(a)(6) suffers from this fatal 
flaw because, on its face, it appears to prohibit the possession or 
communication of constitutionally protected speech and writing 
concerning computer systems or computer security. 
     Section 1030(a)(6) prohibits trafficking "in any password or similar 
information through which a computer may be accessed without 
authorization."   The word "password" is not defined in the statute, but 
the legislative history suggests that Congress intended it to be 
interpreted so as to include a password or its functional equivalent--a 
code or command that functions like the combination to a safe:

The Committee also wishes to make clear that "password", as used in 
this subsection, does not mean only a single word that enables one to 
access a computer.  The Committee recognizes that a "password" may 
actually be comprised of a set of instructions or directions for gaining 
access to a computer and intends that the word "password" be 
construed broadly enough to encompass both single words and longer 
more detailed explanations on how to access others' computers.  

S. Rep. No. 432, 99th Cong., 2d Sess. 13 (1986).*8*

The Senate Report also indicates that the word password was intended 
to reach "conduct associated with `pirate bulletin boards.'" Id.  The 
word "traffic" is also broadly defined to mean "transfer, or otherwise 
dispose of, to another or obtain control of with intent to transfer or 
dispose of."  18 U.S.C.  1029(e)(5). 
     The most problematic statutory phrase is the one under which the 
defendant is charged, making it a criminal offense to communicate 
"information through which a computer may be accessed without 
authorization."*9*  This phrase is not defined in the statute, and if it is 
construed to prohibit the communication of information other than 
"passwords" or "detailed explanations on how to access others' 
computers,"*10* its scope would be impossible to ascertain. 
     On its face, then, section 1030(a)(6) could be used to prohibit the 
communication of a broad category of information relating to 
computers or even the mere possession of such information by one 
who intends to to communicate it.  The statute would apparently 
prohibit the giving of a speech or the publication of a scholarly article 
on computer security if the speech or article contained "information" 
that another person could use to access a computer without 
authorization.  The statute could be read to prohibit computer 
professionals from discussing the operations of programs designed to 
test computer security, since such knowledge could be used to facilitate 
access to a computer system without authorization.  The statute is even 
susceptible to an interpretation that would prohibit a journalist from 
publishing an article describing the security deficiencies of a 
government computer system, even if all of the information contained 
in the article came from publicly available sources.  
     The claim that section 1030(a)(6) could be used to prosecute a 
journalist and that it therefore has a chilling effect on freedom of the 
press is not simply imagined.  In United States v. Riggs, 739 F. Supp. 
414, 416 n.1 (N.D. Ill. 1990), a federal grand jury returned a multicount 
indictment charging the editor/publisher of an electronic newsletter 
with "traffick[ing] in information through which a computer may be 
accessed without authorization," in violation of section 1030(a)(6).  
Although the government eventuallydropped the section 1030(a)(6) 
charges,*11* the prosecution has had a substantial chilling effect on 
Neidorf, who is no longer publishing his newsletter.
     The statute is also overbroad in that it appears to sweep within its 
prohibition discussions regarding computer systems and computer 
security taking place on electronic bulletin boards.  The legislative 
history of section 1030(a)(6) reveals that while Congress intended the 
provision to penalize conduct associated with electronic bulletin 
boards, Congress may not have been aware of the richness, depth, and 
variety of discussions its language would prohibit.  The Senate Report 
states that section 1030(a)(6) was "aimed at penalizing conduct 
associated with `pirate bulletin boards,' where passwords are displayed 
that permit unauthorized access to others' computers."  Senate Report 
at 13.  Yet the statutory language sweeps much more broadly, 
prohibiting not only the posting of passwords, but also discussion of 
other "information" that could theoretically be used by another to 
access a computer without authorization. This is not surprising, for 
while the legislative history is replete with references to so-called 
"pirate bulletin boards," there is no indication in the history that 
Congress was made aware of the sophisticated and constitutionally 
protected discussions about computers and computer security occurring 
on bulletin board systems across the country on a daily basis.
     Section 1030(a)(6) violates the First Amendment because it prohibits 
constitutionally protected communications about computers and 
computer security because of their communicative impact.  The 
statutory requirement that the defendant possess an intent to defraud 
does not cure this defect.  Communications concerning computers and 
computer security are constitutionally protected, unless they fall within 
the narrow subset of communications amounting to "advocacy ... 
directed to inciting or producing imminent lawless action" and "likely 
to incite or produce such action."  Brandenburg v. Ohio, 395 U.S. 444 
(1967).  Outside this narrowly defined category of unprotected speech, 
Congress may not pass a law prohibiting the dissemination of 
information about computers or computer security unless the 
prohibition is "necessary to serve a compelling [government] interest 
and ... narrowly drawn to achieve that end."  See Widmar v. Vincent, 
454 U.S. 263 (1981).  Even if the purpose underlying section 1030(a)(6) P
P presumably, preventing unauthorized intrusion into computers in 
which the government has an interest -- were considered to be 
"compelling," it is apparent that the broad prohibition of the 
communication of "information through which a computer may be 
accessed without authorization" is not "narrowly drawn" to achieve 
that end.
     The potential unconstitutional applications of this statute to 
protected and socially productive speech and activity far exceed its 
legitimate reach.  As the Riggs case demonstrates, this is plainly not a 
statute whose overbreadth could be deemed insubstantial or imagined.  
Broadrick v. Oklahoma, 413 U.S. at  616 (where conduct and not merely 
speech is involved, the overbreadth of a statute must be "substantial ... 
judged in relation to the statute's plainly legitimate sweep").
     The overbreadth of this statute cannot be cured through case-by-
case adjudication.  Given the broad definition of "password" suggested 
by the legislative history of the CFAA, it impossible to imagine what 
additional "information" sharing Congress could constitutionally 
prohibit.  The statutory language under which the defendant is charged 
--  prohibiting dissemination of "information that could be used to 
access a computer without authorization," has no constitutionally 
legitimate core. See Houston v. Hill, 107 S. Ct. 2502 (1987) (invalidating 
ordinance forbidding the interruption of an onPduty police officer 
because there was no definable core of constitutionally unprotected 
expression to which it could be limited).
     Moreover, judicial efforts to narrow the scope of this language 
through case-by-case adjudication could not eliminate its direct and 
substantial chilling effect on research, education, and discussions 
concerning computer technology.  Application of the overbreadth 
doctrine is appropriate where, as here, the "statute's very existence may 
cause others not before the court to refrain from constitutionally 
protected speech or expression."  Broadrick v. Oklahoma, 413 U.S. at 
613.  The Supreme Court has repeatedly emphasized that

"[p]recision of regulation must be the touchstone in an area so closely 
touching our most precious freedoms," N.A.A.C.P. v. Button, 371 U.S. 
415, 438 ..."[f]or standards of permissible statutory vagueness are strict 
in the area of free expression.... Because First Amendment Freedoms 
need breathing space to survive, government may regulate in the area 
only with narrow specificity." Id. at 432P433 .... When one must guess 
what conduct or utterance may lose him his position one necessarily 
will "steer far wider of the unlawful zone .... Speiser v. Randall, 357 
U.S. 513 .... For "[t]he threat of sanctions may deter ... almost as potently 
as the actual application of sanctions.  N.A.A.C.P. v. Button, supra.... 
The danger of that chilling effect upon the exercise of vital First 
Amendment rights must be guarded against by sensitive tools which 
clearly inform [individuals] what is being proscribed."

Keyishian v. Board of Regents, 385 U.S. 607, 603P604 (1967).

     This statute hangs over citizens "like a sword of Damocles," 
threatening them with prosecution for any speech or writing relating 
to computer security.  That a court may ultimately vindicate such 
citizens "is of little consequence--for the value of a sword of Damocles 
is that it hangs--not that it falls."  Arnett v. Kennedy, 416 U.S. 230, 232 
(1974)(Marshall, J., dissenting).  For every speaker or writer who risks 
criminal prosecution "by testing the limits of the statute, many more 
will chose the cautious path and not speak at all."  Id.
     For the reasons given above, the Electronic Frontier Foundation 
urges this Court to invalidate section 1030(a)(6) on the ground that it is 
unconstitutionally vague and overbroad.
DATED:  January 7, 1991.
					 Respectfully submitted,

                          Amicus Curiae,                            
					 by its Attorneys,

                          Harvey A. Silverglate
                          Sharon L. Beckman
                          Silverglate & Good
                          89 Broad St., 14th Floor
                          Boston, Massachusetts 02110
                          (617) 542-6663
                          Michael Godwin, Staff Attorney
                          Electronic Frontier Foundation
                          155 Second Street
                          Cambridge, Massachusetts 02141
                          (617) 864-0665


*1*	18 U.S.C.  (a)(6)(b) makes it a criminal offense to knowingly and 
with intent to defraud traffic[] (as defined in section 1029) in any 
password or similar information through which a computer may be 
accessed without authorization, if .. such trafficking affects interstate or 
foreign commerce.

*2*	The Electronic Frontier Foundation is a nonprofit organization 
established to promote the public interest in the development of 
computer-based communications technology. See Motion of Electronic 
Frontier Foundation for Leave to File Memorandum of Law Amicus 
Curiae (setting forth the Foundation's goals).

*3*	An electronic bulletin board system  (BBS) is a conferencing 
system made of computers communicating over telephone lines.  
Anyone with a computer, a modem, and a telephone line has the 
necessary tools to access a BBS. A BBS is accessed the same way one 
accesses a database like WESTLAW or LEXIS.  Unlike these databases, 
however, a BBS typically permits users to give as well as receive 
information.  See Note, An Electronic Soapbox, 39 Fed. Comm. L.J. at 
	A BBS is facilitated and maintained by a "systems operator," 
whose computer has the hardware and software necessary to run the 
BBS.   A BBS, and the conferences within it, can be designed to be 
private (permitting access only to authorized users) or public 
(permitting access to all callers).  BBSs range in size from systems 
accommodating only a few users to large commercial enterprises 
servicing hundreds of thousands of users.  Some BBSs permit 
simultaneous electronic conversations among users.  Most BBS 
systems also offer an electronic mail service, whereby a user can send 
private mail another user or users.  Id., at 218-221.

*4*	EFF News is an electronic publication containing "news, 
information, and discussion about the world of computer-based 
communications media."  1 EFF News (December 19, 1990).  It covers 
issues such as "freedom of speech in digital media, privacy rights, 
censorship, standards of responsibility for users and operators of 
computer systems, policy issues such as the development of national 
information infrastructure, and intellectual property." Id.

*5*	One writer has argued that a electronic conferencing system "can 
be thought of as the electronic analogy to a public, ordinary bulletin 
board -- a kind of computerized Democracy Wall -- on which users 
can post whatever information they desire, and from which users can 
retrieve information provided by others."  L. Becker, supra, 22 Conn. L. 
Rev. at 204.  See also Note, An Electronic Soapbox, 39 Fed. Comm. L.J. 
at 217 (analogizing to a grocery store message board).

*6*	J. Barlow, Crime and Puzzlement, 68 Whole Earth Review 44, 45 

*7*	Recognizing that an overbroad criminal statute has a chilling 
effect on constitutionally protected speech and association well beyond 
the prosecutions in which it is employed, the Supreme Court has ruled 
that an overbreadth challenge may be raised even by one whose own 
conduct does not fall within the protected category.  Broadrick v. 
Oklahoma, 413 U.S. 615, 612P613 (1973) (citing Dombrowski v. Pfister, 
380 U.S. 479, 486 (1965) (permitting First Amendment challenge by 
litigants whose conduct fell squarely within the "hard core" of the 
statutory prohibition)).

*8*	The version of section 1030(a)(6) considered by the Senate (S. 
2281) is identical to the language of the House bill that was ultimately 
enacted into law.  Compare 18 U.S.C.  1030(a)(6), with Hearing on S. 
2281 Before the Committee on the Judiciary, 99th Cong., 2d Sess. 7P14 
(1986) (full text of S. 2281).

*9*	See Counts I and II of the indictment against Leonard Rose.

*10*	See Sutherland Statutory Construction  46.06 ("A statute should 
be construed so that effect is given to all its provisions, so that no part 
will be inoperative or superfluous, void or insignificant.")

*11*	Compare United States v. Riggs, 739 F. Supp at 416 n.1, with 
United States v. Riggs, 743 F. Supp. 556, 558-559 (N.D. Ill. 1990) 
(discussing remaining non-CFAA charges). The Government entered 
into a Pretrial Diversion Agreement with Craig Neidorf with respect to 
the remaining charges after trial testimony established that the 
information Neidorf had published in his newsletter was publicly 
available. "U.S. Drops Computer Case Against Student," New York 
Times p. 7 col.3 (July 28, 1990); "`Hacking' Crackdown is Dealt a Setback 
in Trial in Chicago,"  Wall St. Journal p. B3 (July 30, 1990). 

                          ATTACHMENT A
                    CONFERENCES ON THE WELL
Best of the WELL - vintage material -     (g best)
                        Business - Education
Apple Library Users Group(g alug)      Agriculture       (g agri) 
Brainstorming          (g brain)       Classifieds       (g cla)  
Consultants            (g consult)     Consumers         (g cons) 
Design                 (g design)      Desktop Publishing(g desk) 
Disability             (g disability)  Education         (g ed)   
Entrepreneurs          (g entre)       Homeowners        (g home) 
Investments            (g invest)      Legal             (g legal)       
One Person Business    (g one)         Periodical/newsletter(g per)         
Telecomm Law           (g tcl)         The Future        (g fut)  
Translators            (g trans)       Travel            (g tra)  
Work                   (g work)        
                   Social - Political - Humanities
Aging                  (g gray)        AIDS              (g aids) 
Amnesty International  (g amnesty)     Archives          (g arc)  
Berkeley               (g berk)        Buddhist          (g wonderland)  
East Coast             (g east)        Emotional Health****(g private)     
Environment            (g env)         Christian         (g cross)       
Couples                (g couples)     Current Events    (g curr) 
Dreams                 (g dream)       Drugs             (g dru)  
Firearms               (g firearms)    First Amendment   (g first)       
Fringes of Reason      (g fringes)     Gay               (g gay)  
Gay (Private)#         (g gaypriv)     Geography         (g geo)  
German                 (g german)      Hawaii            (g aloha)       
Health                 (g heal)        Histor            (g hist) 
Interview              (g inter)       Italian           (g ital) 
Jewish                 (g jew)         Liberty           (g liberty)     
Mind                   (g mind)        Miscellaneous     (g unclear)     
Men on the WELL**      (g mow)         Nonprofits        (g non)  
North Bay              (g north)       Northwest         (g nw)   
Parenting              (g par)         Peace             (g pea)  
Peninsula              (g pen)         Poetry            (g poetry)      
Philosophy             (g phi)         Politics          (g pol)  
Psychology             (g psy)         San Francisco     (g sanfran)     
Scam                   (g scam)        Sexuality         (g sex)  
Singles                (g singles)     Southern          (g south)       
Spirituality           (g spirit)      Transportation    (g transport)   
True Confessions       (g tru)         WELL Writer's Workshop***(g www)       
Whole Earth            (g we)          Women on the WELL*(g wow)  
Words                  (g words)       Writers           (g wri)
**** Private Conference - mail wooly for entry
***Private conference - mail sonia for entry
** Private conference - mail flash for entry
*  Private conference - mail carolg for entry
#  Private Conference - mail hudu for entry
                  Arts - Recreation - Entertainment
ArtCom Electronic Net  (g acen)        Audio-Videophilia (g aud)
Boating                (g wet)         Books             (g books)
CD's                   (g cd)          Comics            (g comics)      
Cooking                (g cook)        Flying            (g flying)      
Fun                    (g fun)         Games             (g games)       
Gardening              (g gard)        Nightowls*        (g owl)
Jokes                  (g jokes)       MIDI              (g midi) 
Movies                 (g movies)      Motorcycling      (g ride) 
Music                  (g mus)         On Stage          (g onstage)     
Pets                   (g pets)        Radio             (g rad)  
Restaurant             (g rest)        Science Fiction   (g sf)   
Sports                 (g spo)         Star Trek         (g trek) 
Television             (g tv)          Theater           (g theater)
Weird                  (g weird)       Zines/Factsheet Five (g f5) 
* Open from midnight to 6am
                             Grateful Dead
Grateful Dead          (g gd)          Deadplan*         (g dp)
Deadlit                (g deadlit)     Feedback          (g feedback)    
GD Hour                (g gdh)         Tapes             (g tapes)       
Tickets                (g tix)         Tours             (g tours)
* Private conference - mail tnf or marye for entry
AI/Forth               (g ai)          Amiga             (g amiga)       
Apple                  (g app)         Atari             (g ata)  
Computer Books         (g cbook)       Art & Graphics    (g gra)  
Hacking                (g hack)        HyperCard         (g hype) 
IBM PC                 (g ibm)         LANs              (g lan)
Laptop                 (g lap)         Macintosh         (g mac)  
Mactech                (g mactech)     Microtimes        (g microx)      
OS/2                   (g os2)         Printers          (g print)       
Programmer's Net       (g net)         Software Design   (g sdc)*
Software/Programming   (software)      Unix              (g unix) 
Word Processing        (g word)
* Private Conference - Send email to tao for entry.
                        Technical - Communications
Bioinfo                (g bioinfo)     Info              (g boing)       
Media                  (g media)       Netweaver         (g netweaver)
Packet Radio           (g packet)      Photography       (g pho)  
Radio                  (g rad)         Science           (g science)     
Technical Writers      (g tec)         Telecommunications(g tele) 
Usenet                 (g usenet)      Video             (g vid)  
Virtual Reality        (g vr)

                              The WELL Itself
Deeper                 (g deeper)      Entry                  (g ent)         
General                (g gentech)     Help                   (g help)        
Hosts                  (g hosts)       Policy                 (g policy)
System News            (g news)        Test                   (g test)

Back to top

JavaScript license information