Skip to main content
Podcast Episode: 'I Squared' Governance

EFFector - Volume 5, Issue 4 - Victory in the Steve Jackson Games Case

EFFECTOR

EFFector - Volume 5, Issue 4 - Victory in the Steve Jackson Games Case

******************************************************************
           //////////////     //////////////     //////////////
         ///                ///                ///
       ///////            ///////            ///////
     ///                ///                ///
   //////////////     ///                ///
******************************************************************
EFFector Online Volume 5 No. 4       3/19/1993       editors@eff.org
A Publication of the Electronic Frontier Foundation   ISSN 1062-9424
389 lines

                  -==--==--==-<>-==--==--==- 
                        In this issue:
            Victory in the Steve Jackson Games Case
              EFF Pioneer Award Winners for 1993
               Issues for K-12 Access to the Internet
                   -==--==--==-<>-==--==--==- 

               STEVE JACKSON GAMES WINS LAWSUIT 
                  AGAINST U.S. SECRET SERVICE

A games publisher has won a lawsuit against the U.S. Secret Service 
and the federal government in a ground-breaking case involving 
computer publications and electronic mail privacy.

In a decision announced in Austin, Texas, on March 12, Judge Sam 
Sparks of the federal district court for the Western District of Texas 
announced that the case of Steve Jackson Games et al. versus the U.S. 
Secret Service and the United States Government has been decided 
for the plaintiffs.

The plaintiffs, which include Steve Jackson, the company he founded, 
and three users of the company's bulletin board system (BBS), sued 
the government on claims that their statutory rights to electronic 
mail privacy had been violated when the BBS and other computers, 
disks and printouts were seized by the Secret Service as part of a 
computer crime investigation.  These rights are protected under the 
Electronic Communications Privacy Act (ECPA), which extended most 
of the protections of the federal Wiretap Act ("Title III") to electronic 
mail.

Jackson and his company also claimed violations of the Privacy 
Protection Act of 1980, a federal law designed to limit searches of 
publishers in order to protect their First Amendment rights.

Mitch Kapor, founder and chairman of the board for the Electronic 
Frontier Foundation, the public interest/civil liberties organization 
that has underwritten and supported the case since it was filed in 
1991, said he is pleased with the decision.  "This decision vindicates 
our position that users of computer bulletin board systems are 
engaging in Constitutionally protected speech," Kapor said.

"This decision shows that perseverance pays off," he added.  "We've 
been at this for almost three years now, and we still don't know if it's 
over -- the Justice Department might appeal it."  Nevertheless, Kapor 
said he is optimistic about the case's ultimate outcome.

Judge Sparks awarded more than $50,000 in damages to Steve 
Jackson Games, citing lost profits and violations of the Privacy 
Protection Act of 1980.  In addition, the judge awarded each plaintiff 
$1,000 under the Electronic Communications Privacy Act for the 
Secret Service seizure of their stored electronic mail.  The judge also 
stated that plaintiffs would be reimbursed for their attorneys's fees.

The judge did not find that Secret Service agents had "intercepted" 
the electronic communications that were captured when agents 
seized the Illuminati BBS in an early morning raid in the spring of 
1990 as part of a computer crime investigation.  The judge did find, 
however, that the ECPA had been violated by the agents's seizure of 
stored electronic communications on the system.

The case was tried in Austin, Texas, by the Austin-based media law 
firm George, Donaldson & Ford, with case assistance provided by the 
Boston, Massachusetts, law firm of Silverglate & Good.

Pete Kennedy, the lawyer from George, Donaldson & Ford who 
litigated the case, calls the decision "a solid first step toward 
recognizing that computer communications should be as well-
protected as telephone communications."  Kennedy also said he 
believes the case has particular significance for those who use 
computers to prepare and distribute publications.  "There is a strong 
indication from the judge's decision that the medium of publication is 
irrelevant," he said, adding that "electronic publishers have the same 
protections against law enforcement intrusions as traditional 
publishers like newspapers and magazines.  All publishers that use 
computers should be heartened by this decision.  It indicates that the 
works-in-progress of all types of publications are protected under 
the Privacy Protection Act.

"The case also demonstrates that there are limits on the kinds of 
defenses law enforcement agents can use, Kennedy said, noting that 
"the judge made it very clear that it is no excuse that the seizure of 
draft material for publication held on a computer was incidental or 
accidental."

Mike Godwin, an attorney for the Electronic Frontier Foundation who 
has worked on the case since 1990, said he is pleased with the scope 
of the decision.  "This case is a major step forward in protecting the 
rights of those who use computers to send private mail to each other 
or who use computers to create and disseminate publications."

                    -==--==--==-<>-==--==--==- 

                SECOND ANNUAL EFF PIONEER AWARDS 

On March 10, at the Computers, Freedom and Privacy Conference in 
Burlingame, California, the Electronic Frontier Foundation presented 
its Second Annual Pioneer Awards to five recipients who were 
judged to have made significant and influential contributions to the 
field of computer-based communications.  The 1993 Pioneer Award 
recipients were Paul Baran, Vinton Cerf, Ward Christensen, Dave 
Hughes and the USENET software developers,  represented by the 
software's originators Tom Truscott and Jim Ellis.

Nominations for the Pioneer Awards were carried out over national 
and international computer-communication systems from November 
1992 to February 1993.   A panel of four judges selected the winners 
from these nominations.

The Pioneer Award Recipients

Paul Baran was the original inventor of the notion of packet 
switching, a technology of fundamental importance to data networks.  
Packet switching makes possible the efficient and simultaneous 
transmission of many messages from many sources to many 
destinations over the same circuit.  Mr. Baran's innovations in other 
and related technologies have led him to co-found a number of 
companies in Silicon Valley including Telebit, Packet Technologies (a 
portion of which later became StrataCom), Equatorial 
Communications, Metricom, InterFax and his current venture, Com21. 

Dr. Vinton Cerf led the research project which developed the TCP/IP 
protocol suite, the open system interconnection protocol which is 
used today by schools, government, corporations and an increasing 
number of individuals to communicate with each other over the 
Internet.  Dr. Cerf also participated in the development of the 
ARPANET host protocols and managed the Internet, Packet 
Communications and Networked Security programs for DARPA.  
While working at MCI, he led the engineering effort to develop MCI 
Mail.  He is now vice president of the Corporation for National 
Research Initiatives where he is responsible for projects involving 
the Internet, electronic mail, and Knowledge Robot research.

Ward Christensen wrote the original software program, 
"MODEM.ASM", which came to be called "Xmodem" or the 
"Christensen protocol".  For untold numbers of early-to-present day 
computer communications users, Xmodem has made it possible to 
transfer files, error-free, over phone lines from one computer to 
another.  Xmodem file transfer has been the major means of 
information exchange for computer hobbyists and small business 
users through the first decade of the personal computer revolution.  
Mr. Christensen also programmed the first microcomputer dial-in 
system which he named a "BBS" - bulletin board system. His original 
BBS, CBBS/Chicago, is still in operation.  He is in his 25th year at IBM. 

Dave Hughes has been an outspoken and effective grassroots 
evangelist and spokesperson for popular computer networking and 
electronic democracy for over a decade.  He fashioned his own 
computer system at Old Colorado City Communications in1985, and 
soon brought the municipal elected government of Colorado Springs 
online.  He helped design and implement a personal computer 
network connecting  one-room rural schoolhouses in Montana to 
worldwide information  resources.  He continually brings network 
connections and new applications to new populations here and 
abroad.  Perhaps most importantly, he is a tireless and enthusiastic 
communicator, offering  his experience, his inspiration and his vision 
to any and all on the Net.

USENET is a distributed bulletin board system with approximately 
two million readers worldwide. It came into being in late1979 
through the inspiration of Tom Truscott and Jim Ellis combined with 
the design and programming efforts of Steve Bellovin, Stephen 
Daniel, and Dennis Rockwell.  Following USENET's introduction in 
1980, the resulting and ever-expanding collection of "newsgroups" 
began to be carried and circulated by a growing number of 
networked sites.  The ongoing work of numerous individuals has 
allowed Usenet to survive its increasing popularity.  The daily traffic 
is now approximately 20,000 articles, totaling 50 megabytes, posted 
to 2000 different newsgroups.

Tom Truscott is currently a distributed computing professional at 
IBM in the Research Triangle Park, North Carolina. He has authored a 
number of UNIX-related articles, and is a member of ACM, IEEE, and 
Sigma Xi.

James Ellis is currently the Manager of Technical Development at the 
Computer Emergency Response Team, which is the team created to 
assist Internet sites with computer security incidents. At CERT, he is 
responsible for analyzing UNIX system vulnerabilities and for 
developing tools to assist in the handling of security incidents. 

Judges

This year's judges for the Pioneer Awards were: Jim Warren, Pioneer 
Award recipient from 1992 who coordinated the judging process, 
Steve Cisler of Apple Computer, Esther Dyson, editor of Release 1.0, 
and Bob Metcalfe, Editor of Infoworld.

                   -==--==--==-<>-==--==--==-

                   COMMUNICATIONS POLICY FORUM

          CPF Airs Issues for K-12 Access to the Internet
                        by Andrew Blau

      The Communications Policy Forum (CPF), a non-partisan project 
of the EFF that brings stakeholders together to discuss 
communications policy issues, recently convened a roundtable to 
explore some of the legal questions that arise when K-12 schools 
provide Internet access to their students.  Approximately 15 people, 
representing carriers who provide connections to the Internet, 
schools or school systems who are connected to the Internet, and 
legal experts with expertise in this and related areas, met to discuss 
issues of legal liability as this new medium enters an educational 
setting for minors.
      A key concern is that students may be exposed to material that 
parents or teachers find inappropriate for children.  In other 
electronic media, such as broadcast television, cable TV, and 
audiotext, legal restrictions have been imposed to protect children 
from ÒharmfulÓ or ÒindecentÓ material, and liability has been 
assigned.  No such framework exists for the Internet.  Moreover, the 
very strengths of the Internet Ð its decentralized, unhierarchical, and 
essentially uncontrolled flow of traffic Ð offer distinct challenges to 
those who would seek to control it in the interest of protecting 
children.  Finally, the tools available in other media Ð safe harbors, 
lockboxes, or subscription schemes Ð don't fit in this environment. 
Issues and Suggestions
      Following a brief summary of the Internet and how it operates 
and a review of how it is being used by a handful of K-12 
institutions, participants identified specific problems and policy 
issues and considered existing statutes and case law for guidance.  
The group also considered the potential effects of "harmful to 
minors" or "obscene as to minors" statutes, which are on the books in 
41 states.  Although they are often vague or broad, the Supreme 
Court has agreed that it is constitutional to have such laws which 
prohibit the dissemination to minors of material that is protected by 
the First Amendment and would be constitutional for adults, to 
minors.
      Discussion then turned to various practical measures that carriers 
and schools might take in light of what had been described.  One 
suggestion was that carriers work with school systems to provide a 
recommended set of features or services.  In order to protect 
themselves, carriers could ensure that the school put in place a set of 
policies, identify for students their responsibilities, and place a 
teacher or other adult in control of what students access through the 
school's connection.
      It was also suggested that carriers could develop a contract that 
only connects schools that agree to indemnify the provider.  
Moreover, the carrier could require assurance that when access is 
provided to minors, the school will use some formal agreement with 
the minor's parent that includes provisions that hold the network 
provider harmless from liability.
      As an alternative, it was suggested that carriers could offer a 
simple warning to schools that alerts them that Internet access may 
enable access to materials inappropriate for minors, and that local 
discretion is advised.  Schools could also offer disclaimers to parents 
modelled on those that parents are given before a field trip.
      A handful of technical solutions were suggested throughout the 
course of the meeting, and many elicited substantial interest.  For 
example, various participants suggested using encryption, programs 
that flag key words or phrases and route them for human 
intervention, and mandatory password protection for all purveyors 
of certain kinds of information.
      Many participants seemed intrigued by a proposal to develop an 
addressing standard under which someone who gets access by virtue 
of his/her status as a K-12 student could get an address tag that 
identifies the student as such for various purposes.  One example 
would be to press for the creation of an additional domain of ".stu" 
for K-12 students.  The appearance of the ".stu" tag would function 
like any other identification stamp for access to certain materials.
      Statutory immunity for carriers was also seen by almost all 
participants as highly desirable and worth pursuing.  Developing a 
legislative strategy may also highlight how these issues in the K-12 
setting are linked to and can be addressed in partnership with other 
issues and other sectors of the communications field.
      It was also noted that all those interested in K-12 networking 
need to educate the new Administration as it considers "information 
highways," a new Federal Communications Commission, the 
implementation of the NREN, and other programs.  According to this 
approach, a critical first step is to educate as many new players as 
possible, including Congressional staff and the new administration, 
that addressing these liability issues is part of the package of 
building the networks of tomorrow.
Conclusion
      By the end of the session, most participants agreed that there are 
no easy answers to the issues raised.
      Yet participants also agreed that if the community of interested 
educators, carriers, and public interest groups could establish 
workable models and promote a positive agenda with lawmakers, 
instead of waiting for problems to arise, the resulting legislative and 
regulatory framework would be far more likely to cultivate 
educational access, as well as to provide a model for broadband 
policy as a whole.
      The value of the Internet as an educational resource is clear.  As 
one educator pointed out, our schools lose both students and teachers 
because of inadequate access to resources; the Internet can enrich 
the resources available to both teachers and students and is not 
something that only universities should enjoy.  The challenge is to 
articulate a policy framework that can enable that potential to be 
realized and then to work to see that framework constructed.

=============================================================

     EFFector Online is published by
     The Electronic Frontier Foundation
     666 Pennsylvania Ave., Washington, DC 20003
     Phone: +1 202 544-9237 FAX: +1 202 547 5481
     Internet Address: eff@eff.org
     Coordination, production and shipping by Cliff Figallo, EFF 
     Online Communications Coordinator (fig@eff.org)
 Reproduction of this publication in electronic media is encouraged.
 Signed articles do not necessarily represent the view of the EFF.
 To reproduce signed articles individually, please contact the authors
 for their express permission.

      *This newsletter is printed on 100% recycled electrons*
=============================================================

        MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION

In order to continue the work already begun and to expand our 
efforts and activities into other realms of the electronic frontier, we 
need the financial support of individuals and organizations.

If you support our goals and our work, you can show that support by
becoming a member now. Members receive our bi-weekly electronic 
newsletter, EFFector Online (if you have an electronic address that 
can be reached through the Net), and special releases and other 
notices on our activities.  But because we believe that support should 
be freely given, you can receive these things even if you do not elect 
to become a member.

Your membership/donation is fully tax deductible.

Our memberships are $20.00 per year for students, $40.00 per year 
for regular members, and $100.00 per year for organizations.  You 
may, of course, donate more if you wish.

Our privacy policy: The Electronic Frontier Foundation will never, 
under any circumstances, sell any part of its membership list.  We 
will,  from time to time, share this list with other non-profit 
organizations  whose work we determine to be in line with our goals.  
But with us,  member privacy is the default. This means that you 
must actively grant us permission to share your name with other 
groups. If you do not  grant explicit permission, we assume that you 
do not wish your  membership disclosed to any group for any reason.

=============================================================
Mail to: The Electronic Frontier Foundation, Inc.
         238 Main St.
         Cambridge, MA 02142

I wish to become a member of the EFF.  I enclose: $_______
            $20.00 (student or low income membership)
            $40.00 (regular membership)

    [  ] I enclose an additional donation of $_______

Name:

Organization:

Address:

City or Town:

State:       Zip:      Phone: (    )             (optional)

FAX: (    )              (optional)

Email address:

I enclose a check [  ].
Please charge my membership in the amount of $
to my Mastercard [  ]  Visa [  ]  American Express [  ]

Number:

Expiration date:

Signature: ________________________________________________

Date:

I hereby grant permission to the EFF to share my name with
other non-profit groups from time to time as it deems
appropriate   [ ].
                       Initials:___________________________

Back to top

JavaScript license information