Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 07 Issue 55

  


Computer underground Digest Sun Jul 2, 1995 Volume 7 : Issue 55
ISSN 1004-042X

Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Field Agent Extraordinaire: David Smith
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
la Triviata: Which wine goes best with Unix?

CONTENTS, #7.55 (Sun, Jul 2, 1995)

File 1--Another Cinci BBS comment
File 2--Are We Sheep? - LA Times Op-Ed on online censorship (fwd)
File 3--Big Brother Covets the Internet (fwd)
File 4--Legal Bytes 3.01 (part 1)
File 5--Cu Digest Header Info (unchanged since 19 Apr, 1995)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Fri, 30 Jun 95 15:40:00 -0500
From: JOHN BAILEY <john.bailey@cccbbs.cincinnati.oh.us>
Subject: File 1--Another Cinci BBS comment

((MODERATORS' NOTE: We ran several articles on the Cincinnati
BBS busts in CuD 7.53. Below is another comment from a
Cincinnatian)).

Dear CUD,

I was wondering if you ever did anything in regards to computer
rights. This is becoming a very big issue lately, especially with the
Exon bill eeking its way through the government.

The reason I ask, on Friday, June 16, this became a very critical
issue for some 5000 users of one BBS here in Cincinnati. A local
sheriff and his group took it upon themselves to raid 5 local BBSs for
what he considers "adult material". These BBSs by the way, were not
all in the sheriff's jurisdiction. The largest BBS (Cincinnati
Computer Connection, CCC) was a 25 node PCBoard BBS with 5000 users.
These users used the board for personal mail, conducting business,
playing games and downloading files. The users are outraged and have
begun to try and understand what prompted this action and why it was
executed in the manner it was. The Cincinnati media has provided
excellent coverage of this situation and the CCC users have already
held a "town meeting" to try and discover what has actually happened
and what rights the users really have. Unfortunately, the sheriff and
his group refused to attend or provide any explanation as to what is
really happening.

According to the warrant, "adult material" seemed to be the issue but
this was very vague and far reaching. If there was offensive material
on the board, it was unbeknownst to the users. The sheriff apparently
had a plant on the board for 2 years. This person, in all good
conscience, would have to have seen that the BBS was a very friendly
and open "family type" community of users who had nothing to hide.
Parents and their children (of all ages) used the board. If something
was wrong, nobody ever bothered to suggest to the Sysop there might be
a problem, which certainly would have been rectified. Instead, a
Gestapo type raid was performed (very poorly, I might add), seizing
some equipment here, some there without full knowledge of how the
equipment even worked.

What the CCC users are trying to do is gain some exposure, and
insight, in to the rapidly growing problems regarding the censorship
issues the government (and police agencies) seem to have with computer
on-line networks and the way in which they brutalize computers (and
their users) instead of trying to remedy the situation through
discussion and education. If legal action is considered a viable
alternative, many CCC users have shown support for that type of action
in order to protect their rights.

Does your publication offer any kind of editorial facility to not only
review, but help in the research of these types of on-line network
problems that seem to be occurring more frequently? Users need to be
aware of potential seizure of their personal information without their
knowledge or without a warrant specifically identifying their property
as part of the seizure. Regardless of the outcome of any type of legal
proceedings, this incident in Cincinnati could be a far reaching
landmark case. Your assistance and knowledge would be greatly
appreciated.

Sincerely,


Cincinnati Computer Connection BBS Users


John M. Bailey (CCC User)
1570 Citadel Place
Cincinnati, Oh 45255
Home: 513-474-9114
Work: 513-624-8844 ext 239
Internet: john.bailey@cccbbs.cincinnati.oh.us

------------------------------

Date: Wed, 28 Jun 1995 08:11:48 -0500 (CDT)
From: David Smith <bladex@BGA.COM>
Subject: File 2--Are We Sheep? - LA Times Op-Ed on online censorship (fwd)

From--dewelch@earthlink.net (Douglas E. Welch)
Date--Tue, 27 Jun 1995 14:11:55 -0700

Previously published in the Los Angeles Times, Tuesday, June 27, 1995. Page
B11

Note: Electronic re-posting is ALLOWED but NO PAPER REPRINTS or inclusion in
online digests without written permission (paper or email) from the
author. All re-postings must retain this notice.

The complete article is available on the web site listed below.

Copyright (c) 1995 Douglas E. Welch

dewelch@earthlink.net
dewelch@pop.com
76625,3301
http://www.earthlink.net/~dewelch/
------------------------------------------

Are We Sheep?

By Douglas E. Welch

DOUGLAS E. WELCH, a writer and computer analyst from North
Hollywood, is concerned about calls for government control
of electronic media in the guise of protecting children.
He told The Times:

The thought of anti-violence and anti-sex technology built into our
televisions and computers is appalling and unnecessary. The ultimate
control device is already built into every piece of technology
manufactured today: the "off" switch.

We need to use our own best censors, our values and morals, to decide
what we and our children watch. If we took control and stopped
watching, advertisers would quickly learn that we expected better
entertainment.

Instead, we have become lazy, whining neo-children who want our
governmental parents to tell us what is right and wrong, what is good
and bad, so that we don't have to think for ourselves. We want to
continue grazing peacefully like a herd of sheep while the shepherd
keeps the wolf at bay. What we don't realize is the shepherd might be
the wolf in disguise.

We should not be so willing to give our government the power to
control what we see and hear. If we give these rights away, they will
only be bought back at a very high price, if they are to be bought
back at all.

------------------------------

Date: Mon, 19 Jun 1995 23:21:46 -0500 (CDT)
From: David Smith <bladex@BGA.COM>
Subject: File 3--Big Brother Covets the Internet (fwd)

---------- Forwarded message ----------

From: nyt@nyxfer.blythe.org (NY Transfer News Collective)


Via NY Transfer News Collective * All the News that Doesn't Fit


From Flatland, No. 12, May 1995, pp. 44-46.


Big Brother Covets the Internet

by Daniel Brandt

"The Internet offers intelligence agencies an amazing
potential source for information collection and for monitoring
the activities of their targets. They not only can plug into
communications through the names of senders and receivers of
e-mail, but also through keyword monitoring of messages as
they have done for many years. If you add e-mail to their
monitoring of telephone and other credit card transactions,
they can get a very complete picture of a given person's
activities.

"On my long trips to the United States for university
lecturing and other activities, such monitoring enables them
to know my every flight, hotel and car rental, and local
contacts, not to mention my complete itineraries. All this
prior to my flight from Germany to the U.S. Add to this my
other calls and bank transactions and you ahve almost every
imaginable detail. It is a perfect system for spy agencies and
getting better all the time."

-- former CIA officer Philip Agee

What the government giveth, the government can taketh away.
This message has been received by Internet watchers recently, as
Big Brother begins to confront the issue of online computer security.
Internet hacking is at an all-time high, the Pentagon claims, just
as big business is buying into the Internet in a big way. Something
has to give.

"Hackers are even better than communists," says one Washington
activist who deals with civil rights and electronic privacy issues.
Several weeks later, on November 22, 1994, NBC News with Tom Brokaw
underscored his point with an alarmist segment by Robert Hager:

A Pentagon unit is poised to combat unauthorized
entries into some of the world's most sensitive computer
systems. But despite all the safeguards and a computer
security budget in the hundreds of millions of dollars,
attempts were made to break into the Pentagon's computers
on 254 separate occasions in the last twelve months
alone, almost always through the Internet.... NBC News
has learned that intrusions into the Defense Department's
computers go unreported 98 percent of the time -- 98
percent! -- often because no one is aware information is
being pirated. Pentagon officials are worried the
nation's security is being compromised.

Only Joe McCarthy knows how Robert Hager came up with a figure
of 98 percent for undetected break-ins, and then pretended it was
worth repeating. Hager continued with his voice-over and began
talking about hackers breaking into one nameless hospital's records
and reversing the results of a dozen pap smears. Patients who may
have had ovarian cancer, Hager claimed, were told instead that they
were okay.

If this were an isolated story, then the Newsgroup subscribers
on <alt.conspiracy> who reacted to Hager's segment, by speculating
that something must be behind it, might be dismissed for weaving
yet another paranoid thread. But here I have to agree that even if
you're paranoid, they still might be after you. On this story, at
least, NBC seems to be the mouthpiece for larger forces.

"Organized Crime Hackers Jeopardize Security of U.S." reads
the headline in "Defense News" (October 3-9, 1994). This article
reported on a conference sponsored by the Center for Strategic and
International Studies, a prestigious Washington think tank with
close connections to the intelligence community. Dain Gary from the
Computer Emergency Response Team in Pittsburgh, a hacker-buster
group funded by the Pentagon, claimed that "there are universities
in Bulgaria that teach how to create more effective viruses." Mr.
Gary did not respond to my letter requesting more information.


The government started the Internet, and then over a period
of years it lost control. This was partly due to the unique
architecture of the Internet, which has its roots in a 1964 Rand
Corporation proposal for a post-Doomsday network. Rand's idea was
that information packets could contain their own routing
information, and would not have to rely on centralized switching.
Anarchy, it seems, is the best antidote to vulnerable
communications systems.

Recently the government, due to a combination of tight budgets
and a trend toward deregulation, has allowed big business to take
over the main conduits, or "backbone" of the Net. Corporations
smell a huge potential cybermarket, and are investing money to get
themselves positioned on the Net. They want to be ready when it
comes time to harvest the expected profits.

Today we have a global network with 30 million users.
No one is in control, and no one can pull the plug. If one
telecommunications company decided to shut off the segment of the
Net that they administer, other companies could simply route their
traffic around them. And if it weren't for password protection and
the "firewalls" installed by corporations to protect their local
turf from other computers, each of Internet's users would have
access to all the other computers on the Net.

Passwords and firewalls don't always work. A hacker who
burrows in and obtains the right sort of access can watch the
passwords of other users fly by, and can capture them for later
use. In November 1994, General Electric's robust firewalls were
circumvented by hackers, according to a company spokeswoman, and
GE had to pull their computers off the Net for a week to revamp
their security procedures. In two other incidents, a group of
hackers calling itself the Internet Liberation Front managed to
break into systems. On one they posted a message warning corporate
America against turning the Internet into a "cesspool of greed."

So Big Brother has a problem. But it's not so much a problem
of national security, except perhaps in the broad sense of economic
vulnerability. Defense and intelligence systems that are classified
are not connected to the Internet. When the Pentagon complains to
NBC about national security, what they really mean is that they
might have to forego the convenience of Internet contacts with
their contractors, and use other means instead.

No, Big Brother in this case is not the Pentagon, it's really
big business. They're chomping at the Net's information bits, while
the computer security problem is reining them back. Until this
problem is solved, the Net cannot be used for serious commercial
transactions. Big business seems to be feeding scare stories to the
media, and the Pentagon is helping them out by raising the
time-tested bugaboo of national security -- the only surefire way
to scare Congress into repressive legislation. America leads the
world in information technology, and the Internet is potentially a
lucrative link in tomorrow's profit chain. If only those pesky
hackers would go away.

The hackers that do exist are grist for the system's
disinformation mill, so if they didn't exist the system would
probably have to invent them. The bottom line for those whose
opinions matter is that the Internet has potential to help the rich
get richer. Hackers belong in jail, of course, but there's also the
Net surfer who's clogging bandwidth with idle chatter, or even
swapping copyrighted material with their friends. Frequently this
unprofitable silliness is subsidized by the universities. All big
business wants from these folks is consumption -- they may browse
through online catalogs and debit their credit lines, but forget
all this virtual community stuff. It's got to go.


The way to reboot the system is to boot the little guy, and
the best way to do this has always been to let the government bash
some heads. The digital equivalent of this is the one-two punch of
the Clipper chip and the Digital Telephony Bill. Clipper is an
ongoing government effort to encourage the mass marketing of a
encryption standard that can be tapped by them. It was developed
with help from the National Security Agency (NSA), which is worried
about the emergence of encryption that can't be easily broken by
their supercomputers. The FBI's favorite is the Digital Telephony
Bill, which was passed without debate by Congress last October.
It forces telecommunications companies to modify their digital
equipment so that the government has access to wiretapping ports
when they come calling with a warrant.

Warrants? When was the last time the intelligence community
took warrants seriously? Just in case a few of them get nervous
while breaking the law, the Foreign Intelligence Surveillance Act
of 1978 set up a secret court to issue warrants in situations
involving a foreign threat. This court has yet to turn down a
single request put before it -- even rubber stamps don't perform
this well. All it would take is a vague rumor of a Bulgarian virus
with Russian organized crime lurking close behind, and presto, a
secret warrant is issued to tap the Internet backbone so that U.S.
spooks can look for nasty digital germs. The judges aren't
competent to evaluate technical rumors, and with their track
record, no one pretends that they will call in their own experts.
Why bother, since the proceedings are secret and there's no
accountability?

But then, who needs a warrant? According to reports, the NSA,
Britain's Government Communications Headquarters (GCHQ), and
Canada's Communications Security Establishment, all practice what
might be termed the "sister agency gambit." They do this by
stationing liaison officers in each of the other agencies. When
they want to tap their own citizens without a warrant, they just
call over the liaison officer to throw the switch. Now it's called
"intelligence from a friendly foreign agency" and it's all legal.


Particularly with the Internet, where jurisdictional problems
involve many nations, this sort of transnational cooperation will
be the rule rather than the exception. The excuse for monitoring
the Net today might be the security problem. Tomorrow the security
problem may be solved, one way or another, and the Net will be used
for commercial transactions. Then the excuse for monitoring will be
the need to detect patterns of commerce indicative of money
laundering, much like FinCen does today.

FinCen, the Financial Crime Enforcement Network, monitors
Currency Transaction Reports from banks, and other records from
over 35 financial databases, as well as NSA intercepts of wire
transfers into and out of the U.S. This data is shared with the DEA
(Drug Enforcement Administration), CIA, DIA (Defense Intelligence
Agency), IRS, FBI, BATF (Bureau of Alcohol, Tobacco, and Firearms),
and the Secret Service. FinCen, which began in 1990, is an attempt
to track, cross-reference, and apply artificial-intelligence
modeling to all the relevant data from government agencies. Now
they are floating a proposal for a deposit tracking system. When
the Internet begins carrying financial transactions, FinCen is sure
to be poking around behind the scenes.

One characteristic of the Internet is that surveillance on a
massive scale is easy to accomplish. With telephone voice or fax
transmissions, the digital signal is an approximation of the analog
signal. Massive computing power, relatively speaking, is needed to
extract the content in the form of words or numbers. This is called
"speech recognition" for voice, or "optical character recognition"
for fax. Data on the Internet, on the other hand, is already in the
form that computers use directly. Moreover, each packet
conveniently includes the address of the sender and receiver.

It's a simple matter to tap an Internet backbone and scan
every packet in real time for certain keywords. With voice and fax,
it's only practical to capture specific circuits, and then examine
them later for content. On the Internet, even encryption doesn't
solve the privacy problem, because the Net is also ideal for
message traffic analysis. A stream of encrypted messages between
two points could be detected by a computer, which then spits out a
report that's sure to attract attention. Each end of this stream
is now identified as a target, which means that other types of
surveillance are now practical. The Internet, in other words,
increases opportunities for surveillance by many orders of
magnitude, with or without encryption.

Those who have the resources can try to befuddle the spooks
who monitor them by disguising their transactions. Shell
corporations, off-shore banks, and cash-intensive businesses will
still be popular with money launderers. Seemingly innocent
transactions will slip through the net, and for the most part only
the little guy without transnational resources will get caught.

Which is exactly the point. The little guy on the Net is
surfing on borrowed time. There are too many pressures at work, too
many powerful interests to consider. The Net is too important to
the Suits -- if not now, then soon.


If it were only a case of Us and Them, it would be easier to
sort it all out. But the self-styled Internet Liberation Front, and
similar types with hacker nonethics, are part of the problem as
surely as the greedy capitalists. Nor is it easy to see much hope
in the way the little guy -- the one who obeys the law -- has used
the Internet. The entire experiment has left us with 30 million
connections but very little public-sector content. Apart from the
sense of community found in Newsgroups, list servers, and e-mail,
not much is happening in cyberspace. And just how deep is this
community when the crunch comes? Not nearly as deep as the
counterculture of the 1960s, and look what happened to them.

Rand Corporation, meanwhile, is churning out studies on
cyberwar, netwar, and information warfare. The Defense Department,
at the urging of their Advanced Research Projects Agency (which
started the Internet), recently signed a memorandum of understanding
with the Justice Department, at the urging of the FBI and the
National Institute of Justice. This memorandum anticipates a
coordinated effort on high-tech applications for "Operations Other
Than War" and "Law Enforcement." The game is on, and the high-tech
high rollers are getting it together.

The neat graphics and sassy prose in "Wired" and "Mondo 2000"
magazines notwithstanding, the Net-surfing culture is more virtual
than real. Cyberspace cadets are no match for the real players, and
it's going to be like taking candy from a baby. Lots of squeals,
but nothing to raise any eyebrows. It's all so much spectacle
anyway. Guy Debord (1932-1994) summed it up in "Society of the
Spectacle" in 1967, when Rand was still tinkering with their
Doomsday idea:

The technology is based on isolation, and the
technical process isolates in turn. From the automobile
to television, all the goods selected by the spectacular
system are also its weapons for a constant reinforcement
of the conditions of isolation of "lonely crowds." The
spectacle constantly rediscovers its own assumptions more
concretely.... In the spectacle, which is the image of
the ruling economy, the goal is nothing, development
everything. The spectacle aims at nothing other than
itself.

Then again, the Spectacle does make for excellent Internet
watching, once silly notions like "information wants to be free"
are discarded, and the drama can be enjoyed for what it is.
Basically, it's one more example of something that happens
frequently in history. The little guy thinks he has created
something new and powerful. He's so busy congratulating himself,
that when the Big Dogs begin to notice, the little guy doesn't.
In the end, it's merely another dog-bites-man nonstory that won't
be found on NBC News. This just in: "Little guy gets screwed."

END END END

Flatland can be reached at PO Box 2420,
Fort Bragg CA 95437-2420, Tel: 707-964-8326.
Reposting permitted by the author.

------------------------------

Date: Tue, 13 Jun 1995 00:31:00 -0500 (CDT)
From: David Smith <bladex@BGA.COM>
Subject: File 4--Legal Bytes 3.01 (part 1)

---------- Forwarded message ----------
Date--Fri, 2 Jun 1995 11:40:42 -0500
From--owner-legal-bytes@io.com

By George, Donaldson & Ford, L.L.P.
Attorneys at Law
114 West Seventh Street, Suite 1000
Austin, Texas 78701
(512) 495-1400
(512) 499-0094 (FAX)
gdf@well.sf.ca.us
___________________________________

Copyright (c) 1995 George, Donaldson & Ford, L.L.P.
(Permission is granted freely to redistribute
this newsletter in its entirety electronically.)
___________________________________

David H. Donaldson, Jr., Publisher <6017080@mcimail.com>
Peter D. Kennedy, Senior Editor <pkennedy@io.com>
Jim Hemphill, Contributing Editor <JAHEMPH+aGD&F%GDF@mcimail.com>
Jeff Kirtner, Law Clerk
___________________________________

IN THIS ISSUE:

1. WILL THE SHRINK-WRAP LICENSE DILEMMA PLAGUE ON-LINE SALES?

2. SOME LEGAL RISKS POSED BY ON-LINE ADVERTISING

3. LOTUS LOSES FIGHT TO PROTECT ITS USER INTERFACE

4. COPYRIGHT LAW UPDATE: COPYING BY COMMERCIAL RESEARCHERS IS
NOT NECESSARILY A FAIR USE
____________________________________________________

1. WILL THE SHRINK-WRAP LICENSE DILEMMA PLAGUE ON-LINE SALES?

Can software companies unilaterally decide what terms govern
the sale of their software? What's the point of those long,
complicated, one-sided licenses that come with most commercial
software packages? Are they enforceable?

The Purpose of Shrink-wrap Licenses.

Everyone has seen these licenses -- they come with commercial
software and state that opening the package or using the software
means the buyer is agreeing to abide by their terms. While these
documents may be slightly aggravating, software companies use them
for two important reasons -- to protect their copyrights and to
limit their exposure to lawsuits.

Software is terribly easy to copy and distribute; software
developers understandably want to protect themselves from losing
revenue from unauthorized copying. Shrink wrap licenses include
terms restricting the copying of the software in order to help
insure that the sale of a single copy of the software does not give
rise to any implied license to make, distribute or use additional
copies. The licenses might also try add further restrictions, such
as prohibiting resale or leasing of the software.

Shrink-wrap licenses have a second goal: to limit the
software company's legal liability. This need arises not from
copyright law, but from the general laws governing contracts and
the sale of goods -- which in all states (except Louisiana) is the
Uniform Commercial Code, or UCC.

Article 2 of the UCC sets "default" rules that automatically
become part of just about every sale of goods, unless the buyer and
seller agree to change the defaults to something else. Despite
some theoretical questions, most legal authorities agree commercial
software is a "good" under the UCC.

The problem for a software vendor is that the UCC reads into
every sale implied terms that favor the buyer. Rather than adopt
the doctrine of "caveat emptor," the UCC assumes that the seller
has made certain promises or warranties about the quality of the
product. If the product does not live up to these implied
warranties, the buyer can sue. Most importantly, the UCC assumes
that the seller always promises that the product is "merchantable,"
that is, fit for the customary use that such products are put to.
Further, the UCC also assumes that the seller has promised that the
product was fit for the buyer's particular intended use, if the
seller had reason to know of that use.

The seller and buyer can agree to change these terms, such as
when a used car is sold "as is." The buyer and seller can also
agree to limit the scope of the seller's liability if the product
does not live up to the promises that were made. However, when the
seller tries to make these limitations himself, through terms on an
invoice or other document, the limitations must be "conspicuous,"
they must mention "merchantability," and they cannot be "unreason-
able." Moreover, the buyer has to agree to the limits.

Are Shrink-wrap Contracts Enforceable?

There is serious question about how effective a typical
shrink-wrap license is. Various criticisms are made.

First, and most obviously, is whether a purchaser has really
"agreed" to the terms of the shrink wrap license. Typically, the
buyer does not know what the license says when she buys the
software; the purchase is made before the terms are revealed. How
can the buyer "agree" to the terms without knowing what they are?
After a sale is made, one party cannot add new terms. The federal
court of appeals sitting in Philadelphia discussed these issues in
STEP-SAVER DATA SYSTEMS, INC. v. WYSE TECHNOLOGY, 939 F.2d 91 (3rd
Cir. 1991), and decided that a particular shrink-wrap license was
not enforceable. See also David Hayes, Shrinkwrap License
Agreements: New Light on a Vexing Problem, 15 Hastings Comm. Ent.
L.J. 653 (1993).

A second, related objection is one raised to all take-it-or-
leave it contracts, which are derisively named "contracts of
adhesion." These tend to get rough treatment by courts, and
shrink-wrap licenses are a special strain.

Other concerns relate to the technical question of contract
formation -- the sale is usually made between a retailer and the
consumer, but the shrink-wrap license is between the consumer and
the software company. Is that a contract at all? What did the
software company give the consumer that the consumer did not
already have when she bought the product? There are also some
concerns about whether particular restrictive terms in these
licenses (or more accurately, state laws that state that the terms
are enforceable) violate the federal Copyright Act. See VAULT
CORP. v. QUAID SOFTWARE, LTD. 847 F.2d 255 (5th Cir. 1988).

Can These Problems be Fixed by On-line Transactions?

Do these same objections to shrink-wrap licenses apply to on-
line transactions? Maybe not.

The unique nature of interactive on-line transactions offers
vendors the ability to get and record the buyer's agreement to
license terms before a purchase is made. Much of the software that
is distributed on-line, shareware particularly, comes with a
license.doc zipped up with the program files. These licenses will
have the same troubles a shrink-wrap licenses, because they are an
after-the-fact "surprise".

However, most bulletin board systems, and now the World Wide
Web, can easily be configured to require short interactive sessions
before a transaction is consummated. The vendor can display the
license terms, require the buyer's assent before the software is
made available, and importantly, the buyer's assent can be recorded
-- written to a log file. While an on-line seller cannot force the
buyer to read the terms, it surely can record the fact that the
terms were displayed, and that the buyer gave affirmative responses
-- "Did you read the terms of the license?" "I did." "Do you agree
to the terms?" "I do."

This type of interaction before the sale makes the transaction
appear far less one-sided. While take-it-or-leave-it terms might
still be criticized as "adhesion contracts," the unique give-and-
take that's possible on-line removes much of the inequitable sting
that "surprise" shrink-wrap license terms leave on many observers.
___________________________________________________________________

2. SOME LEGAL RISKS POSED BY ON-LINE ADVERTISING

Advertising on the Internet is booming -- not with crass
"spamming" on Usenet newsgroups, but with flashy, multi-media home
pages on the World Wide Web that show off pictures, sound and even
video. Most commercial World Wide Web sites combine a mix of
advertising, information, and entertainment -- honoring the
Internet tradition that tasteful, non-intrusive self-promotion is
acceptable if it comes along with something neat or valuable.

Are there legal risks involved in on-line advertising? There
are, just like any other endeavor. Any business that extends its
advertising to cyberspace must take the same care as it does with
print or broadcast advertising. Electronic advertising also
introduces new questions of jurisdiction -- whose laws apply? On-
line service providers that accept advertising must consider their
own potential liability, too. What is their duty concerning the
content of other companies' ads?

Advertisements are "publications."

Companies that put their ads on the Internet are "publishers"
and face the same potential risks of defamation, invasion of
privacy, etc., from these ads as from print ads. Moreover,
electronic service providers that accept paid advertisement may be
"publishers" of those ads as well, and responsible to some degree
for their content. Absent particular exceptions, advertisements
carried by a publisher are viewed as that publisher's own speech.
For example, the landmark 1964 Supreme Court libel case, New York
Times v. Sullivan, concerned the liability of the New York Times
for a paid advertisement written by others. The Supreme Court's
ruling, although favorable to the Times, made no distinction
between advertisements and other content of the newspaper.

Compuserve, in the now-famous Cubby v. Compuserve case,
successfully defended itself from a libel suit by proving its
ignorance -- that it knew nothing of the content of a newsletter
carried on its service, but provided by an outside contractor.
This defense -- based on the traditional protection granted
bookstores from libel suits -- is unlikely to be available when it
comes to paid advertisements. Publishers, whether on-line or in
print, generally review the content of advertisements before they
are accepted and published, if only to determine pricing. They
usually retain the right to refuse an advertisement based on its
content. (Recall the recent attempts by revisionist "historians"
to place ads in college papers denying that the Holocaust took
place).

Because of this potential exposure to liability, electronic
publishers should be guided by two general principles: (1) review
all proposed advertisements for potential legal problems, and
(2) obtain an agreement that the advertiser will indemnify the
publisher for any legal liability that arises from the ad. This
article reviews several areas of potential concern for electronic
advertisers.

Ads for illegal transactions.

You can't legally advertise marijuana for sale. (Or, more
accurately, the First Amendment does not protect ads for illegal
transactions.) A publisher can't knowingly carry such ads, even if
the publisher would not be a party to the illegal transaction.

A publisher's liability for carrying ads for illegal
transactions has been hashed out in an interesting series of
lawsuits involving the magazine Soldier of Fortune, which
unintentionally carried several classified advertisements submitted
by real live hit men offering the services of a "gun for hire."
The hit men were hired through the magazine ads, and the families
of those people "hit" sued the magazine.

Two federal appeals courts came to entirely opposite
conclusions about very similar Soldier of Fortune ads. The
Eleventh Circuit upheld a multi-million dollar damage award against
the magazine; the Fifth Circuit reversed a finding of liability.
The legal principles these courts announced were relatively
consistent, though: if an advertisement poses a "clearly
identifiable unreasonable risk that it was an offer to commit
crimes for money" the publisher can be held liable if it was
negligent in running the ad. BRAUN v. SOLDIER OF FORTUNE MAGAINZE,
INC., 968 F.2d 1110, 1121 (11th Cir. 1992), cert. denied, 113 S.
Ct. 1028 (1993). A publisher must make sure that the ad, on its
face, does not present a "clearly identifiable unreasonable risk"
that the advertisement is soliciting an illegal transaction. On
the other hand, the courts are less likely to impose liability for
ambiguous advertisements that could have an innocent meaning. See
EIMANN v. SOLDIER OF FORTUNE MAGAZINE, INC., 880 F.2d 830 (5th Cir.
1989), cert. denied, 493 U.S. 1024 (1990). This recognizes courts'
reluctance to impose a duty on publishers to investigate
advertisements beyond what the advertisements say.

There is no reason to believe that this standard is different
for advertisements of so-called "victimless" crimes like
prostitution, although the likelihood of a civil lawsuit might be
less.

Ads for regulated businesses.

Many businesses are regulated, and so is the content of their
advertisements. The First Amendment permits some government
regulation of commercial speech; for example, lawyer advertising is
regulated by state bar associations or courts (although lawyers are
constantly fighting over how far the regulations can go).
Businesses placing ads should know what rules regulate their
advertising. Companies accepting ads have two choices: (1) know
the regulations for all companies for which it accepts ads; or (2)
require the advertiser to guarantee that its ads comply with
applicable regulations, and indemnify the publisher for losses if
they don't.

An example of the difficult legal questions raised by local
regulation in the new borderless world of cyberspace are lottery
and gambling ads. Some states (and territories) regulate or ban
advertising lotteries and gambling. Puerto Rico, for instance,
allows casino gambling. It also allows advertisement of gambling
aimed at tourists, but prohibits such ads aimed at Puerto Ricans.
The U.S. Supreme Court says that this odd regulatory scheme is
constitutional. POSADAS DE PUERTO RICO ASSOCIATES v. TOURISM CO.
OF PUERTO RICO, 478 U.S. 328 (1986).

More recently, the Supreme Court also upheld the
constitutionality of a federal law that forbids radio or television
stations from broadcasting lottery ads into states that don't have
a lottery -- even if the broadcasts are primarily heard in a state
that has a lottery. UNITED STATES v. EDGE BROADCASTING CO., 113
S. Ct. 2696 (1993). This federal law only regulates airwave
broadcasts of lottery ads. However, some states have similar
statutes banning lottery advertising in any medium. For example,
North Carolina prohibits advertising a lottery "by writing or
printing or by circular or letter or in any other way." N.C. Stat.
 14-289. Could North Carolina enforce this law against electronic
publishers who carry lottery ads?

Answering that question raises a host of difficult, unanswered
jurisdictional questions and is beyond the scope of this short
article. As a practical matter, it seems unlikely that North
Carolina officials would try to prosecute the State of Texas, for
example, if Texas set up a Web site to advertise its lottery that
of course could be accessed from North Carolina. On the other
hand, a local North Carolina service provider that accepted and
posted ads for the Texas lottery (or even the results of the Texas
lottery) might have something to worry about: the language of the
law prohibits it; the service provider is in easy reach of local
prosecutors; and the U.S. Supreme Court has already looked kindly
on a similar law.

Misleading and deceptive ads.

The First Amendment does not protect false advertisement;
state statutes (and some federal laws) routinely prohibit false,
misleading and deceptive ads. For example, the broad Texas
Deceptive Trade Practices-Consumer Protection Act ("DTPA")
prohibits all sorts of deceptive advertising, and gives deceived
consumers very powerful remedies in court. Such statutes are
primarily aimed at those who place advertisements, rather than the
publishers. Where do electronic publishers fit in? As usual, it's
not clear.

Newspapers cannot be sued under the Texas DTPA because that
law does not apply to "the owner or employees of a regularly
published newspaper, magazine, or telephone directory, or broadcast
station, or billboard." Tex. Bus. & Comm. Code  17.49(a). Is an
internet service provider a "magazine" or "broadcast station?"
Maybe. Is a BBS or a World Wide Web page a "billboard"? Maybe.
The question has not come up yet. While it would be more logical
and consistent with the purpose of the statute to exempt electronic
publishers that perform the same function as a newspaper, courts
are supposed to apply the DTPA "liberally" to provide consumers
with as broad a remedy as possible from deceptive ads -- leaving
the answer in doubt.

Some things are clear. An entity distributing information
regarding its own goods or services cannot claim the "media
exemption" -- a newspaper or BBS that publishes false information
about its goods or services can be sued by consumers under the
DTPA. Also, an entity that has a financial stake in the sale of
the goods advertised is also subject to DTPA liability. This means
that internet service providers that accept a percentage of sales
generated by on-line advertising will be subject to the
restrictions of the DTPA, and should insure that the ads they place
are not deceptive, and that the seller has agreed (and can)
indemnify them for liability. Finally, no publisher -- whether
earthbound or in cyberspace -- is exempt from DTPA liability if the
outlet and/or its employees know an ad is false, misleading or
deceptive.

Remember: It's YOUR service.

Unless an electronic publication accepts all advertisements,
regardless of content, and does not review the content of that
advertising in any way or reserve any right to reject
advertisements (and can prove this in court), the presumption will
be that the service "published" the ad and is responsible for its
content. No one has a First Amendment right to place their
advertisement with any given Internet service provider or on any
commercial information service. Despite lots of on-line rhetoric,
the First Amendment only restricts what the government can do, not
what businesses (even big ones) can do. Remember that a publisher
always has the right to reject an ad for any reason at all and can
require changes before an ad is placed. For ads that are obviously
illegal, slanderous or misleading, the safest bet is to refuse the
ad.

------------------------------

Date: Sun, 19 Apr 1995 22:51:01 CDT
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 5--Cu Digest Header Info (unchanged since 19 Apr, 1995)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message: SUB CUDIGEST your name
Send it to LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message: UNSUB CUDIGEST
Send it to LISTSERV@VMD.CSO.UIUC.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
In ITALY: Bits against the Empire BBS: +39-464-435189
In LUXEMBOURG: ComNet BBS: +352-466893

UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD

The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu:80/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #7.55
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT