CYBERSPACE AND THE INTERNET: WHO WILL BE THE PRIVACY POLICE?

Anne Meredith Fulton

The word "Cyberspace" has become the house- The Internet,5 a mere portion of Cyberspace, is an hold word of the 1990's, though most people have no immense network of networks that connects an esti- idea what Cyberspace is or how it works. Many mated twenty million computer users by telephone know that it is the information highway where lines to thousands of electronic information store- ATM machines, telephone calls, fax transmissions, houses worldwide.' With increased accessibility to and computers somehow magically travel. the Internet, privacy is a major issue.' A single com- In reality, Cyberspace consists of electron states, puter is now the equivalent of a typewriter, teletype, microwaves, magnetic fields and light pulses. As filing cabinet, printing press and more, all wrapped such, it is the repository for all digitally and elec- into a few small pieces of equipment that are now tronically transferred information.' Cyberspace en- sitting in millions of homes and offices. In effect, a compasses all electronic messaging and information new mass media is emerging before our eyes. systems including: Bulletin Board Systems ("BBS");2 The purpose behind the Internet is increased ac- commercial data services; research data networks; cessibility and shared communications. People from electronic publishing; public and "private" networks all over the world can communicate and share infor- and network nodes; e-mail' systems; data banks with mation with little more than a few keystrokes.' personal medical, credit, membership, purchasing However, with the increased accessibility and in- habit, and census information; electronic data in- creased number of users comes prodigious and pre- terchange systems; and electronic fund transfer dictable opportunities for the invasion of one's pri- systems." vacy.9 Additionally, the essence of shared

I Mitchell Kapor & John P. Barlow, Across the Electronic other research institutions and universities, and more recently to Frontier, July 10, 1990 (on file with the CommLaw connect commercial users as well. MARK GIBBS, NAVIGATING Conspectus). THE INTERNET, 2-5 (1993). 2 A BBS is an electronic network of computers. At the heart ' Tabitha Powledge, Information Highway Without Toll- of the BBS is the central computer, set up and operated by the booths, WASH. POST, June 23, 1994, at Al. system operator. Users link their computers to the central BBS ' As Oregon Associate Justice Hans Linde said, "[Glive... computer by modem, which is a device that allows computers to lawyers a word like privacy to play with, and they will take it communicate over telephone lines. Once users have accessed the anyplace and do anything with it." Hans Linde, The Constitu- BBS, they may communicate with other users, obtain informa- tion and Privacy, CENTER MAG., Nov-Dec. 1982, at 46, 49. tion from databases, obtain software, or perform other activities ' In the Gulf War, CNN provided unprecedented news cov- "on-line." Eric Schlacter, Cyberspace, The Free Market and the erage that was nearly instantaneous by television news stan- Free Marketplace of Ideas; Recognizing Legal Differences in dards. However, the Internet, which at that time linked 15 mil- Computer Bulletin Board Functions, 16 HASTINGS COMM. & lion people directly and as many as 25 million through private ENT. L.J. 87, 90 (1993). networks, provided a completely unmediated channel of commu- 8 E-mail is electronic mail sent via computer. nication that allowed news of Gulf events to travel swiftly to 4 Lance Rose, Cyberspace and the Legal Matrix: Law or many people. As one Internet user wrote: "In the Gulf War Confusion?, June, 1991 (on file with the CommLaw news coverage, we were the watchers, dependent on a few men Conspectus). and women with cameras and a company with the technology to ' Many have tried to come up with the perfect, most under- bring those images home to us. On the Internet, we are the re- standable definition of the Internet. It is the world's largest net- porters, the viewers, and the production team." Clemons P. work of computers. A network is the term for a group of com- Work, Whose Privacy?, 55 MONT. L. REV. 209, 209 n. 111 puters linked together so they can share information and (1994) (citing TRACY LAQUEY & JEANNE C. RYDER, THE IN- resources. The Internet is not a single network, but a network of TERNET COMPANION, 2-3 (1993)). networks. The Internet grew out of a United States Defense De- ' For example, in 1991, Dutch computer "hackers" had no partment experiment in the late 1960's for linking military net- trouble breaking into the U.S. government's Pacific Fleet Com- works. The experiment grew into connecting the networks at mand and Kennedy Space Center Computers. In addition, direc- COMMLAW CONSPECTUS [Vol 3

communications gives rise to questions of ownership ment, protecting people and property from unreason- and expectations of privacy.10 able government intrusion; and the Fifth and Four- The rapid growth of computer technology has left teenth Amendments, guaranteeing due process of law the law in the dust. There are limited laws regulat- and exemption from self-incrimination. The Fourth ing Cyberspace, and many of its users and program Amendment of the United States Constitution has activities remain unchecked. Abuses have occurred, particular implications to the issue of privacy on net- and if the history of the development of other forms works such as the Internet. The Fourth Amendment of communication is any guide, more far-reaching states that: abuses affecting many more people will occur. The very anonymous nature of the Internet (and all The right of the people to be secure in their persons, Cyberspace) has as much potential for private and houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall governmental abuse as a masked burglar, a con art- issue, but upon probable cause, supported by Oath or af- ist, a hooded night rider, or a dossier collecting firmation, and particularly describing the place to be zealot. The paradox is that in order to protect pri- searched, and the persons or things to be seized." vacy, anonymity must be limited. This Comment explores the evolution of the pri- Cyberspace has no physical boundaries, and a ''seizure" in Cyberspace vacy issue in Cyberspace and, more specifically, the may not result in a loss of Internet. Part I defines the Internet and its recent property or liberty as the Framers of the Constitu- technological advances. Part II explores the Consti- tion contemplated. Under the Fourth Amendment, tutional and common law history involving computer an individual's "papers" are safe from "search and communications. Part III delineates the deficiencies seizure," but it is unclear whether the protection of in the current law and the currently proposed an- paper applies when the papers are electronic bits of swers to the privacy dilemma. Part IV offers a possi- information and lack physical presence. ble solution, recommending a plan for Federal Com- Cyberspace civil libertarians would alter Potter munications Commission ("Commission" or "FCC") Stewart's famous words to read: "The Fourth and Congressional action. Though this Comment Amendment and the personal rights it secures have a will focus only upon the legal issues involving pri- long history. At the very core stands the right of a vacy in Cyberspace and the Internet, there are many man [and woman] to retreat into [his or her] home other pressing legal questions that will require an- [turn on the computer, log into Cyberspace] and swers in the coming years." there be free from unreasonable governmental intrusion. '13 Some argue that Cyberspace must be subject to .1. THE EVOLUTION OF PRIVACY LAW the same or stricter laws that apply to public mails, telephones, and broadcast airways in order to protect A. Constitutional History all users of the Internet and similar technology. 4 Katz v. United States5 is one of the most pivotal Several constitutional amendments directly and in- cases regarding the Constitutional right to privacy directly address privacy issues, including: the First and electronic communications. Katz involved a Amendment, prohibiting laws abridging the freedom "bug" or listening device that the government placed of speech, assembly, or the press; the Fourth Amend- on the outside of a public telephone booth.' 6 The

tions for breaking into voice mail systems can be found easily Law of the Net: Problems and Prospects, INTERNET WORLD, and followed on computer bulletin boards. Cindy Skrzycki, Dark Sept./Oct. 1993. Side of the Data Age: Privacy is Prey in Cyberspace, WASH. 12 U.S. CONST. amend. IV. POST, May 3, 1993, at F19. 1 Potter Stewart's original words were: "The Fourth " Recently booklets have been distributed with e-mail ad- dresses such as "e-mail for the Rich and Famous" and "Internet Amendment and the personal rights it secures have a long his- White Pages." The issue then, is whether a reasonable expecta- tory. At the very core stands the right of a man to retreat into tion of privacy exists in your e-mail address, as with unlisted his own home and there be free from unreasonable governmental telephone numbers. intrusion." THE QUOTABLE LAWYER 253 (David Shrager & "' Such issues include: whether owners of copyrighted mate- Elizabeth Frost eds., 1986). rial can protect their rights when their works may be accessed "' See generally Nan Levinson, Electrifying Speech: New and downloaded by thousands or millions of computer users; and Communication Technologies and Traditional Civil Liberties, whether computer users have the right to communicate with HUMAN RIGHTS WATCH, July, 1992. each other freely without having their statements censored by 15 389 U.S. 347 (1967). owners of the computer gateway providers. Mike Godwin, The 16 Id. at 348. 19951 PRIVACY ON THE INTERNET government argued that because the bug was not ac- coming more and more obsolete. These laws include: tually inside the booth, there was no invasion of pri- The Federal Wiretap Act of 1968;22 the Privacy vacy.17 The defendant argued that the placement of Protection Act of 1980;2s the Electronic Communica- the bug violated the Fourth Amendment's search and tions Privacy Act of 1986;24 and finally, the Com- seizure clause.' 8 The Supreme Court held that "the puter Fraud and Abuse Act of 1986.25 Fourth Amendment protects people, not places."9 In addition to federal law, many state laws apply What a person knowingly exposes to the public, even to computer communications. However, problems in her own home or office, will not receive Fourth arise with jurisdictional issues, as the very nature of Amendment protection. But what she seeks to main- the technology is multijurisdictional.26 tain as private, even in an area accessible to the pub- lic, may be constitutionally protected.20 1. The Federal Wiretap Act The issue then becomes whether a person sending an e-mail message on the Internet has a reasonable Congress created The Federal Wiretap Act of expectation of privacy when twenty million people 1968 ("Wiretap Act") to address the privacy issues use the same service. In addition, a more difficult in wireline communications between two persons.27 privacy question concerns whether the government However, the law only affected "wire communica- can access a person's or an organization's database to tion," which is limited to "aural [voice] learn what kind of databases are used, what searches acquisition." ' were run and what type of information has been In United States v. Seidlitz,29 the court held that retrieved. the interception of computer transmission is not an The Constitution protects citizens from unlawful "aural acquisition" and, therefore, the Wiretap Act intrusions into their privacy by the government, but does not cover transmission or stored computer does not protect citizens from privacy invasions com- data."0 mitted by private citizens. Legal causes of action provide protection against invasions of privacy by private citizens, such as the torts of invasion of pri- 2. Privacy Protection Act vacy and trespassing. However, applying old laws to ever-advancing technology may not be sufficient. The Privacy Protection Act of 1980 ("Privacy Act") protects electronic bulletin boards and publicly accessible computer networks.3' The Privacy Act op- B. Statutory History erates to prohibit blanket searches and seizures of such entities unless there exists "probable cause to Radio and television communications are subject believe that the person possessing such materials has to regulation by the FCC and by the Congress. committed or is committing the criminal offense to However, the FCC considers computer information which the materials relate . . ." and such criminal systems to be "enhanced services" beyond the scope offense does not consist of the "receipt, possession, of its regulatory power.2' communication, or withholding of such materials Congress has enacted several laws that address "32 privacy issues. However, with the advent of new Cyberspace legal scholars 3 interpret the practical technology, such as the Internet, current laws are be- effect of the Privacy Act to:

17 Id. at 351. held that a newspaper office could be searched even when no one Is Id. employed by the paper was suspected of any crime. " Id. (citations omitted). 24 18 U.S.C. § 2510 (1988). 20 Fourth Amendment scholars have interpreted Katz to 25 18 U.S.C. § 1030 (1988 and Supp. 1993). stand for the proposition that if a person does not have a reason- 20 Most on-line service providers operate on an interstate ba- able expectation of privacy, then there is no Fourth Amendment sis. Even a few, infrequent, out-of-state calls can warrant inter- protection. See Ruel Hernandez, Computer Electronic Mail and state status. Rose, supra note 4, at 4. Privacy (1994) (on file with the CommLaw Conspectus). 27 18 U.S.C. § 2510. 21 In Re Amendment of Section 64.702, Notice of Inquiry 28 See Hernandez, supra note 20, at 1. and Proposed Rule Making, 61 F.C.C.2d 103 (1976). See also 29 589 F.2d 152, 157 (4th Cir. 1978), cert. denied, 441 U.S. In Re Amendment of Section 64.702, Final Decision, 77 922 (1979). F.C.C.2d 384, para. 97 (1980). 30 Id. 22 18 U.S.C. § 2510 (1988). 21 42 U.S.C. § 2000aa(a). " 42 U.S.C. § 2000aa (1988). This statute was passed to 22 42 U.S.C. § 2000aa(a)(1). overturn Zurcher v. Stanford Daily, 436 U.S. 547 (1978), which 22 In particular, Harvey Silverglate, Thomas Viles, Mike COMMLAW CONSPECTUS [Vol. 3

strictly limit wholesale computer seizures where the sys- file was available to BBSs around the country, in- tems are used for bulletin boards or other general commu- cluding one operated by an employee of Steve Jack- nications. In such situations, a seizure is appropriate only where the system's operators are directly implicated in son Games, a creator and publisher of computer unlawful activity. [However,] where the system has been games in Austin, Texas. While looking for evidence used as a conduit by others who are criminally motivated, against the employee, Secret Service agents searched but the operator is not involved, the Privacy Protection the bulletin board run by Jackson and found the Act would seem to require that no search take place, but draft of a rule book for a fantasy game called instead a subpoena be issued for the relevant GURPS . The government concluded information." that the manual was essentially a handbook for com- The Attorney General has issued guidelines under puter crime."' the Privacy Act governing the execution of search The Secret Service then raided Steve Jackson warrants where highly confidential or personal in- Games, Inc. and seized its bulletin board system, formation relating to innocent third parties may drafts of the game, electronic mail, and all electronic come into the hands of law enforcement authori- files. They also took all copies of the company's soon ties." According to the guidelines, federal officials to have been released game, GURPS Cyberpunk. should "not use search and seizure to obtain docu- Jackson was never charged with a crime, and his mentary materials in the possession of disinterested files and equipment were returned to him four third parties unless reliance on alternative means months after the raid. would substantially jeopardize their availability... However, the raid caused the company to shut or usefulness," or where less obtrusive means of ob- down and lay off approximately half of its employ- taining such materials are available."6 The guide- ees. The Electronic Frontier Foundation,' which lines define "documentary materials" to include provided legal counsel for Steve Jackson,' analo- ''materials upon which information is electronically gized the Secret Service's taking to an indiscriminate ' 3 seizure of all of a business's filing cabinets and print- or magnetically recorded. 7 Additionally, recogniz- ing the potential for violations of privacy rights of ing presses."' individual third parties, the Attorney General's guidelines exact strict controls over search warrants 3. Electronic Communications Privacy Act executed upon records possessed by physicians, law- yers and clergy."8 The Electronic Communications Privacy Act of The first case to apply the Privacy Act to elec- 19864 5 ("1986 Act") closed the gaps left open by the tronic publishers was , Inc. v. Wiretap Act. Congress originally enacted the 1986 United States Secret Service. 9 In Steve Jackson Act in response to Watergate. 4'6 The 1986 Act is the Games, the Secret Service investigated Craig privacy shield protecting e-mail. Neidorf, a student and publisher of an electronic The statute provides in part that "any person who magazine called "Phrack," for reprinting a document .. .intentionally intercepts, endeavors to intercept, stolen from a Bell South computer.40 The Bell South or procures any other person to intercept or endeavor

Godwin, and Mitchell Kapor, counsel to and of Electronic Fron- to trial and he incurred approximately $100,000 in legal costs. tier Foundation. Harvey Silverglate and Thomas Viles. Remarks Id. at the Federal Enforcement 1991 Conference at Georgetown 41 Steve Jackson Games, Inc., 816 F.Supp. at 439-40. University Law Center, Washington, D.C. (May 17, 1991) 48 The Electronic Frontier Foundation is the civil liberty (transcript available in Georgetown University Law Center champion for Cyberspace users. It provides legal services to com- Library). puter users, lawyers, and the government and undertakes inten- 84 Id. sive lobbying efforts to influence the legislative process. Mitchell 36 See 28 C.F.R. § 59 (1994). Kapor, Civil Liberties in Cyberspace: When Does Hacking 86 Id. §§ 59.1, 59.4(a)(1), 59.4(b)(1). Turn From An Exercise of Civil Liberties Into Crime? Sci. AM., 87 Id. § 59.2(c). Sept. 1991, at 52. 8I Id. § 59.4(b)(4). 48 Id. In May, 1991, Jackson filed suit against the Secret a 816 F. Supp. 432 (W.D.Tex. 1993). Service, two individual Secret Service agents, an assistant U.S. 0 Id. Three hackers already had been sentenced to prison attorney and others, alleging violations of his Constitutional for stealing the document that concerned a 911 emergency sys- rights. tem. The phone company claimed that the document was valued " LEGAL CASE SUMMARY, ELECTRONIC FRONTIER FOUN- at $79,499 and was highly sensitive. When Neidorf's case came DATION, May 10, 1990 (on file with the CommLaw to trial in July, 1990, the government dropped the charges after Conspectus). it was revealed that the document was publicly available for $30. 48 18 U.S.C. § 2510. Neidorfs magazine ceased publication by the time his case went " Rose, supra note 4, at 1. 19951 PRIVACY ON THE INTERNET to intercept, any wire, oral, or electronic communica- government had to follow the procedures established tion" shall be fined or imprisoned. The intentional by section 2703 in order to properly discover the disclosure or use of the contents of any wire, oral, or contents of the electronic mail on the BBS. " The electronic communication that is known or could rea- court went on to say that the Secret Service's evi- sonably be known to have been intercepted in viola- dence of good faith reliance on what it believed to be tion of the statute is prohibited."8 In essence, this law a valid search warrant was insufficient. 6 The gov- prohibits anyone but the sender or the intended re- ernment knew that the computer stored private elec- cipient from reading an intercepted e-mail mes- tronic communications, and therefore the only legal sage."9 Any further disclosure or use of the content means to gain access to those communications was by of the message by any party, other than the message compliance with the Act, and not by seizing the 57 sender and its intended recipient, is prohibited if the BBS. intercepting party knows or has reason to know that While the 1986 Act presently is the most compre- the message was illegally intercepted." hensive statute applicable to computer communica- The 1986 Act enables electronic communication tions, there are many ambiguous provisions. The service providers to ensure the privacy of their sub- judge in Steve Jackson Games agreed with the Secret scribers and e-mail users." Invasion of privacy Service that e-mail on Jackson's system was not in- problems have arisen repeatedly. The culprits are tercepted when the computers were seized because it now dubbed "hackers. ' 52 A hacker is a computer pi- was not taken during the transmission. 8 However, rate who violates computer privacy by intercepting the Electronic Frontier Foundation argued that until and possibly using telephone and credit card num- the intended recipient takes control of the message by bers, reading electronic mail, listening in on cellular reading it, the e-mail should be considered vulnera- phone conversations, or by tapping into sensitive ble to interception. 9 government databases. In October of 1994, the Fifth Circuit affirmed the In Steve Jackson Games, the court looked at sec- district court's ruling in Steve Jackson Games.60 The tion 2701 and the following sections of the 1986 Act Fifth Circuit held that because the seizure of the e- regarding access to stored computer communica- mail contents was not contemporaneous with the tions." Section 2701 reads, in part, "whoever (1) in- transmission of the e-mail, there was no "intercep- tentionally accesses without authorization a facility tion" within the meaning of the 1986 Act.6' through which an electronic communication service is provided; or (2) intentionally exceeds an authori- zation to access that facility; and thereby obtains, al- 4. Computer Fraud and Abuse Act ters, or prevents authorized access to a wire or elec- tronic communication while it is in electronic storage The Computer Fraud and Abuse Act of 1986" in such system" shall be subject to fines and/or im- ("Fraud Act") criminalizes unauthorized access to prisonment, or both. 4 federal interest computers. The Fraud Act defines Applying the 1986 Act, the court held that the "federal interest computer" as a computer:

47 18 U.S.C. § 2511()(a) and (4). 11 816 F. Supp. at 434. '8 Id. § 2511(1)(c). 54 18 U.S.C. § 2701(a) and (b). 4' The Presidential Records Act constitutes a possible excep- 55 Steve Jackson Games, Inc., 816 F. Supp. at 434. tion to the privacy of e-mail. The Presidential Records Act re- 51 Id. at 443. quires all records classified by the Act as "Presidential Records" 57 Id. at 442-43. to be preserved for historical research. 44 U.S.C. §§ 2201(2), 2204 (1988). The only case to apply this statute to presidential 5 Id. e-mail held that the Presidential Records Act implied preclusion 5' Richard Klau and Enk Heels, Online: The Electronic of judicial review of the President's compliance with its provi- Frontier Foundation is Exploring and Charting the Legal sions. Armstrong v. Bush, 924 F.2d 282, 290-91 (D.C. Cir. Boundaries of Cyberspace, STUDENT LAWYER, Oct. 1994, at 16. 1991). 00 Steve Jackson Games, Inc. v United States Secret Service, 6o 18 U.S.C. § 2511(1)(c). 36 F.3d 457, 460 (1994). " Intercepted e-mail messages can cause problems for the 01 Id. The 1986 Act defines "intercept" as "the aural or senders and the receivers. For example, e-mailing off-color jokes other acquisition of the contents of any wire, electronic, or oral to co-workers could get the sender fired; a competitor inter- communication through the use of any electronic, mechanical, or cepting a business proposal could reek havoc with the company; other device." 18 U.S.C. § 2510(4). and passwords, private phone numbers and credit card numbers *2 18 U.S.C. § 1030 (1988). The action is criminal regard- easily could be lifted off of private e-mail messages. less of whether or not there is resulting damage or loss to the '2 Also referred to as "phreakers" and "crackers." database. COMMLAW CONSPECTUS [Vol. :3

(A) exclusively for the use of a financial institution or the The reality of such a scenario is not impossible. It United States Government and the conduct consisting the takes computer gurus only minutes to break into the offense affects the use of the financial institution's opera- tion or the government's operation of such computer; or world's largest banking computers or a personal (B) which is one of two or more computers used in com- computer and take a ride into Cyberspace's private mitting the offense, not all of which are located in the lives. 8 same State. As demonstrated by Morris, mass amounts of in- formation can be irreparably harmed and some of One of the most significant cases in the area of the worlds most important computer systems can be federal-interest computer technology abuse is United infiltrated and destroyed within minutes. While laws 64 States v. Robert Tappen Morris. On January 2, may punish the culprits, the damage has often al- 1990, Morris, a suspended graduate student at Cor- ready been done. nell University, became the first person convicted of 5 The United States government, particularly the a felony under the Fraud Act. Morris admitted re- Federal Bureau of Investigation and the National leasing a worm, similar to a virus, onto the In- 66 Security Agency, has proposed what they consider to ternet. The worm affected network subscribers in- be the ultimate prescription for preventive medicine, cluding the University of California at Berkeley, the Clipper Chip. Clipper, as it often is called, is NASA and the U.S. Logistics Command at Wright- "the U.S. government-designed encryption 67 system Patterson Air Force Base. The estimated cost of for encoding and decoding phone calls and E-mail so the computer down-time and the labor necessary to that the communictaion is protected from snooping combat and cure the worm fell between $5 million 8 ... " Clipper allows the government to retain a and $12 million. "back door key." Officials insist this is necessary to Morris, the son of a top computer security em- be able to intercept messages from mobsters, ter- ployee at the National Security Agency, denied any rorists, and drug dealers.7 intentions to do harm to Internet subscriber's equip- However, many computer and policy experts op- ment.69 Regardless of intent, the damage was done. pose Clipper, arguing that communications security This case demonstrates the need for securing against is too important to be left to "secret processes and injury to innocent third parties before the injury classified algorithms."7 " A recent survey interviewing occurs. 1,000 Americans reported that two-thirds believed it was more important to protect the privacy of home II. CLIPPER: A POSSIBLE SOLUTION telephone calls than to preserve the ability of the po- lice to conduct wiretaps.7 When Clipper was ex- plained to the interviewees, eighty percent opposed Imagine that your bank account holds one hundred thou- the idea.74 Yet, the National Security Agency argues sand dollars accumulated only after years of diligent sav- ing. At the time you are ready to withdraw the funds for a that "non-escrowed" encryption technology threatens 75 home down payment, the teller declares that you must be law enforcement and national security. mistaken. 'Have you forgotten that you transferred those While there are other security and encryption pro- funds weeks ago?' she inquires. Upon further investiga- grams, they too have problems and insufficiencies. tion the bank finds that someone has accessed their com- puter system and, using your personal identification num- Most importantly, the programs have been written, ber, has transferred and withdrawn your entire balance encoded, and marketed by private persons. Therein from a bank in another state or country. lies the problem. If a private person or group wrote

"5 Id. § 1030(e)(2). provided for prison time. Morris, 928 F.2d at 504. 64 928 F.2d 504 (2d Cir. 1991), cert. denied, 112 S. Ct. 72 71 Philip Elmer-Dewitt, Battle for the Soul of the Internet, (1991). TIME, July 25, 1994, at 50, 54. "' See, e.g., Student Guilty of Computer Break-In, WASH. 71 Id. at 55. POST, Jan. 23, 1990, at A16; John Markoff, Computer Intruder 72 U.S. PUBLIC POLICY COMMITTEE, COMPUTER POLICY is Put on Probation and Fined $10,000, N.Y. TIMES, May 5, COMMITTEE CALLS FOR WITHDRAWAL OF CLIPPER COMMUNI- 1990, at Al. CATIONS PRIVACY "Too IMPORTANT" FOR SECRET DECISION- 06 While a worm is not usually intended to cause damage, as MAKING, THE ASSOCIATION FOR COMPUTING MACHINERY 1 with viruses, its main purpose is to replicate itself as many times (1994). as possible. GIBBS, supra note 5, at 295. " John Schwartz, Clinton Plans for Wiretaps Taps Fears: 7 Markoff, Student Testifies His ErrorJammed Computer Privacy Conference Reflects Wider Concerns, WASH. POST, Network, N.Y. TIMES, Jan. 19, 1990, at A19. Apr. 4, 1994, at F17. e Id. 74 Id. e Morris was fined and given probation though the statute 75 Id. 19951 PRIVACY ON THE INTERNET the encryption, chances are that a private person or munications and, as such, mandate regulation. group can break the code. Because the Clipper Chip Civil libertarians do not want computer users' was written and designed with the benefit of the ex- rights trampled upon by government intrusion and tensive resources of the Federal Bureau of Investiga- regulation. While these concerns are legitimate, it tions and the National Security Agency, it is the sys- must be remembered that invasion of privacy by tem most unbreakable both here and abroad. hackers and criminals tramples on peoples' rights The battle over the Clipper Chip will undoubt- with a larger, and arguably a more dangerous foot edly be a long one. It could be years before such than the government has ever had. The key to com- proactive security and privacy protections, govern- puter privacy regulation must be reasonableness. ment implemented or otherwise, would be put in But to merely suppose that abuses will not occur place. flies in the face of human experience. Computers are quickly taking over traditional communication de- III. THE FCC'S ROLE IN PROTECTING vices. Computers have become the heart of the PRIVACY American person's home, business, military, govern- ment, financial, and educational institutions. How- The FCC has determined that it will not regulate ever, with the ease and convenience of new technol- computer communications in any manner different ogy comes new avenues for user exposure to from voice communications.7" Federal courts have af- personal, political and business sabotage, and eco- firmed this decision." Without direction from Con- nomic loss. A falsely incriminating memorandum gress, the FCC will continue to regard computer placed on a politician's campaign committee hard communications as being outside their realm of regu- drive, financial records of a bank manipulated, or lation. As privacy issues become more of a concern, draft documents deleted from files at a law office are pressure will be applied to legislative bodies to pass anonymous invasions of privacy that subject the com- more comprehensive legislation in an attempt to fill puter user to relatively untraceable victimization. the holes of the currently inadequate laws. The anonymity of the wrong-doer is more secure Clearly, according to it's stated purpose, the FCC in Cyberspace. While other forms of communication is the most logical body to enforce computer laws. such as mail, telephone, and facsimile could intrude Telephones run the modems that connect and net- on the privacy of a person or organization, they work computers, while satellites transfer data where could not so easily elicit information or initiate ac- telephone lines cannot. Thus far, the FCC has regu- tions without the knowledge of that person or organ- lated the telephone wires that connect telephone and ization. Where is the electronic notary public on the the satellites that transmit audio, video, and data. 8 Internet? Anonymity sends a big invitation for With the advent of the new computer technology, abuse. the FCC cannot just dig in its heels. The FCC must An expert's mastery of the computer technology rethink its position on computer communications as gives impending power over those who are novices at being "enhanced services" outside of the realm of its the computer. The "experts" have the ability to do regulatory power. The FCC has been the governing harm should they chose, effectively putting the ma- body of wire and satellite communications up until jority of users on the Internet open to great invasions the computer boom era; it must adjust with advanc- of privacy. The ability to become a victim occurs ing technology, just as it did when television technol- upon signing on to the Internet and similar net- ogy was created and largely replaced radio. works. It is up to the legislatures to protect the ma- While current FCC regulations cannot be jority from the abuse of the minority whose greater blanketly applied to Cyberspace, and overseeing the mastery of the technology puts them in a position to governing of this whole new world would be a tre- victimize the less knowledgeable, hence vulnerable mendous undertaking, the FCC is the most logical users. body for the task. Computers are not some abstract In theory, if there were no laws regulating speed unknown, they are simply the newest means of com- on interstates, cars would travel at excessive speeds

70 THE TELECOMMUNICATIONS DEREGULATION regulation). SOURCEBOOK 259 (Stuart N. Brotman, ed. 1992). "7 See Computer and Communications Industry Association, '8 The nation's telephone system is heavily regulated by the etc. v. Federal Communications Commission, 693 F.2d 198 FCC with standard fees and rules for the exchange of messages (D.C. Cir. 1982) (holding that customer premises equipment between carriers. The broadcast system is regulated as well, with and enhanced services are not appropriate subjects for Title II licensing procedures, rules and costs. COMMLAW CONSPECTUS [Vol. 3 thereby putting those who chose to drive carefully in cost or by protection through FCC regulation. The harm's way. Speed limits impose a balance between consideration increases particularly when the cost- the rights of the speeders and the slower drivers by benefit analysis includes national security. allowing slight limitations on some people's rights, while enabling enjoyment on behalf of others. The Internet needs some regulation so that it is an infor- IV. CONCLUSION mation highway that all users can travel upon freely and safely. Increased technology often creates new, unforeseen Without assurance of some level of privacy protec- problems. Merely applying the Bill of Rights to the tion, the benefits of the technology of the Internet be- electronic world of Cyberspace is insufficient. Until gin to dwindle. For example, the ability to dissemi- the legislature truly understands the complex high- nate privileged or secure information via computer way of computer technology, the current laws will network extends huge benefits of convenience as well remain inadequate. as economizes time, money and resources. Prior to The need for some method of securing systems is computer communications, a document vital to na- undeniable. However, preventing repeat abusive gov- tional security or a company's stockholders had to be ernmental power such as that evidenced in Steve transported by someone holding some type of trusted Jackson Games must be balanced with the govern- position. Often, in the military, an officer would ment's legitimate interest in the ability to protect transport a document by hand, flying to another Cyberspace from rampant crime. state or country. In the computer age, that document Privacy protections such as the Clipper Chip will can be encrypted and sent via computer in a matter be a long time coming. In the meantime, the law and of seconds. The possibility that a document could be the agencies writing and implementing it must move intercepted, decoded, read and widely disseminated, full speed ahead to catch up with current technology mandates considering a return to the past means of and protect the privacy that American citizens hold transporting information, despite its huge monetary so dear.