Computer underground Digest Fri Sept 22, 1995 Volume 7 : Issue 75 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #7.75 (Fri, Sept 22, 1995) File 1--CuD readers may want to know... File 2--VTW BillWatch #18: new child porn bill (S1237) File 3--Ruling in RTC v. F.A.C.T.NET (Church of Sci. Loses) File 4--Cu Digest Header Info (unchanged since 19 Apr, 1995) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- From: Stanton McCandlish <mech@EFF.ORG> Subject: File 1--CuD readers may want to know--(EFF Homepage) Date: Wed, 20 Sep 1995 20:47:43 -0400 (EDT) ...that the EFF-housed CuD archive has been jazzed up a bit for WWW users. It now features a nice index page. URL: http://www.eff.org/pub/Publications/CuD/ This index should propagate to all the mirrors as well, so all of them should be browsable in style. Only the top level is currently so indexed. Will work on the subdirectories at some point. -- <A HREF="http://www.eff.org/~mech/"> Stanton McCandlish </A><HR><A HREF="mailto:mech@eff.org"> mech@eff.org </A><P><A HREF="http://www.eff.org/"> Electronic Frontier Foundation </A><P><A HREF="http://www.eff.org/1.html"> Online Services Mgr. </A> ------------------------------ Date: Sun, 17 Sep 1995 17:30:12 -0400 From: shabbir@PANIX.COM(Shabbir J. Safdar, Voters Telecom Watch) Subject: File 2--VTW BillWatch #18: new child porn bill (S1237) SUMMARY OF INTERNET CENSORSHIP LEGISLATION The four different pieces of legislation that address Internet regulation are still waiting for conference committee consideration. With the budget as the current Congressional priority, it isn't likely the fate of the Internet will be considered for several weeks. VTW is still collecting the signatures of businesses and bulletin boards that wish to participate in the joint letter to be sent to Congress urging parental control (instead of censorship) as a means of approaching the Internet. VTW urges you to contact your Internet service provider along with any business that use the Internet to signon to this letter. Details can be found at the http://www.vtw.org/cdaletter/ or by sending mail to vtw@vtw.org with "send cdaletter" in the subject line. _________________________________________________________ CHANGES IN US CRYPTOGRAPHY POLICY VTW has been chronicaling the government's attempts at forcing Clipper II onto the public and industry. Of course, it is still extremely unpopular. At the Sep. 6th and 7th NIST workshop, industry and public interest groups panned the plan and small working groups setup by NIST to evaluate the criteria unhappily participated, even openly revolting in some instances. On Sep 15th, NIST held another workshop to discuss the FIPS (Federal Information Processing Standard) that would embody Clipper II (also know as Commercial Key Escrow). Believe it or not, this meeting was not a repeat of the Sep 6th/7th meeting. Several attendees noticed significant differences: HEIGHTENED GOVERNMENT PRESENCE At the Sep 6th/7th workshop, dissent among industry and public representatives interfered with NIST's attempts at having a discussion about the specifics of Clipper II. Simply put, industry and the public advocates didn't like the plan. Therefore discussions of the details were fruitless. One smaller working group simply refused to work on the details and issued a statement condemning the whole Clipper II plan. The government upped the number of Federal participants at the Sep. 15th meeting in order to prevent the repeat of such an event. Several public advocates noticed a high percentage of government-provided participants in the working groups. One civil liberties advocate noted that he had never seen so many NSA individuals identifying themselves in public before. Needless to say the tactic worked. Little in the way of opposition to the plan was voiced. BURNOUT AMONG INDUSTRY AND PUBLIC REPRESENTATIVES Having been through this Kafka-esque exercise a mere two years ago with the original Clipper plan, industry and public advocates are showing signs of burnout. It's fairly clear that their concerns are not being listened to. Both the public and the industry clearly sent a message to the Clinton Administration when the original Clipper was proposed. Said F. Lynn McNulty of NIST in the New York Times Magazine (6/12/94), "We received 320 comments, only 2 of which were supportive." NIST made the Clipper Chip a government standard anyway, and it flopped in the marketplace. How many of those Clipper-phones do you see running around? The government's so-called "stupid criminals" are just falling over themselves to buy them, aren't they? NIST has stated that it has already been decided to make Clipper II a standard, before receiving any public input. Is this how democracy is supposed to work? COMMERCIAL CHEERLEADING FROM SELECT INDUSTRY INDIVIDUALS If you're wondering how the Clinton administration can get away with pushing such a disastrous proposal again, look no further than select members of the hardware and software industry. Several companies that make both security software, hardware devices and several key escrow companies are pushing Clipper II because they incorrectly believe that the government will not make it mandatory, and because they believe the industry wants key escrow. VTW believes they have it half-right: industry wants key escrow, though not on the Clinton Administration's terms. It is clear, however, that the Administration will not allow key-escrow to be a voluntary program. The EPIC (Electronic Privacy Information Center) has proved that the government has enough common sense to know that key escrow is going to be unpopular and will have to be forced on the marketplace. (See FOIA'd documents at URL:http://www.epic.org/crypto/). Never the less, several companies who want to produce hardware key escrowed devices, key escrowed software, and become escrow holders have become the champions of the Clipper II (Commercial Key Escrow) program. With their support, VTW predicts that the Clinton Administration will ratify Clipper II as a FIPS standard over the objections of industry and public. Stay tuned to BillWatch for progress on Clipper II. ______________________________________________________________ Internet Freedom and Family Empowerment Act (HR 1978, S n.a.) *** THIS BILL IS IN CONFERENCE COMMITTEE *** Description: HR 1978 is an attempt to recognize the unique medium that is online systems and avoid legislating censorship. It would: -prohibit the FCC from regulating constitutionally-protected online speech -absolve sysops and services from liability if they take good faith measures to screen their content or provide parental-screening software See directions below for obtaining analyses from various organizations. House sponsors and cosponsors: Cox (R-CA), Wyden (D-OR), Matsui (D-CA), White (R-WA), Stupak (D-MI), Rohrabacher (R-CA) House status: HR 1978 was passed 8/4/95 by the House in a vote (421-4). Where to get more info: Email: vtw@vtw.org (with "send hr1978" in the subject line) Gopher: gopher -p 1/vtw/exon gopher.panix.com WWW: http://www.panix.com/vtw/exon ___________________________________________________________ 1995 COMMUNICATIONS DECENCY ACT (CDA) (Passed Senate, HR 1004) *** THIS BILL IS IN CONFERENCE COMMITTEE *** Description: The CDA would criminalize electronic speech currently protected in print by the First Amendment. House CDA sponsors: Johnson (D-SD) House status: HR1004 will probably never leave committee. Senate status: The Senate affirmed the Communications Decency Act (84-16) as amended to the Telecommunications Reform bill (S 652). Where to get more info: WWW: http://www.panix.com/vtw/exon http://www.eff.org/ http://www.cdt.org/ http://epic.org/free_speech Gopher: gopher -p 1/vtw/exon gopher.panix.com gopher gopher.eff.org Email: vtw@vtw.org (with "send cdafaq" in the subject line) cda-status@cdt.org cda-info@cdt.org ____________________________________________________________ Child Protection, User Empowerment, and Free Expression in Interactive Media Study Act (Amendment to HR1555 in the House, S 714) *** THIS BILL IS IN CONFERENCE COMMITTEE *** Description: Would direct the Department of Justice to study whether current law is sufficient to cover enforcement of existing obscenity laws on computers networks. Senate sponsors: Leahy (D-VT) Senate status: Currently unattached to any legislation; attempted attachment to S.652 but failed (6/14/95). House sponsors: Klink (D-PA) House status: Amended to HR 1555 in committee. ______________________________________________________________ Last-minute provisions of the Manager's Mark amendment to HR1555 (added to HR1555 at the last minute) *** THIS BILL IS IN CONFERENCE COMMITTEE *** Description: Criminalizes many forms of constitutionally-protected speech when they are expressed online. House sponsors: Unknown House status: Amended to HR 1555 through the Manager's Mark on 8/4/95. ______________________________________________________________ 1995 Protection of Children from Computer Pornography Act (S 892) Description: Would make Internet Service Providers liable for shielding people under 18 from all indecent content on the Internet. Senate sponsors: Dole (R-KS), Coats (R-IN), Grassley (R-IA), McConnell (R-KY), Shelby (R-AL), Nickles (R-OK), Hatch (R-UT) Senate status: A hearing was held Monday July 24th. No action on the bill has happened yet as a result of that hearing. ___________________________________________________________ Anti-Electronic Racketeering Act of 1995 (HR n.a., S 974) Description: S 974 has many effects (not good) on law enforcement's use of intercepted communications. It would also make it unlawful for any person to publicly disseminate encoding or encrypting software including software *currently allowed* to be exported unless it contained a "universal decoding device". This more than likely means that Clipper-style key escrow systems could be disseminated, but not strong, private cryptography. Senate sponsors: Grassley (R-IA) Senate status: Currently not active and probably won't move before the August recess. Senate citizen action required: Request bill below and familiarize yourself with it. VTW is tracking this bill, and will alert you when there is movement. There is no Congressional action to take right now; as other bills (such as the Communications Decency Act) pose a greater, more immediate threat. House of Representatives status: No House version is currently enrolled. Where to get more info: Email: vtw@vtw.org (with "send s974" in the subject line) Gopher: URL:gopher://gopher.panix.com:70/11/vtw/ _________________________________________________________ Child Pornography Prevention Act of 1995 (HR n.a., S 1237) Description: S 1237 would criminalize material that depicts children engaging in sexually-explicit conduct whether or not the material was produced with children or entirely without computer. Senate sponsors: Hatch (R-UT), Abraham (R-MI), Grassley (R-IA), Thurmond (R-SC) Senate status: In the Judiciary committee, no hearing has been held yet Senate citizen action required: Read the bill below and familiarize yourself with it. VTW is tracking this bill, and will alert you when there is movement. House of Representatives status: No House version is currently enrolled. Where to get more info: Check URL:http://thomas.loc.gov and search for bill S1237. VTW will have a homepage on this bill soon. We've included both the text of the bill and Congressional debate on it below. To amend certain provisions of law relating to child pornography, and for other purposes. IN THE SENATE OF THE UNITED STATES September 13 (legislative day, September 5), 1995 Mr. Hatch (for himself, Mr. Abraham, Mr. Grassley, and Mr. Thurmond) introduced the following bill; which was read twice and referred to the Committee on the Judiciary A BILL To amend certain provisions of law relating to child pornography, and for other purposes. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION 1. SHORT TITLE. This Act may be cited as the `Child Pornography Prevention Act of 1995'. SEC. 2. FINDINGS. Congress finds that-- (1) the use of children in the production of sexually explicit material, including photographs, films, videos, computer images, and other visual depictions, is a form of sexual abuse which can result in physical or psychological harm, or both, to the children involved; (2) child pornography permanently records the victim's abuse, and its continued existence causes the child victims of sexual abuse continuing harm by haunting those children in future years; (3) child pornography is often used as part of a method of seducing other children into sexual activity; a child who is reluctant to engage in sexual activity with an adult, or to pose for sexually explicit photographs, can sometimes be convinced by viewing depictions of other children `having fun' participating in such activity; (4) prohibiting the possession and viewing of child pornography encourages the possessors of such material to destroy them, thereby helping to protect the victims of child pornography and to eliminate the market for the sexually exploitative use of children; and (5) the elimination of child pornography and the protection of children from sexual exploitation provide a compelling governmental interest for prohibiting the production, distribution, possession, or viewing of child pornography. SEC. 3. DEFINITIONS. Section 2256 of title 18, United States Code, is amended-- (1) in paragraph (2)(E), by inserting before the semicolon the following: `, or the buttocks of any minor, or the breast of any female minor'; (2) in paragraph (5), by inserting before the semicolon the following: `, and data stored on computer disk or by electronic means which is capable of conversion into a visual image'; (3) in paragraph (6), by striking `and'; (4) in paragraph (7), by striking the period and inserting `; and'; and (5) by adding at the end the following new paragraph: `(8) `child pornography' means any visual depiction, including any photograph, film, video, picture, drawing, or computer or computer-generated image or picture, whether made or produced by electronic, mechanical, or other means, of sexually explicit conduct, where-- `(A) the production of such visual depiction involves the use of a minor engaging in sexually explicit conduct; `(B) such visual depiction is, or appears to be, of a minor engaging in sexually explicit conduct; or `(C) such visual depiction is advertised, promoted, presented, described, or distributed in such a manner that conveys the impression that the material is or contains a visual depiction of a minor engaging in sexually explicit conduct.'. SEC. 4. PROHIBITED ACTIVITIES RELATING TO MATERIAL CONSTITUTING OR CONTAINING CHILD PORNOGRAPHY. (a) In General: Section 2252 of title 18, United States Code, is amended to read as follows: `Sec. 2252. Certain activities relating to material constituting or containing child pornography `(a) Any person who-- `(1) knowingly mails, transports, or ships in interstate or foreign commerce by any means, including by computer, any child pornography; `(2) knowingly receives or distributes-- `(A) any child pornography that has been mailed, shipped, or transported in interstate or foreign commerce by any means, including by computer; or `(B) any material that contains child pornography that has been mailed, shipped, or transported in interstate or foreign commerce by any means, including by computer; `(3) knowingly reproduces any child pornography for distribution through the mails, or in interstate or foreign commerce by any means, including by computer; `(4) either-- `(A) in the maritime and territorial jurisdiction of the United States, or on any land or building owned by, leased to, or otherwise used by or under the control of the United States Government, or in the Indian country (as defined in section 1151), knowingly sells or possesses with the intent to sell any child pornography; or `(B) knowingly sells or possesses with the intent to sell any child pornography that has been mailed, shipped, or transported in interstate or foreign commerce by any means, including by computer, or that was produced using materials that have been mailed, shipped, or transported in interstate or foreign commerce by any means, including by computer; or `(5) either-- `(A) in the maritime and territorial jurisdiction of the United States, or on any land or building owned by, leased to, or otherwise used by or under the control of the United States Government, or in the Indian country (as defined in section 1151), knowingly possesses 3 or more books, magazines, periodicals, films, videotapes, computer disks, or any other material that contains any child pornography; or `(B) knowingly possesses 3 or more books, magazines, periodicals, films, videotapes, computer disks, or any other material that contains any child pornography that has been mailed, shipped, or transported in interstate or foreign commerce by any means, including by computer, shall be punished as provided in subsection (b). `(b)(1) Whoever violates, or attempts or conspires to violate, paragraphs (1), (2), (3), or (4) of subsection (a) shall be fined under this title or imprisoned not more than 10 years, or both, but, if such person has a prior conviction under this chapter or chapter 109A, such person shall be fined under this title and imprisoned for not less than 5 years nor more than 15 years. `(2) Whoever violates paragraph (5) of subsection (a) shall be fined under this title or imprisoned for not more than 5 years, or both.'. (b) Technical Amendment: The table of sections for chapter 110 of title 18, United States Code, is amended by amending the item relating to section 2252 to read as follows: `2252. Certain activities relating to material constituting or containing child pornography.'. SEC. 5. PRIVACY PROTECTION ACT AMENDMENTS. Section 101 of the Privacy Protection Act of 1980 (42 U.S.C. 2000aa) is amended-- (1) in subsection (a)(1), by inserting before the semicolon at the end the following: `, or if the offense involves the production, possession, receipt, mailing, sale, distribution, shipment, or transportation of child pornography, the sexual exploitation of children, or the sale or purchase of children under section 2251, 2251A, or 2252 of title 18, United States Code'; and (2) in subsection (b)(1), by inserting before the semicolon at the end the following: `, or if the offense involves the production, possession, receipt, mailing, sale, distribution, shipment, or transportation of child pornography, the sexual exploitation of children, or the sale or purchase of children under section 2251, 2251A, or 2252 of title 18, United States Code'. SEC. 6. SEVERABILITY. If any provision of this Act, an amendment made by this Act, or the application of such provision or amendment to any person or circumstance is held to be unconstitutional, the remainder of this Act, the amendments made by this Act, and the application of such to any other person or circumstance shall not be affected thereby. STATEMENTS OF INTRODUCED BILLS AND JOINT RESOLUTIONS (Senate - September 13, 1995) THE CHILD PORNOGRAPHY PREVENTION ACT OF 1995 Mr. HATCH. Mr. President, it is impossible for any decent American not to be outraged by child pornography and the sexual exploitation of children. Such material is a plague upon our people and the moral fabric of this great Nation. And, as a great Nation, I believe that we have both the constitutional right and moral obligation to protect our children from those who, motivated by profit or perversion or both, would abuse, exploit, and degrade the weakest and most vulnerable members of our society. Current Federal law dealing with child pornography reflects the overwhelming bipartisan consensus which has always existed, both in Congress and in the country, that there is no place for such filth even in a free society and that those who produce or peddle this reprehensible material must be made to feel the full weight of the law and suffer a punishment reflective of the seriousness of their offense. As with many of our criminal statutes, however, effective enforcement of our laws against child pornography today faces a new obstacle: The criminal use, or misuse, of new technology which is outside the scope of existing statutes. In order to close this computer-generated loophole and to give our law enforcement authorities the tools they need to stem the increasing flow of high-tech child pornography, I am today introducing the Child Pornography Prevention Act of 1995. The necessity for prompt legislative action amending our existing Federal child pornography statutes to cover the use of computer technology in the production of such material was vividly illustrated by a recent story in the Washington Times. This story, dated July 23, 1995, reported the conviction in Canada of a child pornographer who copied innocuous pictures of children from books and catalogs onto a computer, altered the images to remove the childrens' clothing, and then arranged the children into sexual positions. According to Canadian police, these sexual scenes involved not only adults and children, but also animals. Even more shocking than the occurrence of this type of repulsive conduct is the fact that, under current Federal law, those pictures, depicting naked children involved in sex with other children, adults, and even animals, would not be prosecutable as child pornography. That is because current Federal child pornography and sexual exploitation of children laws, United States Code title 18, sections 2251, 2251A, and 2252, cover only visual depictions of children engaging in sexually explicit conduct whose production involved the use of a minor engaging in such conduct; materials such as photographs, films, and videotapes. Today, however, visual depictions of children engaging in any imaginable forms of sexual conduct can be produced entirely by computer, without using children, thereby placing such depictions outside the scope of Federal law. Computers can also be used to alter sexually explicit photographs, films, and videos in such a way as to make it virtually impossible for prosecutors to identify individuals, or to prove that the offending material was produced using children. The problem is simple: While Federal law has failed to keep pace with technology, the purveyors of child pornography have been right on line with it. This bill will help to correct that problem. The Child Pornography Prevention Act of 1995, which includes a statement of congressional findings as to harm, both to children and adults, resulting from child pornography, has three major provisions. First, it would amend United States Code title 18, section 2256, to establish, for the first time, a specific, comprehensive, Federal statutory definition of child pornography. Under this bill, any visual depiction, such as a photograph, film, videotape or computer image, which is produced by any means, including electronically by computer, of sexually explicit conduct will be classified as child pornography if: (a) its production involved the use of a minor engaging in sexually explicit conduct; or (b) it depicts, or appears to depict, a minor engaging in sexually explicit conduct; or (c) it is promoted or advertised as depicting a minor engaging in sexually explicit conduct. _____________________________________________________________ SUBSCRIPTION AND REPRODUCTION INFORMATION *** Know of someone ANYWHERE with a fax machine but without net *** *** access that's interested in VTW's issues? Tell them to *** *** call and get on our weekly fax distribution list at *** *** (718) 596-2851 (or email us their fax number). *** To get on the distribution list for BillWatch, send mail to listproc@vtw.org with "subscribe vtw-announce Firstname Lastname" in the subject line. To unsubscribe from BillWatch (and all other VTW publications) send mail to listproc@vtw.org with "unsubscribe vtw-announce" in the subject line. Email vtw@vtw.org with "send billwatch" in the SUBJECT LINE to receive the latest version of BillWatch For permission to reproduce VTW alerts contact vtw@vtw.org ------------------------------ Date: Fri, 22 Sep 1995 15:21:41 CDT From: CuD Moderators <cudigest@sun.soci.niu.edu> Subject: File 3--Ruling in RTC v. F.A.C.T.NET (Church of Sci. Loses) ((MODERATORS NOTE: The following is the text of the Church of Scientiology civil action against F.A.C.TNET. The ruling is a legal blow for CoS. Links to web sites detailing what some have called a "campaign of litigation terrorism" or a "war on the Net" can be found on the CuD homepage at http://www.soci.niu.edu. Copyright © 1995 Faegre & Benson Professional Limited Liability Partnership and Internet Broadcasting Corporation, all rights reserved. http://www.faegre.com)) IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO Civil Action No. 95-B-2143 RELIGIOUS TECHNOLOGY CENTER, Plaintiff, vs. F.A.C.T.NET, INC., et al., Defendants. _________________________________________________________________ REPORTER'S TRANSCRIPT RULING Proceedings before the HONORABLE JOHN L. KANE, JR., Judge, United States District Court for the District of Colorado, commencing at 4:00 p.m., on the 12th day of September, 1995, in Courtroom C-401, United States Courthouse, Denver, Colorado. _________________________________________________________________ DEBORAH A. STAFFORD, Official Reporter P.O. Box 3592 Denver, Colorado 80294 Proceedings Reported by Mechanical Stenography Transcription Produced via Computer _________________________________________________________________ APPEARANCES For the Plaintiff: EARLE C. COOLEY, ESQ. Cooley, Manion, Moore & Jones 21 Custom House Street Boston, MA 02110 TODD P. BLAKELY, ESQ. Sheridan Ross & McIntosh 1700 Lincoln Street, 3500 Denver, CO 80203 ERIC M. LIEBERMAN, ESQ. Rabinowitz, Boudin, Standard, Krinsky & Lieberman, P.C. 740 Broadway at Astor Place New York, New York 10003 HELENA K. KOBRIN, ESQ. 7629 Fulton Avenue North Hollywood, CA 91605 For the Defendants: THOMAS B. KELLEY, ESQ. KENNETH LIEBMAN ESQ. NATALIE HANLON-LEH, ESQ. Faegre & Benson 2500 Republic Plaza 370 17th Street Denver, CO 80202 _________________________________________________________________ PROCEEDINGS THE COURT: I have some remarks to make, some of which may be considered preliminary. But I think that they are important for a full understanding of what this kind of procedure is. A preliminary injunction is an extraordinary remedy providing the potential for considerable harm, yet because of its emergency nature, it does not afford the Court the usual degree of careful consideration and examination of all relevant and material evidence which is afforded by the deliberative process of a so-called full-fledged trial. It is by its very nature an emergency matter, and as a consequence, the issuance of an injunction is tentative, and it's subject to later modification or for that matter even a complete rescission or vacation following trial on the merits. That is why in our legal tradition the question of whether to issue an injunction, what terms such an injunction should contain are to be approached with the utmost caution and prudence. The power to issue an injunction, like the power to hold a person in contempt of court is a power which is best used sparingly, if at all. Moreover, the very purpose of an injunction is to preserve the status quo ante. That is a rather elegant piece of Latin which means the last existing state of peaceable, non-contested conditions which preceded the pending controversy. I will not dwell on this, but I do think it's helpful to observe that our legal forefathers were not fools, and the complete phrase from the Latin is the status quo ante bellum which literally means the state of things before the war began. Given this purpose and the caution that the law prescribes, there are four basic considerations or findings which must be made before an injunction can issue. These same four factors likewise assist in determining the scope of an injunction and the conditions which would attach to it. Applying these conditions and factors to this case and reserving, as I had previously indicated, the right, if not indeed the obligation, to issue a more detailed document of a finding, finding of fact and conclusion of law, in other words, a more formal opinion at a later time, I am going to make the following ruling on the case from the bench. And if there is any ambiguity, the parties can obtain a copy of these comments from the court reporter. The first consideration is probability of success on the merits. I find the plaintiff has not established a probability of success on the merits, either in relation to the copyright or the trade secret cause of action. With regard to the copyright infringement, on the evidence before me, I find there is no probability of plaintiffs succeeding on their copyright claim because the evidence which has been presented shows that the defendants' use of the copyrighted works constitutes a fair use under Section 107 of the Copyright Act in that it is for the purposes of criticism, comment, or research, and as such is not an infringement. With regard to the trade secrets violation claim, the plaintiff has not shown by a preponderance of the evidence that the materials in issue are secret or within the definition of trade secrets under Colorado law. The evidence shows the materials are in fact in the public domain, and I am not persuaded by the evidence presented here that they entered the public domain only through unlawful means. The second consideration or factors is irreparable injury, and I find that the plaintiffs has not shown it will suffer irreparable injury of the use by defendants for the materials in issue. The evidence does not show that plaintiff will lose competitive advantage through defendants' use of the materials, nor that the defendants are using the materials for commercial purpose. In balancing the hardships to the plaintiff, I find the threatened injury of the plaintiff does not outweigh the damage the proposed injunction would cause the defendants. Whereas, the evidence has not shown the plaintiffs will suffer harm if the injunction is not issued. It shows the affect of issuing the injunction would amount to an infringement on defendants' right of fair use of copyright materials, and even more so in this case to barely prevent the functioning of the defendant F.A.C.T.NET in its entirety. With respect to the final consideration of public interest, the public interest is served best by the free exchange of speech and ideas on matters of public interest. This is indeed a matter of public interest and to issue the injunction sought would not serve that interest. Having weighed all of the factors, as I am required to do, I conclude the plaintiff has not shown a likelihood of success on the merits and the balance of harm lies in favor of the defendants. For these reasons, Plaintiff's Motion for Preliminary Injunction is denied. I order, however, as follows: That the plaintiffs shall return and restore to the defendants immediately at the plaintiff's expense all seized materials, including defendants' hard drive in the exact conditions that they were taken and from the precise places from which they were taken. I also order the defendants in this case that they must maintain -- and each defendant must maintain the status quo as to the possession of all of the copyrighted materials at issue in this case and the defendants, and each of then, are restricted to making fair use and only fair use thereof. The defendants here are specifically prohibited from making any additional copies of the materials or transferring them in any manner or publishing them other than in the context of fair use. Those are the orders of the Court. I thank counsel for the presentation, and the Court will be in recess until 9:00 a.m. MR. COOLEY: Your Honor, we'll undoubtedly be appealing this to the United States Court of Appeals for the Tenth Circuit, and we would respectfully ask a stay of the Court's order of return pending that appeal. THE COURT: No, I will not order a stay of the return of the materials. That would, in my view, cause the exact harm, which I am mot concerned with, and that is the inability of the defendants in the case to maintain their continued existence during this litigation. (Recess.) _________________________________________________________________ REPORTER'S CERTIFICATE I certify that the foregoing is a correct transcript from the record of proceedings in the above-entitled matter. Dated at Denver, Colorado, this 13th day of September, 1995. __________________________________ Deborah A. Stafford _________________________________________________________________ Last changed 15-September-95 Copyright © 1995 Faegre & Benson Professional Limited Liability Partnership and Internet Broadcasting Corporation, all rights reserved. ------------------------------ Date: Sun, 19 Apr 1995 22:51:01 CDT From: CuD Moderators <cudigest@sun.soci.niu.edu> Subject: File 4--Cu Digest Header Info (unchanged since 19 Apr, 1995) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send a one-line message: SUB CUDIGEST your name Send it to LISTSERV@VMD.CSO.UIUC.EDU The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CUDIGEST Send it to LISTSERV@VMD.CSO.UIUC.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (203) 832-8441. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org In ITALY: ZERO! BBS: +39-11-6507540 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/cud/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu:80/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #7.75 ************************************