Computer underground Digest    Wed  Aug 9, 1995   Volume 7 : Issue 66
                           ISSN  1004-042X

       Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
       Archivist: Brendan Kehoe
       Shadow Master: Stanton McCandlish
       Field Agent Extraordinaire:   David Smith
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson

CONTENTS, #7.66 (Wed, Aug 9, 1995)


FIle 1--CINCINNATI ELECTRONIC BULLETIN BOARD SYSTEM USERS
FIle 2--Cincinatti Computer Connection Users lawsuit against Police
FIle 3--Cu Digest Header Info (unchanged since 19 Apr, 1995)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Tue, 08 Aug 1995 20:15:27 -0400
From: john.bailey@CCCBBS.CINCINNATI.OH.US(JOHN BAILEY)(by way of
Subject: File 1--CINCINNATI ELECTRONIC BULLETIN BOARD SYSTEM USERS


- - - - - - - - -    P R E S S   R E L E A S E   - - - - - - - -

For IMMEDIATE Release 8/7/95           Contact: Scott T. Greenwood
                                                Peter D. Kennedy
                                                513/684-0101
Computer Users Fight Back:

        CINCINNATI ELECTRONIC BULLETIN BOARD SYSTEM USERS
       FILE CLASS ACTION LAWSUIT AGAINST SHERIFF SIMON LEIS

  Seven subscribers to a Cincinnati electronic bulletin board system filed
a class action lawsuit today in federal court against Sheriff Simon L Leis,
Jr., and other law enforcement officials.  On June 16, 1995, members of the
Hamilton County Computer Crimes Task Force raided the offices of the
Cincinnati Computer Connection BBS and seized the entire computer system,
including all the private electronic mail of the subscribers.  This is the
first user class action challenging a government seizure of computer
material.

  According to the search warrant used to justify the raid, the Task Force
was seeking 45 computer image files on a system that contained hundreds of
thousands of public and private messages.

  The seven subscribers represent a class of thousands of users of the
Cincinnati Computer Connection electronic bulletin board.  The lead
plaintiff is Steve Guest, a 36-year old computer system analyst who runs
his own business, in large part using the Cincinnati Computer Connection
BBS.  Other plaintiffs include Denise and Ben Kelley, active bulletin board
users and grandparents of seven; Nelda Sturgill, a registered nurse who
used the bulletin board to keep up with medical news and to swap recipes;
and Randy Bowling, who suffers from a speech impediment caused by a head
injury, who used CCC BBS as his primary way to communicate and to study
computer science.

  "The faces of the CCC subscribers were the faces of Greater Cincinnati -
working men and women, retirees, mothers, fathers, grandparents and
children, Republicans, Democrats and Independents," the lawsuit alleges.
The users of the system claim that the wholesale seizure of the computer
bulletin board system violated their constitutional right to free speech
and association and that the seizure of their private e-mail violated their
right to privacy and federal law.

  "The Task Force used a drift net to troll for a tiny amount of supposed
'computer porn,'" said Cincinnati civil rights lawyer Scott T. Greenwood,
who represents the plaintiffs.  "In the process, they netted an enormous
amount of entirely irrelevant material, and shut down a
constitutionally-protected forum for speech and association."

  "We believe that the law prohibits the indiscriminate seizure of private
electronic communications," said Peter D. Kennedy, an Austin, Texas
attorney who also represents the plaintiffs, and who represented Steve
Jackson Games when that company sued the U.S. Secret Service for illegally
seizing its electronic bulletin board system in 1990.  "It is a fundamental
principle of law that, even during legitimate investigations, the
government must limit its searches and seizures to things related to the
crime under investigation.  Here, the Task Force took everything, including
thousands of innocent persons' private mail and public notices."

  Greenwood added, "Whether the sheriff and the computer 'net police' like
it or not, the Bill of Rights is not optional just because they don't like
it or understand it.  Shutting down a computer system and seizing people's
private communications makes a mockery of the First Amendment."

  The lawsuit claims that Sheriff Leis and the Task Force violated the
First Amendment, the Fourth Amendment, several provisions of the federal
Electronic Communications Privacy Act of 1986,  and Ohio common law privacy
rights, and seeks actual damages, statutory damages, and punitive damages
on behalf of the seven plaintiffs and the entire class.

For further information, contact:

Scott T. Greenwood                    Peter D. Kennedy
Greenwood & Associates                George, Donaldson & Ford LLP
2301 Carew Tower, 441 Vine St         114 W. 7th Street, Suite 1000
Cincinnati, Ohio  45202               Austin, Texas  78701
(513) 684-0101                        (512) 495-1400
stgrnwd@iac.net                       pkennedy@io.com

------------------------------

Date: Wed, 09 Aug 1995 22:18:15 -0400
From: pstemari@ERINET.COM(Paul J. Ste. Marie)
Subject: File 2--Cincinatti Computer Connection Users lawsuit against Police

 UNITED STATES DISTRICT COURT
 SOUTHERN DISTRICT OF OHIO
 WESTERN DIVISION


 STEVEN GUEST,
 [home address removed]                 CIVIL ACTION NO.

         and

 DENISE B. KELLEY,
 [home address removed]

         and

 BEN S. KELLEY,
 [home address removed]

         and

 NELDA STURGILL,
 [home address removed]

         and

 DEBORAH CUMMINGS,
 [home address removed]

         and

 RANDY BOWLING,
 [home address removed]

         and
                                                    CLASS ACTION
 RICHARD E. KRAMER,                          COMPLAINT
 [home address removed]                      (JURY DEMAND
                                                     ENDORSED
         and                                         HEREON)

 all others similarly situated,

 Plaintiffs,

 vs.

 SIMON L. LEIS, JR.,
 Hamilton County Justice Center
 1000 Sycamore Street
 Cincinnati, Ohio  45202

         and

 Hamilton County                 :
 Sheriff's Department,           :
 Hamilton County Justice Center  :
 1000 Sycamore Street                    :
 Cincinnati, Ohio  45202                 :
                                                 :
         and                                     :
                                                 :
 Hamilton County Regional        :
 Computer Crimes Task Force,     :
 Hamilton County Justice Center  :
 1000 Sycamore Street                    :
 Cincinnati, Ohio  45202                 :
                                                 :
         and                                     :
                                                 :
 Dale Menkaus,                   :
 Hamilton County Justice Center  :
 1000 Sycamore Street                    :
 Cincinnati, Ohio  45202                 :
                                                 :
         and                                     :
                                                 :
 ROBERT SWISSHELM,                       :
 Hamilton County Justice Center  :
 1000 Sycamore Street                    :
 Cincinnati, Ohio  45202                 :
                                                 :
         and                                     :



 JANE/JOHN DOES 1 THROUGH 10,    :
 Addresses Presently Unknown             :
                                                 :
                 Defendants.                     :


 I.  INTRODUCTION

 1.      The Plaintiffs bring this lawsuit on behalf of themselves and the
 thousands of subscribers to the Cincinnati Computer Connection electronic
 bulletin board system, in order to redress the violation of their civil
 rights by Hamilton County Sheriff Simon L. Leis, Jr. and the other
 Defendants.
 2.      On June 16, 1995, the Hamilton County Regional Computer Task Force
 (the "Task Force") raided at least five electronic bulletin board systems
 in the Cincinnati area, in a search for allegedly obscene materials.
 3.      During these raids, the Task Force seized the entire computer
 network comprising the Cincinnati Computer Connection BBS, a computer
 bulletin board service with thousands of subscribers in Southern Ohio,
 Northern Kentucky, and beyond.  Robert Emerson owns and operates the
 Cincinnati Computer Connection BBS.  The target of the raid was some 45
 computer image files allegedly stored on the Cincinnati Computer Connection
 BBS.  According to the search warrant, the Task Force already had obtained
 copies of these image files from the Cincinnati Computer Connection BBS.
 4.      In pursuit of these 45 image files,  the Sheriff and Task Force
 raided and seized the entire bulletin board system.  In the process,
 Sheriff Leis and his Task Force seized the private electronic mail and
 communications of thousands of entirely innocent subscribers, they shut
 down an active, thriving, electronic community of average citizens, and
 they denied thousands of people access to their friends, neighbors, and
 business associates.
 5.      The named Plaintiffs bring this lawsuit on behalf of themselves and
 the thousands of subscribers to the Cincinnati Computer Connection and all
 those whose electronic communications were seized and intercepted during
 the raid, in order to remedy this violation of their civil rights
 guaranteed by the First Amendment, the Fourth Amendment, the Fourteenth
 Amendment, the Ohio Constitution, the Electronic Communications Privacy Act
 of 1986 (18 U.S.C. 2510 et seq. and 2701 et seq.) and Ohio common law.


 II.  JURISDICTION

 6.      This action seeks to enforce rights guaranteed by the Constitution
 and laws of the United States and is brought pursuant to 42 U.S.C. 1983
 and 1985.  Jurisdiction is based upon 28 U.S.C. 1331 and 1343(3). The
 substantive federal claims are brought pursuant to 42 U.S.C.  1983 and
 1985, and 18 U.S.C. 2707 and 2520.  Declaratory relief is sought pursuant
 to 28 U.S.C. 2201-2202.  Authority to hear the pendent state claims is
 conferred by the Court's supplemental jurisdiction under 28 U.S.C. 1367.
 This action does not raise novel or complex issues of state law, and the
 state law claims do not predominate over the federal law claims.
 7.      Venue is proper in the Southern District of Ohio, Western Division,
 under 28 U.S.C. 1391(b), because at least one Defendant resides in this
 District and Division and because a substantial part of the events or
 omissions giving rise to the claims occurred within this District and
 Division.


 III.  PARTIES


 A.      PLAINTIFFS
 8.      PLAINTIFF STEVEN GUEST is a thirty-six year old resident of
 Clermont County, Ohio.  Mr. Guest is a computer consultant who uses the
 Cincinnati Computer Connection BBS to send and receive electronic
 communications, to conduct his consulting business, to exchange files with
 his business partners, to access shareware, and otherwise to engage in
 expressive and associational activity.
 9.      PLAINTIFF DENISE KELLEY is a sixty-nine year old resident of
 Hamilton County, Ohio.  She is employed by the Hamilton County Department
 of Human Services as an investigation coordinator and serves as the chief
 union steward for AFSCME Local 1768.  Mrs. Kelley, mother of three and
 grandmother of seven, uses the Cincinnati Computer Connection BBS for
 political discussion, to download shareware files, to play some games, to
 send and receive electronic mail communications across the Internet, to
 "chat" with users, to write stories in an on-line conference, and otherwise
 to engage in expressive and associational activity.
 10.     PLAINTIFF BEN S. KELLEY is Mrs. Kelley's husband, a seventy-six
 year old retired machinist who resides in Hamilton County, Ohio.  Mr.
 Kelley, father of three and grandfather of seven, uses the Cincinnati
 Computer Connection BBS to send and receive electronic communications, play
 games, to read the discussions going on in various conferences, and
 otherwise to engage in expressive and associational activity.
 11.     PLAINTIFF NELDA STURGILL is a registered nurse in a local hospital
 who resides in Hamilton County.  In her thirties, Ms. Sturgill uses the
 Cincinnati Computer Connection BBS to send and receive electronic
 communications across the Internet, to access shareware programs, to keep
 abreast of information through the use of the Usenet newsgroups, and
 otherwise to engage in expressive and associational activity.  Ms. Sturgill
 particularly participates in the health-related conferences newsgroups, and
 has exchanged recipes and ideas with people from Australia, England and the
 United States.
 12.     PLAINTIFF DEBORAH CUMMINGS is a resident of Kenton County,
 Kentucky.  Ms. Cummings uses the Cincinnati Computer Connection BBS to send
 and receive electronic communications, to conduct her business, and to
 otherwise engage in expressive and associational activity.
 13.     PLAINTIFF RANDY BOWLING is a resident of Butler County, Ohio.  Mr.
 Bowling suffers from a head injury that makes speaking very difficult.
 Mr. Bowling uses the Cincinnati Computer Connection BBS to send and receive
 electronic communications, to supplement his limited ability to speak, and
 to discuss his head injury and therapy, and to engage in the majority of
 his expressive and associational activity.  Mr. Bowling also uses the
 Cincinnati Computer Connection BBS to facilitate his current study of
 computer systems.
 14.     PLAINTIFF RICHARD KRAMER is a retired insurance agent who resides
 in Butler County, Ohio.  Mr. Kramer, who uses a wheelchair, uses the
 Cincinnati Computer Connection BBS to send and receive electronic
 communications, to supplement his sometimes restricted access to more
 traditional fora for expressive and associational activity, to access
 file-management and utility shareware, and to study computer systems.
 15.     Each named Plaintiff is a citizen of the United States.
 16.     At all times relevant herein, Plaintiffs were users of the
 Cincinnati Computer Connection BBS.
                 Class Action Allegations
 17.     The named Plaintiffs are proper representatives of a class within
 the meaning of Rule 23(a) and 23(b) (3) of the Federal Rules of Civil
 Procedure.
 18.     The members of the class are so numerous that the joinder of all of
 them is impractical.  Upon information and belief, the class consists of at
 least several thousand persons.  The exact size of the class is unknown
 because the Defendants have seized and failed to return the computer and/or
 documentary records needed to determine the exact number and identity of
 the class members.
 19.     The members of the class should be readily identifiable from
 records seized by the Defendants.
 20.     There are questions of law and fact common to the class; their
 class claims predominate over any individual claims.  Each class member
 shares the same federal and state constitutional protections of their right
 to speak, publish and associate.  Each class member shares the same federal
 and state constitutional right to be free from unreasonable searches and
 seizures.  Each class member shares the same federal and state rights
 protecting the privacy of their electronic communications and subscriber
 records.
 21.     The claims of the named Plaintiffs are typical of the claims of the
 class.  All class members suffered a similar violation of their common
 rights when the Defendants seized and shut down the Cincinnati Computer
 Connection BBS, and, upon information and belief, reviewed their private
 electronic communications and subscriber records.  As alleged in greater
 detail above, the Plaintiffs' uses of the Cincinnati Computer Connection
 BBS typify the uses of the class members generally.
 22.     The named Plaintiffs will fairly and adequately protect the
 interests of the class.  As of June 16, 1995, each named Plaintiff was a
 user of the Cincinnati Computer Connection BBS.  The named Plaintiffs are
 represented by counsel experienced in litigating federal and state civil
 rights lawsuits, including class actions, and who are familiar with the
 technology involved and experienced in litigating computer communications
 cases.  The representative Plaintiffs know of no conflict of interest among
 class members.  Plaintiffs will vigorously prosecute this action.
 23.     The class consists of all persons who, on June 16, 1995, were
 users, subscribers, or customers of the Cincinnati Computer Connection
 electronic bulletin board service, and all persons whose private electronic
 communications were resident on the Cincinnati Computer Connection BBS when
 it was seized by the Defendants, but not including the actual provider of
 that electronic bulletin board service.
 24.     Plaintiffs do not propose class notice at this time, but belief
 that class certification and notice can and should be achieved promptly.

 B.      DEFENDANTS
 25.     Defendant Simon L. Leis, Jr., is and was at all relevant times the
 Sheriff of Hamilton County, Ohio.  For the constitutional and common law
 claims, Defendant Leis is sued in his official capacity with respect to the
 declaratory and injunctive relief sought herein, and in his individual
 capacity with respect to the request for damages and attorney's fees in
 this action.  For the federal statutory claims, Defendant Leis is sued in
 his individual and official capacities.
 26.     Defendant Hamilton County Sheriff's Department is a sheriff's
 department organized under the laws of the State of Ohio.
 27.     Defendant Hamilton County Regional Computer Crimes Task Force is a
 division of the Hamilton County Sheriff's Department organized under Ohio
 law to develop and use special skills and expertise in investigating
 suspected computer crimes.
 28.     Defendant Dale Menkaus is and was at all relevant times the
 Commander of the Regional Computer Crimes Task Force.  For the
 constitutional and common law claims, Defendant Menkaus is sued in his
 official capacity with respect to the declaratory and injunctive relief
 sought herein, and in his individual capacity with respect to the request
 for damages and attorney's fees in this action.  For the federal statutory
 claims, Defendant Menkaus is sued in his individual and official
 capacities.
 29.     Defendant Robert Swisshelm is and was at all times referred to
 herein a member of the Regional Computer Crimes Task Force.  For the
 constitutional and common law claims, Defendant Swisshelm is sued in his
 official capacity with respect to the declaratory and injunctive relief
 sought herein, and in his individual capacity with respect to the request
 for damages and attorney's fees in this action.  For the federal statutory
 claims, Defendant Swisshelm is sued in his individual and official
 capacities.
 30.     Defendants Jane/John Doe 1-10 are private individuals; members,
 representatives, or agents of the Regional Computer Crimes Task Force; or
 individuals from other law enforcement agencies whose names are currently
 unknown, but whom the Plaintiffs believe acted under color of state law or
 clothed with official authority, and who violated or conspired to violate
 the Plaintiffs' and the class members' civil rights.  For the
 constitutional and common law claims, Defendant Does are sued in their
 official capacities with respect to the declaratory and injunctive relief
 sought herein, and in their individual capacities with respect to the
 request for damages and attorney's fees in this action.  For the federal
 statutory claims, Defendant Does are sued in their individual and official
 capacities.
 31.     At all times relevant herein, each named individual Defendant was
 acting under color of state law.
 32.     At all times relevant herein, Defendants, and each of them,
 separately and in concert, acted under color of state law.  At all times
 relevant herein, Defendants, and each of them, separately and in concert,
 engaged in the illegal and unconstitutional conduct described herein and
 deprived Plaintiffs of the rights, privileges, and immunities secured to
 Plaintiffs by the First, Fourth, and Fourteenth Amendments to the United
 States Constitution, the laws of the United States, and the Constitution
 and laws of the State of Ohio.

 IV.  FACTS

 A.      The Cincinnati Computer Connection Community.
 33.     On June 16, 1995, and for many years before that, the Cincinnati
 Computer Connection ("CCC") was a thriving community.  The bulletin board
 system ("BBS") provided a forum for its users to speak and publish
 privately and publicly, to debate, to associate and recreate, and to
 exchange ideas and information.  On June 16, 1995, the faces of the CCC
 subscribers were the faces of Greater Cincinnati -- working men and women,
 retirees, mothers, fathers, grandparents and children, Republicans,
 Democrats and Independents.  The CCC community even included subscribers
 from around the United States and overseas.
 34.     Many of the subscribers to the CCC BBS have made personal
 acquaintances through the bulletin board community.   Subscribers have held
 dinner get-togethers to meet personally, to socialize, and to discuss
 matters of interest to the BBS community.  These meetings were organized by
 using the BBS itself.
 35.     On June 16, 1995, the CCC community included thousands of users and
 subscribers.  Because the CCC computers and subscriber records remain in
 the hands of the Defendants, the exact number remains unknown.
 36.     At all relevant times, the CCC BBS affected and operated in the
 stream of interstate commerce.

 B.      The Cincinnati Computer Connection BBS.
 37.     Each user or subscriber to the CCC BBS selected a private password,
 which secured the privacy of his or her account.  The subscriber contacted
 the CCC BBS by using his or her personal computer, a modem, and a phone
 line.  The user's computer would call the CCC BBS over a phone line, and
 after "logging in" by using the confidential password, the user was given
 access to the CCC BBS.  Once connected to the BBS, the subscriber could do
 a whole range of things, including:
         i.      Private electronic mail or "e-mail."
 38.     The CCC BBS provided subscribers the ability to send and receive
 private electronic communications, typically known as e-mail.  A subscriber
 could compose private electronic messages either before "logging on" to the
 CCC, or while connected to the bulletin board system.  Just like First
 Class mail, e-mail messages are addressed to a specific person, and are
 confidential.
 39.     E-mail was sent and received in two manners on the CCC BBS.  E-mail
 exchanged between persons who had accounts on the CCC BBS was sent within
 the many conference areas on the BBS (see below).  If the sender designated
 a conference message "confidential," the message remained inaccessible to
 any user except the designated recipient.  The CCC BBS also provided an
 "Internet mail gateway."  This feature allowed subscribers to send and
 receive confidential electronic communications from persons who did not
 have an account on the CCC BBS, but who had an Internet address.  This
 Internet mail gateway allowed the users of the CCC BBS to send confidential
 electronic communications to, and receive them from, tens of millions of
 persons around the world.
 40.     This e-mail was not readily accessible to the public.  The users of
 the CCC BBS, and those who sent electronic mail to the CCC BBS from the
 Internet, had a reasonable expectation of privacy in those communications.
 41.     When Defendant Leis and the other Defendants seized the CCC BBS,
 they seized all of the private electronic communications contained on the
 system, and cut off the subscribers' ability to send and receive e-mail.
         ii.     Conference areas.
 42.     In addition to e-mail, the Cincinnati Computer Connection provided
 its subscribers access to thousands of "conferences."  These conferences,
 like the sections of a library, are the main organizational units of the
 BBS.  Each conference area had a name and a topic.  For example, the CCC
 BBS had conference areas dedicated to writers, game players, and computer
 professionals.  When a subscriber accessed the bulletin board system, he or
 she could "enter" an conference area.  Once in a conference area, the
 subscriber could read all the public messages posted by other visitors to
 the conference, post public reply messages or begin new public discussions
 on new topics.   The user could also send and receive private electronic
 communications within the conference.  The CCC BBS provided literally
 thousands of conferences for its users, including:
                 a.      Local conference areas.
 43.     These conferences were unique to the CCC BBS, and included
 discussions and debates on topics ranging from local and national politics
 to sports and computers.  These conferences were the heart of the local CCC
 community interaction.
                 b.      Private local conference areas.
 44.     The CCC BBS also provided conference areas that were restricted to
 particular users.  These restricted conference areas were used by
 subscribers for confidential business purposes, including exchanging
 confidential information.
                 c.      BBS network conferences.
 45.     On June 16, 1995, the CCC BBS also provided to its users "feeds"
 from networks of similar dial-up bulletin board systems.  These networks
 provided dozens of additional conference areas, and allowed the users of
 the CCC BBS to engage in discussion on topics with users of a whole network
 of BBSs beyond the subscribers to the CCC BBS.
                 d.      Usenet newsgroups.
 46.     The CCC BBS also received, via satellite feed, thousands of
 additional conferences from an Internet network known as Usenet.  Usenet is
 essentially a  bulletin board system for the Internet.  Usenet is organized
 into thousands of separate "newsgroups" where people from all around the
 world can engage in discussion and debate on a huge variety of topics,
 ranging from computer science, philosophy, and law to pop music.  The CCC
 subscribers could read and participate in these newsgroups.
 47.     When Defendant Leis and the other Defendants seized the CCC BBS,
 they seized all of the contents of all of these thousands of conference
 areas, and denied the subscribers to the CCC any access to the conferences.
         iii.    Live "chat."
 48.       The Cincinnati Computer Connection BBS also featured live chat
 "channels."  Similar to CB radio channels, the "chat" function allowed
 subscribers to converse in "real time" with other subscribers who were
 logged into the BBS.  One subscriber could invite another person to chat,
 and the two subscribers could exchange confidential messages by typing them
 in sequence to each other.
 49.     When Defendant Leis and the other Defendants seized the CCC BBS,
 they shut down any chat taking place on the board and seized any captured
 chat file sessions.
         iv.     Games.
 50.     The game areas on the CCC were very popular.  Subscribers could
 play a variety of on-line games against the computer or against other
 subscribers.   Some "games" were more like interactive creative writing,
 with different users of the BBS taking on personas and interacting with
 each other in a fictional world.
 51.     The Defendants' seizure of the bulletin board system of course
 included seizure of all the games, and cut off the subscribers' access to
 the games.
         v.      File transfer.
 52.     The CCC BBS offered its subscribers the ability to "upload"
 computer files from their home computer to the bulletin board system, and
 to "download" computer files from the bulletin board to their home
 computers.  Computer files can consist of anything from computer programs
 and other software, to the text of written material (such as this
 Complaint), to picture files and sound files.  The CCC BBS had an enormous
 library of computer files for its users to access and use.  The Defendants
 seized this entire library of thousands of computer files when they seized
 the 45 allegedly obscene images they were after.
         vi.     The restricted adult file area.
 53.     Among the thousands of conferences on the CCC, there was a single
 conference area dedicated to adult-oriented computer image files.  Access
 to this area was extremely limited.  In order to gain access to this
 conference, a subscriber was required to verify his age and identity in
 person to the CCC system operator, Mr. Emerson.  After verifying the
 subscriber's age, Emerson would configure that user's account to give that
 subscriber access to the adult file area.  Only after a subscriber's age
 and identity was verified, and the subscriber's account given access to the
 adult file area, would the existence of the adult file area even appear on
 the user's screen when logged in to the CCC.  The "menu" of choices
 available to a subscriber who had not been verified and given access would
 not even show that an adult file area existed.
 54.     Even for those with access to the restricted adult file area, the
 adult image files could not be viewed "on-line."  In order to view a file,
 a subscriber with access would have to log onto the BBS, enter the
 restricted adult area, designate a file for downloading, download that file
 to the user's home computer, log off the system, and then run a separate
 computer  program on the home computer that interprets the image and
 displays it on the user's home computer screen.
 55.     The restricted adult file area comprised a very small percentage of
 the material on the CCC BBS -- no more than 3%, and upon information and
 belief far less than that.  The number of users with access to this area
 was also very small -- no more than 3% of the subscribers, and upon
 information and belief far less than that.  Many, if not most, of the CCC
 subscribers had no idea that an adult file area even existed.
 56.     Compared to the Cincinnati Computer Connection as a whole, the
 adult file area was like a tiny, locked, and largely unknown private room
 within a huge, bustling convention center.
 C.      Defendants Obtain A Search Warrant And Go Trolling for Computer
 Porn.
 57.     On or about June 15, 1995, the Defendants applied to the Municipal
 Court of Clermont Count for a search warrant for the premises containing
 the CCC BBS computers.  Municipal Court Judge James A. Shriver signed the
 search warrant at 11:30 p.m. that evening.  Upon information and belief,
 Judge Shriver had never reviewed an application for the search or for the
 seizure of an electronic communication system such as the CCC BBS, and had
 never issued a search warrant for such a system.  The search warrant itself
 listed 45 particular image files, by name and description, that were the
 target of the search.
 58.     The Defendants obtained an order sealing from public scrutiny the
 search warrant affidavit that allegedly justified their application for the
 search warrant.    Plaintiffs have not obtained a copy of the affidavit or
 affidavits that allegedly supported the search warrant.  However, upon
 information and belief, Plaintiffs allege that the Defendants failed to
 inform Judge Shriver of the following material facts:  (1) that the CCC BBS
 was a forum for protected speech, publication and association, and that the
 Defendants intended to shut down that forum and seize all the publications
 contained on that forum; (2) that the CCC BBS contained thousands of
 private electronic communications to and from the subscribers of the CCC
 BBS, and that the Defendants intended to shut down that communication
 system, and seize, intercept and read these private communications; (3)
 that the electronic communications Defendants sought were protected by
 federal and state law from interception, seizure and disclosure; and (4)
 that the Defendants had no probable cause to believe that these private
 communications of the thousands of subscribers to the CCC BBS were relevant
 to any investigation of any alleged criminal activity.
 D.      Defendants Shut Down the Cincinnati Computer Connection BBS and
 Indiscriminately Seize Everything On It.
 59.     On June 16, 1995, purportedly acting under the authority of the
 search warrant signed by Judge Shriver, the Defendants seized the entire
 CCC BBS.  The Defendants made no effort to limit their seizure to materials
 or information related to the alleged offense under investigation; rather,
 they seized the entire system, shutting it down completely.  If not for a
 significant personal financial commitment by Mr. Emerson after the raid,
 the CCC BBS would have been permanently shut down.
 60.     As of the date of this filing, the Defendants have made no effort
 to return to the Plaintiffs or any other user of the CCC BBS their private
 electronic communications, or to assure that such communications reach
 their intended recipients.  Upon information and belief, the Defendants
 have already, or have every intention to, read the private electronic
 communications of the CCC BBS subscribers.
 61.     The Defendants made no effort to limit the scope of their seizure.
 Prior to the raid, the Defendants knew the exact file names of the computer
 image files they were searching for.  In fact, the Defendants had already
 obtained those files prior to the raid.  The Defendants consciously chose
 not to use means at their disposal that would have allowed for a limited
 search and seizure of evidence relevant to the alleged offense.  The
 Defendants consciously refused to use narrower means of obtaining their
 investigative objectives that would have protected the privacy of the
 subscribers' communications and the integrity of their forum.
 62.     The Defendants knew, or should have known, that the CCC BBS was a
 forum for protected speech, publication and communication.  The Defendants
 knew, or should have known, that the CCC BBS contained materials being
 published electronically that were protected by the First Amendment to the
 U.S. Constitution and the Ohio Constitution.  The Defendants knew, or
 should have known, that the  BBS contained the private electronic
 communications of its users, and that such communications were not readily
 accessible to the public.  The Defendants knew, or should have known, that
 the users of the CCC BBS had a reasonable expectation of privacy in their
 electronic communications.
 63.     Reasonable law enforcement officers in the position of the
 Defendants, with the information available to the Defendants, would have
 known that the CCC BBS was a forum for speech, publication and
 communication protected by the First Amendment and the Ohio Constitution,
 and that the electronic communications on the CCC BBS were protected by the
 Fourth Amendment, the Ohio Constitution and federal statutory law from
 search and seizure and interception unless the officers had probable cause
 to believe that those communications were relevant to the law enforcement
 inquiry.

 V.      FIRST CLAIM -   FIRST AMENDMENT
 (FREEDOM OF SPEECH, PRESS, AND ASSOCIATION)

 64.     The allegations in paragraphs 1-63 are incorporated herein by
 reference.
 65.     At all relevant times, the Cincinnati Computer Connection BBS
 published, in electronic form, magazines, periodicals, non-fiction,
 fiction, images and other materials protected by the First Amendment.
 66.     The Cincinnati Computer Connection BBS was a forum for speech,
 publication and association protected by the First and Fourteenth
 Amendments.
 67.     The Plaintiffs and the class members at all relevant times used the
 Cincinnati Computer Connection BBS to exercise their constitutional rights
 to speak, publish and associate.
 68.     The Defendants' search, seizure, and retention of the Cincinnati
 Computer Connection BBS, and the materials contained on the BBS, violated
 the Plaintiffs' and class members' clearly established constitutional
 rights to speak, publish and associate.
 69.     The Defendants' seizure and retention of computer hardware and
 software used by Cincinnati Computer Connection BBS constituted a prior
 restraint on the Plaintiffs' constitutional rights of freedom of speech, of
 the press, and of association.
 70.     Defendants knew or reasonably should have known that their conduct
 violated the Plaintiffs' and the class members' clearly established First
 Amendment rights of freedom of speech, freedom of the press, and freedom of
 association.
 71.     Defendants acted with intent to violate, or with reckless
 indifference to, the Plaintiffs and class members' clearly established
 First Amendment rights to freedom of speech, freedom of the press, and
 freedom of association.
 72.     At all relevant times, Defendants were acting under color of state
 law.
 73.     The Defendants' actions have caused the Plaintiffs and class
 members a real and palpable fear that their future electronic
 communications will be seized and reviewed by law enforcement agents,
 without justification or excuse.  As a result, the Plaintiffs and class
 members have suffered a distinct and actual diminution of their willingness
 to speak, publish and associate freely and openly without fear of
 government intrusion and reprisal.
 74.     As a direct result of Defendants' conduct, the Plaintiffs and class
 members have suffered a distinct and actual restriction on their freedom of
 speech, press and association.
 75.     As a direct result of the Defendants' conduct, the Plaintiffs have
 suffered actual damages, attorneys' fees, and costs.

 VI.     SECOND CLAIM - OHIO CONSTITUTION ARTICLE I, SECTION 11
 (FREEDOM TO SPEAK, WRITE, PUBLISH, AND ASSOCIATE)
 76.     The allegations in paragraphs 1-75 are incorporated herein by
 reference.
 77.     In the same manner that the Defendants' actions violated the
 Plaintiffs and the class members' rights under the First Amendment, the
 Defendants' acts violated the Plaintiffs' and class members' clearly
 established right to speak, write, publish, and associate guaranteed by
 Article I, Section 11 of the Constitution of the State of Ohio.
 78.     The Defendants' actions have caused the Plaintiffs and class
 members a real and palpable fear that their future electronic
 communications and publications will be seized and reviewed by law
 enforcement agents, without justification or excuse.  As a result, the
 Plaintiffs and class members have suffered a distinct and actual diminution
 of their willingness to speak, publish and associate freely and openly
 without fear of government intrusion and reprisal.
 79.     As a direct result of Defendants' conduct, the Plaintiffs and class
 members have suffered a distinct and actual restriction on their freedom of
 speech, press and association.
 80.     As a direct result of the Defendants' conduct, the Plaintiffs have
 suffered actual damages, attorneys' fees, and costs.

 VII.  THIRD CLAIM - FOURTH AMENDMENT
 (FREEDOM FROM UNREASONABLE SEARCHES AND SEIZURES)
 81.     The allegations in paragraphs 1-80 are incorporated herein by
 reference.
 82.     The Plaintiffs and class members had a reasonable expectation of
 privacy in their private electronic communications and subscriber records
 resident on the Cincinnati Computer Connection BBS.
 83.     The Defendants' actions violated the Plaintiffs' and class members'
 clearly established right to be free from unreasonable searches and
 seizures as guaranteed by the Fourth Amendment and Fourteenth Amendments to
 the United States Constitution and 42 U.S.C. 1983.
 84.     The search and seizure at the location of the Cincinnati Computer
 Connection BBS was a illegal and unwarranted general search.
 85.     The search and seizure of the Cincinnati Computer Connection BBS
 was not authorized by a valid warrant particularly describing the place to
 be searched and the things to be seized.
 86.     The search warrant did not authorize the seizure of the Cincinnati
 Computer Connection BBS or any of its contents, including the Plaintiffs'
 and class members' private electronic communications and subscriber
 records.
 87.     The search warrant failed to establish probable cause to believe
 that any of the Plaintiffs' or the class members' private electronic
 communications was relevant to a legitimate law enforcement inquiry.
 88.     The search warrant failed to establish probable cause to believe
 that the Plaintiffs' and class members' private electronic communications
 contained evidence of the offense listed in the search warrant, or any
 offense, for that matter.
 89.     The Defendants knew, or reasonably should have known, that their
 conduct violated the Plaintiffs' and class members' clearly established
 constitutional right to be free from unreasonable searches and seizures.
 90.     The Defendants acted with intent to violate, or with reckless
 indifference to, the Plaintiffs' and class members' clearly established
 Fourth Amendment rights.
 91.     At all times relevant herein, Defendants were acting under color of
 state law.
 92.     As a direct result of the Defendants' conduct, the Plaintiffs have
 suffered actual damages, attorneys' fees, and costs.

 VIII.   FOURTH CLAIM - OHIO CONSTITUTION ARTICLE I, SECTION 11
 (FREEDOM FROM UNREASONABLE SEARCHES AND SEIZURES)
 93.     The allegations in paragraphs 1-92 are incorporated herein by
 reference.
 94.     In the same manner that the Defendants' actions violated the
 Plaintiffs and the class members' rights under the Fourth Amendment, the
 Defendants' acts violated the Plaintiffs' and class members' clearly
 established right to be free from unreasonable searches and seizures
 guaranteed by Article I, Section 11 of the Constitution of the State of
 Ohio.
 95.     As a direct result of the Defendants' conduct, the Plaintiffs have
 suffered actual damages, attorneys' fees, and costs.

 IX.     FIFTH CLAIM - ELECTRONIC COMMUNICATIONS PRIVACY ACT
 (UNLAWFUL SEIZURE OF STORED COMMUNICATIONS,18 U.S.C. 2703 (a) & (b))
 96.     The allegations in paragraphs 1-95 are incorporated herein by
 reference.
 97.     At all relevant times, Mr. Emerson and the Cincinnati Computer
 Connection were the providers of an electronic communication service within
 the meaning of 18 U.S.C. 2510(15) and 2707.
 98.     At all relevant times, Mr. Emerson and the Cincinnati Computer
 Connection were the providers of a remote computing service within the
 meaning of 18 U.S.C. 2711(2).
 99.     At all relevant times, Plaintiffs and the class members were
 subscribers to, users of, or customers of the electronic communication
 service and remote computing service provided by Mr. Emerson and the
 Cincinnati Computer Connection, within the meaning of 18 U.S.C. 2510
 and 2707.
 100.    At all relevant times, Plaintiffs and some or all of the class
 members had electronic communications in electronic storage on the
 Cincinnati Computer Connection that were not accessible to the general
 public.
 101.    Upon information and belief, when Defendants applied for a warrant
 to search and seize the computer operating the Cincinnati Computer
 Connection BBS and all data stored thereon, they failed to inform the
 issuing Judge that the computer contained stored electronic communications
 that were not accessible to the general public and that were protected by
 18 U.S.C. 2501, et seq. and 18 U.S.C. 2701, et seq.
 102.    The search warrant obtained by Defendants failed to state or be
 supported by any probable cause to believe that the Plaintiffs or class
 members' private electronic communications constituted evidence of any
 offense named in the warrant, or any criminal offense whatsoever.
 103.    The search warrant obtained by Defendants failed to state, or be
 supported by, reason to believe that the Plaintiffs or class members'
 private electronic communications were relevant to a legitimate law
 enforcement inquiry, in violation of 18 U.S.C. 2703(d).
 104.    Defendants, acting without a valid warrant, and without a court
 order, subpoena or consent of the Plaintiffs or class members, and without
 providing prior notice of their intentions, required Mr. Emerson and the
 Cincinnati Computer Connection to disclose the contents of electronic
 communications that were not accessible to the general public, in violation
 of 18 U.S.C. 2703(a) & (b).
 105.    At all times relevant herein, Defendants were acting under color of
 state law.
 106.    At all times relevant herein, Defendants acted knowingly and
 intentionally.
 107.    At all times relevant herein, Defendants did not act in good faith.
 108.    As a direct result of the Defendants' conduct, the Plaintiffs have
 suffered actual damages, attorneys' fees, and costs.

 X.      SIXTH CLAIM - ELECTRONIC COMMUNICATIONS PRIVACY ACT
 (UNLAWFUL SEIZURE OF SUBSCRIBER RECORDS, 18 U.S.C. 2703)
 109.    The allegations in paragraphs 1-108 are incorporated herein by
 reference.
 110.    At all relevant times, Mr. Emerson and the Cincinnati Computer
 Connection had in electronic and hard-copy storage records and other
 information pertaining to the Plaintiffs and the class members, within the
 meaning of 18 U.S.C. 2703(c).
 111.    The search warrant obtained by Defendants failed to state or be
 supported by any probable cause to believe that the Plaintiffs or class
 members'  subscriber records constituted evidence of any offense named in
 the warrant, or any criminal offense whatsoever.
 112.    The search warrant obtained by Defendants failed to state, or be
 supported by, reason to believe that the Plaintiffs or class members'
 subscription records were relevant to a legitimate law enforcement inquiry,
 in violation of 18 U.S.C. 2703(d).
 113.    Defendants, acting without a valid warrant, and without a subpoena,
 court order or consent of the subscribers or customers, required Mr.
 Emerson and the Cincinnati Computer Connection to disclose subscriber
 records and information to the government, in violation of 18 U.S.C.
 2703(c).
 114.    At all times relevant herein, Defendants were acting under color of
 state law.
 115.    At all times relevant herein, Defendants acted knowingly and
 intentionally.
 116.    At all times relevant herein, Defendants did not act in good faith.
 117.    As a direct result of the Defendants' conduct, the Plaintiffs have
 suffered actual damages, attorneys' fees, and costs.



 XI.     SEVENTH CLAIM - ELECTRONIC COMMUNICATIONS PRIVACY ACT
 (UNLAWFUL INTERCEPTION OF ELECTRONIC COMMUNICATIONS, U.S.C. 2511 et seq.)
 118.    The allegations in paragraphs 1-117 are incorporated herein by
 reference.
 119.    At all relevant times, Plaintiffs and/or some or all of the class
 members had electronic communications in transit on the Cincinnati Computer
 Connection that were not accessible to the general public.  Such
 communications had been written, addressed, and sent, but not yet received
 and read by the addressees.
 120.    Defendants intercepted, disclosed, or intentionally used such
 electronic communications, without the consent of the Plaintiffs or the
 class members, in violation of 18 U.S.C. 2510 et seq. and 2520.
 121.    Defendants intentionally intercepted, endeavored to intercept, or
 procured others to intercept or endeavor to intercept, the Plaintiffs'
 and/or class members' electronic communications, without the consent of the
 Plaintiffs or the class members, in violation of 18 U.S.C. 2511(1)(a).
 122.    The warrant application was not authorized by the appropriate
 federal or state law enforcement officials as required by 18 U.S.C. 2516.
 123.    The Defendants did not comply with the standards and procedures
 prescribed in 18 U.S.C. 2518, or any procedures provided under state law
 for the interception of electronic communications.
 124.    At all times relevant herein, Defendants were acting under color of
 state law.
 125.    At all times relevant herein, Defendants acted knowingly and
 intentionally.
 126.    At all times relevant herein, Defendants did not act in good faith.
 127.    As a direct result of the Defendants' conduct, the Plaintiffs have
 suffered actual damages, attorneys' fees, and costs.

 XII.    EIGHTH CLAIM - COMMON LAW INVASION OF PRIVACY
 128.    The allegations in paragraphs 1-127 are incorporated herein by
 reference.
 129.    The Defendants intercepted and seized, without legal justification
 or right, the Plaintiffs' private electronic communications.  Upon
 information and belief, the Defendants reviewed and read some or all of
 these private communications.  The Defendants have failed and refused to
 return any such private communications, and have failed to provide for the
 delivery to the intended recipients of the electronic communications they
 unlawfully seized.
 130.    The Defendants' acts constitute an invasion of the Plaintiffs' and
 class members' privacy by intruding upon their seclusion.
 131.    At all times relevant herein, Defendants were acting under color of
 state law.
 132.    At all times relevant herein, Defendants acted knowingly and
 intentionally.
 133.    At all times relevant herein, Defendants did not act in good faith.
 134.    As a direct result of Defendants' conduct, Plaintiffs and the class
 members suffered damages, attorneys' fees and costs.


 XIII.   DAMAGES
 135.    The allegations in paragraphs 1-134 are incorporated herein by
 reference.
 136.    On account of the Defendants' actions and violations of their
 rights as set forth above, the Plaintiffs and class members have suffered
 actual damages and incurred attorney's fees and costs.
 137.    Plaintiffs are entitled to recover their damages, attorney's fees
 and costs, liquidated damages as provided by statute, and punitive damages.

 XIV.  PRAYER FOR RELIEF

 WHEREFORE Plaintiffs request that this Court:
 A.      Assume jurisdiction of this action;
 B.      Certify this lawsuit as a class action on behalf of the class as
 defined above;
 C.      Declare that Defendants' actions violate the Constitution and Laws
 of the United States and the Constitution and Laws of the State of Ohio;
 D.      Enter judgment against the Defendants and in favor of the
 Plaintiffs and class members;
 E.      Enter an injunction ordering the Defendants to return all
 electronic communications and subscriber records seized from the premises
 of the Cincinnati Computer Connection, all copies and print-outs of such
 data, and all computer files necessary to read and interpret such records;
 46.      Award the Plaintiffs and the class members their actual, liquidated
 and punitive damages;
 G.      Award the Plaintiffs and each class member $1,000 statutory damages
 per violation of their rights guaranteed under 18 U.S.C. 2703, et seq., or
 their actual damages, whichever is greater, as provided in 18 U.S.C.
 2707(c);
 H.      Award the Plaintiffs and each class member $10,000 statutory
 damages per violation of their rights guaranteed under 18 U.S.C. 2511, et
 seq., or their actual damages, whichever is greater, as provided in 18
 U.S.C. 2520(c)(2)(B), plus punitive damages, as provided in 18 U.S.C.
 2520(b)(2);
 I.      Award Plaintiffs all costs incurred in the prosecution of this
 action, including reasonable attorney's fees under 42 U.S.C. 1988 and
 other statutes; and
 J.      Enter such other and further relief as the Court deems just and
 proper.





 Scott T. Greenwood (0042558)            Peter D. Kennedy
 Trial Attorney for Plaintiffs           (Texas Bar No. 11296650)
 2301 Carew Tower                                Attorney for Plaintiffs
 441 Vine Street                         114 W. 7th Street, Suite 1000
 Cincinnati, Ohio  45202                 Austin, Texas  78701
 (513) 684-0101                          (512) 495-1400
 (513) 684-0077 fax                              (512) 499-0094 fax
 Internet:  stgrnwd@iac.net              Internet:  pkennedy@io.com

 Of Counsel:

 GREENWOOD & ASSOCIATES
 2301 Carew Tower
 441 Vine Street
 Cincinnati, Ohio  45202
 (513) 684-0101

 George, Donaldson & Ford
 1000 Norwood Tower
 114 W. 7th Street
 Austin, Texas  78701
 (512) 495-1400


 DEMAND FOR TRIAL BY JURY
 Pursuant to Rule 38(b) of the Federal Rules of Civil Procedure, Plaintiffs,
 individually and on behalf of a class of others similarly situated, hereby
 demand a jury trial on all issues so triable.




 Scott T. Greenwood (0042558)
 Trial Attorney for Plaintiffs


 Scott T. Greenwood                        Attorney
 stgrnwd@iac.net                           Greenwood & Associates
 (513) 684-0101 (voice)                    2301 Carew Tower, 441 Vine Street
 (513) 684-0077 (fax)                      Cincinnati, Ohio  45202

------------------------------

Date: Sun, 19 Apr 1995 22:51:01 CDT
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 3--Cu Digest Header Info (unchanged since 19 Apr, 1995)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message:  SUB CUDIGEST  your name
Send it to  LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB CUDIGEST
Send it to  LISTSERV@VMD.CSO.UIUC.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE:  In BELGIUM: Virtual Access BBS:  +32-69-844-019 (ringdown)
         Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
         In ITALY: Bits against the Empire BBS:  +39-464-435189
         In LUXEMBOURG: ComNet BBS:  +352-466893

  UNITED STATES:  etext.archive.umich.edu (192.131.22.8)  in /pub/CuD/
                  ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                  aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                  world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                  wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
  EUROPE:         nic.funet.fi in pub/doc/cud/ (Finland)
                  ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

  JAPAN:          ftp://www.rcac.tdi.co.jp/pub/mirror/CuD

The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
  URL: http://www.soci.niu.edu:80/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

------------------------------

End of Computer Underground Digest #7.66
************************************