Copy Link
Add to Bookmark
Report
The WorldView Volume 01 Issue 01
Weltanschauung Magazine (The WorldView)
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
% %
% Editor: The Desert Fox D E R %
% Co-Editor: Rev. Scott Free %
% %
% W E L T A N S C H A U U N G %
% %
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
April 4, 1991 Vol. 1, Issue 1.
(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)
Material Written By Computer And Telecommunications Hobbyists World Wide
Promoting the publication of Features, Editorials, and Anything Else....
To submit material, or to subscribe to the magazine in hardcopy, send a
SASE to: WorldView
11504 Hughes #124 ø Weltanschauu¤g Distribution Site:
Houston, Texas U.S.A. 77089 Rivendell BBS
******************************************* (713)333-XXXX
* Please submit articles and comments to: * 3/12/2400 Bps
* INTERNET - Fox@nuchat.sccsi.com * (The New BBS will be
******************************************* up May 1, 1991)
If Possible...Otherwise, Mail Or Call!
******************************************************************
*IN THE NEXT ISSUE *** Unix features, More On Robert Morris, Info*
*On The New Rivendell BBS Including The New Phone Number, An *
*Editorial By The Reverand Scott Free, Plus Much More... *
******************************************************************
Table Of Contents:
I. The Shockwave Rider: A mini-biography on Robert T. Morris,
the creator of the Internet Worm.
II. Wordless: An editorial by Homer Mandril
III. The State Of National Security: An editorial by The
Desert Fox and Lord Macduff
IV. The complete explination of BEER*NET
V. Torts: Some handy information on laws governing the world of
communications, by James J. Spinelli
VI. HR 4070 [The story behind Homer Mandrill's Editorial]
VII. Editor's Comments
Title: The Shockwave Rider. (background on Robert T. Morris Jr., author
of the Internet 'worm')
Author: Unknown
Summary: A profile of Robert T. Morris Jr, author of the 'worm' program
which caused major system crashes on the Internet network in Nov 1988, is
presented. Morris is the son of Robert Tappan Morris Sr, the chief computer
scientist of the National Security Agency's Computer Security center and a
master cryptographer. Morris junior ('RTM') identified with the protagonist
of John Brunner's science fiction novel 'The Shockwave Rider,' a social rebel
who outsmarts computer security measures and is forced to make a
controversial decision. Some hackers view RTM as a 'freedom fighter,' but
some say he is placing freedom of information at risk. The younger Morris was
known for computer pranks while an undergraduate at Harvard and worked on
graphics problems as a Cornell University graduate student. He was allegedly
bored and created the Internet worm as an experiment; it was designed to
replicate itself throughout the umbrella Internet network and exploited
well-known bugs in the Unix operating system. It struck academic, military
and commercial scientific research sites, consuming memory and causing
machines to grind to a halt. Many computer security experts argue that RTM
should not be punished, but many worry about the social implications of
computer security: more and more systems will require cumbersome 'locks'
which will make it difficult for legitimate users to access information.
The Shockwave Rider "ONCE YOU RELEASED this worm, did you have any ability to
control it?" the defense attorney asked the defendant.
"No. Once I released it, I had essentially no contact with it at all. I
couldn't control it," said the young man, facing the jury in the Syracuse,
New York, courtroom. "After it started, it was pretty much doing its own
thing."
Robert Tappan Morris, the creator of the Internet computer worm, patiently
told the courtroom packed with TV and newspaper reporters how his secret
experiment had gone terribly awry.
In the front row of the courtroom sat a slender man holding a copy of Livy's
History of Rome. The man's suit was worn, his shoes untied, his gray beard
unkempt. But he just happened to be an internationally known computer
security expert, master cryptographer, and the National Security Agency's top
computer scientist. His name: Robert Morris, Sr.
"It was a mistake, and I am sorry for it," said the younger Morris, his
large, watery eyes focused on the jury. Minutes later, at the lunch break,
the prosecutor walked past the defendant, and the young hacker couldn't
suppress a smile. His soft, pale checks seemed to rise into a smirk. Was he
giggling?
"The work of a bored graduate student," was Morris senior's explanation to
The New York Times after his son released the most virulent worm the world
had ever seen. Indeed, the younger Morris did seem bored at Cornell, where
he was only a few weeks into his graduate studies. Two weeks before the
worm's release, Peter McIlroy, a childhood friend, had visited Morris. "He
liked some classes and not others," McIlroy remembers. "Some he seemed to be
blowing off."
But Morris seemed to be getting along in Ithaca. He had taken to
rock-climbing and was playing intramural hockey. "There was no inkling he
was about to write a computer worm," recalls his friend. Except, perhaps,
for one clue. McIlroy, also a techie, had casually mentioned to his friend
that he believed the Unix operating system was pretty secure.
"No! It's unbelievably insecure!" Morris snapped. "It's unbelievable how
many holes there are!"
McIlroy was caught off-guard by Morris's fervor. "It bothered and surprised
him that the holes would never get fixed."
Was it as simple as that? Bored by his courses, had the son of the nation's
leading computer security expert taken things into his own hands? Had the
"attack" merely been a well-intended but bungled attempt to shore up computer
security and teach the world a valuable, relatively safe lesson?
Theories on the worm and its author's motivations consume several chapters of
popular books and countless articles. Some have hypothesized that the worm
was a high-tech, father-son spat played out on a global scale, while one book
blithely concluded that father and son had jointly launched the attack under
the auspices of the National Security Agency.
Hackers saw a broader political motivation. The trial of Robert Morris
became the trial of an entire generation and philosophy of computers and
information. To many hackers, Morris became a freedom fighter, a symbol of
electronic free speech, a voice against the power that centralized computers
wield over individuals.
But more than a few hackers wondered if the coup was misguided, if Morris was
not placing at risk the very freedom of information that his supporters
angrily demanded.
At the center of the debate stood two elite hackers, the very sort of wizards
we have come to expect to guard us against computer saboteurs. But that was
before Morris stepped over the line and plunged into a digital no-man's land.
Under provisions of the untested 1986 Computer Fraud and Abuse Act, Robert
Tappan Morris, Jr., was indicted for trespass. His offense? Unauthorized
computer access.
THE STORY OF ROBERT TAPPAN MORRIS begins with his father and the hauntingly
powerful electronic world he helped to create. In the early 1970s, when Bell
Laboratories began designing the universal operating system called Unix, it
was Morris senior who imbued the virgin software with security.
"The scheme for encrypting passwords was very heavily influenced by him, the
interest in low-grade cryptography--the things we think of as absolutely
routine," says Douglas McIlroy, Peter's father and one of the designers of
Unix at Bell Labs' Murray Hill, New Jersey, facility. The elder Morris
helped bar snoopers by making it difficult for anyone to become a "super
user"--a person with the power to use or abuse a system.
"There was this constant game of trying to figure out how to circumvent the
best security measures we had," McIlroy recalls. "You had to be able to
out-think the most devious minds."
That was the dilemma Morris senior faced: to protect, he had to know how to
destroy.
Morris senior often seemed locked in an elusive battle with the equally
brilliant and eccentric Ken Thompson, a legend in the computer industry and
widely respected as one of the inventors of Unix. "Each would try to outdo
the other in a friendly, but mean-spirited, way," McIlroy says.
Morris thrived in the daily skirmishes. One of the cryptic scientist's most
revealing feats occurred during tests on the first working copy of the Multix
operating system. He walked into the laboratory and typed two
characters--two specific characters he had a hunch the system could not
compute. The machine crashed. "It was dramatic," says McIlroy. "He always
liked to put on an air of mystery."
First Bell and then other companies invited Morris to break into their
computer centers to test their defenses. Hired by one defense contractor to
discover its computer system's Achilles' heel, Morris dressed himself as a
security guard, walked in, and watched someone type a password. While this
tactic was an exception (Morris usually broke systems with his encyclopedic
knowledge of encryption, cryptography, and computer security), it
demonstrated his dramatic side. "Bob had a certain amount of flair," recalls
McIlroy. "He definitely enjoyed his prowess."
By the 1980s, the chain-smoking, shabbily dressed scientist had developed
into a master cryptographer and a world expert in protecting electronic
information. He designed a Navy computer that tracked enemy submarines by
spotting anomalies in the masses of data gleaned by ocean sensors. At the
time it was the world's largest computer.
Morris senior's stage broadened in 1986, when he became the chief scientist
at the National Computer Security Center of the National Security Agency and
assumed responsibility for protecting sensitive computer-based data
worldwide. Friends reported that he dove into the mysterious intelligence
underworld with a passion. His office was outfitted with a "Tempest"
computer, encased in lead to prevent the interception of radio emissions, and
visitors say his blackboard was covered with Russian words.
Years later, in the tumultuous days following the Internet attack, Morris
senior's sense of mystery and drama had not waned. Newspaper and TV
reporters camped in front of his new home in Arnold, Maryland. Inside, his
son was quiet, talking little even to his Harvard buddies who had driven
through the night to support their friend.
It was his father who spoke to the press, telling The New York Times, "I know
a few dozen people in the country who could have [created the worm]. I could
have done it, but I'm a darned good programmer." Perhaps it was not
surprising that after the press left, Morris senior placed the puzzling deed
in historical focus. "Let's find out where this all started," he said to his
son's friends, pulling down a book by John Brunner titled The Shockwave
Rider.
In a scholarly tone, Morris senior explained that the 1976 science fiction
classic, one of his son's favorites, popularized the idea of computer worms.
What he didn't explain was that the book's protagonis was remarkably similar
to himself. And to his son. Like both Morrises, the Shockwave Rider
outsmarted computer security measures with the cunning of a secret agent and,
like Robert Morris, Jr., the Shockwave Rider was forced by his genius to make
a difficult, controversial decision. Having spent his youth expanding his
computer powers, the Shockwave Rider pondered the true test of wisdom:
"What a wise man can do, that can't be done by someone who's merely clever,
is make a right judgment in an unprecedented situation."
YOUNG MORRIS MAY HAVE BEEN CHARGED with the crime of the future, but he grew
up in a world closer to the last century than the next. The Morris family
lived in a 250-year-old farmhouse on nine rambling acres of spruce, pine, and
swamp alongside the Passaic River near the quaint town of Millington, New
Jersey. The children cared for the farm animals and Robert tended the
family's sheep.
"They wanted to keep the old ways," recalls the current owner of the house.
"They lived very simply. They didn't have material things." The family grew
vegetables in a 50-by-100-foot garden, and if they needed something more than
the earth and animals could supply, Morris senior would bring home a cast-off
to salvage, like the giant-size freezer he repaired to store their freshly
slaughtered meat. The family cut firewood for themselves and in winter
dragged it by sleds over the ice-bound river.
There was something untamed about the Morris clan. "I don't think the
Morrises even knew how many cats they had," recalls a friend, who says 20 or
more cats roamed the property while three or four big furry black dogs ruled
the hearth.
Inside the old farmhouse, unnecessary elements were eliminated. A mantle
considered "too ornamental" was hacked out, a closet was torn out to squeeze
in yet another bookcase, and a bathroom was ripped out to create another
bedroom. The ceiling sagged and the plaster was cracked, but the
"unbelievable mess," as a friend calls it, held an unusual collection of
quirky wartime coding devices, including the mysterious Nazi Enigma machine.
Named from the Greek word for puzzle, the Enigma was a mesh of gears and
rotors that controlled an electronic drum rimmed by the letters of the
alphabet and fed by a typewriter. Considered a foolproof scrambler, the
battery-powered Enigma served as the Third Reich's top coder in World War II.
But in 1939, an elite British team of cryptanalysts and mathematicians
cracked the coder and gained a tremendous edge over Hitler's forces
throughout the war. With the Enigma's secrets unlocked, the Allied
commanders could read the Fuhrer's orders often before his own generals
received them.
Almost everything at the Morris house had a story behind it, no matter how
obscure it might appear. The house was overflowing with puzzle sculpture
pieces, magazines, and more books than you'd find in most small libraries.
And not just any books. Morris senior had been a brilliant mathematician at
Harvard, but he also loved the classics and learned to read Greek and Latin.
His wife, Anne Morris, counted the vast family collection one day and, after
tossing out duplicates, logged 7,000 volumes.
Morris junior began reading at the age of four. The curious toddler created
working scale models out of paper, file folders, and paper clips--cars with
wheels that turned when you moved the steering wheel and revolvers with
bullets and chambers that turned. At nine he read stacks of Scientific
American. His father had a ham radio license, and before long the boy began
assembling and disassembling radios and a variety of other electronic
equipment. By the time he reached his early teens, his reading list had
expanded to include the classics, history, economics, political science, and
science fiction.
But downstairs, in the old kitchen, in front of an unused Dutch oven, was a
machine like no other. From a distance, it looked like a huge mechanical
typewriter stretched over a desk, but what were those protruding rods and
cables? The strange-looking device, which had been in the house since the
mid-1960s, when Morris junior was born, was a computer terminal.
As a top scientist at Bell Labs, Morris senior was one of a few employees
with a home computer terminal during an era when electric typewriters were
still rare. "Everybody lined up behind one another to get their computer
time," recalls Anne Morris of the Digital Equipment terminal. But her
children were not all alike. Soon her daughter lost interest, and the
younger boy rebelled. (He now works as a tree surgeon.)
Only Robert, the older boy, remained captivated by the clanking, screenless
terminal. Each time he struck a key on the machine, mechanical rods shifted
like the trackers of a pipe organ, forming the eight bits that made their way
over the terminal's modem to Bell's central computer. Frequent lubrication
was needed to keep the machine's rods from sticking, and after a long
session, Robert would often emerge with oily knees.
When Peter McIlroy visited the Morris farmhouse, he noticed his friend wasn't
merely playing the computer's math and guessing games. "By the sixth grade,
he was finding holes [in the operating system]," recalls McIlroy. "But he
wasn't a snoop. It was much more of an intellectual game."
Not yet in his teens, Morris junior already knew his way around the huge,
complex Unix operating system. He created multiuser games to chat with his
friends simultaneously and a surprisingly sophisticated Unix interface shell.
The Unix code was online, and nearly every day after school Robert studied it
the way other boys studied girls. His girlfriend, the daughter of another
Bell employee, was online, and the budding hacker zapped love notes to her.
By his mid-teens, the young Morris showed Peter McIlroy how, by logging on to
one terminal, he could masquerade as a legitimate user on any computer in
Bell's network. "He found it, played with it, and fixed it," says McIlroy.
"I think they [Bell officials] were impressed." Bell officials say that
while Morris did modify some files, no serious damage was done. "He was told
to stop and that was that," says Bell's Fred Grampp.
But Morris was allowed to visit his father's office and continue his poking,
and in December 1982, Grampp invited him to give a talk about tightening
security on a Unix communications program. Soon Morris was working part-time
at the lab after school and full-time for the next two summers, writing his
first scientific paper, "A Security Flaw in Berkeley . . . Unix," in January
1983.
His initiation into the rites of super-hacking couldn't have been more pure.
In the elite, challenging research environment of Bell Labs, the teenager
learned "to spot and repair security holes" at the feet of the very people
who had created Unix.
But Morris was far from a one-dimensional, stereotypical hacker. At nearby
Delbarton, a preparatory school run by Benedictine monks, he excelled in a
broad range of courses, swam the breaststroke on the school swim team, sang
with the abbey's chorus, and was, according to the Delbarton credo,
"encouraged to become an independent seeker of information and take
responsibility for gaining both knowledge and judgment."
Yet years later, his parents proudly announced that it was he who was
featured in a 1982 Smithsonian magazine article as a "quiet, polite young
man" who "has broken into password files" and read "supposedly private"
computer mail. "I never told myself that there was nothing wrong with what I
was doing," the boy was quoted as saying, adding that he was driven by the
challenge of testing computer security. It was a family preoccupation that
Morris shared with his fictional double, the shockwave Rider:
"I guess my daddy was a 'phone phreak' and I inherited the gene."
The following year, Morris senior wrote in his 25th anniversary Harvard
report: "I promised myself that I would learn to read Greek, learn in some
detail how the planets move in their orbits, and learn how to decipher secret
codes. I have gone a long way toward keeping all three promises." But it
was secret codes--not Greek or the heavens--that captivated his teenage son,
and he was soon fast at work on his first paid computer security project at
Bell.
The security crusade didn't end at the laboratory. At the farmhouse, father
and son often discussed Unix and computer security. "I'm very sure he got
hints from his father," says Douglas McUlroy, "but I doubt he got much
detailed help. I think his father wanted to generate self-reliance." The
young Morris told a friend that his father created games to develop his
programming skills, once even making him program without GOTO
commands--something like playing basketball with only your left hand. "His
father was always challenging him," recalls Roy Horton, Morris junior's music
teacher and a close family friend. "They were of similar minds."
The next year Morris senior and Grampp wrote and, with some trepidation,
published the definitive paper on Unix security. In the footnotes was a
reference to Morris junior's paper, and in the introduction, a warning:
"There is a fine line between helping administrators protect their systems
and providing a cookbook for bad guys."
Morris junior seemed to understand the dangers. In his second published
scientific paper, he sounded every bit the seasoned computer security expert.
"The old uucp [Unix to Unix copy procedure] was designed on small machines
with light traffic and little concern for security," wrote the confident
18-year-old. "Times have changed. With many hundreds of machines running
uucp, one cannot assume that no uucp requests will be malicious."
"AREN'T YOU THIS FAMOUS, GREAT HACKER?" asked an impressionable fellow
Harvard student. "No," said Morris, his boyish face betraying embarrassment
and a slight smile. "That's my roommate."
Morris continued the playful deception for several minutes. The Shockwave
Rider, too, had many identities, many lives woven through the electronic net:
"An individual could rewrite him or herself via any terminal connected to the
federal data banks . . . this was the most precious of all freedoms . . .
freedom to become the person you chose to be instead of the person remembered
by the computers . . . it was the enchanted sword, the invulnerable shield,
the winged boots, the cloak of invisibility. It was the ultimate defense."
Morris had several identities at Harvard. The story goes that as a freshman
he walked in, brought down the system, and hacked his first identity, an
unauthorized Harvard account. Whether that initial act of mastery be myth or
fact, in a matter of months Morris had hacked and cultivated a fistful of
computer credit accounts. His log-on name became his identity, both online
and among his friends: RTM.
As a freshman, RTM began hanging around Harvard's graduate computer science
department, Aiken Lab, an ugly slab of concrete built in the 1940s and named
after one of the inventors of the modern computer. It was here, behind a
glass wall, opposite the antiquated vacuum-tube computer, that RTM spent most
of his waking hours.
"He'd fix things for free," recalls Paul Graham, a computer science graduate
student and close friend. "There was no question that he was the most
technical person."
RTM's breadth of knowledge was exceptional: Unix, networking, hardware,
graphics, and several other languages. Andrew Sudduth, Aiken's system
manager, hired RTM, and like many who employed him on campus, Sudduth found
that RTM was too busy chasing the latest computer problem to punch a time
clock or do his class work. "A professor would say, 'Wouldn't it be nice if
we had this?'" he recalls. "And Robert would go and do it."
He began by pacing the halls. There was no evidence he was working on the
problem. After sufficient gestation, he settled in at a terminal, preferably
"a lousy one," with a black and white display, a throwback, says Graham, to
his days on his father's mechanical, screenless terminal. There were no
distractions, no interruptions, and once he began, the pace was fierce, for
TRM could program as fast as he could type.
Rail-thin, RTM ate little, and when classmates invited him to lunch, two
hours later he would still be hunched over his keyboard, typing furiously.
Friends would stand over him, calling out his name, but the transfixed
programmer seemed to hear nothing. When a few nights of intense programming
finally gelled, RTM would snap out of his spell. "He would jump up and rub
his hands when he figured something out," says Sudduth.
Not all of his achievements were altruistic. RTM could do "anything he
wanted" when friends were logged on to a Sun workstation, according to Graham
and others. One of his most playful pranks was creating a subliminal message
that would flash for less than half a second on the screen of an unsuspecting
user. Graham said he saw the fleeting message, "Help, I'm being held
prisoner within a VAX 750!" and then wondered if he'd imagined it all.
Occasionally RTM took the game further, demanding a response to his whimsical
intrusions. Classmates sometimes found their work interrupted by a sage
called The ORacle. "Ask me a question and I will answer you," asked RTM, The
Oracle. "But first you must answer me."
Some of his pranks tested a user's technical knowledge. On a lark, RM
reverse-engineered the Harvard network into an older, defunct interface.
Everything worked, but the commands were different, and "true" hackers seemed
to enjoy the challenge. Roommate Greg Kuperberg, a nationally ranked college
mathemaician (also prone to feverish pacing) who befriended RTM and
collaborated with him on an elaborate graphics program, says his friend's
forays into Harvard's computers were exagerrated and misunderstood. RTM was
simply inquisitive, says Kuperberg, and his experiments were not much
different from those of a young chemist who occasionally mixed the wrong
chemicals.
But RTM's experiments were not without side effects, and there were some who
didn't consider it good, clean fun. One night, Robert Ziff, a Harvard
engineering student, watched the program he was working on slow to a snail's
pace. He complained to the deparmtent's system manager, who checked to see
who was tying up the computer's resources and exclaimed, "Oh God! It's
Robert Morris."
RTM had programs simultaneously running off his accounts on the engineering
and robotics computers--in addition to Aiken's. It wasn't the first time he
had "hogged" computer time. Ziff was instructed to warn RTM that "if it
happens again, they'll take you off the account."
Ziff was by no means the only one at Harvard who was unhappy with RTM and his
experiments. A few were "mistrustful of Robert because he was smarter and
better," says a friend. To those individuals, RTM sometimes sent commands
that mysteriously crept onto their computer screens. There was never any
doubt who had sent the ominous commands. Only RTM knew the secret security
holes. And there was never any doubt that he would keep his dark knowledge
secret. "He wouldn't tell them how he did it," says the friend. "He didn't
trust them." Instead, RTM left his enemies hanging, wondering whether he
might just decide to execute the REMOVE FILE commands he dangled on their
screens. "I did in fact break into other people's computers [at Harvard],"
Morris later admitted in court, "but I ... knew that they wouldn't mind."
In one sense, RTM was no different from other hackers. The first commandment
of hacking is to not waste computer time, to push and pull every electron's
worth of processing might. It is a boy's pursuit, a masculine display of
virtuosity. Test pilots call it "pushing the envelope." No longer protected
by his father or the understanding researchers at Bell Labs, RTM began
testing his wings, and, like the Shockwave Rider, he thrived in his new
environment:
"Meantime, taking advantage of the corporation's status, he could gain access
to data nets that were ordinarily secure. That was the whole point of coming
to KC. He wanted--more, he needed--data..."
RTM never did carry out the ominous threats, and at the same time he was
building professional credentials as a dedicated computer security expert.
"The Unix software is very flexible and convenient, but it places too much
trust in a protocol that provides very little security," he warned in a 1985
Bell Labs paper that described how to attack "trusting" host on the vast
national computer network known as Internet.
Two years later, while still at Harvard, RTM delivered several long talks on
his extensive knowledge of computer security at the National Computer Science
Security Center and the Naval Research Lab. During his summers he hacked for
computer companies on both coasts.
As he became more technically accomplished, his two personas--the mischievous
RTM and the dedicated computer security expert, Robert Morris, Jr.--struck an
uneasy balance. The same friends who detail how RTM inspired fear in his
enemies remember him as a person who believed in the importance of
"character" and who hacked out favors at a moment's notice.
But in his professional role, Morris increasingly found that the real world
was not nearly as responsive to security concerns as the Bell Laboratories of
his childhood. he discovered that if he reported a security bug, companies
often did nothing, or they waited for months before issuing patches. He
worried that unscrupulous hackers would take advantage of his discoveries.
He began to keep the secret openings to himself.
When RTM was taking graduate mathematics and computer science courses in
1985, the combination of his freelance projects, his generosity, and the
"difficulty and the boredom" of graduate work became too much for him. RTM
did not excel in every course, as his father had. So he dropped out and went
to work at the Convex Computer Corporation, in Richardson, Texas.
The young hacker's education began to have more in common with that of the
Shockwave Rider:
"Shortly thereafter, he began to concentrate on data processing techniques at
the expense of his other study subjects."
The following year, Morris junior returned to his Harvard studies eager to
learn. Friends remember his pacing about their homes or apartments, picking
up things to see how they worked. Often his excitement bubbled over. "He
was always breaking things," says Graham. "And he was insatiably curious."
The love of the classics his father had inspired had not diminished. "He
might be interested in medieval art, English history (a poster of English
kings adorned his dorm room), Homer, the Renaissance, or Greek art," recalls
a Harvard classics professor RTM helped with some computing problems. "His
knowledge was pretty encyclopedic." But the serious topics didn't keep the
Harvard student from classic adventure stories like the Norse sagas and one
of his favorites, The Three Musketeers.
Something of an adventurer himself, RTM and a classmate spent a week buying
copies of The Racing Form at six in the morning and entering "tons of data
about correlations of past performances." Then the budding computer bookies
took in their first horse race at nearby Suffolk Downs. "It was so
depressing," says RTM's friend about the crowd of retired, alcoholic
pensioners. Deciding it "criminal" to beat such sorry bettors, the two
abandoned their get-rich-quick scheme.
Computer graphics became a new infatuation. With Kuperberg, RTM created an
advanced ray-tracing graphics program. When he found that higher mathematics
were not enough to create beautiful forms, he turned to the ancients,
studying the works of Vitruvius, the inventor of proportion standards for
classical columns. One of RTM's finest creations was of a temple standing in
the middle of a blue sea.
Excited by their success, the talented duo entertained the idea of launching
a computer graphics firm. "We had this picture of a kid running a lemonade
stand who one day turned into Donald Trump," says Kuperberg, who, like his
friend, had a "default plan" of graduate school.
BACK AND FORTH, BACK AND FORTH. It was the way RTM entertained an idea, as
if by the movement of his light steps he might nudge the completed thought
from his brain. But this time he seemed more driven than usual.
He had come the nearly 300 miles from his graduate computer science studies
at Cornell to pore over the Unix source code at Harvard's Aiken Lab and visit
his friend, Paul Graham. "He had discovered a big hole and he had to tell
someone," recalls Graham. Excitedly, RTM paced the small office, telling
Graham how he had isolated holes in Unix that could enable him to be a super
user--not at Cornell or Harvard, but across the country and around the world.
Both of the bugs were communications holes, but RTM explained how the FTP
(File Transfer Protocol) bug could conceivably grant an invader root
privileges--the ability to read or delete anything on a compromised machine.
"It was an experiment," Morris later testified. "I had never heard of
anything like it before ... to see if I could write a program that would
spread as widely as possible in Internet." His friend was similarly
entranced. "I thought it was the greatest idea," says Graham, "All over the
world. A big living organism. No one had ever done it before." Of course,
it had been done before by the Shockwave Rider:
"This is indeed the father and mother of a tapeworm. You'll have noticed how
much use it makes of terminology derived from the study of living animals.
And with reason. Not for nothing is a tapeworm called a tapeworm. It can be
made to breed ... my newest--my masterpiece--breeds by itself."
To Graham, the worm was not only an incredible creation, it was a bold strike
for freedom, and later in court he would compare RTM to Mathias Rust, the
West German pilot who landed in Moscow's Red Square in May 1987. Encouraged
by his starry-eyed friend, RTM paced, describing how he wanted every computer
on the Internet to receive one innocuous probe, one worm that would wriggle
its way into each computer's memory.
Finally, the excitement grew too great for Morris.
"RTM, you're on his desk," said Graham, as he watched RTM's feet pad by on
top of their colleague's desk.
"Oh," said RTM, for the first time aware of his rise in elevation. This
behavior was typical of Morris when he was absorbed in thought.
Later, on that cool October night in 1988, RTM and Graham continued talking
about the probe as they stood in front of a Boston seafood restaurant waiting
for Sudduth, a champion rower, whom they would toast as a winner of the
annual Head of the Charles regatta. As they waited, Graham suggested that
the worm write something to the computers it wriggled its way into.
"No, no, we can't do writes," his friend said, explaining that any writes, no
matter how well-intended, might be dangerous.
What the two couldn't figure out was how to protect a single worm on each
machine. "It would have been very simple for someone to write a program that
just acted as if it was a worm [an antiworm]," tricking new worms into
believing a computer had already been penetrated and stopping "my worm from
growing at all," Morris testified. And so, he decided it might be all right
to have two, or maybe three, worms per machine.
But neither knew much about population growth, and if RTM had any technical
shortcoming, it was his ambivalence toward higher mathematics. There on the
sidewalk, the two decided that the second worm to invade a machine should
have a one-in-seven rate of survival.
No particular formula was used, Morris later told a jury. "It was based on
the intuition I had on how rapidly it would spread." He figured a new worm
might appear once every few hours. As the Shockwave Rider explained,
everything was under control:
"And, no, it can't be killed. It's indefinitely self-perpetuating so long as
the net exists ... incidentally, though, it won't expand to indefinite size
and clog the net for other use. It has built-in limits."
When Sudduth arrived at the restaurant, the two collaborators abruptly
changed the subject. "When we were on a project," says Graham, "it was
understood that it was secret." But RTM couldn't keep everything under his
hat. Without hinting that he planned an attack, he excitedly told Sudduth
about the bugs he had uncovered.
And at first, in the ensuing days, it seemed that RTM's wild idea might go
the way of his racetrack betting and computer graphics schemes. For several
days after RTM had returned to Cornell, Graham heard nothing from his friend.
The two had an old practice of sending elliptical messages over Internet--for
security's sake. "Any news on the brilliant project?" Graham asked in his
electronic message.
There was no response.
RTM HAD BEEN BUSY. More than a week before his visit to Harvard, he had
created a wish list for his worm on his university computer. It was
strangely appropriate that he began the work at Cornell. Officials would
later say it was his reputation as a hacker that gained him admittance to the
university's prestigious graduate school in computer science.
RTM's list was divided into the two main goals he had for his worm: attack
and defense. The target was Internet, an umbrella of three national
communication networks, including ARPAnet, run by the Department of Defense
to link research computers at military sites and universities; MILnet, used
by military and civilian researchers to send routine, unclassified
communications; and NSFnet, a National Science Foundation network.
In the beginning, RTM and Graham used the popular term virus to describe the
worm, but as the creation took shape it came to resemble the prehistoric
worm. Viruses exist by invading and altering their host cells, and their
computer counterparts are similar. They cannot "live" or run without
attaching themselves to other programs. But a computer worm is independent.
Self-propagating and self-running, worms can exist without directly
endangering a network or its users. Some early computer worms were actually
loosed to perform network management tasks. The Shockwave Rider's worm had a
higher social and moral goal:
"The primary my worm is designed to invade is that privacy under whose cover
justice is not done and injustice is not seen."
RTM designed his worm to clone itself, spreading throughout the net.
Searching out new nesting locations, the worm scanned address lists of
computers, selecting the most directly linked machines, such as gateways, and
then began cycling through its attacks. If one method failed, the tireless
invader quickly picked another from its arsenal. The attacks fell into three
categories: nooking a foothold through a security hole, taking advantage of
"trusting" computers, and cracking passwords. RTM playfully named his worm's
attack engine the "cracksome" routine.
Footholds could be gained through either of two techniques. One involved a
utility designed to elicit such information as a user's full name, office,
and phone number. It was fittingly named Fingered. The worm overflowed the
program's small buffer and tricked unsuspecting machines into downloading,
compiling, and running a tiny source code "grappling hook"--the worm's scout.
Once ensconced within the target computer, the hook called the original worm
and "pulled" back sections of a new version of the original worm compiled to
run on either a VAX or a Sun workstation, the two most common computers on
the network (if the hook guessed wrong, it pulled over the other version).
Finally, the hook linked the sections together and the new worm began
running.
By compiling his worm for the two machines in advance, RTM avoided the risk
of sending an easily decipherable source code copy of the program. Only the
tiny "grappling hook" was written in source code, to ensure that the first
cast would draw a bite. The drawback, of course, was that the worm could
successfully invade only VAX or Sun workstations.
A similar attack was launched on an electronic mail program called Sendmail.
RTM had discovered that the program's seldom-used debugging utility allowed
users to send a set of commands instead of a user's address. Through the
gaping security hole went the worm's grappling hook, and, as in the Fingerd
attack, in less than a minute a new, fully functioning copy of the worm was
running on the target machine.
The worm made another attack, not so much on a security hole but on the
network's community of trust. Once a machine was invaded, the worm attempted
to connect with remote machines that "trusted" the invaded machine and didn't
require a password. The techniques were similar to what RTM had described as
a teenager in a Bell Labs paper he wrote about a "weakness" in security that
allows "users on untrusted and possibly very distant hosts to masquerade as
users on trusted hosts."
These were the cracked windows, loose hinges, and open doors upon which the
worm directed its principal attacks. But the worm also tried to find keys
lying around, checking to see if an account had no password, and then
attempting simple heuristics using a combination of words from a user's
account, including names, nicknames, and names spelled backward.
If these attacks failed, the worm would try its internal dictionary of 432
passwords. But the task of cracking new passwords was a time-consuming
process. The only passwords publicly available were encrypted. To figure
out the true password behind its encrypted double, the worm had to encrypt
its own internal list of probable passwords against those it attempted to
crack.
If two encrypted passwords matched, the worm knew that its original password
(before the worm encrypted it) was identical to the password it was trying to
crack. Since virtually every target password was encrypted under a different
key, each target password forced the worm to re-encrypt its list of possible
passwords. After trying this strategy for a few seconds, the worm tried
words from Unix's online dictionary, using the same tedious encryption
method. Cycling through its arsenal of attacks, the worm continually
camouflaged and transformed itself. Immediately upon arriving in a new
computer, the worm deleted the disk copy of itself and ran only in memory
under the alias of an innocuous command interpreter, the kind often used in
shell scripts or automatic commands.
Every three minutes, the worm forked, splitting into a dead parent and a
child. The child started off "fresh," using to apparent resources such as
processing time or memory usage. The short dashes made the worm more
difficult to seize, even if it happened to be spotted.
THE WORM LEFT FEW CLUES. It read all its support files into memory, deleting
file system copies that might be noticed. And by turning off the generation
of core files, if the worm made a mistake and accidentally died, it left no
corpse behind. Once every 15 infections, the worm attempted to connect to a
Berkeley computer. RTM had hoped the "red herring," as he called it, might
by itself shift suspicion onto the computer center, but it never actually
made the connection.
Finally, if the worm, or parts of it, were somehow captured, the binary (near
machine-level) program would require many hours of complex decompilation
before its nuts and bolts could be understood.
For nearly three weeks RTM worked sporadically on the worm, increasing the
number and complexity of its potential assaults. Its diverse collection of
attack strategies gave it a character more like that of a bulky battleship
than a sleek submarine, and one friend and security expert later called it
"everything but the kitchen sink."
RTM collected password files form computers at Stanford, Harvard, Berkeley,
and other universities around the country; he found the fast encryption
routine he needed in a program written at Bell Labs; he incorporated
password-breaking techniques his father had discussed in his classic paper on
Unix security. RTM didn't want to omit anything, and he feverishly threw a
decade of security training into the worm. There was little time to check
for errors; besides, the Shockwave Rider didn't make mistakes:
"'How the hell were you able to build a tapeworm this complicated"' It's a
talent, like a musician's or a poet's. I can play a computer read-in
literally for hours at a time and never hit a wrong note."
Everything seemed to be going exactly as planned. On Wednesday, November 2,
1988, RTM logged on to his terminal at Cornell's Upson Hall at a little after
10 a.m. and worked until lunch. In the afternoon, the trouble began.
RTM noticed a posting from Keith Bostic, of Berkeley: a patch to the FTP bug
he had discovered on his fateful visit to Harvard. RTM quickly typed out an
electronic mail message to Sudduth, asking whether he had been the source of
the leak.
"I didn't think it was a good idea to spread information about random
security holes," Morris later testified.
Sudduth sensed panic in his friend. "Maybe he worried that the [other] bugs
would be patched before he sent his worm."
At 8 p.m. EST, sitting at his Upson Hall terminal, RTM copied the worm to an
account at MIT known to be frequented by hackers. "I wanted to start it out
so it wouldn't be obvious that I had started the worm myself," Morris
testified. (The final version of the worm did not include attacks on the now
patched FTP bug.) For the next 20 minutes, RTM tried to track the worm's
path, but as far as he could tell, "it wasn't working right. It seemed to
have been getting bogged down, not really doing very much."
And so, having begun his experiment, RTM left his terminal and walked home.
ON INTERNET, THE WORM WAS AWAKENING. One hour and 24 minutes after its
release, the worm squirmed its way across the country and into the computers
of a Santa Monica defense contractor, the Rand Corporation.
In two hours it hit the major gateway at the University of California,
Berkeley; the Lawrence Livermore Laboratories, in Berkeley and Livermore; and
the Los Alamos National Laboratory, in New Mexico. Very quickly it became
apparent that something had gone terribly wrong. Individual machines became
infected by not one or two but several worms. Then, the infection erupted.
Since university and military computers are rarely used so late at night,
they generally register only a 1 or 2 load average of a possible 100. But by
9:21 p.m. PST, computers at the University of Utah had already documented a
load of 5. Twenty minutes later, the load reached 7; in another 20 minutes,
16; and incredibly, in just another five minutes, the system topped out at
100, choking to a standstill.
Of course, as his lawyer later argued, RTM had been careful to ensure that
his worm not read, delete, or in any way damage targeted computers. But he
hadn't counted on a more insidious risk. Simply by reproducing, the worm was
sucking the oxygen out of Internet the way algae strangle a dying sea.
RTM's birth control wasn't working quite the way he had planned. Only the
first virus on a machine listened for others. Subsequent worms didn't hear
each other and didn't submit to the killer dice roll. And those few worms
that lost the roll were allowed to continue their efforts to propagate new
copies of themselves on other machines, even after they'd received death
sentences.
Emergency teams at Berkeley, MIT, and other computer centers worked
frantically to stop the invader. Though the worm didn't appear to be
directly damaging files, the rescue workers desperately searched for hidden
trap doors, Trojan horses, or time bombs. By midnight EST, NASA's Ames
Research Center, in Silicon Valley, had shut off all communications with
outside researchers, stranding 52,000 computer users. Minutes earlier, one
of the Berkeley scientists on the front line had sent out an electronic
S.O.S. over the net: "We are under attack from an Internet virus..."
"No. We can't stop it! There's never been a worm with that tough a head or
that long a tail. It's building itself, don't you understand? Already it's
passed a billion bits and it's still growing ... and now it's so goddamn
comprehensive that it can't be killed. Not short of demolishing the net!"
While computer experts across the country raced to salvage what they could of
the worm's wreckage, RTM sat dazed. When he telephoned Sudduth, his voice
was deathly quiet. Sudduth passed the receiver to Graham, who listened to
the barely audible voice and wondered whether Morris had broken up with his
girlfriend.
"I really F_____ed up," said Morris as he quietly described how his worm was
reproducing like a virulent cancer, jamming Internet with resource-sapping
copies of itself. Graham was stunned. He had thought the project was far
off in the future.
"RTM, you idiot!" he yelled, angry at his friend for "blowing" such a great
idea. Then he asked, "How did this happen?"
"Well, you remember the number I picked?"
The two worked on possible cures. It was nearly midnight, and the worm had
been racing through Internet for four hours. Graham suggested that they
create a Pac-Man cannibal worm to gobble up the worms. "I didn't do that,
because I had messed up with the first one," Morris later testified.
The two couldn't agree on a strategy, and the conversation ended. Graham
went to Sudduth's office practically bursting with his secret. "Something
really big is up. I can't tell you."
"F_____k you, Paul!" shot back the Olympic rower.
"Well ... Robert wrote this virus," Graham said, "and it's taking over every
computer in the country!"
Sudduth punched out an e-mail message. Though surprised that Morris wasn't
doing more to stop the worm, he guessed his friend was finding it hard to
admit that "something he created was out of control!" Morris phoned back and
told Sudduth how to stop the worm from spreading on Harvard's computers.
Later, at about 1:30 a.m., Morris called Sudduth from his home phone. The
two decided that Sudduth should publish the worm antidotes on
Internet--anonymously.
"I was scared," Morris later testified. "I knew people would be annoyed
about this because it was causing problems, and I wasn't particularly eager
to catch the blame for this at that time."
Why didn't Morris send the warning?
"Well, I was at home," testified the driven programmer, who had been known to
work till dawn. "I don't have computer access at home. I suppose I could
have walked back to Cornell at 2 in the morning ... but even then I wasn't
sure I could get access to the network." Critics later questioned why Morris
didn't simply telephone computer experts at Berkeley or MIT, but somehow,
after having grown up online, in the electronic net, that direct,
non-computer solution seemed to have escaped him.
Friends have a simpler explanation. Morris, quite unlike his hero, the
Shockwave Rider, was simply "frightened out of his wits."
"'Precipice is going to be attacked with nukes at 0130!' [The Shockwave
Rider] launched into a burst of furious activity, punching his board with
fingers that flew faster than a pianist's. '... Run like hell--because this
may not work'"
SUDDUTH WORKED TO GET THE WORD OUT. By now, the system was clogged. the
only connection he could find was to a bulletin board at Brown University,
hardly a center for Unix or Internet. The tired system manager typed out the
antidote, describing how to close the holes and protect against new attacks,
ending with the odd phrase, "I hope this helps, but even more, I hope it's a
hoax."
At about 4 a.m., Sudduth finally dragged himself to bed. Computer centers
around the nation were in the process of shutting down the relay centers that
might pass the worm--and its antidote. His friend had already been fast
asleep for two hours.
The next morning, Morris worked on some school-work he had neglected and
"just generally tried to relax." In the evening he went to choir practice.
Almost 24 hours had passed since he'd released the worm. When he returned to
Upson Hall, he logged on to read his mail. The system seemed to be working
fine. Morris read several Cornell notices about a "loose virus" that seemed
under control, although users were warned to "be careful"; some notices from
Keith Bostic about patching security holes that the worm had used; and a
message from Paul Graham asking him to call. There was something else Morris
did at Upson Hall on November 3:
"Yes, I believe I cleaned up some of my files."
"By 'cleaned up,' you mean you deleted some of the files?" probed the
prosecution.
"I deleted some of my files, yes."
"And that copy of the virus you left on your account, that was encrypted,
that was in an encrypted form, wasn't it?
"It was. Yes."
Once again, Morris left Upson Hall and returned home to make a phone call.
Graham excitedly informed him that the worm and disclosure of its staggering
impact "was about to get into newspapers, and that it might be a big sort of
media event."
Morris "screwed up" his courage and called his father, the computer security
expert, because he "felt that he ought to know." Morris senior was not
amused. He told his son to go home and not to talk to anybody. "So then I
went to bed and I left Cornell the next day," Morris testified.
But the true Shockwave Rider never abandoned the front line. With a nuclear
bomber zeroing in, he bravely hacked out the commands to avert the attack:
"And you did it in less than ten minutes?"
"Looking back on it, I feel I had all the time in the world."
MEANWHILE, MORRIS WAS RETREATING, though not as smoothly as planned. One of
his friends had inadvertently let RTM's log-on and nickname slip to John
Markoff, a reporter from The New York Times who happened to have written
extensively on computer security and who counted among his friends one of the
nation's leading computer security experts, Robert Morris, Sr.
The reporter used an Internet account to "Fingerd" RTM, and the program
faithfully flashed the name Robert T. Morris. When the reporter called
Morris senior and noted the similarity of their names, the elaborate
"experiment" unraveled. Morris junior's secret trail of anonymous accounts,
red herrings, and encrypted files suddenly became the machinations of an
adolescent playing war games.
Officials at MIT estimated that 6,000 of the nation's 60,000 Internet
computers had been invaded. The country's top computer experts spent several
sleepless days and nights battling and cleaning up after the attack, while
tens of thousands of military and university researchers went without
computer power. (Blocked at the relay point, Sudduth's antidote had not been
delivered for two days.) The tab for the wasted time and resources was
estimated at $15 million.
Three days after the attack, The New York Times began a series of front-page
stories about the missing Internet attacker, Robert Tappan Morris. While
Morris maintained a public silence ordered first by his father and then by
his Washington, D.C., attorney, the FBI began an investigation, and
government and university officials harshly criticized the hacker.
Old Bell Labs colleagues like Douglas McIlroy were puzzled by their progeny's
slip. "What I don't understand is the secrecy part of it. All of the
juvenile tricks, encrypting source files to launch from some other machine,
encrypting the program," says the scientist. "That's not consonant with a
fun-loving kid."
Yet many computer security experts--some of them friends and former
associates of Morris senior--rose to Morris junior's defense. They said his
experiment was a harmless, overdue warning of gross gaps in computer
security, and argued that Morris should be cheered, not convicted.
"When all is said and done, this kid is going to come down as a folk hero,"
Peter Neuman, a computer security expert at SRI international (one of Morris
junior's former employers) told The New York Times.
Of course, the hacker is the hero--in fiction. The Shockwave Rider liberates
the masses from a corrupt, computer-controlled government with a
freedom-fighting worm, risks his life to foil a nuclear attack, wins his
girl's heart, and is praised by the world. But Morris had no such righteous
intentions. He had no social or moral agenda, and never intended to expose
Internet's well-known security limitations. His worm had no other purpose
than to spread as far and wide as possible, and if it had spread as planned,
slowly, innocuously, most say the response would have been even greater
panic.
The world that Morris's worm entered was far removed from his boyhood
computer security training in the hallowed research halls of Bell Labs. In
the decade since his code-cracking childhood, computers leapt into the
mainstream to become the foundation of business and commerce. Assaults on
computers became assaults on industry, and by the mid-1980s terrorist
computer attacks and malicious break-ins revealed the dark side of hacking,
forever ending the playful era of his father, when hacking was a rite of
passage.
Therein lay the irony and tragedy of the trial of Robert Morris. He was
being tried for what he was taught by his father, his institutions, and his
generation: access, unauthorized. The trouble was, as the would-be security
expert wrote in one of his early papers, "Times have changed."
Some were not prepared for the change. On the day before the verdict, a
Harvard professor warned that "if Robert had wanted to do damage, there would
have been nothing left! All the computers would have gone up in smoke!"
Another Harvard friend suggested that if Morris were "unjustly punished," it
might inspire a less restrained, less idealistic hacker to "do it right."
The reasoning was similar to Morris's main line of defense.
"Was it your intention to have the worm program destroy or damage any files?"
asked the defense attorney.
"No, it was not."
"Was it possible for you to do that?"
"It would have been easy to do that."
The implication was ominous, and at least one close friend of Morris's was
not convinced that everything was OK just because his bored buddy hadn't
pulled the trigger. "On some level I know why he did this, and on some level
I don't," says Kuperberg, glancing away and pacing like the old roommate he
struggle to defend. "On some level [Morris senior's explanation of boredom]
is not satisfactory."
No answer seemed likely to come from the one person who might know. After
the guilty verdict was issued in his trial, Morris and his attorney walked
past the jostling TV crews and newspaper reporters and into the winter night.
His father held back. The press surrounded him and the TV lights shone
eerily on his face. "What do you feel, Mr. Morris? What do you feel?"
He chose his words carefully, stiffly stating that the trial had been fair,
though he was not happy with the verdict. The question came again, and this
time he spoke with conviction: "It's perfectly obvious that there is not a
fraudulent or dishonest bone in his body."
IN THE WORM'S WAKE, there has been no great improvement in security, but
fresh concern that future computer communication tools used by the average
citizen may have to be weighed down by cumbersome locks and chains. For, as
Morris senior wrote in his treatise on Unix security, "It is easy to run a
secure computer system. You merely have to disconnect all dial-up
connections and permit only direct-wired terminals, put the machine and its
terminals in a shielded room, and post a guard at the door."
Such is the bleak reality of total computer security, and if history is any
lesson, computers, too, will move through cycles, bringing periods of cold
war as well as openness. In the end, security is trust, which must be
nurtured and cultivated like any other human quality. Morris wanted to be a
hero, yet he lacked the patience and vision to forge a new direction.
"What would have been great is if he had shut the holes after himself. That
would have been a coup," says Peter McIlroy. "If he had thought of that, I
think he would have done it."
But RTM wanted nothing of the sort. In the private war he waged it was his
duty to hold on to the holes, to wield them in the way he "knew they wouldn't
mind."
And Robert Tappan Morris? He was just a kid.
"He might have been trained to display such powers of judgment; he might have
been specially bred to possess them. One thing was sure: he hadn't lived
long enough to grow into them."
Jonathan Littman is the author of Once Upon a Time in ComputerLand (Simon &
Schuster, 1990). A journalist who covers Silicon Valley and the
high-technology industry, he lives in Sonoma, California.
*************************************************************************
WORDLESS
By Homer Mandrill
The new era is rapidly upon us, folks, just like it
always has been since the beginning of time. With every
passing moment, with every exhalation, with every beat of our
hearts the potential for this new era is conceived,
disregarded, and thrown away.
The new era of which I write will not be heralded by a
great battle. Neither will it be heralded by rapture,
discernment, the rise of the Anti-Christ, bill HR 4079 (which
EVERYONE needs to learn about REAL quick), or the arrival of
aliens from Planet X.
It will be ushered in by some random but seemingly
'composed' event. Neither I nor anyone else know what it will
be, and there in lies its power. It will not have been
manufactured by any ego, collective or individual. Neither
will it be 'perceived' as a prophecy, 'as it is written'.
In this way, it will catch us unawares; we will stand as
a world, jaws lowered, gasping, trying to conceive of words
that apply to the situation.
Each individual on the planet will be caught in that
breathless Moment of confusion; a tugging on the compassion
of every human alive, simultaneously. A hole in our
collective chest cavity where once beat our hearts, we will
all, simultaneously be forced to come to terms with something
none of us had counted on. We will all be out of our depth.
This Gasp will be felt by everyone, everywhere. This
event will transcend religion, politics, race; no one will be
immune to its effects/affects. It will be universal. And
words won't do it justice.
A billion trillion dollars/yen/deutchmarks/pounds/gold/
frankenscence/myrhh, the cold right hand of fundamentalism
made into a fist, the hopes and prayers of trillions of
people of all races, the ac
tions of every amassed army,
ever, the commercial exploitation of every nation ever to
have existed and which will ever exist, the shaping and
moulding of justice and liberty, the simultaneous reduction
and expansion of freedom around the planet; these things are
not the ends to which civilization aspires, but rather the
tools of our collective psyche, simultaneously raising our
standard of living and raining on our parade.
All these things are representative of our greatest
accomplishments and our greatest folly, and they are the raw
materials of the Moment of the Gasp. Just as the artist forms
the clay into something of sublime beauty, so that Moment
will form our perceptions of ourselves into something we are
not ready to understand. We will stand in the gallery and
look at the work of art that is the culmination of all
humanity throughout the ages encapsulated in that Moment, and
we will find ourselves unable to judge that which is before
us.
The Moment of the Gasp has no analog, no metaphor, no
preconception, no 'safe zone'. The white man will not be able
to blame the black man. The black man will not be able to
blame the white man. The Christians will not be able to blame
the Jews, the Atheists will not be able to blame the
Believers, the Right will not be able to blame the Left, I
will not be able to blame you and you will not be able to
blame me. The very concept of blame will become obsolete, our
internal systems of judgement, already built of flimsy
material, will be dashed to bits on the hard edge of the
Moment.
The cynic will be unable to discount the facts before
him. The idealist will see the cold face of reality. The
ascetic will be filled with compassion for those around him.
Every step we will take to run away from the truth will be
met with more evidence, every word we say will crawl out of
our mouth like a salted slug.
"Q: When will this Moment come? Is it upon us?"
My answer can only be that no one knows. As I mentioned
earlier, it can not be anticipated. And to do so would ruin
its effect/affect. Being practical for a moment, it seems to
be rapidly approaching. But again, we cannot anticipate the
Moment. It will fall down like a bird dropping from a bright
blue cloudless birdless sky. Who's to say?
"Q: What will come after the Moment of the Gasp?"
This is the crucial question, because the answer lies
within the it. Since we can't determine what the event will
be, we can't predict what will come afterward.
"A: It all depends."
This is the frightening realization that has been at the
back of our collective minds for thousands of years. We
really DON'T know what the future holds, and whatever it is,
we in fact are totally unprepared for it. So we listen to
Nostradamus, we re-read Revelations, we consult the Tarot and
I Ching... to what end? We wish to control the future...
When these temporal Holders-Of-The-Power wax poetic of
the New World Order, they are not speaking of what is to come
after the Moment of the Gasp. They are just covering their
tracks. This war in Iraq made some among us humans gasp, but
it was not THE Gasp. I certainly felt cheated by the system
I'd been brought up to 'love and obey, or else'. But once
more, The Gasp will be total, universal, and undeniable. Even
George Bush will feel it.
When that Moment comes and we have floundered and
wallowed and died to our sanity, hopefully we will pick
ourselves up and learn the lesson of that Moment. Q:What is the
lesson? A: What kind of bird dropped that turd on us from the
cloudless birdless sky?
When we find ourselves in the Moment, and all we can do
is Gasp, the time for change is at hand. Hope springs
eternal, but then again, the circumstances of the Moment may
kill us one and all.
Who's to say?
*************************************************************************
THE STATE OF NATIONAL SECURITY -- HOW MUCH WE (DON'T) KNOW
November 11, 1990
Re-Release April 3, 1991
By The Desert Fox
Transcribed and Edited by Lord Macduff
I have been a member of the modem community for about seven years.
During that time period, I have watched literally hundreds of bulletin boards
go up and go down. A great majority of these systems were based on a public
message and file exchange. But a few of these systems were dedicated to the
exchange and distribution of information... Information that was not usually
available on a regular basis. In my day, I have seen files on VAX/VMS, phone
switching systems, hacking, phreaking, and anything else that one could dream
of. But one thing that constantly has me pondering at all hours of the night
is the state of our national defense.
How close and how often do we come to pressing the button? Defined as
DEFCON-1, the state of panic which is actually sub-defined as World War III,
is something that has not been reached... yet.
There are five levels of International Status. DEFCON-5 is what we'd
all like to be at... unless you're a real nut case and have absolutely no hope
for the future of mankind. DEFCON(s) 4-1 are lesser states of "panic". A dumb
reference, yet a valid one, is the movie "Wargames". Although a liberal dose
of fiction was mixed in as far as the actual methods of hacking and such, it
makes one think "Just how often DO hackers break into systems like that and
cause problems possibly leading to the destruction of the world?" [Editor's
Note -- Not as often as certain federal agencies would like to think. Go
catch some REAL criminals instead of picking on us modem users...]
Another question that comes to mind is "How often do Soviet troop
movements or something of that nature cause a defcon decrease to bring us to
the brink of global extermination... and the public never knows about it?"
During the Kennedy Administration, this country was brought to what is the
equivalent of DEFCON-2 when the Soviets brought their missiles into Cuba in
the early 1960's. From what transcripts say about the incident, we were
seconds away from DEFCON-1... what a pisser, huh? Although that happened seven
years before I was born, my generation would have taken it with a grain of
salt and looked at it as a chance to get a tan. (A real good one, I might
add...) Our country goes seconds from World War III and we never found out
until years later. How often does this happen? Personally, I'd like to know
when Vodka is going to replace Coca-Cola as the national beverage. I'd also
like to know when fish eggs are going to be put on the menu at fast food
joints.
At this very moment [4:27 AM on Sunday, November 11, 1990 if anyone
is curious... -Ed.] United States and Allied troops are in the Middle East
preparing for war. The media reports that all the troops are over there just
sitting around bored to death. [Yet another Editor's Note -- Due to a time
control problem, I will finish this essay instead of Sir Lawrence...
Apologies for the interruption.] It's very possible we could have another
Vietnam on our hands. Hell, Saddam Hussain is not going to stop with the
invasion of Kuwait... There's a very interesting parallel between Hussain and
a short German guy who started World War II... I'm not so sure why everyone's
worried about German Reunification -- It's the Iraqis we SHOULD be worrying
about! Hussain insists that the American citizens that he is holding hostage
in various hotels in Baghdad are "Guests". We might do well to round up every
last Iraqi citizen in this country who has a visa or green card and stick 'em
all in ONE Motel 6 somewhere in the midwest. Let Tom Bodett deal with them for
a while... Perhaps the CIA could go blow up some of their planes or important
buildings... Goodness knows they've done the same to us enough times to make
the average citizen want to puke. If we hurry up and storm the place NOW,
before Saddam figures out how to put together that mail-order nuclear bomb,
we could take the whole place over in a matter of days. We could use that oil.
The weapons manufacturers would make a fortune, perhaps even create new jobs.
Our economy could USE a boost, with the gas prices what they are. [Sidenote:
Who's to say that Exxon isn't financing Saddam Hussain?] Sell the entire
country to Russia for them to use as parking, for that matter.
The projected costs for Operation Desert Shield are in the billions,
while it has accomplished virtually nothing. Truly another case of YOUR TAX
DOLLARS AT WORK.
But who's to say if this is for real? This may be a conspiracy by the
oil companies (who secretly own the government) to make more money. The
government controls the media, which is our only source if information from
over there. Small wonder they want to supress publications like PHRACK...
They aren't from the government-controlled media.
SUPRESSION BREEDS REVOLUTION
*************************************************************************
:======================================================:
| A Brief Explanation of Beer*Net |
| 10/16/90 |
| |
| Written by Toxic Sock @beernet01 |
| |
| Further information availible on the |
| |
| +-------------------------------------------------------------+
| following | |
| Beer*Net | |
| systems: | Apocalyptic Funhouse (713) 531 -*- 1139 |
| | Sysop: Nuclear Gerbil/Chris 40 megs/2400/1200 |
| | |
| | The Magic Window (713) 356 -*- 7150 |
| | Sysop: Zen Master/Mark 30 megs/2400/1200 |
| | |
| | Malacology Unlimited (713) 356 -*- 6004 |
:===============| Sysop: Dr. Goodnight/Craig 80 megs/2400/1200 |
| |
| Split Infinity (713) FEW -*- BUGS |
| Sysop: Strider Arcadian/Will 40 megs/2400/1200 |
| |
| Rawhide Palace (713) 383 -*- 3961 |
| Sysop: Gurn Blanston/Ron 80 megs/2400/1200 |
+-------------------------------------------------------------+
Why Beer*Net?
-------------
Houston is famed for its intolerance of basic rights and
the opinions of others on its bulletin board systems. This is not
surprising in a city where the most common activity is the proverbial
leechline activity, but is distressing nonetheless to intelligent users
who want to make their opinions known without living in fear of
mysterious account modifications, deletions or message removal. At
times the oppression has been so blatant that users have made the
transition from user to sysop and have run "free speech" systems that
broke all of the established (and stupid) rules and allowed the open
expression of intelligence. They have always met with opposition from
the petty tyrants who run their own digital kingdoms for the
gratification of having power, no matter how unconnected to reality it
is. And, since these types generally invest a good deal of money in
their systems, they are the ones who have what the common user covets -
file transfers - and use this as the basis of their power. When
something threatening such as a board with free speech allowed or a no
ratio file transfer system appears, they often band together and assault
the sysop, especially if he is a minor, where they know they can
sufficiently confuse his parents into forcing them to remove the
offending bulletin board system. This has happened to more than one
reputable user-turned-sysop, and with the emergence of Beer*Net, will
hopefully be eradicated.
Free Speech
-----------
Simply put, "free speech" is the right to say whatever the user
pleases without any immediate repercussions other than the responses of
fellow users. On a free speech BBS, a user may say whatever he wishes
without trepidation, because the sysop is honor bound not to take action
against the user. This is not easy for a sysop, especially when said
user espouses neanderthal beliefs such as racism or bigotry. However,
the overall outlook is much better for a BBS that allows intellectual
development and interesting posts through free speech than for a
squeaky-clean and silent BBS. This is a basic right we hold to be
necessary, and we, the Beer*Net sysops, are committed to defend it.
We agree that by allowing free speech we are exempting the users
from action taken by the sysop against them for what they say publicly
or privately on a BBS, with the exception of illegal activity such as
passing long distance codes or passwords. We also agree that we will
not read private mail, nor will we ever use a user's account for our own
purposes. Any change in access level, change in user information or
deletion of a part or the whole of the user's account in response to
user posting is considering a violation, as are passing on to any other
sysop, user or official all or part of a user's information and
confronting anyone but the user himself with details of a supposed
infraction.
In addition, we are committed to helping others interested in
maintaining free speech on bulletin board systems. If we hear of a case
where unwarranted harrassment is being delivered by other sysops, we are
pledged to combat it by whatever means necessary. Rights must be
preserved above all.
The Systems
-----------
The systems listed on the file header are all committed to the
Beer*Net ideals and have implemented them. They do not support
blacklisting, and do not pass on user information between systems or to
other users. Moreover, the sysops will NOT call up parents or deal with
anyone besides the user himself regarding the user's conduct. The
sysops do reserve the right to preserve in copy buffer form all or part
of any chats, posts, or e-mail directed to the sysop or in a public
area. These policies are implemented at the verification of this file
by all of the sysops involved.
History
-------
Beer*Net was an idea developed in part by the sysops of TURD
(the "original" true free speech system), namely Royal Flush, Vile Scent
(Toxic Waste, Yeast Infection) and Captain Crapp (Vehicular Slaughter,
Nuclear Gerbil) and in part by Zen Master, an original user on TURD and
now sysop of the Magic Window.
TURD had its origins in the Apple II community, where the sysops
observed that more than the normal amount of petty didactic types
reigned, and committed themselves to do something about it. Today, the
remnants of TURD are to be found in Apocalyptic Funhouse (713-531-1139),
as are parts of the Metal Hell and Dead Animal Pickup.
Malacology Unlimited and Magic Window are later additions to the
free speaking world, but are viable systems worthy of investigation by
any user. They are running Hermes on the Macintosh and TAG on a clone,
respectively. All are open systems.
Attribution
-----------
The credit for the impetus and ideas behind Beer*Net go to the
following people:
Yeast Infection: part of original brainstorm project
Myself: Captain Crapp had to be involved...
Zen Master: stimulated us to further develop the idea
Dr. Goodnight: for helping to break the power of didactic
sysops in Houston
Jesse Helms: For proving that pro-rights people are
smarter...
*************************************************************************
THE LAW OF TORTS
James J. Spinelli
The Activity Bulletin Board Service - ABBS - (914) 779-4273
=====================================================================
This paper is NOT intended as a substitute for a lawyer NOR as a
do-it-yourself kit. It provides basic information to help you under-
stand certain legal principles. In any serious situation or when you
are in doubt, there is no substitute for competent professional legal
advice. Trying to act as your own lawyer can be costly and, in some in-
stances, dangerous. The author assumes no responsibility, accountabil-
ity or liability whatsoever in the use or misuse of any information
presented herein. The information herein is of a general nature.
=====================================================================
Most of us are generally aware of what crimes are (murder, arson,
theft, for example) but are vague about what the law refers to as
torts. There's a good reason: leading legal writers agree that no one
has satisfactorily defined a tort. This is partly because torts are so
common, so widespread and so varied. You are far more likely to be the
victim of a tort than a crime, and you are also far more likely to com-
mit a tort than a crime.
The purposes of this paper are sevenfold:
1. To explain torts;
2. To show how they differ from crimes;
3. To stress the importance, in the law of torts, of
negligence, intent and liability;
4. To indicate what relief is available to you when a
tort has been committed against you or your property;
5. To show you how to seek that relief by starting a
lawsuit;
6. To explain how such a suit is tried;
7. To relate all of the above purposes to a specific
classification of circumstances, i.e., how they relate
to the role and responsibilities of a systems operator
(Sysop) of an electronic bulletin board service (BBS).
TORTS VERSUS CRIMES - A tort is a civil wrong against an individual. A
crime, on the other hand, is an offense against the public at large, or
the state. For example, an automobile driver who carelessly bumps into
your car in a parking lot and crumples the fender has committed a tort
against your property. Because the law recognizes your legal right to
freedom from injury to your property caused by other people's careless-
ness, you are entitled to sue the driver and be awarded damages for his
breach of your tight. But, he has committed no crime.
Once again, a tort is an act that violates your private or personal
rights. Unless the act that is a tort is also a crime, the state will
do nothing about it. If you believe someone has violated your personal
rights -- but has not acted against the interests of the public as a
whole -- it is entirely up to you to seek relief by suing the person in
the civil courts. If the person who you believe has legally aggrieved
you is found liable -- that is, the judge or jury finds that the person
did in fact injure you or your property -- the person may be required
to:
1. give you relief by paying you "damages" for the injury or
property loss you suffered,
2. discontinue the wrongful acts, or
3. restore to you what was taken from you.
In some cases the person may be imprisoned.
If the tort is also a crime, two separate legal actions confront the
wrongdoer: your's and the state's.
A tort is usually committed when someone injures you physically, dam-
ages or misuses your property, attacks your reputation arbitrarily or
takes away your liberty and freedom of action without just cause. To
recover damages for a tort you must prove either that the act was com-
mitted with deliberate intent (as when someone spreads false accusa-
tions about you) or that it was the result of negligence.
In most cases you must prove that the act inflicted actual damage or
injuries. A malicious act that does you no harm is not sufficient cause
for legal action.
A person who is proved to have committed a tort will be held respon-
sible for all the damages proved to have resulted from the act, includ-
ing damages to "third parties."
WHO IS RESPONSIBLE FOR COMMITTING A TORT - Generally speaking, any per-
son, young or old, mentally competent or not, is responsible for
his/her torts, i.e., for the consequences of the actions to others in-
jured by those actions. Here is an interesting distinction between
torts and crimes. Children below a certain age not usually liable for
crimes they commit, on the ground that children of their age really do
not understand the significance of their actions. For basically the
same reason, persons who have been adjudged mentally incompetent are
not liable for their crimes. BUT, these SAME persons may be liable for
their torts, whether they are deliberate or the result of carelessness.
Intent is an essential element in such torts as libel and trespass. Al-
most all employers are liable for the torts of their employees if the
employee committed the harmful act during the course of employment.
(This also applies to "agent" and "principal" relationships.) The point
to keep in mind is that the law usually holds an employer liable for
what happens when his employee is carrying out instructions and/or
working on behalf on the employer. But, not all employers -- especially
not governmental ones. The doctrine of sovereign immunity -- that the
state cannot be sued except by its own consent -- severely limits your
right to sue governments and governmental bodies for the torts of their
employees. However, the US government and the government of many states
have in recent years passed laws that do permit such suits to be
brought against them. In some instances separate courts, usually called
courts of claims, have been established to handle these actions.
Some people may not be held liable in tort actions. Among them are hus-
bands and wives, who are not considered responsible for each other's
torts, and parents, who are not usually liable for the torts of their
children. The situation changes, however, if the parent knows that the
child has developed what lawyers call a vicious propensity to commit
acts that injure other people or their property. In addition, some
states have passed laws that do make the parents responsible for will-
ful damage caused by their minor children.
Of course, if it can be established that the husband or wife or parent
or other adult actually thought up the tortious action, planned it and
coerced or persuaded the spouse or child into committing it, than that
adult or spouse WILL be held responsible for the act and liable for the
damage it caused.
Except for so-called acts of God, any interference with your personal
or property rights, whether intentional or through negligence, is a
tort.
When it comes to personal rights, torts typically deal with one or more
of the following intentional violations: (negligence comes later)
1. Interference with your freedom of movement
2. Misuse of the legal process
3. Interference with your person
4. Interference with your peace of mind
5. Interference with your privacy
6. Interference with your reputation
For our purposes, we shall examine only items 4, 5 and 6 -- interfer-
ence with your peace of mind, your privacy and your reputation.
INTERFERENCE WITH YOUR PEACE OF MIND - The growth in the sciences of
medicine and psychology has brought about an expansion of the idea of
freedom from fear or apprehension. You may have an action against some-
one who intentionally inflicts mental suffering on you. You have a
right to freedom from the consequences of mentally abusing malicious
acts, and the courts protect that right by awarding damages -- nominal,
or small, if the harm is slight; punitive, or large, if the damage is
great or the act particularly outrageous. Consider the mental anguish
if you are worried that someone will come into your home and cause dam-
age, or that someone will "attack" your computer system while you are
not around to protect it. The more expensive the equipment (your prop-
erty), the more punitive the damages. At times, the intent alone, par-
ticularly if shown to be an act of vengeance or malice, can be suffi-
cient to award punitive damages that are considerably greater than the
cost or value of property, depending on the mental anguish suffered. If
such an act disrupts a business, the mental anguish can be quite se-
vere, and the tort may be punishable by stiff fines and/or a jail term.
In some cases, such torts can be classified as a crime, which then ne-
cessitates the state to step in, since some states view the mental an-
guish to be associated with acts of violence that concern the public at
large. This applies since other businesses may be subjected to similar
malfeasance.
INTERFERENCE WITH YOUR PRIVACY - This is another right protected by the
courts -- your right to be let alone. Such interference can take many
forms, some obvious, others not so obvious. One of the not-so-obvious,
or less direct violations to privacy, is the objectionable publicity to
private information about you.
INTERFERENCE WITH YOUR REPUTATION - As important as any freedom to
which you are entitled is freedom from unwarranted, untruthful attacks
on your character. This kind of attack, if made in the presence of
other people, constitutes defamation, for which you are entitled to
nominal or punitive damages, as the case may be. If you are defamed
orally, you have been slandered. If the defamation is in writing and
shown to or seen by someone else, you have been libeled. Slander is the
less serious of the two torts because it is fleeting. The spoken words
of defamation exist only as they are uttered and then disappear for-
ever. Libel is permanent, and the damages awarded are therefore usually
larger. Generally speaking, defamatory statements made over radio and
television, and via computer are now considered libelous rather than
slanderous.
You can recover damages for slander or libel without proving actual fi-
nancial loss if you are accused of something considered serious. The
reason is that, since the good reputation of a professional person is
essential to his/her ability to make a living, the law assumes that
such accusations will diminish that ability and will therefore damage
the individual. This kind of attack slander or libel is called slander
or libel per se. Spreading lies about others, especially when the lies
affect their ability to make a living or may hurt them in their family
or public relationships, constitutes slander if spoken to others and
libel if written or transmitted to others.
With property rights, torts are generally concerned with the following
intentional violations: (negligence comes later)
1. Nuisances
2. Keeping others off your property
3. Misuse of your personal property
4. Interference with your contractual and business
relationships
5. Fraud, deceit and misrepresentation
For our purposes, we shall examine items 3, 4 and 5 above, i.e., misuse
of your personal property, interference with contractual/business rela-
tionships, and fraud, etc.
MISUSE OF YOUR PERSONAL PROPERTY - You have the right to the unre-
stricted and uninterrupted enjoyment of your personal property. The law
provides remedies for the intentional interruption of your right or in-
terference with it. Interference with your personal property is called
the tort of conversion. It can be conduct intended to affect your per-
sonal property or conduct that, even though not intentionally wrong, is
inconsistent with your right of ownership.
Examples of conversion are:
1. Someone intentionally alters the property
2. Someone uses your property in a manner inconsistent
with your wishes or requirements
In both of these cases, your control of your property has been inter-
fered with, and you are entitled to sue for the tort of conversion.
INTERFERENCE WITH YOUR CONTRACTUAL AND BUSINESS RELATIONSHIPS - You
have a right to freedom from interference by others with the contrac-
tual relationships you have entered into. This applies even when, after
the contractual or business relationship, admission of errors are ac-
knowledged by the offending party. (Remember, contracts occur into com-
mon forms: oral and written. NOTE: The law of contracts is beyond the
scope of this paper, and will only be referred to as sufficient to re-
late to torts as defined herein.) Damages can be punitive if you can
convince the court that the defendant specifically set out to interfere
with the relationship or set out to ruin your reputation within the
confines of your relationship. Proof need only be beyond a reasonable
doubt and not necessarily overwhelmingly convincing. Potential disrup-
tion also is considered, since business relationships can be both
short- and long-term.
FRAUD, DECEIT AND MISREPRESENTATION - You have a right to freedom from
being improperly induced or persuaded to do something, or not to do
something, by someone's trickery. What is involved in this tort is:
1. A conscious or knowing false statement made to you,
2. by someone who knew the statement was false,
3. with the intention that you would rely on it,
4. followed by your actual reliance on it, and
5. your "suffering" as a result.
The main thing here is for the person suing to establish that he/she
was consciously tricked and that if the correct information had been
given, the suing person would not have acted as he/she did.
We now move onto the Law of Torts as it applies to the accidental in-
terference with your personal or property rights. This is typically
classified under the general heading of NEGLIGENCE.
Earlier, we were concerned with the intentional interferences with your
various rights as a member of society. In each of the torts presented
the harm was intended or the result of an intended act. But, there is a
large area of the law of torts that is basically different -- the area
of civil wrongs or torts that are the result of negligence, or mere
carelessness.
In our increasingly complex society, wrongs resulting from carelessness
are becoming more numerous than intentional torts. In any case, there
is a major difference between the two kinds of wrong: to recover from
someone's negligent conduct toward you, you must prove actual damages
-- you must establish that the person really did injure your person or
your property. By contrast with intentional torts, such as trespass,
you are entitled to some damages just by proving the tort was commit-
ted.
Unintentional interference can result either from negligence or from
accident.
WHAT IS NEGLIGENCE - Legal actionable negligence exists when:
1. You have a legal duty or obligation to conform to a
certain standard of conduct to protect others against
unreasonable risk;
2. You fail to conform to that standard;
3. Your conduct is so closely related to the resulting
injury that it can be said to have caused it --
to have been its proximate cause, and
4. Actual damages results from your conduct.
If these four elements are present in a situation in which you are in-
volved, you may be sued and you will find it hard to defend yourself.
These elements of negligence are reasonably clear. But, you should rec-
ognize that the existence of "a legal duty or obligation" to others may
depend on the circumstances of the case in which you are being sued.
You have a legal duty to others only if the court or a statute says you
do. You have no obligation if the court finds none.
When a tort suit is tried, the standard of care expected of the defen-
dant is defined by the judge (or the jury). The judge (or the jury, if
there is one) determines the facts of the case and applies them in
light of his/her (or their) definition.
In groping around for guidelines as to whether you do or do not have a
duty to act a certain way, and in deciding whether your conduct meets
the required standard, the courts compare your conduct with the pre-
sumed conduct of a reasonable or prudent man. If this imaginary reason-
able or prudent man would have acted a certain way, the person who does
is liable. You are supposed to do what the prudent man would do, and
you are not supposed to do what the prudent man would not do.
As A.P. Herbert, the English legal humorist, put it:
He is an ideal, a standard, the embodiment of all
those qualities which we demand of the good citizen...
He is one who invariably looks where he is going,
and is careful to examine the immediate foreground
before he executes a leap or a bound...who never swears,
gambles or loses his temper; who uses nothing except
in moderation....In all that mass of authorities which
bears upon this branch of the law there is no single
mention of a reasonable woman.
A key element in a successful negligence suit is the connection between
what was done and the injury that supposedly resulted from the act. The
person suing must prove that the defendant caused injury to his/her
person or property. Some courts in trying to decide whether an act was
the proximate cause of subsequent damage have applied what is called
the "foreseeability test." They hold that the negligence is not the
proximate cause unless the consequence was one that, in the light of
all circumstances, our reasonably prudent man could have foreseen as a
probably result of his actions or his failure to act.
(NOTE: There is modification to the prudent man rule when professionals
or experts in given fields are involved. Here, the court views the
facts in light of the nature of the knowledge of the expert. For ex-
ample, a computer programmer is not viewed the same way as a casual
computer user. Actions attributable to an expert are viewed in terms of
how the typical expert in that field would have acted or would not have
acted. If a casual computer user unintentionally damaged your computer
system, it would not be given the same consideration as if an "expert"
did the same thing. Remember, we are dealing with reasonableness, and
expertise or skills above the "ordinary person" can weigh heavily in
determining the final outcome of a tort-based lawsuit.
Other circumstances can apply, particularly if a business transaction
occurs and/or a contract is in force.)
YOUR DUTY TO OTHERS WHO COME ONTO YOUR PROPERTY - If you own property
(any kind of property, not just real estate, e.g., computer bulletin
board systems), you have definite responsibilities to persons coming
onto that property legally or otherwise. Even to a trespasser, someone
entering your property illegally, you have an obligation to give warn-
ing of any genuinely dangerous (or injurious/harmful) condition known
only to you. If you hobby is a computer bulletin board, you'd be wise
to post a warning sign (or disclaimer) so that casual trespassers real-
ize that there may be a danger in wandering around your property.
(NOTE: You must be able to prove that the warning was in fact in such a
place, state or condition that it could not have been bypassed or mis-
interpreted. A warning (or disclaimer) that people cannot easily view
or is not reasonably obvious is no warning at all. For example, a
typical news item that can be bypassed on a bulletin board log-on is
not considered a reasonable posting of a warning because it can be by-
passed -- is not necessarily obvious to all.)
You owe a stricter responsibility to trespassing children (minors) be-
cause they are children and unlikely to realize or care about the fine
points of the law of trespass. To protect young trespassers and to com-
pensate them for injuries they may suffer in behaving like children,
the courts have thrown over them a mantle called the attractive nui-
sance doctrine. This doctrine requires the property owner who maintains
on his property anything attractive to young children, and dangerous to
them because of their immaturity and unawareness of possible risks, to
exercise reasonable care in protecting them against the dangers of the
attraction.
(Think about this should you be carrying pornographic material on your
bulletin board, or other such attractions that children can be harmed
from. Computer games may become a potential source of difficulty given
the current lawsuit against the manufacturers and distributors of Dun-
geons & Dragons -- the "game" being blamed as a teenager's cause for
committing a crime. As "ludicrous" as it may sound, the case is going
to court.)
There is a group of people called licensees who may come onto your
property with your implied permission. They are different from tres-
passers who have no permission, and you have a somewhat stronger obli-
gation to protect them. You have a duty to warn them of dangerous or
hazardous or harmful conditions they may not anticipate or easily see.
(The law regarding your obligation to casual guests in your computer
system is specialized and evolving.)
Invitees are the people coming onto your property to whom you owe the
maximum duty of protection, not only against risks you actually do know
about, but also against dangers that you should know about if you exer-
cised reasonable care. Invitees are persons who enter your property
upon your business and upon your express or implied invitation.
As in most tort cases, the court and the jury will carefully consider
the facts in each situation before coming to a decision about whether
or not the defendant was negligent. One rule commonly applied is that
the standard of care required of the property owner is greater to the
degree that the presence of people on his property is helpful or prof-
itable to the property owner. In other words, a bulletin board sysop,
who gains a benefit from your visiting his/her system, has a greater
duty to you than does a friend who invites you to his/her home as a so-
cial guest. (Note: the benefit need NOT be monetary.). The application
of general rules is up to the court. The liability to trespassers,
invitees and licensees is the owner's or that of the person in legal
possession. (For example, if you lend your computer system to someone,
and harm is done, the liability belongs to the person in legal posses-
sion, which may or may not be your's., depending on the nature of the
possession and of the restrictions thereof.)
Torts frequently occur under circumstances in which, although it is im-
possible to prove negligence on anyone's part, what happens is so ex-
traordinary that negligence is presumed. As the courts say, the thing
speaks for itself: res ipsa loquitur.
The doctrine of res ipsa loquitur may also be invoked where damage is
caused by the breakdown of a device that is under the complete owner-
ship and control of the defendant.
THE IMPORTANCE OF LIABILITY - Underlying all of this is your right to
recover for injuries you suffer from interference with your right to be
free from a variety of wrongs, some well established and others just
becoming established. If you feel that you have been wronged, you
should carefully consider still another factor that will influence your
decision whether or not to sue.
This is the question, which only your lawyer should decide, of whether
there is any liability on the part of the person who has wronged you.
He will be liable, and your legal action against him will succeed, only
if he/she has actually violated a legal duty which is owed to you as an
individual. Forgetting momentarily the question of your responsibility
for what happened, you can recover only where what was done or failed
to be done violated the course of conduct that the reasonably prudent
man would have done.
If the conduct of the person you want to sue has not, judged by the
presumed conduct of the reasonably prudent man, violated a duty to you,
the chances are you have no action. Liability is essential: you can win
your suit only if the person you are suing acted or failed to act in
such a way as to make the person liable. Liability results from conduct
that violates or interfers with one of your rights that the law recog-
nizes. If there is no such conduct there is no liability, no matteer
how aggrieved you may feel.
However, remember that the "prudent man" standard can also vary. Pro-
fessionals, i.e., doctors, lawyers, computer specialists, and the like,
are not your "ordinary" layperson. As such, the standards that govern
their conduct are viewed as a prudent practioner within the area of
speciality. These standards are gauged at a higher level than the ordi-
nary citizen's.
RIGHTING THE WRONG - Let's say that your lawyer has decided that, on
the basis of the facts you have given, the person who has wronged you
had a duty not to do so and that a court can therefore find the person
liable for violation of that duty. The question of which remedy you
should seek becomes all-important. Underlying the answer to this ques-
tion is the subject of damages. Also, keep in mind that many inten-
tional torts are or can be crimes.
Someone, for example, breaks into your computer system and destroys all
of the information you had stored there. It would take you weeks, if
not months, if at all, to be able to restore that information. However,
in the process you are severely compromised for work that you were per-
forming for someone for a fee. What is the "cost" of the damage? You
need to decide whether what you've lost is worth the expense of suing.
Also, is the person you are suing "judgment-proof?" That is, is the
person being sued broke or without assets? Sure you can sue, but if you
can't recover anything, you've gained nothing. You've lost the expense
of the legal action. You may, therefore, decide to sue on principle.
Provided you have the funds to take legal action, and do not care very
much about recovering money damages, you may continue your efforts. In
this example, some states would view the action as a crime. If so,
"punishment" may no longer be simply "monetary" in nature.
You are not limited to asking for money damages when you have been de-
prived of your property. You may try to get back the property itself,
or a reasonable facsimile. Let's say that someone causes damage to your
equipment. You may sue to get back equipment of equal value.
There are certain other torts for which money damages are not the re-
lief you want. If you are bothered by the neighbor who persists in
walking across your property despite all your requests that he stop,
money damages don't help you much. What you want in such a case is a
court order that he stop. Such an order is called an "injunction."
Now, let's apply all of this to the BBS environment.
ABBS wishes to thank Frank Levine, Attorney at Law and Co-Sysop
at ABBS, for the following. We are uncertain as to its origin,
but know that it has come from another bulletin board system.
This and our paper on the Law of Torts, represent our efforts
to provide information to fellow Sysops/BBS operators in hopes
to enlighten and contribute toward the growth and success of
the services we all provide and the communities we all serve.
James J. Spinelli
Sysop, ABBS
(914) 779-4273
ELECTRONIC COMMUNICATIONS PRIVACY ACT OF 1986
H.R. 4952
Some of its provisions are important to BBS sysops and users.
The following is an excerpt from the House Report (
99-647).
CHAPTER 121--STORED WIRE AND ELECTRONIC COMMUNICATIONS
AND TRANSACTION RECORDS ACCESS
Section 2701. Unlawful access to stored communications
(a) Offense.--Except as provided in subsection 9c) of
this section whoever--
(1) intentionally accesses without authorization a
facility through which an electronic
communiation service is provided; or
(2) intentionally exceeds an authorization to ac-
cess that facility and thereby obtains, alters,
or prevents authorized access to a
wire or electronic communication while it is
in electronic storage in such system shall be
punished as provided in subsection (b) of this
section.
(b) Punishment.-- The punishment for an offense under
sub section (a) of this section is--
(1) if the offense is committed for purposes of
commercial advantage, malicious destruction or
damages, or private commercial gain--
(A) a fine of not more than $250,000 or
imprisonment for not more than one
year, or both, in the case of a first
offense under this subparagraph; and
(B) a fine under this title or imprison-
ment for not more than two years or
both for an subsequent offense under
this subparagraph; and
(2) a fine of not more than $5,000 or imprisonment
for not more than six months, or both in any
other case.
Section 2702. Disclosure of Contents
(a) Prohibitions.--Except as provided in subsection
(b)--
(1) a person or entitle providing an electronic
communication service to the public shall not
knowingly divulge to any person or entity the
contents of a communication while in
electronic storage by that service; and
(2) a person or entity providing remote computing
service to the public shall not knowingly di-
vulge to any person or entity the contents of
any communication which is carried or main-
tained on that service--
(A) on behalf of, and received by means
of electronic transmission from (or
created by means of computer
processing of communications received
by means of electronic transmission
from), a subscriber or customer of
such service; and
(B) solely for the purpose of providing
storage or computer processing ser-
vices to such subscriber or customer,
if the provider is not authorized to
access the contents of any such
communications for purposes of pro-
viding any services other than
storage or computer processing.
(b) Exceptions.--A person or entity may divulge the con-
tents of a communication ---
(1) to an addressee or intended recipient of such
communication or an agent of such addressee or
intended recipient;
(2) as otherwise authorized in section 2516,
2511(2)(a) or 2703 of this title;
(3) with the lawful consent of the originator or an
addressee or intended recipient of such
communication, or the subscriber in the case of
remote computing service;
(4) to a person employed or authorized or whose fa-
cilities are suited to forward such communication
to its destination;
(5) as may be necessarily incident to the rendition
of the service or to the protection of the
rights or property of the provider of that ser-
vice; or
(6)to a law enforcement agency, if such contents--
(A) were inadvertently obtained by ser-
vice provider; and
(B) appear to pertain to the commission
of a crime.
REPORT LANGUAGE
Proposed section 2701 provides a new criminal offense. The
offense consists of either: (1) intentionally accessing,
without authorization, a facility through which an electronic
communication service is provided or (2) intentionally exceeding
the authorization of such facility.
In addition, the offense requires that the offender must, as
a result of such conduct, obtain, alter, or prevent
unauthorized access to a wire or electronic communication
while it is in electronic storage in such a system. The
term electronic storage is defined in section 2510(17) of
Title 18. Electronic storage means any temporary,
intermediate storage of a wire or electronic communication
incidental to the electronic transmission thereof and the
storage of such communication by an electronic communications
service for the purpose of back-up protection of such
communication.
Section 2701(a) makes it an offense intentionally to access
without authorization, or to exceed an authorization to ac-
cess, an electronic communication service and thereby obtain,
or prevent authorized access to a wire or electronic
communication while it is in electronic storage in such sys-
tem. This provision addresses the growing problem of unautho-
rized persons deliberately gaining access to, and sometimes
tampering with, electronic or wire communication that are not
intended to be available to the public.
The Committee recognizes however that some electronic com-
munication services offer specific features, sometimes known
as computer "electronic bulletin boards," through which
interested person may communicate openly with the public to
exchange computer programs in the public domain and other
types of information that may be distributed without legal
constraint.
It is not the intent to hinder the development or use of
"electronic bulletin boards" or other comparable services.
The Committee believes that where communciations are
readily accessible to the general public, the sender has,
for purposes of Section 2701(a), extended an "authorization"
to the public to access those communications. A person may
reasonably conclude that a communication is readily acces-
sible to the general public if the telephone number of the
system and other means of access are widely known, and if a
person does not, in the course of gaining access, encounter
any warnings, encryptions, password requests or other indicia
of intended privacy. To access a communication on such a
system should not be a violation of the law.
Some communcation systems offer a mixture of services, some,
such as bulletin boards, which may be readily accessible to
the general public, while others--such as electronic
mail--may be intended to be confidential. Such a system
typically has two or more distinct levels of security. A
user may be able to access electronic bulletin boards and
the like merely with a password he assigns to himself,
while access to such features as electronic mail ordinarily
entails a higher level of security (i.e., the mail must be
addressed to the user to be accessible specifically).
Section 2701 would apply differently to the different
services. These wire or electronic communications which the
service provider attempts to keep confidential would be
protected, while the statute would impose no liability for
access to feature configured to be readily accessible to the
general public.
Section 2702 specifies that a person or entity providing wire
or electronic communication service to the public may
divulge the contents of a communication while in electronic
storage by that service with the lawful consent of the
originator or any addressee or intended addressee or
intended recipient of such communication. The committee
emphasizes that "lawful consent" in this context, need not
take the form of a formal written document of consent. A
grant of consent electronically would protect the service
provider from liability for disclosure under section 2702.
Under various circumstances, consent might be inferred to
have arisen from a course of dealing between the service
provider and the customer or subscriber--e.g. where a
history of transactions between the parties offers a basis
for a reasonable understanding that a consent to disclosure
attaches to a particular class of communications. Consent
may also flow from a user having had a reasonable basis for
knowing that disclosure or use may be made with respect to a
communications, and having taken action that evidences
acquiescence to such disclosure or use--e.g., continued use
of such an electronic communication system. Another type of
implied consent might be inferred from the very nature of
the electronic transaction. For example, a subscriber who
places a communication on a computer "electronic bulletin
board," with a reasonable basis for knowing that such
communications are freely made available to the public,
should be considered to have given consent to the disclosure
or use of the communication. If conditions governing
disclosure or use are spelled out in the rules of an
electronic communication service, and those rules are
available to users or in contracts for the provision of such
services, it would be appropriate to imply consent on the
part of a user to disclosures or uses consistent with those
rules.
Section 2702(a) specifies that a person or entity providing
a wire or electronic communication service or remote
computer services to the public shall not knowingly divulge
the contents of any communication while in electronic
storage by that service to any person or entity other than
the addressee or intended recipient of such communication or
an agent of such addressee or intended recipient of the
communications. Under some circumstances, however, a
customer or subscriber to a wire or electronic communication
service may place a communication on the service without
specifying an addressee.
The Committee intends, in that situation, that the communica-
tion at a minimum be deemed addressed to the service provider
for purposes of Section 2702(b). Because an addressee may
consent to the disclosure of a communication to any other
person, a service provider or system operator, as implied
addressee, may disclose the contents of an unaddressed
communcation.
A person may be an "intended recipient" of a
communication, for purpose of section 2702, even if he is
not individually identified by name or otherwise. A
communication may be addressed to the members of a group,
for example. In the case of an electronic bulletin board,
for instance, a communication might be directed to all
members of a previously formed "special interest group" or,
alternatively, to all members of the public who are
interested in a particular topic of discussion. In such an
instance, the service provider would not be liable for
disclosure to any person who might reasonably be considered
to fall in the class of intended recipients.
COMMENTS
The entire document has to be read and studied to draw final
conclusions on a number of important issues. However, the
following observations can be made:
1. SYSOPS are to be considered providers of an electronic
communications service. In other words, whenever a BBS
goes up, it becomes an electronic communication service
subject to the requirements of the law.
2. Users of the BBS are protected and may have grounds to take
action against or ask that criminal charges be brought if
their communications are improperly disclosed.
3. SYSOPs do have added protection against hackers, and
federal law enforcement is available.
4. Any "general" messages addressed to all members of the
board, provided the board is open to the general public, may
be disclosed and are not protected.
5. However:
a. It is unclear whether a sysop may legally read pri-
vate mail on his board addressed to another user, un-
less sysop discloses in a warning message that
he/she may read such messages.
b. Conferences that are not generally open to the pub-
lic may create an expectation of privacy and there
will be limited rights to disclose information.
c. Major changes in security procedures may require
user consent, or their messages may have to be re-
moved.
6. It would be prudent to have a major disclaimer in the in-
troduction of each BBS session, stating that there is no ex-
pectation of privacy and that anything left on the board
may be read or disclosed by the sysop.
Next, we present the "LEGAL" view.
We wish to thank our friend, Ruel Hernandez, for the information in
this section of our report.
COMPUTER_ELECTRONIC_MAIL_AND_PRIVACY
INTRODUCTION
Four years ago, Congress introduced legislation which sought to
provide federal statutory guidelines for the privacy protection of
electronic communications, including electronic mail (e-mail) found on
commercial computer-based services and on other remote computer systems such
as electronic bulletin board systems (BBS). The old federal wiretap law
only gave protection to normal audio telephone communications. Before the
legislation culminated into the Electronic Communications Privacy Act of
1986 (ECPA), which went into effect on January 20, 1987, there was no
contemplation of computer-based electronic communications being transmitted
across telephone lines and then being stored on disk for later retrieval by
or forwarding to its intended recipient. Federal law did not provide
guidelines for protecting the transmitted electronic messages once they were
stored on these computer-based communications services and systems.
QUESTIONS
(1) Whether electronic mail and other intended private material stored
on an electronic computer communications service or system have Fourth
Amendment privacy protection?
(2) Should private electronic mail and other such material be accorded
federal statutory protection guidelines such as those enjoyed by the U.S.
Mail?
PROBLEM
Law enforcement seeks criminal evidence stored as e-mail either on a
commercial computer service, such as CompuServe, GEnie or The Source, or on
a hobbyist-supported BBS. (Note, this situation is equally applicable to
personal, private data stored on a remote system for later retrieval, such
as with CompuServe's "personal file" online storage capabilities.)
For example, a computer user calls up a computer communication system.
Using the electronic mail function, he leaves a private message that can
only be read by an intended recipient. The message is to inform the
recipient of a conspiracy plan to violate a federal or state criminal
statute. Law enforcement gets a tip about the criminal activity and learn
that incriminating evidence may be found on the computer system.
In 1982, such a situation occurred. (Meeks, Life_at_300_Baud:_Crime_on
the_BBS_Network, Profiles, Aug. 1986, 12-13.) A Detroit federal grand jury,
investigating a million-dollar cocaine ring, issued a subpoena ordering a
commercial service, The Source, to hand over private subscriber data files.
The files were routinely backed up to guard against system crashes. The
grand jury was looking for evidence to show that the cocaine ring was using
The Source as a communications base to send messages to members of the ring.
With such evidence, the grand jury could implicate and indict those
suspected of being part of the cocaine ring. The Source refused to obey the
subpoena on the basis of privacy. The prosecution argued The Source could
not vicariously assert a subscriber's privacy rights. Constitutional rights
are personal and could only be asserted by the person whose rights are
invaded. Additionally, since the files containing messages were duplicated
by the service, any user expectation of privacy would be extinguished. A
court battle ensued. However, before a ruling could be made, the kingpin of
the cocaine ring entered a surprise preemptive guilty plea to federal drug
trafficking charges. The case against The Source was discontinued.
Publicly posted messages and other public material may be easily
retrieved by law enforcement. It is the private material, such as e-mail,
which posed the problem.
Law enforcement's task was then to gather enough evidence to
substantiate a criminal case. Specifically, they would want the e-mail, or
other private files, transmitted by suspected criminals. In opposition, the
provider or systems operator of a computer communications service or system,
in his assumed role as keeper of transmitted private electronic messages,
would not want to turn over the private data.
INADEQUACY OF OLD LAW
Meeks noted that as of August, 1986, "no ... protection exist[ed] for
electronic communications. Any law enforcement agency can, for example,
confiscate a local BBS and examine all the message traffic," including all
private files and e-mail. (Id.)
CASE LAW
There is little case law available on computer communications and
Fourth Amendment constitutional problems. (See_generally M.D. Scott,
Computer Law, 9-9 (1984 & Special Update, Aug. 1, 1984).) If not for the
preemptive guilty plea, the above described Detroit case may have provided
some guidance on computer-based communications and privacy issues.
Of the available cases, there are those which primarily dealt with
financial information found in bank and consumer credit organization
computers. In U.S._v._Davey, 426 F.2d 842, 845 (2 Cir. 1970), the
government had the right to require the production of relevant information
wherever it may be lodged and regardless of the form in which it is kept and
the manner in which it may be retrieved, so long as it pays the reasonable
costs of retrieval. In a California case, Burrows_v._Superior_Court, 13
Cal. 3d 238, 243, 118 Cal. Rptr. 166, 169 (1974), a depositor was found to
have a reasonable expectation that a bank would maintain the confidentiality
of both his papers in check form originating from the depositor and the
depositor's bank statements and records of those checks. However, in
U.S._v. Miller, 425 U.S. 435, 96 S.Ct. 1619 (1976), customer account
records on a bank's computer were held to not be private papers of the bank
customer, and, hence, there was no Fourth Amendment problem when they are
subpoenaed directly from the bank.
Although these cases have more of a business character in contrast to
personal e-mail found on computer systems such as CompuServe or a hobbyist-
supported BBS, they would hold that there would be very little to legally
stop unauthorized access to computer data and information.
Under the old law, a prosecutor, as in the Detroit case, may try to
analogize duplicated and backed up e-mail to business situations where data
on business computer databases are also backed up. Both types of computer
data are stored on a system and then later retrieved. The provider or
systems operator of a computer electronic communications system would
counterargue that the nature of computers always require the duplication and
backup of any computer data, whether the data files be e-mail or centrally-
based financial or credit data. Data stored on magnetic media are prone to
possible destruction. Duplication does not necessarily make e-mail the same
as financial or credit data stored in business computers. Centrally-based
business information is more concerned with the data processing. That
information is generally stored and retrieved by the same operator. E-mail
is more concerned with personal communications between individuals where the
sender transmits a private message to be retrieved only by an intended
recipient. The sender and the recipient have subjective expectations of
privacy that when viewed objectively are reasonable. Therefore, there would
be a constitutionally protected expectation of privacy under Katz_v._U.S.,
389 U.S. 347, 88 S.Ct. 507 (1967).
However, the prosecution would note under California_v._Ciraolo, --
U.S. --, 106 S.Ct. 1809 (1984), users would have to protect their electronic
mail from any privacy intrusion. The provider or operator of the service or
system has ultimate control over it. He has complete access to all areas of
the system. He could easily examine the material. The prosecution would
note the user could not reasonably protect his private data from provider or
operator invasion. This "knot-hole," where an observer can make an
observation from a lawful position, would exclude any reasonable expectation
of privacy. If there is no privacy, there can be no search and therefore no
Fourth Amendment constitutional violation. Law enforcement can retrieve the
material.
The Justice Department noted the ambiguity of the knothole in a
response to Senator Leahy's question whether the then existing wiretap law
was adequate to cover computer communications. (S. Rep. No. 541, 99th
Cong., 2d Sess. 4 reprinted_in 1986 U.S. Code Cong. & Ad. News 3558.) It
was "not always clear or obvious" whether a reasonable expectation of
privacy existed. (Id.)
FEDERAL WIRETAP STATUTES
The old federal wiretap statutes protected oral telephone
communications from police interceptions. This protection was made during
1968 in response to electronic eavesdropping conducted by government.
(Cohodas, Congress_Races_to_stay_Ahead_of_Technology, Congressional
Quarterly Weekly Report, May 31, 1986, 1235.) Although e-mail appears to
come under the old 18 U.S.C. sec. 2510(1) definition of "wire
communication," it was limited to audio transmissions by wire or cable. The
old 18 U.S.C. sec. 2510(4) required that an interception of a wire
communication be an oral acquisition of the communication. By being
"oral," the communication must be "heard." There would be a problem as to
whether an electronic communication could be "heard." Data transmissions
over telephone lines generally sound like unintelligible noisy static or
high pitched tones. There would certainly be no protection after a
communication has completed its transmission and been stored on a computer.
The communication's conversion into computer stored data, thus no longer in
transmission until later retrieved or forwarded as transmission to another
computer system, would clearly take the communication out of the old
statutory protected coverage.
"Eighteen years ago ... Congress could not appreciate - or in some
cases even contemplate - [today's] telecommunications and computer
technology...." (132 Cong. Rec. S7992 (daily ed. June 19, 1986) (statement
of Sen. Leahy).)
COMPARISON WITH U.S. MAIL PROTECTION
A letter sent by first class mail is given a high level of protection
against unauthorized intrusion by a combination of federal and U.S. Postal
Service statutes and regulations. For instance, the unauthorized taking out
of and examining of the contents of mail held in a "depository for mail
matter" before it is delivered to the mail's intended recipient is
punishable by fine, imprisonment, or both. (18 U.S.C. sec. 1702.) In
comparison, under the old law, electronic communications had no protection.
Federal protection for U.S. Mail provided a suggested direction as to how
electronic communications should be protected when it was no longer in
transmission.
SOLUTION - THE NEW LAW
There are two methods towards a solution: (1) court decisions; or (2)
new legislated privacy protection.
COURT DECISIONS
Courts may have chosen to read computer communications protection into
the old federal wiretap statute or into existing state law. However, they
were reluctant to do so. Courts "are in no hurry to [revise or make new law
in this area] and some judges are openly asking Congress for help....
[F]ederal Appeals Court Judge Richard Posner in Chicago said Congress needed
to revise current law, adding that 'judges are not authorized to amend
statutes even to bring them up-to-date.'" (Cohodas, 1233.)
NEW STATUTE
On October 21, 1986, President Reagan signed the new Electronic
Communications Privacy Act of 1986 amending the federal wiretap law. ECPA
went into effect during the beginning of 1987. (P.L. 99-508,
Title I, sec. 111, 100 Stat. 1859; P.L. 99-508, Title II, sec. 202, 100
Stat. 1868.) ECPA created parallel privacy protection against both
interception of electronic communications while in transmission and
unauthorized access to electronic communications stored on a system.
The new ECPA first provides privacy protection for any
'electronic communication' ... [by] any transfer of signs,
signals, writing, images, sounds, data or intelligence of any
nature transmitted in whole or in part by a wire, radio,
electromagnetic, photoelectronic or photooptical system that
affects interstate or foreign commerce...."
(18 U.S.C. secs. 2510(12), 2511.) The Senate Report noted examples of
electronic communications to include non-voice communications such as
"electronic mail, digitized transmissions, and video teleconferences." (S.
Rep. No. 541, 99th Cong., 2d Sess. 14 reprinted_in 1986 U.S. Code Cong. &
Ad. News 3568.) Electronic communication is defined in terms of how it is
transmitted. So long as the means by which a communication is transmitted
affects interstate or foreign commerce, the communication is covered ECPA.
(18 U.S.C. sec. 2510(12).) Generally, that would include all telephonic
means including private networks and intra-company communications. (S.
Rep. No. 541, 99th Cong., 2d Sess. 12 reprinted_in 1986 U.S. Code Cong. &
Ad. News 3566.)
Second, ECPA protects the electronic communication when it has been
stored after transmission, such as e-mail left on an electronic computer
communication system for later pickup by its intended recipient. (18 U.S.C.
sec. 2510(17).) The legislation makes it a federal criminal offense to
break into any electronic system holding private communications or to exceed
authorized access to alter or obtain the stored communications. (18 U.S.C.
sec. 2701(a).)
The legislation would protect electronic computer communication systems
from law enforcement invasion of user e-mail without a court order. (18
U.S.C. secs. 2517, 2518, 2703.) Although the burden of preventing
disclosure of the e-mail is placed on the subscriber or user of the system,
the government must give him fourteen days notice to allow him to file a
motion to quash a subpoena or to vacate a court order seeking disclosure of
his computer material. (18 U.S.C. sec. 2704(b).) However, the government
may give delayed notice where there are exigent circumstances as listed by
the Act (18 U.S.C. sec. 2705.) Recognizing the easy user destruction of
computer data, ECPA allows the government to include in its subpoena or
court order the requirement that the provider or operator retain a backup
copy of electronic communications when there is risk of user destruction.
(18 U.S.C. sec. 2704(a).)
The legislation gives a civil cause of action to the provider or
operator, subscriber, customer or user of the system aggrieved by an
invasion of an electronic communication in the system in violation of the
ECPA. (18 U.S.C. secs. 2520, 2707.) If the provider or operator has to
disclose information stored on his system due to a court order, warrant,
subpoena, or certification under ECPA, no cause of action can be brought
against him by the person aggrieved by such disclosure. (18 U.S.C. sec.
2703(e); see_also 18 U.S.C. secs. 2701(c), 2702(b), 2511(2)(a)(i),
2511(3)(b)(iii) where the systems operator or provider is not held
criminally liable, may observe a private communication while performing
employment duties or according to authorization, etc., may intercept private
communication while making quality control checks or during the course of
forwarding communications to another system.)
SYSTEMS COVERED
Clearly, the national commercial services in the United States,
including CompuServe, MCI Mail or a company using a contracted e-mail
service, such as GE QUIK-COM (See S. Rep. No. 99-541, 99th Cong., 2d Sess.
8 reprinted_in 1986 U.S. Code Cong. & Ad. News 3562) are covered by ECPA.
However, there may be some confusion as to whether ECPA would protect
electronic communications found on a mere user-supported BBS. For
instance, language in ECPA does not expressly state the term "bulletin
board." Nonetheless, ECPA would indeed cover electronic bulletin boards.
What are electronic bulletin boards? Generally, they are personal
computers provided for and maintained by computer users out of their own
personal resources. These systems traditionally allow free access to
computer/modem-equipped members of local communities and provide for both
public and private electronic mail exchange. Some sophisticated systems,
such as the ProLine system written for Apple II computers, provide callers
with personal user areas where they may keep private files much like the
CompuServe personal file areas.
Augmenting the single stand-alone BBS, there are networks of bulletin
boards linked together, often with the assistance of university mainframes,
with other bulletin boards or mainframe computers by sophisticated "mail
routing" systems (such as ARPAnet and FIDOnet). These networks use
sophisticated message addressing instructions and computer automation where
networked computers make calls to other networked computers to exchange
"net-news" or private mail between users of the different bulletin boards.
Given the proper address routing instructions, a user may communicate with
another user on a cross-town BBS or on a BBS in another part of the country.
Although there is some delay with messages being routed through a network,
these networks help to reduce or eliminate the computer user's need to
make direct toll or long distance calls to faraway systems. (Note, there
are also network exchange systems and "gateways" between commercial
services.)
Businesses have been turning to the use of BBS's and BBS mailing
networks for increased productivity, paperwork reduction, improved client
contact and the elimination of "telephone tag." (See Keaveney,
Custom-Built_Bulletin_Boards, Personal Computing, Aug. 1987, 91.)
A number of these corporate BBS's are open to the public with
restricted access to business and client system areas. Examples of
such systems include (a) two Washington D.C. area boards run by Gannet
Company Inc. ("[f]or all Gannet/USA Today employees and other computer
users"), Issue Dynamics Inc. (catering to the consulting company's clients),
and (b) A Westchester County (NY) area board run by VITRON Management
Consulting, Inc. (catering to the general business community).
ECPA language would show protection for bulletin boards. 18 U.S.C.
sec. 2510(15) provides that "'electronic communication service' means any
service which provides to users thereof the ability to send or receive wire
or electronic communications". A "remote computing service" was defined in
the Act as an electronic communications system that provides computer storage
or processing services to the public. (18 U.S.C. sec. 2710(2).)
Intra-company communications systems, corporate BBSes, would also be
protected. (S. Rep. No. 541, 99th Cong., 2d Sess. 12 reprinted_in 1986 U.S.
Code Cong. & Ad. News 3566.) Language in ECPA refers to "the person or entity
providing the wire or electronic communication service," such as in 18 U.S.
secs. 2701(c)(1) and 2702(a)(1). Such language would indicate the inclusion
of individuals and businesses who operate bulletin board systems.
The Senate report, in addition to defining "electronic mail," gave a
separate definition of "electronic bulletin boards":
Electronic "bulletin boards" are communications networks created
by computer users for the transfer of information among computers.
These may take the form of proprietary systems or they may be commercial,
or noncommercial systems operating among computer users sharing special
interests. These systems may [or may not] involve fees covering
operating costs and may require special "passwords" which restrict
entry to the system. These bulletin boards may be public or
semi-public in nature, depending on the degree of privacy sought by
users, operators or organizers of such systems.
(S. Rep. No. 541, 99th Cong., 2d Sess. 8-9 reprinted_in 1986 U.S. Code
Cong. & Ad. News 3562-3563.)
ECPA, as enacted, takes note of the different levels of security found
on user-supported BBS's, i.e. the difference between configured system
areas containing private electronic mail and other areas configured to
contain public material. (18 U.S.C. sec. 2511(2)(g)(i).) The electronic
communications which a user seeks to keep private, through methods provided
by the system, would be protected by ECPA. In contrast, there would be no
liability for access to features configured by the system to be readily
accessible by the general public. An indicia of privacy on the system, with
no notice to show otherwise, would trigger ECPA coverage. An indicia of
privacy may include passwords and prompts asking if a message is to be kept
private.
House Representative Kastenmeier noted that there was an unusual
coalition of groups, businesses and organizations interested in ECPA.
(Kastenmeier, Communications_Privacy, Communications Lawyer, Winter 1987,
1, 24.) Among those interested included the BBS community. Reporters in
the BBS community noted how Senator Leahy and others were receptive to their
concerns. They report Leahy to have been "soliciting [users and BBS
operators'] comments and encourag[ing] sensitivity to the needs of BBS's in
the legislation.... [Senators and congressional members] are ... willing to
listen to our side of things." (BBSLAW02.MSG, dated 07/24/85, information
from Chip Berlet, Secretary, National Lawyers Guild Civil Liberties
Committee, transmitted by Paul Bernstein, SYSOP, LAW MUG, Chicago, Illinois
regarding Federal Legislation Affecting Computer Bulletin Boards, deposited
on The Legacy Network in Los Angeles, California.)
ESCAPING COVERAGE
There are at least two possible ways to escape ECPA coverage. The
first is to provide adequate notice that all material on a service or system
may be publicly accessible even though methods of providing privacy remain.
The bulletin board system maintained by DePaul University College of Law
Chicago, Illinois, provides an example of an electronic notice (displayed
upon user access):
PURSUANT TO THE ELECTRONIC AND COMMUNICATIONS PRIVACY ACT OF 1986, 18
USC 2510 et. seq., NOTICE IS HEREBY GIVEN THAT THERE ARE NO FACILITIES
PROVIDED BY THIS SYSTEM FOR SENDING OR RECEIVING PRIVATE OR
CONFIDENTIAL ELECTRONIC COMMUNICATIONS. ALL MESSAGES SHALL BE DEEMED
TO BE READILY ACCESSIBLE TO THE GENERAL PUBLIC.
Do NOT use this system for any communication for which the sender
intends only the sender and the intended recipient or recipients to
read.
Note, although the DePaul notice states otherwise, user-operated message
privacy toggles remain on the board. The second possible method to escape
ECPA coverage would be to merely not provide any means of privacy.
One way of foiling the intent of a government subpoena or court order
requirement to keep duplicate copies of private electronic communications
would be the use of passworded private e-mail. For instance, the private
e-mail capabilities of GEnie Mail and GE QUIK-COM include user-toggled
passwording which utilizes an encryption technique that no one, not even the
provider, knows how to decipher. Bill Louden, General Manager of GEnie
(General Electric Network for Information Exchange), noted how GEnie Mail
and GE QUIK-COM passworded e-mail cannot be read by anyone who did not know
the password. "[N]ot even our 'god' number could ever read the [passworded]
mail." (Message from Bill Louden, GEnie, Legacy RoundTable (LAW), category
1, topic 7, message 6 (May 15, 1987).) The writer of the encryption
software has since left General Electric and no one has had success in
breaking the code. (Message from Bill Louden, GEnie, Legacy RoundTable
(LAW), category 1, topic 7, message 10 (May 17, 1987).)
CONCLUSION
With ECPA, e-mail and other private electronic communications stored on
computer communication systems have privacy protection. Unfortunately,
before ECPA, federal statutory guidelines for such protection were not
articulated. Case law also did not provide any helpful guidance. The
peculiarities of computers and computer storage were not addressed by the
old wiretap laws. Electronic communications privacy could not stand up
against constitutional privacy law as defined by the United States Supreme
Court. The then existing law was "hopelessly out of date." (S. Rep. No.
541, 99th Cong., 2d Sess. 2 reprinted_in 1986 U.S. Code Cong. & Ad. News
3556 (statement of Sen. Leahy).) Fortunately, a legislative solution to
bring privacy law up to date with the advancing computer communication and
information technology was provided for in ECPA.
OBSERVATIONS
One should note that ECPA was designed as a statutory solution to fill a
loop-hole in federal constitutional law where computer-communication
messages (e.g., email) are not protected. Under traditional Fourth
Amendment Search and Seizure law, email and similar computer-communication
material are not considered to have any constitutional privacy protection
against government intrusion. ECPA provides statutory privacy protection
where there is no constitutional protection.
Generally, a BBS may fall under the coverage of ECPA if there is some
indicia of privacy found on the BBS. There are various degrees of privacy
found on a BBS ranging from the opening login password to the sending of a
private message via UUCP. Under ECPA, a sysop or online service employee
may not be found civilly liable for intercepting (i.e., reading/viewing)
private information or private messages between users who call in to a BBS
so long as he is performing "quality control checks" or other similar
duties. This may include passive maintenance activity and intermail or
echomail forwarding. ECPA thus provides some protection for a sysop from
civil liability if his system is found to fall under ECPA coverage.
To escape coverage from ECPA, a BBS sysop may place a disclaimer at the
"front door" or throughout his system (such as an automatic notice whenever
if the caller wishes to send private email) giving the caller adequate
notice that the system has no privacy privileges. (Note: what I mean by
privileges, in the legal sense, is much broader than mere privacy toggle
commands found on a BBS.) Giving such notice would work to negate any
indicia of privacy that may be found on the system. For instance, the sysop
may say that he has access to all private email, he will read all private
email, and he will disclose all improper or criminal information left on his
system to the appropriate authorities even if there are privacy toggle
commands found on the system -- and suggest the caller try another system if
he/she wishes to send secure private messages. The sysop may then stand a
better chance of not being found liable under ECPA.
The DePaul University College of Law BBS Disclaimer:
----------------------------------------------------
This type of disclaimer, dealing with communications, should not be found to
be applicable to private login passwords -- in other words, passwords should
maintain their privileged private status. (Note, some attorney may try to
argue that passwords are messages and therefore are excluded from ECPA by
the disclaimer and may be disclosed.)
Note, ECPA is primarily first a statutory solution to providing
statutory protection against government intrusion into private computer
communications in order to be more in tune with traditional Fourth Amendment
Search and Seizure law. Generally, in order for police or other government
authorities to intrude into private computer communications, a court order,
subpeona, or warrant must be obtained. A sysop may be ordered to provide
copies of particular information -- the warrant should particularly describe
what is sought, such as the author of the message, subject matter, etc. The
author of the private information may also be given 14 days notice of the
search unless there are exigent circumstances, e.g., the author has the
ability to destroy the information. Note, although there may be the
possibility that a sysop may be held in contempt of court for not providing
copies, this does not necessarily mean the sysop has the affirmative duty to
make and keep copies of all information kept on his system if it is not
reasonable for him to do so, e.g., the system program does not keep backups,
old messages are automatically destroyed after a certain period of time such
as on an HBBS system, etc. -- he may only have to provide copies when
ordered to do so and if reasonable (my interpretation).
Although a sysop may not be found liable under the federal ECPA statute,
there may be alternative liability found under state law. Generally, at the
state level, there is either state statutory or common law protection
against INVASION OF PRIVACY. In particular, this would include (1) public
disclosure of private facts and (2) intrusion upon seclusion. A possible
situation would include not only public disclosure of private email, but
also public discussion or private system passwords. A good attorney may be
able to make good arguments to find liability under either one of the two
tort law causes of action -- particularly when a sysop holds himself or
herself out as a provider of private or semi-private information exchange.
Note, under either the federal ECPA or state invasion of privacy laws, a
sysop or caller to a system may be able to sue users who break into the
closed or private areas of the system. Of course, evidence would have to be
obtained to prove causation and liability and evidence is a completely
different issue problem....
Finally, there are several issues that are currently being reviewed for
possible statute inclusion. Such issues involve, but are not limited to:
1. The dissemination and distribution of elements contributing to
the delinquency or corruption of minors:
- pornography
- advocacy of games of chance (gambling)
2. The maintenance of the integrity of electronically stored data
and information within communication systems, including electronic
bulletin boards.
These issues are the subject of a subsequent paper. In addition, they are
topics that represent areas of discussion within the potential PCBRelay
Legal conference.
We at VITRON (and ABBS) would greatly appreciate your feedback and input
regarding this paper. If you have any questions, comments, observations or
suggestions, please leave us a message. Your message will receive as prompt
a reply as is feasible (usually within 24 to 48 hours).
*************************************************************************
Subject: HR 4079 is for REAL!
Date: 29 Jun 90 20:04:36 GMT
(Thant Tessman) writes:
>A new bill, HR 4079 [...]
This posting bothered me enough even after dismissing the alarming rhetoric
that I placed a call to my Representative's local office. Two days later I
received a copy of HR 4079 in the mail. (I recommend others do the same - it
is too long for a lousy typist such as me to enter).
I found some errors in the claims made about it - but it is pretty bad stuff
anyway! Some notes follow:
>[...] would open the way for American concentaration camps to be built,
It does. It calls for housing prisoners in "tent housing or other shelters
placed on available military bases and at other suitable locations." [P10L3-5]
It does not restrict the prisoners to those convicted of drug crimes.
In case that is insufficient, it calls for "any property that is determined
to be excess to the needs of a Federal agency that may be suitable for use as
a correctional facility shall be made available for such use..." [P15L5-7]
Oh, yes, it also says, "a Federal court shall not hold prison or jail
crowding unconstitutional under the eighth amendment except to the extent
that an individual plaintiff proves that the crowding causes the infliction
of cruel and unusual punishment of that inmate." [P8L14-18] The remedy?
"(2) The relief in a case described in paragraph (1) shall extend no
further than necessary to remove the conditions that are causing the cruel
and unusual punishment of the plaintiff inmate." [P8L19-22]
>and thereafter permit the state to round up suspected drug users
This one is a little difficult. Maybe I missed it, but it still requires
conviction. However, it does say, "Evidence which is obtained as a result of
a search or seizure shall not be excluded in a proceeding in a court of the
United States on the ground that the search or seizure was in violation of
the fourth amendment to the Constitution of the United States, if the search
or seizure was carried out in circumstances justifying a reasonably objective
belief that is was in conformity with the fourth amendment." [P35L25-P36L7]
This is followed by (and this has been mentioned before): "The fact that
evidence was obtained pursuant to and within the scope of a warrant
constitutes prima facie evidence of the existence of such circumstances."
[P36L7-9]
>so they can be forced to work without compensation for the state.
This is wrong. On Page 27, "Subtitle C - Mandatory Work Requirements for
Prisoners, Withholding Federal Benefits, and Drug Testing of Prisoners", it
does say "It is the policy of the Federal Government that convicted prisoners
confined in Federal prisons, jails, and other detention facilities shall
work." [P27L7-9]
However, it also says, "(2) Prisoners shall be paid a share of funds
generated by their labor conducted pursuant to this section." [P28L10-11]
>"The Drug Crime Emergency Act" drips with patriotism as Gingrich tries to
>vaguely connect the freedom movement in eastern Europe with America falling
>deeper and deeper into "the slavery of drug addiction."
I didn't find anything even remotely resembling this.
>The bill proposes suspending the Constitution for five years so millions of
>illegal drug users can be held by the state in concentration camps. All
>internees will be forced to work and if anyone is caught with drugs in the
>camps they will have one year added to their sentence each time - with no
>right to appeal.
One small nit, there are exceptions listed to "All internees".
>HR 4079 calls for the declaration of a five year national state of
>emergency - in essence, martial law. It proposes reopening the
>concentration camps of WWII, using active and inactive military bases as
>prisons, and a new privately owned prison system as well. To aid in
>accomplishing this, the 4th Amendment, the 8th Amendment, and habeas corpus
>are either superseded, redefined, or disallowed.
The 4th and 8th have been mentioned. There is a lengthy section called the
"Strom Thurmond Habeus Corpus Reform Initiative" [P37-43] which I cannot
reasonably comment on.
>A provision has been built in to allow the government to purchase goods
>manufactured by prison slave labor. To insure the duration of this labor
>force, all previous maximum sentences would be changed to minimum sentences.
Just to clarify: This is a sentencing change - those already sentenced would
not be affected by this section.
>New mandatory sentences would be established, and probation, parole, and
>suspension of sentences revoked.
True.
>To provide an even greater pool to draw from, mandatory drug testing of
>just about everyone above junior high school level has been included. The
>resolution carefully avoids addressing the funding necessary.
It says "no institution of higher education shall be eligible to receive
funds or any other form of financial assistance under any Federal program,
including participation in any federally funded or guaranteed student loan
program, unless it certifies to the Secretary that it has adopted and has
implemented a program to prevent the use of illicit drugs and the abuse of
alcohol by students and employees that, at a minimum, includes -
(1) the annual distribution to each student and employee of -
(A-E) [...information...]
(2) provisions for drug testing; and
(3) a biennial review by the institution of its program to -
[...]"
[P57L19-P59L5]
It repeats essentially the same as above for "local educational agency".
[P60L13-P63L20]
>Even after 30 press releases were sent to all the national and local news
>outlets by Maryland LP members, there has been practically no mention of
>the bill in the media. The state evidently is hoping to sweep this bill
>into law right under our noses while we are all preoccupied with other
>events taking place around the world. Surprisingly, the response from
>libertarians as well as mainstream folks has been one of complacency.
There is even more in this bill than the authors of the quoted newsletter
mentioned. For example, it calls for:
-revoking the driver's license of those convicted of drug crimes,
-expansion of the "war on drugs" to include alcohol abuse,
-the RICO-like seizure of property alleged to be used in or obtained through
profits from drug crimes (with the burden upon victim/defendant to *prove*
that it was not - could you *prove* you didn't buy your car with profits
from illicit transactions?)
-division of "profits" from such seizures, upon conviction, to be shared
between the state and individuals who provided information leading to the
conviction...
>Everyone needs to make phone calls and write letters. Direct your
>correspondence to the media and your representatives, as well as Gingrich
>and Gramm. If they don't think you care about this bill becoming law - it
>will! Act now or cry behind the barbwire later.
--
~~
From: bill@flash.UUCP (bill)
Newsgroups: alt.conspiracy
Subject: Bye, bye, 6th
Summary: another "right" going down the drain
Keywords: public defenders, 6th Amendment, Bill of Rights, War on Drugs, Sh*t
Date: 13 Jul 90 15:42:04 GMT
Organization: Prodisestablishmentarianism, Inc. :-)
(Andrew Duane):
> DRUG SUSPECTS BARRED FROM PUBLIC DEFENDERS
>Danbury, CT. - A judge has said he will not appoint free legal aid
>lawyers for people arrested on drug charges who say they cannot
>afford lawyers.
> "I don't appoint public defenders to people in drug cases,"
>Judge Joseph Sylvester of Superior Court told a defendant on Tuesday
>at his arrignment. [...] Lawyers at the courthouse said 60 suspects
>had been denied public defenders.
>[...]
>The judge has also denied public defenders in drunken-driving cases.
>[ End of Article ]
>
>Well, there goes the sixth amendment. [...]
>Does anyone else find this as scary as me?
Yes! (and thank you, Andrew, for posting this!)
>What is his rationale disallowing use of public defenders in drug cases?
What else can it be but that "this problem has become so serious we must
take special measures!"?
Sooo... if you're *accused* of drug offences, you no longer have a Sixth
Amendment right to the assistance of counsel. What issue of easy political
popularity will be next, I wonder: child abuse cases? Crimes against women
or the elderly? Flag desecration?
[And people wonder at my concern that we have passed the point where the
Bill of Rights is used to enumerate specifically the rights of the people,
as opposed to the idea expressed in the Tenth that: "The powers not
delegated to the United States by the Constitution, nor prohibited by it
to the States, are reserved to the States, respectively, or to the people."]
--
~~
Subject: Re: stoke up the ovens
Date: 13 Jul 90 16:08:59 GMT
Organization: Prodisestablishmentarianism, Inc. :-)
(Michael Carr) writes:
>>The Senate proposes the death penalty for the following crimes:
>>Destruction of aircraft (better not crash that plane )
>>Destruction of motor vehicle (this surely warrants the death penalty)
I'd be pretty sure that "destruction" means "as with a bomb", not your
typical highway accident or plane crash.
>>Espionage
>>Arson of federal property (watch those campfires in the Natl. forests)
>>Arson of property in interstate commerce
Arson is most likely deliberate arson, again not accidents (but I'd sure
like to see the actual text of the bill, whatever it is).
>>Wrecking a train
>>Mailing of injurious articles (better not mail a pack of cigarettes)
Probably letter bombs and the like.
>>Bank robbery
>>Treason (don't talk bad about the good old USA)
Treason: The offence of *attempting* by overt act to overthrow the
government, or (Art. III section 3 US Constitution), "only
in levying war against them [the States], or in adhering
to their enemies, giving aid and comfort to them."
Well, maybe you got a point.
>>Kidnapping
>>Hostage taking
>>Major crime by drug kingpin (what major crimes aren't covered in this list
>>already??)
>>Attempted homicide by drug kingpin while seeking to obstruct justice
>>Unintentional killing by drug felon involving aggravated recklessness
>>(does this include drunk drivers??)
>>Use of a firearm in violent crime or drug trafficking
>>Murder of family member of federal official
>>Murder of member of congress, cabinet, or Supreme court
>>Murder of nuclear regulatory inspector,federal official,federal witness,
>>horse inspector,meat inspector, poultry inspector, egg products inspector,
>>foreign official, Agriculture dept. official
Hmmm... note how the Ruling Class now gets special "privileges" under the
law... Oligarchy, here we come.
> This is serious??!!! How much of this was in that bullshit crime bill
>that just passed in the Senate? Is this it? This is way out of hand.
I also would a pointer to the source of that posting...
> I've only listed what I thought were some of the more outrageous ones
>( I'm against the death penalty in general, but don't want to start that war
>again ). BTW, what the hell constitutes "treason" ??? This country is getting
>scarier every day.
> Does anyone know how close this is to being law? All the congress-
>critters are wetting their pants trying to look tough on crime for the
>upcoming elections so this kind of dangerous stuff is probably going to
>pass.
> Argghh, you just ruined my day! :-( See you on death row!
> Mike Carr carr@cs.unc.edu
>
>OK, so maybe I'm a little alarmist, but if we don't fight back we'll wake up
>some morning with the FBI/CIA in our face, it seems sometimes.
I'm a big alarmist (I outmass most of my friends :-), but you are correct.
This stuff doesn't go away by wishful thinking, nor when you close your eyes.
Recommended reading:
_They thought they were free; the Germans, 1933-45_
by Milton Mayer. (1955, U. of Chicago Press).
(excerpts from an earlier posting)
"What no one seemed to notice, ... was the ever widening gap
... between the government and the people. ... And it became
always wider. ...
"... the whole process of its coming into being, was above all
*diverting*. It provided an excuse not to think for people who
did not want to think anyway. ... Nazism gave us some dreadful,
fundamental things to think about ... and kept us so busy with
continuous changes and 'crises' and so fascinated ... by the
machinations of the 'national enemies,' without and within,
that we had no time to think about these dreadful things that
were growing, little by little, all around us. ...
"Each step was so small, so inconsequential, so well explained
or, on occasion, 'regretted,' that ... unless one understood
what the whole thing was in principle, what all these 'little
measures' ... must some day lead to, one no more saw it developing
from day to day than a farmer in his field sees the corn growing. ...
"... Each act ... is worse than the last, but only a little worse.
You wait for the next and the next. You wait for one great
shocking occasion, thinking that others, when such a shock
comes, will join with you in resisting somehow. You don't want
to act, or even talk, alone; you don't want to 'go out of your
way to make trouble.' ... And it is not just fear ... that
restrains you; it is also genuine uncertainty.
"... And you *are* an alarmist. You are saying that *this* must
lead to *this*, and you can't prove it. ...
"But the one great shocking occasion, when tens or hundreds or
thousands will join with you, never comes. *That's* the
difficulty. ...
"... The forms are all there, all untouched, all reassuring, the
houses, the shops, the jobs, the mealtimes, the visits, the
concerts, the cinema, the holidays. But the spirit, which you
never noticed because you made the lifelong mistake of identifying
it with the forms, is changed. Now you live in a world of hate
and fear, and the people who hate and fear do not even know it
themselves; when everyone is transformed, no one is transformed. ...
"... You have accepted things you would not have accepted five years
ago, a year ago, things that your father ... could not have imagined.
Cheers.
--
~~
Subject: Full text of H.R. 4079, very long (3,122 lines)
Date: 7 Aug 90 15:22:43 GMT
Here again is the full text of House Resolution 4079. To answer some questions
I have seen since I posted it the first time: You can get copies of bills by
asking your Congressional representatives for them. You can locate your
representatives by looking in local phone books under "United States" or by
calling Washington, D.C., information at 1-202-555-1212. And, yes, this was
typed by hand, not scanned in.
-- edp (Eric Postpischil)
"Always mount a scratch monkey."
101st Congress
2d Session
H.R. 4079
To provide swift and certain punishment for criminals in order to deter
violent crime and rid America of illegal drug use.
------------------------------------------------
IN THE HOUSE OF REPRESENTATIVES
February 22, 1990
Mr. Gingrich (for himself, Mr. Armey, Mr. Hunter, Mr. Smith of New
Hampshire, Mr. Hansen, Mr. Hiler, Mr. Ireland, Mr. Kyl, Mr. Barton of
Texas, Mr. McEwen, Mr. Bliley, Mr. Condit, Mr. Weldon, Mr. Fields, Mr.
Stearns, Mr. Schuette, Mr. Douglas, Mr. Livingston, Mr. Oxley, Ms.
Ros-Lehtinen, Mr. Hancock, Mr. Schaefer, Mr. Bartlett, Mr. Shumway, Mr.
Inhofe, Mr. Nielson of Utah, Mr. Donald Lukens, Mr. Paxon, Mr. Herger,
Mr. Robinson, Mr. Lagomarsino, Mr. Sensenbrenner, Mr. James, Mr. Upton,
Mr. Bilirakis, Mr. Ritter, Mr. Dornan of California, Mr. Baker, Mr.
DeLay, Mr. Hyde, Mr. Grandy, Mr. Hefley, Mr. Coughlin, Mr. Craig, Mr.
Shaw, Mr. Dreier of California, Mr. Solomon, and Mr. McCollum)
introduce the following bill; which was referred jointly to the
Committees on the Judiciary, Energy and Commerce, Public Works and
Transportation, Education and Labor, and Armed Services
------------------------------------------------
A BILL
To provide swift and certain punishment for criminals in order to deter
violent crime and rid America of illegal drug use.
_Be it enacted by the Senate and the House of Representatives of the
United States of America in Congress assembled,_
SECTION 1. SHORT TITLE.
This Act may be cited as the "National Drug and Crime Emergency Act".
SEC. 2. TABLE OF CONTENTS.
Sec. 1. Short title.
Sec. 2. Table of contents.
Sec. 3. Findings and declaration of a national drug and crime
emergency.
Sec. 4. Definitions.
TITLE I--ELIMINATION OF CRIME WITHOUT PUNISHMENT
Subtitle A--National Drug and Crime Emergency Policies
Sec. 101. Judicial remedies for prison crowding.
Sec. 102. Temporary prison facilities and expanded capacity.
Sec. 103. Elimination of early release from prison.
Subtitle B--Imposition of Mandatory Minimum Sentences Without Release
Sec. 111. Increased mandatory minimum sentences without release for
criminals using firearms and other violent criminals.
Sec. 112. Life imprisonment without release for criminals convicted a
third time.
Sec. 113. Longer prison sentences for those who sell illegal drugs to
minors or for use of minors in drug trafficking activities.
Sec. 114. Longer prison sentences for drug trafficking.
Sec. 115. Mandatory penalties for illegal drug use in Federal prisons.
Sec. 116. Deportation of criminal aliens.
Sec. 117. Encouragement to States to adopt mandatory minimum prison
sentences.
Subtitle C--Mandatory Work Requirements for Prisoners, Withholding
Federal Benefits, and Drug Testing of Prisoners
Sec. 131. Mandatory work requirement for all prisoners.
Sec. 132. Repeal of constraints on prison industries.
Sec. 133. Employment of prisoners.
Sec. 134. Withholding prisoners' Federal benefits to offset
incarceration costs.
Sec. 135. Drug testing of Federal prisoners.
Sec. 136. Drug testing of State prisoners.
Subtitle D--Judicial Reform To Protect the Innocent and Punish the
Guilty
Sec. 151. Good faith standards for gathering evidence.
Sec. 152. Strom Thurmond habeas corpus reform initiative.
Sec. 153. Proscription of use of drug profits.
Sec. 154. Jurisdiction of special masters.
Sec. 155. Sentencing patterns of Federal judges.
TITLE II--ACHIEVING A DRUG-FREE AMERICA BY 1995
Sec. 201. Findings.
Sec. 202. Payment of trial costs and mandatory minimum fines.
Sec. 203. Withholding of unearned Federal benefits from drug
traffickers and users who are not in prison.
Sec. 204. Revocation of drug users' driver's licenses.
Sec. 205. Accountability and performance of drug treatment facilities.
Sec. 206. Drug-free schools.
Sec. 207. Drug-free transportation.
Sec. 208. Financial incentives and citizen involvement in the war
against drugs.
TITLE III--MISCELLANEOUS
Sec. 301. Authorization of appropriations.
Sec. 302. Severability.
SEC. 3. FINDINGS AND DECLARATION OF NATIONAL DRUG AND CRIME EMERGENCY.
(a) FINDINGS.--The Congress makes the following findings:
(1) Next to preserving the national security, protecting the
personal security of individual Americans, especially
children, by enacting and enforcing laws against criminal
behavior is the most important single function of government.
(2) The criminal justice system in America is failing to
achieve this basic objective of protecting the innocent and
punishing the guilty.
(3) Reform is needed to ensure that criminals are held
accountable for their actions, that they receive swift and
certain punishment commensurate with their crimes, and that
the protection of innocent citizens takes priority over other
objectives.
(4) The principle of individual accountability should also
dictate policies with respect to drug users. Users should
face a high probability of apprehension and prosecution, and
those found guilty should face absolutely certain measured
response penalties.
(5) According to the Uniform Crime Reports issued in 1989 by
the Federal Bureau of Investigation (FBI), violent crime
known to law enforcement reached an unprecedented high in
1988. A violent crime occurred ever 20 seconds.
(6) The Department of Justice estimates that 83 percent of
Americans will be victimized by violent crime during their
lifetime.
(7) The Federal Bureau of Investigation reports that violent
crime in America rose by 23 percent during the period
1984-1988.
(8) The National Drug Control Strategy reports that in
certain large cities more than 80 percent of the men arrested
have tested positive for illegal drug use.
(9) According to the Department of Justice, the total number
of Federal and State prisoners grew by 90 percent from 1980
to 1988. The growth rate of the total prison population
during the first 6 months of 1989 exceeded the largest annual
increase ever recorded in 64 years of recordkeeping. The
6-month growth rate translates to a need of almost 1,800
additional prison beds per week.
(10) In 1985, 19 States reported the early release of nearly
19,000 prisoners in an effort to control prison populations,
according to the Bureau of Justice Statistics.
(11) According to the United States Bureau of Justice
Statistics, 63 percent of State inmates were rearrested for a
serious crime within 3 years of their discharge from prison.
(12) The criminal justice system is overloaded and does not
deliver swift and certain penalties for violating the law.
In America today, there exists crime without punishment.
Such conditions imperil the public safety, jeopardize the
rule of law and undermine the preservation of order in the
community.
(b) DECLARATION OF NATIONAL DRUG AND CRIME EMERGENCY.--(1) Guided by
the principles that energized and sustained the mobilization
for World War II, and in order to remove violent criminals
from the streets and meet the extraordinary threat that is
posed to the Nation by the use and trafficking of illegal
drugs, the Congress declares the existence of a National Drug
and Crime Emergency beginning on the date of enactment of
this Act and ending on the date that is 5 years after the
date of enactment of this Act.
(2) During the National Drug and Crime Emergency declared in
paragraph (1), it shall be the policy of the United States
that--
(A) every person who is convicted in a Federal
court of a crime of violence against a person or a
drug trafficking felony (other than simple
possession) shall be sentenced to and shall serve a
full term of no less than 5 years' imprisonment
without release;
(B) prisoners may be housed in tents, and other
temporary facilities may be utilized, consistent
with security requirements; and
(C) the Federal courts may limit or place a "cap"
on the inmate population level of a Federal or
State prison or jail only when an inmate proves
that crowding has resulted in cruel and unusual
punishment of the plaintiff inmate and no other
remedy exists.
SEC. 4. DEFINITIONS.
For the purposes of this Act--
(1) the term "crime of violence against a person" means a
Federal offense that is a felony and--
(A) has as an element the use, attempted use, or
threatened use of physical force against the person
or property of another; or
(B) that by its nature, involves a substantial risk
that physical force against the person or property
of another may be used in the course of committing
the offense; and
(C) for which a maximum term of imprisonment of 10
years or more is prescribed by law; and
(2) the term "drug trafficking crime," (other than simple
possession) means any felony punishable under the Controlled
Substances Act (21 U.S.C. 801 et seq.), the Controlled
Substances Import and Export Act (21 U.S.C. 951 et seq.) or
the Maritime Drug Law Enforcement Act (46 U.S.C. App. 1901 et
seq.), other than a felony constituting a simple possession
of a controlled substance for which the maximum term of
imprisonment of 10 years or more is prescribed by law.
TITLE I--ELIMINATION OF CRIME WITHOUT PUNISHMENT
Subtitle A--National Drug and Crime Emergency Policies
SEC. 101. JUDICIAL REMEDIES FOR PRISON CROWDING.
(a) PURPOSE.--The purpose of this section is to provide for reasonable
and proper enforcement of the eighth amendment.
(b) FINDINGS.--The Congress finds that--
(1) the Federal courts are unreasonably endangering the
community by sweeping prison and jail cap orders as a remedy
for detention conditions that they hold are in conflict with
the eighth amendment; and
(2) eighth amendment holdings frequently are unjustified
because of the absence of a plaintiff inmate who has proven
that detention conditions inflict cruel and unusual
punishment of that inmate.
(c) AMENDMENT OF TITLE 18, UNITED STATES CODE.--(1) Subchapter C of
chapter 229 of part 2 of title 18, United States Code, is
amended by adding at the end thereof the following new
section:
"Section 3626. Appropriate remedies with respect
to prison crowding.
"(a)(1) During the period of the National Drug and
Crime Emergency, a Federal court shall not hold
prison or jail crowding unconstitutional under the
eighth amendment except to the extent that an
individual plaintiff proves that the crowding
causes the infliction of cruel and unusual
punishment of that inmate.
"(2) The relief in a case described in paragraph
(1) shall extend no further than necessary to
remove the conditions that are causing the cruel
and unusual punishment of the plaintiff inmate.
"(b)(1) A Federal court shall not place an inmate
ceiling on any Federal, State, or local detention
facility as an equitable remedial measure for
conditions that violate the eighth amendment unless
crowding itself is inflicting cruel and unusual
punishment on individual prisoners.
"(2) Federal judicial power to issue equitable
relief other than that described in paragraph (1),
including the requirement of improved medical or
health care and the imposition of civil contempt
fines or damages, where appropriate, shall not be
affected by paragraph (1).
"(c) Each Federal court order seeking to remedy an
eighth amendment violation shall be reopened at the
behest of a defendant for recommended alteration at
a minimum of two-year intervals.".
(2) Section 3626 of title 18, United States Code, as added by
paragraph (1), shall apply to all outstanding court orders on
the date of enactment of this section. Any State or
municipality shall be entitled to seek modification of any
outstanding eighth amendment decree pursuant to that section.
(3) The table of sections for subchapter C of chapter 229 of
title 18, United States Code, is amended by adding at the end
thereof the following new item:
"3626. Appropriate remedies with respect to prison
overcrowding.".
SEC. 102. TEMPORARY PRISON FACILITIES AND EXPANDED CAPACITY.
(a) IN GENERAL.--In order to remove violent criminals from the streets
and protect the public safety, the Attorney General shall take such
action as may be necessary, subject to appropriate security
considerations, to ensure that sufficient facilities exist to house
individuals whom the courts have ordered incarcerated. During the
period of the National Drug and Crime Emergency, these facilities may
include tent housing or other shelters placed on available military
bases and at other suitable locations. The President may direct the
National Guard and the Army Corps of Engineers to design and construct
such temporary detention facilities.
(b) USE OF MILITARY INSTALLATIONS.--(1)In order to provide facilities
for incarceration authorized by subsection (a), the Secretary
of Defense, the Commission on Alternative Utilization of
Military Facilities, and the Director of the Bureau of
Prisons shall--
(A) identify military installations that could be
used as confinement facilities for Federal or State
prisoners; and
(B) examine the feasibility of using temporary
facilities for housing prisoners with a specific
examination of the successful use of tent housing
during the mobilization for World War II.
(2) Not later than 90 days after the date of enactment of
this Act, the Director of the Bureau of Prisoners shall
submit to the Congress a description and summary of the
results of the examination conducted pursuant to paragraph
(1).
(c) PRIORITY FOR DISPOSAL OF CLOSED MILITARY INSTALLATIONS.--Section
204(b)(3) of the Defense Authorization Amendments and Base Closure and
Realignment Act (10 U.S.C. 2687 note) is amended to read as follows:
"(3)(A) Notwithstanding any provision of this title and any
other law, before any action is taken with respect to the
disposal or transfer of any real property or facility located
at a military installation to be closed or realigned under
this title the Secretary shall--
"(i) notify the Attorney General and the Governor
of each of the territories and possessions of the
United States of the availability of such real
property or facility, or portion thereof; and
"(ii) transfer such real property of facility or
portion thereof, as provided in subparagraph (B).
"(B) Subject to subparagraph (C), the Secretary shall
transfer real property or a facility, or portion thereof,
referred to in subparagraph (A) in accordance with the
following priorities:
"(i) If the Attorney General certifies to the
Secretary that the property or facility, or portion
thereof, will be used as a prison or other
correctional institution, to the Department of
Justice for such use.
"(ii) If the Governor of a State, the Mayor of the
District of Columbia, or the Governor of a
territory or possession of the United States
certifies to the Secretary that the property or
facility, or portion thereof, will be used as a
prison or other correctional institution, to that
State, the District of Columbia, or that territory
or possession for such use.
"(iii) To any other transferee pursuant to the
Federal Property and Administrative Services Act of
1949 (40 U.S.C. 471 et seq.).
"(C) Within each priority specified in clauses (i) and (ii)
of subparagraph (B), the Secretary shall give a priority for
the transfer of any real property or facility referred to in
that subparagraph, or any portion thereof, to any department,
agency, or other instrumentality referred to in such clauses
that agrees to pay the Department of Defense the fair market
value of the real property, facility, or portion thereof.
"(D) In this paragraph, the term 'fair market value' means,
with respect to any real property or facility, or any portion
thereof, the fair market value determined on the basis of the
use of the real property or facility on December 31, 1988.".
(d) REVIEW OF CURRENT STANDARDS OF PRISON CONSTRUCTION.--(1) The
Director of the Bureau of Prisons (referred to as the
"Director") shall--
(A) review current construction standards and
methods used in building Federal prisons; and
(B) examine and recommend any cost cutting measures
that could be employed in prison construction
(consistent with security requirements), especially
expenditures for air conditioning, recreational
activities, color television, social services, and
similar amenities.
(2) Not later than 90 days after the date of enactment of
this Act, the Director shall submit to Congress a description
and summary of the results of the review conducted pursuant
to paragraph (1).
(e)(1) Chapter 301 of title 18, United States Code, is amended by
adding at the end thereof the following new section:
"Section 4014. Private construct and operation of
Federal prisons
"(a) IN GENERAL.--The Attorney General may contract
with private persons to--
"(1) construct, own, and operate Federal
prison facilities; or
"(2) construct or operate Federal prison
facilities owned by the United States,
including the provision of subsistence, care, and
proper employment of United States prisoners.
"(b) COOPERATION WITH STATES.--The Attorney General
shall consult and cooperate with State and local
governments in exercising the authority provided by
subsection (a).
"(c) FINANCING OPTIONS FOR PRISON CONSTRUCTION AND
OPERATION.--(1) To the greatest extent possible,
the Attorney General shall utilize
creative and cost-effective private
financing alternatives and private
construction and operation of prisons.
"(2) Operating cots of privately-operated
prisons shall be covered through rent
charged to participating units of
Government placing inmates in a prison.
"(3) The Attorney General may finance the
construction of facilities through lease
or lease-purchase agreements.
"(4) In order to gain full costs
advantages from economies of scale and
specialized knowledge from private
innovation, the Attorney General may
contract with consortia or teams of
private firms to design, construct, and
manage, as well as finance, prison
facilities.".
(2) The table of sections for chapter 301 of title 18, United
States Code, is amended by adding at the end thereof the
following new item:
"4014. Private construct and operation of Federal
prisons.".
(f) SURPLUS FEDERAL PROPERTY.--(1) For the purpose of expanding the
number of correctional facilities, the Administrator of the
General Services Administration, in consultation with the
Attorney General, shall, not later than 1 year after the date
of enactment of this Act, identify and make available a list
of not less than 20 parcels of surplus Federal property,
which the Attorney General has certified are not needed for
Federal correctional facilities but which may be suitable for
State or local correctional facilities.
(2) During the National Drug and Crime Emergency declared in
section 3(b)(1), notwithstanding any other law, any property
that is determined to be excess to the needs of a Federal
agency that may be suitable for use as a correctional
facility shall be made available for such use, in order of
priority, first, to the Attorney General, and second, to a
State, the District of Columbia, or a local government.
(g) STATE AND LOCAL GOVERNMENT USE OF FACILITIES.--State and local
governments shall be permitted to use Federal temporary incarceration
facilities, when they are not needed to accommodate Federal prisoners,
for the purpose of incarcerating prisoners at a per diem fee to be paid
to the Bureau of Prisons.
SEC. 103. ELIMINATION OF EARLY RELEASE FROM PRISON.
During the National Drug and Crime Emergency declared in section
3(b)(1), notwithstanding any other law, every person who is convicted
in a Federal court of committing a crime of violence against a person
or a drug trafficking crime (other than simple possession), shall be
sentenced to and shall serve a full term of no less than 5 years'
imprisonment, and no such person shall be released from custody for any
reason or for any period of time prior to completion of the sentence
imposed by the court unless the sentence imposed is greater than 5
years and is not a mandatory minimum sentence without release.
Subtitle B--Imposition of Mandatory Minimum Sentences Without Release
SEC. 111. INCREASED MANDATORY MINIMUM SENTENCES WITHOUT RELEASE FOR
CRIMINALS USING FIREARMS AND OTHER VIOLENT CRIMINALS.
(a) USE OF FIREARMS.--Section 924(c)(1) of title 18, United States
Code, is amended to read as follows:
"(c)(1) Whoever, during and in relation to any crime of
violence or drug trafficking crime (including a crime of
violence or drug trafficking crime which provides for an
enhanced punishment if committed by the use of a deadly or
dangerous weapon or device) for which the person may be
prosecuted in a court of the United States--
"(A) possesses a firearm, shall, in addition to the
punishment provided for such crime of violence or
drug trafficking crime, be sentenced to
imprisonment for 10 years without release;
"(B) discharges a firearm with intent to injure
another person, shall, in addition to the
punishment provided for such crime of violence or
drug trafficking crime, be sentenced to
imprisonment for 20 years without release; or
"(C) possesses a firearm that is a machinegun, or
is equipped with a firearm silencer or firearm
muffler shall, in addition to the punishment
provided for such crime of violence or drug
trafficking crime, be sentenced to imprisonment for
30 years without release.
In the case of a second conviction under this subsection, a
person shall be sentenced to imprisonment for 20 years
without release for possession or 30 years without release
for discharge of a firearm, and if the firearm is a
machinegun, or is equipped with a firearm silence or firearm
muffler, to life imprisonment without release. In the case of
a third or subsequent conviction under this subsection, a
person shall be sentenced to life imprisonment without
release. If the death of a person results from the discharge
of a firearm, with intent to kill another person, by a person
during the commission of such a crime, the person who
discharged the firearm shall be sentenced to death or life
imprisonment without release. A person shall be subjected to
the penalty of death under this subsection only if a hearing
is held in accordance with section 408 of the Controlled
Substances Act (21 U.S.C. 848). Notwithstanding any other
law, a court shall not place on probation or suspend the
sentence of any person convicted of a violation of this
subsection, nor shall the term of imprisonment under this
subsection run concurrently with any other term of
imprisonment including that imposed for the crime of violence
or drug trafficking crime in which the firearm was used. No
person sentenced under this subsection shall be eligible for
parole, nor shall such person be released for any reason
whatsoever, during a term of imprisonment imposed under this
paragraph.".
SEC. 112. LIFE IMPRISONMENT WITHOUT RELEASE FOR CRIMINALS CONVICTED A
THIRD TIME.
Section 401(b) of the Controlled Substances Act is amended by striking
"If any person commits a violation of this subparagraph or of section
405, 405A, or 405B after two or more prior convictions for a felony
drug offense have become final, such person shall be sentenced to a
mandatory term of life imprisonment without release" and inserting "If
any person commits a violation of this subparagraph or of section 405,
405A, or 405B or a crime of violence as defined in section 924(c)(3) of
title 18, United States Code, after two or more prior convictions for a
felony drug offense or for a crime of violence as defined in section
924(c)(3) of that title or for any combination thereof have become
final, such person shall be sentenced to a mandatory term of life
imprisonment without release.".
SEC. 113. LONGER PRISON SENTENCES FOR THOSE WHO SELL ILLEGAL DRUGS TO
MINORS OR FOR USE OF MINORS IN DRUG TRAFFICKING ACTIVITIES.
(a) DISTRIBUTION TO PERSONS UNDER AGE 21.--Section 405 of the
Controlled Substances Act (21 U.S.C. 845) is amended--
(1) in subsection (a) by striking "Except to the extent a
greater minimum sentence is otherwise provided by section
401(b), a term of imprisonment under this subsection shall be
not less than one year." and inserting "Except to the extent
a greater minimum sentence is otherwise provided by section
401(b), a term of imprisonment under this subsection shall be
not less than 10 years without release. Notwithstanding any
other provision of law, the court shall not place on
probation or suspend the sentence of any person sentenced
under the preceding sentence and such person shall not be
released during the term of such sentence."; and
(2) in subsection (b) by striking "Except to the extent a
greater minimum sentence is otherwise provided by section
401(b), a term of imprisonment under this subsection shall be
not less than one year." and inserting "Except to the extent
a greater minimum sentence is otherwise provided by section
401(b), a term of imprisonment under this subsection shall be
not less than 20 years without release. Notwithstanding any
other provision of law, the court shall not place on
probation or suspend the sentence of any person sentenced
under the preceding sentence and such person shall not be
released during the term of such sentence.".
(b) EMPLOYMENT OF PERSONS UNDER 18 YEARS OF AGE.--Section 405B of the
Controlled Substances Act (21 U.S.C. 845b) is amended--
(1) in subsection (a) by striking "Except to the extent a
greater minimum sentence is otherwise provided, a term of
imprisonment under this subsection shall be not less than one
year." and inserting "Except to the extent a greater minimum
sentence is otherwise provided by section 401(b), a term of
imprisonment under this subsection shall be not less than 10
years without release. Notwithstanding any other provision
of law, the court shall not place on probation or suspend the
sentence of any person sentenced under the preceding sentence
and such person shall not be released during the term of such
sentence"; and
(2) in subsection (c) by striking "Except to the extent a
greater minimum sentence is otherwise provided, a term of
imprisonment under this subsection shall be not less than one
year." and inserting "Except to the extent a greater minimum
sentence is otherwise provided by section 401(b), a term of
imprisonment under this subsection shall be not less than 20
years without release. Notwithstanding any other provision
of law, the court shall not place on probation or suspend the
sentence of any person sentenced under the preceding sentence
and such person shall not be released during the term of such
sentence.".
SEC. 114. LONGER PRISON SENTENCES FOR DRUG TRAFFICKING.
(a) SCHEDULE I AND II SUBSTANCES.--Section 401(b)(1)(C) of the
Controlled Substances Act (21 U.S.C. 841(b)(1)(C)) is amended--
(1) in the first sentence by striking "of not more than 20
years" and inserting "which shall be not less than 5 years
without release nor more than 20 years"; and
(2) in the second sentence by striking "of not more than 30
years" and inserting "which shall be not less than 10 years
without release nor more than 30 years".
(b) MARIHUANA.--Section 401(b)(1)(D) of the Controlled Substances Act
(21 U.S.C. 841(b)(1)(D)) is amended--
(1) in the first sentence by striking "of not more than 5
years" and inserting "not less than 5 years without release";
(2) in the second sentence by striking "of not more than 10
years" and inserting "which shall be not less than 10 years
without release"; and
(3) by adding the following new sentence at the end thereof:
"Not withstanding any other provision of law, the court shall
not place on probation or suspend the sentence of any person
sentenced under this subparagraph, nor shall a person so
sentenced be eligible for parole during the term of such a
sentence.".
(c) SCHEDULE IV SUBSTANCES.--Section 401(b)(2) of the Controlled
Substances Act (21 U.S.C. 841(b)(2)) is amended--
(1) in the first sentence by striking "of not more than 3
years" and inserting "which shall be not less than 5 years
without release";
(2) in the second sentence by striking "of not more than 6
years" and inserting "which shall be not less than 10 years
without release"; and
(3) by adding the following new sentence at the end thereof:
"Notwithstanding any other provision of law, the court shall
not place on probation or suspend the sentence of any person
sentenced under this subparagraph, nor shall a person so
sentenced be eligible for parole during the term of such a
sentence.".
(d) SCHEDULE V SUBSTANCES.--Section 401(b)(3) of the Controlled
Substances Act (21 U.S.C. 841(b)(3)) is amended--
(1) in the first sentence by striking "of not more than one
year" and inserting "which shall be not less than 5 years
without release";
(2) in the second sentence by striking "of not more than 2
years" and inserting "which shall be not less than 10 years
without release"; and
(3) by adding the following new sentence at the end thereof:
"Notwithstanding any other provision of law, the court shall
not place on probation or suspend the sentence of any person
sentenced under this subparagraph, nor shall a person so
sentenced be eligible for parole during the term of such a
sentence.".
SEC. 115. MANDATORY PENALTIES FOR ILLEGAL DRUG USE IN FEDERAL PRISONS.
(a) DECLARATION OF POLICY.--It is the policy of the Federal Government
that the use or distribution of illegal drugs in the Nation's Federal
prisons will not be tolerated and that such crime shall be prosecuted
to the fullest extent of the law.
(b) AMENDMENT.--Section 401(b) of the Controlled Substances Act (21
U.S.C. 841(b)) is amended by adding the following new paragraph and the
end thereof:
"(7)(A) In a case involving possession of a controlled
substance within a Federal prison or other Federal detention
facility, such person shall be sentenced to a term of
imprisonment of 1 year without release in addition to any
other sentence imposed for the possession itself.
"(B) In a case involving the smuggling of a controlled
substance into a Federal prison or other Federal detention
facility or the distribution of a controlled substance within
a Federal prison or other Federal detention facility, such
person shall be sentenced to a term of imprisonment of 10
years without release in addition to any other sentence
imposed for the possession or distribution itself.
"(C) Notwithstanding any other law, the court shall not place
on probation or suspend the sentence of a person sentenced
under this paragraph. No person sentenced under this
paragraph shall be eligible for parole during the term of
imprisonment imposed under this paragraph.".
SEC. 116. DEPORTATION OF CRIMINAL ALIENS.
(a) DEPORTATION OF ALIENS CONVICTED OF CRIMES OF VIOLENCE.--Section
241(a)(14) of the Immigration and Nationality Act (8 U.S.C.
1251(a)(14)) is amended by inserting after "convicted" the following:
"of a drug trafficking crime or a crime of violence (as those terms are
defined in paragraphs (2) and (3) of section 924(c) of title 18, United
States Code), or".
(b) REENTRY OF DEPORTED ALIENS.--Section 276(b)(2) of the Immigration
and Nationality Act (8 U.S.C. 1326(b)(2)) is amended to read as
follows:
"(2) whose deportation was subsequent to a conviction for a
drug trafficking crime or a crime of violence (as those terms
are defined in sections 924(c) (2) and (3) of title 18,
United States Code), such alien shall be fined under such
title and imprisoned for 20 years without release, and in the
case of a second violation of subsection (a) shall be
imprisoned for life without release. Notwithstanding any
other law, the court shall not place on probation or suspend
the sentence of any person sentenced under this paragraph and
such person shall not be released during the term of such
sentence.".
SEC. 117 ENCOURAGEMENT TO STATES TO ADOPT MANDATORY MINIMUM PRISON
SENTENCES.
(a) PRIORITY.--Beginning on the date that is 2 calendar years after the
date of enactment of this Act, a request for Federal drug law
enforcement assistance funds from the Bureau of Justice Assistance
Grant Programs by a State whose law provides for--
(1) mandatory minimum sentences equal to or greater than the
sentences authorized in sections 111, 112, 113, 114, and 115
for the commission of crimes against the State that are
equivalent to the Federal crimes punished in those sections;
(2) elimination of early release from prison of persons
convicted in a State court of committing a crime of violence
against a person or drug trafficking crime (other than simple
possession), equivalent to the requirements of section 103;
and
(3) payment of trial costs and mandatory fines equivalent to
that imposed by section 202,
shall receive priority over a request by a State whose law does not so
provide.
(b) REDISTRIBUTION.--Beginning on the data that is 2 calendar years
after the date of enactment of this Act, the formula for determining
the amount of funds to be distributed from the Drug Control and System
Improvement Grant Program to state and local governments shall be
adjusted by--
(1) reducing by 10 percent the amount of funds that would,
except for the application of this paragraph, be allocated to
States whose laws do not provide as stated in subsection (a);
and
(2) allocating the amount of the reduction pro rata to the
other States.
Subtitle C--Mandatory Work Requirements for Prisoners, Withholding
Federal Benefits, and Drug Testing of Prisoners
SEC. 131 MANDATORY WORK REQUIREMENT FOR ALL PRISONERS.
(A) IN GENERAL.--(1) It is the policy of the Federal Government that
convicted prisoners confined in Federal prisons, jails, and
other detention facilities shall work. The type of work in
which they will be involved shall be dictated by appropriate
security considerations and by the health of the prisoner
involved. Such labor may include, but not be limited to--
(A) local public works projects and infrastructure
repair;
(B) construction of new prisons and other detention
facilities;
(C) prison industries; and
(D) other appropriate labor.
(2) It is the policy of the Federal Government that States
and local governments have the same authority to require all
convicted prisoners to work.
(b) PRISONERS SHALL WORK.--Medical certification of 100 percent
disability, security considerations, or disciplinary action shall be
the only excuse to remove a Federal prisoner from labor participation.
(c) USE OF FUNDS.--(1) Subject to paragraph (2), any funds generated by
labor conducted pursuant to this section shall be deposited
in a separate fund in the Treasury of the United States for
use by the Attorney General for payment of prison
construction and operating expenses or for payment of
compensation judgements. Notwithstanding any other law, such
funds shall be available without appropriation.
(2) Prisoners shall be paid a share of funds generated by
their labor conducted pursuant to this section.
SEC. 132. REPEAL OF CONSTRAINTS ON PRISON INDUSTRIES.
(a) SUMNERS-ASHURST ACT.--(1) Chapter 85 of part 1 of title 18, United
States Code, is repealed.
(2) The table of chapters for part 1 of title 18, United
States Code, is amended by striking the item for chapter 85
and inserting the following:
"[85. Repealed.]".
(3) The repeal made by this subsection shall not affect the
performance to completion of the pilot projects authorized by
section 1761(c) of title 18, United States Code, prior to
enactment of this act.
(b) FEDERAL PRISON INDUSTRIES.--(1) Section 4122(a) of title 18, United
States Code, is amended to read as follows:
"(a) Federal Prison Industries shall determine in
what manner and to what extent industrial
operations shall be carried on in Federal penal and
correctional institutions for the product of
commodities for consumption in such institutions
or for sale to governmental departments and
agencies and to the public.".
(2) The first paragraph of section 4124 of title 18, United
States Code, is amended to read as follows:
"The several Federal departments and agencies and
all other Government institutions of the United
States may purchase such products of the industries
authorized by this chapter as meet their
requirements and may be available.".
(3) The second sentence of section 4126(f) of title 18,
United States Code, is amended to read as follows: "To the
extent that the amount of such funds is excess to the needs
of the corporation for such purposes, such funds may be
transferred to the Attorney General for the construction or
acquisition of penal and correctional institutions, including
camps described in section 4125.".
(c) WALSH-HEALY ACT.--Subsection (d) of the first section of the Act
entitled "An Act to provide conditions for the purchase of supplies and
the making of contracts by the United States, and for other purposes",
approved June 30, 1936, (41 U.S.C. 35(d)), is amended--
(1) by striking "and no convict labor"; and
(2) by striking ", except that this section, or any law or
Executive order contrasting similar prohibitions against
purchase of goods by the Federal Government, shall not apply
to convict labor which satisfies the conditions of section
1761(c) of title 18, United States Code".
(d) LEGISLATIVE RECOMMENDATIONS.--The Attorney General shall submit to
Congress a report making recommendations for legislation to--
(1) ensure that private businesses and labor do not suffer
unfair consequences from the repeal in subsection (a); and
(2) encourage greater private sector participation in prison
industries and create incentives for cooperative arrangements
between private businesses and prisons providing for such
participation.
SEC. 133. EMPLOYMENT OF PRISONERS.
(a) IN GENERAL.--The Attorney General may enter into contracts with
private businesses for the use of inmate skills that may be of
commercial use to such businesses.
(b) USE OF FEES AND PAYMENTS.--A portion of the fees and payments
collected for the use of inmate skills under contracts entered into
pursuant to subsection (a) shall be deposited in the fund described in
section 131(c)(1), and a portion shall be paid to the prisoners who
conduct the labor.
(c) SECURITY REQUIREMENT.--In the case of contracts described in
subsection (a) in which the provision of inmate skills would require
prisoners to leave the prison--
(1) prisoners shall be permitted to travel directly to a work
site and to remain at the work site during the work day and
shall be required to return directly to prison at the end of
each work day; and
(2) only prisoners with no history of violent criminal
activity and who are able to meet strict security standards
to insure that they pose no threat to the public, shall be
eligible to participate.
SEC. 134. WITHHOLDING PRISONERS' FEDERAL BENEFITS TO OFFSET
INCARCERATION COSTS.
(a) IN GENERAL.--The Federal benefits received by any prisoner (not
including those of a prisoner's spouse or dependents) who has been
convicted of a crime of violence against a person or drug trafficking
crime (other than simple possession) under Federal or State law and who
is incarcerated in a Federal or State prison shall, during the period
of the prisoner's incarceration, be withheld to offset the costs of--
(1) any victim compensation award against such prisoner; and
(2) any incarceration costs of the prisoner incurred by the
prison system.
(b) PAYMENT.--(1) In the case of a Federal Prisoner, Federal benefits
withheld for the purpose of subsection (a)(2) shall be paid
into the fund established by section 131(c).
(2) In the case of a State prisoner, Federal benefits
withheld for the purpose of subsection (a)(2) shall be paid
to the State.
(c) EXCEPTION.--The withholding of Federal benefits of a prisoner with
a spouse or other dependents under subsection (a) shall be adjusted by
the court to provide adequate support to and to prevent the
impoverishment of dependents.
(d) DEFINITIONS.--As used in this section the term "Federal benefit"
means the issuance of any payment of money, by way of grant, loan, or
statutory entitlement, provided by an agency of the United States or by
appropriated funds or trust funds of the United States but does not
include a right to payment under a contract.
SEC. 135. DRUG TESTING OF FEDERAL PRISONERS.
(a) DRUG TESTING PROGRAM.--(1) Subchapter A of chapter 229 of title 18,
United States Code, is amended by adding at the end thereof
the following new section:
"Section 3608. Drug testing of defendants on
post-conviction release
"(a) The Attorney General, in consultation with the
Director of the Administrative Office of the United
States Courts shall, as soon as is practicable
after the effective date of this section, establish
by regulation a program of drug testing of targeted
classes of arrestees, individuals in jails,
prisons, and other correctional facilities, and
persons on conditional or supervised release before
or after conviction, including probationers,
parolees, and persons released on bail.
"(b)(1) The Attorney General shall, not later than
6 months after the date of enactment of
this section, promulgate regulations for
drug testing programs under this section.
"(2) The regulations issued pursuant to
paragraph (1) shall be based in part on
scientific and technical standards
determined by the Secretary of Health
and Human Services to ensure reliability and
accuracy of drug test results. In
addition to specifying acceptable methods
and procedures for carrying out drug
testing, the regulations may include
guidelines or specifications concerning--
"(A) the classes of persons to
be targeted for testing;
"(B) the drugs to be tested
for;
"(C) the frequency and duration
of testing; and
"(D) the effect of test results
in decisions concerning the
sentence, the conditions to be
imposed on release before or
after conviction, and the
granting, continuation, or
termination of such release.
"(c) In each district where it is feasible to do
so, the chief probation officer shall arrange for
the drug testing of defendants on a post-conviction
release pursuant to a conviction for a felony or
other offense described in section 3563(a)(4) of
this title.".
SEC. 136. DRUG TESTING OF STATE PRISONERS.
(a) IN GENERAL.--Title I of the Omnibus Crime Control and Safe Streets
Act of 1968 (42 U.S.C. 3711 et seq.) is amended by adding at the end of
part E (42 U.S.C. 3750-3766b) the following:
"DRUG TESTING PROGRAMS
"SEC. 523. (a) PROGRAM REQUIRED.--No funding shall be
provided under this part, whether by direct grant,
cooperative agreement, or assistance in any form, to any
State or any political subdivision or instrumentality of a
State that has not formulated and implemented a drug testing
program, subject to periodic review by the Attorney General,
as specified in the regulations described in subsection (b),
for targeted classes of arrestees, individuals in jails,
prisons, and other correctional facilities, and persons on
conditional or supervised release before or after conviction,
including probationers, parolees, and persons released on
bail.
"(b) REGULATIONS.--(1) The Attorney General shall, not later
than 6 months after the enactment of this section,
promulgate regulations for drug testing programs
under this section.
"(2) The regulations issued pursuant to paragraph
(1) shall incorporate the standards applicable to
drug testing of Federal prisoners under section
3608 of title 18, United States Code.
"(c) EFFECTIVE DATE.--This section shall take effect with
respect to any State, subdivisions, or instrumentality
receiving or seeking funding under this subchapter at a time
specified by the Attorney General, but no earlier than the
date of promulgation of the regulations required by
subsection (b).".
(b) AMENDMENT TO TABLE OF CONTENTS.--The table of contents of title I
of the Omnibus Crime Control and Safe Streets Act of 1968 (42 U.S.C.
3711 et seq.) is amended by inserting at the end of the item relating
to part E the following:
"Sec. 523. Drug testing program.".
Subtitle D--Judicial Reform to Protect the Innocent and Punish the
Guilty
SEC. 151. GOOD FAITH STANDARDS FOR GATHERING EVIDENCE.
(a) IN GENERAL.--Chapter 223 of title 18, United States Code, is
amended by adding at the end thereof the following new section:
"Section 3509. Admissibility of evidence obtained by search
or seizure
"(a) EVIDENCE OBTAINED BY OBJECTIVELY REASONABLE SEARCH OR
SEIZURE.--Evidence which is obtained as a result of a search
or seizure shall not be excluded in a proceeding in a court of
the United States on the ground that the search or seizure
was in violation of the fourth amendment to the Constitution
of the United States, if the search or seizure was carried
out in circumstances justifying an objectively reasonable
belief that it was in conformity with the fourth amendment.
The fact that evidence was obtained pursuant to and within
the scope of a warrant constitutes prima facie evidence of
the existence of such circumstances.
"(b) EVIDENCE NOT EXCLUDABLE BY STATUTE OR RULE.--Evidence
shall not be excluded in a proceeding in a court of the
United States on the ground that it was obtained in violation
of a statute, an administrative rule or regulation, or a rule
of procedure unless exclusion is expressly authorized by a
statute or by a rule prescribed by the Supreme Court pursuant
to statutory authority.
"(c) RULE OF CONSTRUCTION.--This section shall not be
constructed to require or authorize the exclusion of evidence
in any proceeding.".
(b) TECHNICAL AMENDMENT.--The table of sections at the beginning of
chapter 223 of title 18, United States Code, is amended by adding at
the end the following:
"3509. Admissibility of evidence obtained by search or
seizure.".
SEC. 152. STROM THURMOND HABEAS CORPUS REFORM INITIATIVE.
(a) FINALITY OF DETERMINATIONS.--Section 2244 of title 28, United
States Code, is amended by adding at the end thereof the following new
subsections:
"(d) When a person in custody pursuant to the judgment of a
State court fails to raise a claim in State proceedings at
the time or in the manner required by State rules of
procedure, the claim shall not be entertained in an
application for a writ of habeas corpus unless actual
prejudice resulted to the applicant from the alleged denial
of Federal right asserted and--
"(1) the failure to raise the claim properly or to
have it heard in State proceedings was the result
of State action in violation of the Constitution or
laws of the United States;
"(2) the Federal right asserted was newly
recognized by the Supreme Court subsequent to the
procedural default and is retroactively applicable;
or
"(3) the factual predicate of the claim could not
have been discovered through the exercise of
reasonable diligence prior to the procedural
default.
"(e) A one-year period of limitation shall apply to an
application for a writ of habeas corpus by a person in
custody pursuant to the judgment of a State court. The
limitation period shall run from the latest of the following
times:
"(1) the time at which State remedies are
exhausted;
"(2) the time at which the impediment to filing an
application created by State action in violation to
the Constitution or laws of the United States is
removed, where the applicant was prevented from
filing by such State action;
"(3) the time at which the Federal right asserted
was initially recognized by the Supreme Court,
where the right has been newly recognized by the
Court and is retroactively applicable; or
"(4) the time at which the factual predicate of the
claim or claims presented could have been
discovered through the exercise of reasonable
diligence.".
(b) APPEAL.--Section 2253 of title 28, United States Code, is amended
to read as follows:
"Section 2253. Appeal
"In a habeas corpus proceeding or a proceeding under section
2255 of this title before a circuit or district judge, the
final order shall be subject to review, on appeal, by the
court of appeals for the circuit where the proceeding is had.
"There shall be no right of appeal from such an order in a
proceeding to test the validity of a warrant to remove, to
another district or place for commitment or trial, a person
charged with a criminal offense against the United States, or
to test the validity of the person's detention pending
removal proceedings.
"An appeal may not be taken to the court of appeals from the
final order in a habeas corpus proceeding where the detention
complained of arises out of process issued by a State court,
or from the final order in a proceeding under section 2255 of
this title, unless a circuit justice or judge issues a
certificate of probable cause.".
(c) APPELLATE PROCEDURE.--Rule 22 of the Federal Rules of Appellate
Procedure is amended to read as follows:
"Rule 22. Habeas Corpus and Section 2255 Proceedings
"(a) APPLICATION FOR AN ORIGINAL WRIT OF HABEAS CORPUS.--An
application for a writ of habeas corpus shall be made to the
appropriate district court. If application is made to a
circuit judge, the application will ordinarily be transferred
to the appropriate district court. If an application is made
to or transferred to the district court and denied, renewal
of the application before a circuit judge is not favored; the
proper remedy is by appeal to the court of appeals from the
order of the district court denying the writ.
"(b) NECESSITY OF CERTIFICATE OF PROBABLE CAUSE FOR
APPEAL.--In a habeas corpus proceeding in which the detention
complained of arises out of process issued by a State court,
and in a motion proceeding pursuant to section 2255 of title
28, United States Code, an appeal by the applicant or movant
may not proceed unless a circuit judge issues a certificate
of probable cause. If a request for a certificate of
probable cause is addressed to the court of appeals, it shall
be deemed addressed to the judges thereof and shall be
considered by a circuit judge or judges as the court deems
appropriate. If no express request for a certificate is
filed, the notice of appeal shall be deemed to constitute a
request addressed to the judgements of the court of appeals.
If an appeal is taken by a State or the government or its
representative, a certificate of probable cause is not
required.".
(d) STATE CUSTODY.--Section 2254 of title 28, United States Code, is
amended--
(1) by amending subsection (b) to read as follows:
"(b) An application for a writ of habeas corpus in
behalf of a person in custody pursuant to the
judgment of a State court shall not be granted
unless it appears that the applicant has exhausted
the remedies available in the courts of the State,
or that there is either an absence of available
State corrective process or the existence of
circumstances rendering such process ineffective to
protect the rights of the applicant. An
application may be denied on the merits
notwithstanding the failure of the applicant to
exhausted the remedies available in the courts of
the States.";
(2) by redesignating subsection (d), (e), and (f) as
subsections (e), (f), and (g), respectively;
(3) by inserting after subsection (c) the following new
subsection:
"(d) An application for a writ of habeas corpus in
behalf of a person in custody pursuant to the
judgment of a State court shall not be granted
with respect to any claim that has been fully and
fairly adjudicated in State proceedings."; and
(4) by amending subsection (e), as redesignated by paragraph
(2), to read as follows:
"(e) In a proceeding instituted by an application
for a writ of habeas corpus by a person in custody
pursuant to the judgment of a State court, a full
and fair determination of a factual issue made in
the case by a State court shall be presumed to be
correct. The applicant shall have the burden of
rebutting this presumption by clear and convincing
evidence.".
(e) FEDERAL CUSTODY.--Section 2255 of title 28, United States Code, is
amended by striking the second paragraph and the penultimate paragraph
thereof, and by adding at the end thereof the following new paragraphs:
"When a person fails to raise a claim at the time or in the
manner required by Federal rules of procedure, the claim
shall not be entertained in a motion under this section
unless actual prejudice resulted to the movant from the
alleged denial of the right asserted and--
"(1) the failure to raise the claim properly, or to
have it heard, was the result of governmental
action in violation of the Constitution or the laws
of the United States;
"(2) the right asserted was newly recognized by the
Supreme Court subsequent to the procedural default
and is retroactively applicable; or
"(3) the factual predicate of the claim could not
have been discovered through the exercise of
reasonable diligence prior to the procedural
default.
"A two-year period of limitation shall apply to a motion
under this section. The limitation period shall run from the
latest of the following times;
"(1) The time at which the judgment of conviction
becomes final.
"(2) The time at which the impediment to making a
motion created by governmental action in violation
of the Constitution or laws of the United States is
removed, where the movant was prevented from making
a motion by such governmental action.
"(3) The time at which the right asserted was
initially recognized by the Supreme Court, where
the right has been newly recognized by the Court
and is retroactively applicable.
"(4) The time at which the factual predicate of the
claim or claims presented could have been
discovered through the exercise of reasonable
diligence.".
SEC. 153. PROSCRIPTION OF USE OF DRUG PROFITS.
(a) LIST OF ASSETS.--Section 511(d) of the Controlled Substances Act
(21 U.S.C. 881(d)) is amended by--
(1) inserting "(1)" after (d)"; and
(2) adding at the end thereof the following new paragraph:
"(2)(A) Prior to sentencing a defendant on
conviction in a Federal court of a felony under
this title, the court shall compile a list of all
assets owned by the defendant not subject to
forfeiture.
"(B) After the release of a defendant described in
subparagraph (A), upon request of the Attorney
General, the court shall required the defendant to
provide proof that any asset owned by the defendant
not listed on the list described in subparagraph
(A) was legally obtained.".
"(C) In order to prove that a defendant legally
obtained an asset not listed on the list described
in subparagraph (A), the defendant shall be
required to produce documentation of the same
nature as that required of a taxpayer by the
Internal Revenue Service.
"(D) Assets that a defendant does not prove were
legally obtained under subparagraph (B) may be
seized by the Attorney General through attachment
and foreclosure proceedings, and the proceeds of
such proceedings shall be deposited in the
Department of Justice's Assets Forfeiture Fund and
shall be available for transfer to the building and
facilities account of the Federal prison system.".
SEC. 154. JURISDICTION OF SPECIAL MASTERS.
Notwithstanding any other law, a special master appointed to serve in a
United States court to monitor compliance with a court order, including
special masters who have been appointed prior to the date of enactment
of this Act--
(1) shall be appointed for a term of no more than 1 year;
(2) may be reappointed for terms of 1 year;
(3) shall be given a clear and narrow mandate by the court
and shall have no authority in any area where a specific
mandate is not granted; and
(4) shall not have jurisdiction to enforce any judicial order
with respect to the management of prisons or jails.
SEC. 155. SENTENCING PATTERNS OF FEDERAL JUDGES.
(a) IN GENERAL.--Chapter 49 of title 28, United States Code, is amended
by adding at the end thereof the following new section:
"Section 757 Sentencing patterns
"(a) The Administrative Office of the United States Courts
shall annually publish a cumulative report on sentencing by
United States District Judges. The report shall be compiled
for the purpose of enabling the reader to assess criminal
sentencing patterns among Federal judges and post-sentencing
treatment to determine judicial accuracy of forecasting
future responsible and lawful behavior by those whom they
sentence.
"(b) The report shall--
"(1) personally identify the judge that pronounced
each criminal sentence;
"(2) give a brief description of the crime or
crimes perpetrated by the criminal and the prison,
probation, parole, furlough, recidivism, and other
history of the criminal that is reasonably
available for compilation; and
"(3) include such charts, profiles, and narratives
as are necessary.".
(b) TECHNICAL AMENDMENT.--The table of sections for chapter 49 of title
28, United States Code, is amended by adding at the end thereof the
following:
"757. Sentencing patterns.".
TITLE II--ACHIEVING A DRUG-FREE AMERICA BY 1995
SEC. 201. FINDINGS.
The Congress finds that--
(1) to make America drug-free by 1995 requires a concerted
effort to hold drug users accountable for their actions,
which sustain the drug trade and related criminal activities;
and
(2) the anti-drug policy of the 1990's must emphasize the
principles of zero tolerance, user accountability, and
measured user penalties.
SEC. 202 PAYMENT OF TRIAL COSTS AND MANDATORY MINIMUM FINES.
(a) FINE TO PAY COST OF TRIAL.--(1) A person who is convicted of a
violation of section 404 of the Controlled Substances Act (21
U.S.C. 844) shall pay to the Treasury of the United States
the cost of the trial in which the person is convicted, as
determined by the court, out of the income of such person.
(2) If a person convicted of drug possession has insufficient
income and property to pay the cost of trial as required by
paragraph (1), the court shall determine an appropriate
amount that should be paid in view of the person's income and
the cost of trial.
(3) The amount that a person shall be required to pay out of
the person's income to pay the cost of trial shall not exceed
25 percent of the person's annual income.
(b) ADDITIONAL MANDATORY FINE.--In addition to the fines authorized in
section 404 of the Controlled Substances Act (21 U.S.C. 844) and in
subsection (a), a person who is convicted of section 404 of the
Controlled Substances Act shall be assessed a mandatory fine of at
least 10 percent of the person's income for a first offense and at
least 25 percent of the person's income for a second or subsequent
offense.
(c) INCOME.--For the purposes of this section, a person's annual income
shall be determined to be no less than the amount of income reported on
the person's most recent Federal income tax filing.
(d) FORFEITURE OF PROPERTY.--If a person convicted of a drug crime has
insufficient income to pay the fines imposed under subsections (a) and
(b), the person's property, including wages and other earnings, shall
be subject to forfeiture through attachment, foreclosure, and
garnishment procedures.
(e) The court may order payment of trial costs and fines imposed under
this section in a single payment or in installments, as necessary to
realize the greatest possibility that the entire amount of costs and
fines will be paid.
SEC. 203. WITHHOLDING OF UNEARNED FEDERAL BENEFITS FROM DRUG
TRAFFICKERS AND USERS WHO ARE NOT IN PRISON.
(a) DRUG TRAFFICKERS.--Section 5301(a) of the Anti-Drug Abuse Act of
1988 (21 U.S.C 853a(a)) is amended--
(1) by amending paragraph (1) to read as follows:
"(1) Any individual who is convicted of any State
offense consisting of the distribution of
controlled substances (as such terms are defined
for purposes of the Controlled Substances Act) who
is not sentenced to a prison term or who serves a
prison term of less than the time periods specified
in subparagraph (A), (B), or (C) of this paragraph
shall--
"(A) upon the first conviction for such
an offense be ineligible for unearned
Federal benefits for 5 years after such
conviction;
"(B) upon a second conviction be
ineligible for all unearned Federal
benefits for 10 years after such
conviction; and
"(C) upon a third or subsequent
conviction for such an offense be
permanently ineligible for all unearned
Federal benefits."; and
(2) in paragraph (2) by striking "there is a reasonable body
of evidence to substantiate such declaration" and inserting
"there is clear and convincing evidence to substantiate such
declaration".
(b) DRUG USERS.--Section 5301(b) of the Anti-Drug Abuse Act of 1988 (21
U.S.C. 853a(b)) is amended--
(1) in paragraph (1) by amending subparagraphs (A) and (B) to
read as follows:
"(A) upon the first conviction for such an offense
be ineligible for all unearned Federal benefits for
1 year after such conviction;
"(B) upon a second and subsequent convictions be
ineligible for all unearned Federal benefits for 5
years after such convictions; and
(2) in paragraph (2) by striking "there is a reasonable body
of evidence to substantiate such declaration" and inserting
"there is clear and convincing evidence to substantiate such
declaration".
(c) SUSPENSION OF PERIOD OF INELIGIBILITY.--Subsection (c) of section
5301 of the Anti-Drug Abuse Act of 1988 (21 U.S.C. 853a(c)) is amended
to read as follows:
"(c) SUSPENSION OF PERIOD OF INELIGIBILITY.--A court may
reduce the period of ineligibility referred to in subsection
(b)(1)(A) to 3 months if the individual--
"(1) successfully completes a supervised drug
rehabilitation program which includes periodic,
random drug testing after becoming ineligible
under this section; or
"(2) completes a period of community service
satisfactory to the court and passes period and
random drug tests administered during the 3-month
period of suspension.".
(d) DEFINITIONS.--Subsection (d) of section 5301 of the Anti-Drug Abuse
Act of 1988 (21 U.S.C. 853a(d)) is amended to read as follows:
"(d) DEFINITIONS.--As used in this section--
"(1) the term 'earned Federal benefits' means
programs and benefits that are earned through or by
financial contributions or service, such as Social
Security or veterans' benefits; and
"(2) the term 'unearned Federal benefits' means all
Federal benefits, including the issuance of any
grant, contract, loan, professional license, or
commercial license provided by an agency of the
United States or by appropriated funds of the
United States, but not including earned Federal
benefits, such as Social Security and veteran's
benefits.
(e) MONITORING.--The Attorney General shall establish a system to
monitor implementation of section 5301 of the Anti-Drug Abuse Act of
1988 (21 U.S.C. 853a).
SEC. 204. REVOCATION OF DRUG USERS' DRIVER'S LICENSES AND PILOT'S
LICENSES.
(a) DRIVER'S LICENSES.--(1) Chapter 1 of title 23, United States Code,
is amended by adding at the end thereof the following new
section:
"Section 159. Revocation of the driver's licenses
of persons convicted of drug possession
"(a) Beginning on the date that is 2 calendar years
after the date of enactment of this section, a
request for Federal drug law enforcement assistance
funds from the Bureau of Justice Assistance Grant
programs by a State whose law provides for
revocation of drivers' licenses as provided in
subsection (c) shall receive priority over a
request by a State whose law does not so provide.
"(b) Beginning on the date that is 2 calendar years
after the date of enactment of this section, the
formula for determining the amount of funds to be
distributed from the Drug Control and System
Improvement Grant Program to State and local
governments shall be adjusted by--
"(1) reducing by 10 percent the amount of
funds that would, except for the
application of this paragraph, be
allocated to States whose laws do not
provide as stated in subsection (c); and
"(2) allocated the amount of the
reduction pro rata to the other States.
"(c)(1) A State meets the requirements of this
section if the State has enacted and is enforcing a
law that requires in all circumstances, except as
provided in paragraph(2)--
"(A) the mandatory revocation of the
driver's license for at least 1 year of
any person who is convicted, after the
enactment of such law, of--
"(i) a violation of section 404
of the Controlled Substances
Act (21 U.S.C. 844); or
"(ii) any other Federal or
State drug offense for which a
person serves less than 1 year's
imprisonment; and
"(B) the mandatory denial of any request
for the issuance or reinstatement of a
driver's license to such a person if the
person does not have a driver's license,
or the driver's license of the person is
suspended, at the time the person is so
convicted.
"(2) The State law referred to in paragraph (1) may
provide that the driver's license of a first
offender, but not of a second or subsequent
offender, may be reinstated on performance of 3
months' community service and passes periodic drug
tests administered during the period of community
service.".
"(d) For purposes of this section--
"(1) The term 'driver's license' means a
license issued by a State to any person
that authorizes the person to operate a
motor vehicle on the highways.
"(2) The term 'drug offense' means any
criminal offense which proscribes the
possession, distribution, manufacture,
cultivation, sale, transfer, or the
attempt or conspiracy to possess,
distribute, manufacture, cultivate, sell,
or transfer any substance the possession
of which is prohibited under the
Controlled Substances Act (21 U.S.C. 801
et seq.) and such offenses under State
laws.
"(3) The term 'convicted' includes
adjudicated under juvenile proceedings.".
(2) The table of contents for chapter 1 of title 23, United
States Code, is amended by adding at the end thereof the
following new item:
"159. Revocation of the driver's licenses of
persons convicted of drug offenses.".
(b) PILOT'S LICENSES.--The Secretary of Transportation shall cause the
Federal Aviation Administration to amend its regulations as necessary
to cause the revocation of pilot's licenses on the terms and conditions
prescribed for revocation of driver's licenses in subsection (a).
SEC. 205. ACCOUNTABILITY AND PERFORMANCE OF DRUG TREATMENT FACILITIES.
(a) STATEWIDE DRUG TREATMENT PLANS.--Title XIX of the Public Health
Service Act is amended by inserting after section 1916A (42 U.S.C.
300x-4a) the following new section:
"SEC. 1916B. STATEWIDE DRUG TREATMENT PLAN.
"(a) NATURE OF PLAN.--To receive the drug abuse portion of
its allotment for a fiscal year under section 1912A, a State
shall develop, implement, and submit, as part of the
application required by section 1916(a), an approved
statewide Drug Treatment Plan, prepared according to
regulations promulgated by the Secretary
, that shall
contain--
"(1) a single, designated State agency for
formulating and implementing the Statewide Drug
Treatment Plan;
"(2) a description of the mechanism that shall be
used to assess the needs for drug treatment in
localities throughout the State including the
presentation of relevant data;
"(3) a description of a statewide plan that shall
be implemented to expand treatment capacity and
overcome obstacles that restrict the expansion of
treatment capacity (such as zoning ordinances), or
an explanation of why such a plan is necessary;
"(4) a description of performance-based criteria
that shall be used to assist in the allocating of
funds to drug treatment facilities receiving
assistance under this subpart: [sic]
"(5) a description of the drug-free patient and
workplace programs, that must include some form of
drug testing, to be utilized in drug treatment
facilities and programs;
"(6) a description of the mechanism that shall be
used to make funding allocations under this
subpart;
"(7) a description of the actions that shall be
taken to improve the referral of drug users to
treatment facilities that offer the most
appropriate treatment modality;
"(8) a description of the program of training that
shall be implemented for employees of treatment
facilities receiving Federal funds, designed to
permit such employees to stay abreast of the latest
and most effective treatment techniques;
"(9) a description of the plan that shall be
implemented to coordinate drug treatment facilities
with other social, health, correctional and
vocational services in order to assist or properly
refer those patients in need of such additional
services; and
"(10) a description of the plan that will be
implemented to expand and improve efforts to
contact and treat expectant women who use drugs and
to provide appropriate follow-up care to their
affected newborns.
"(b) SUBMISSION OF PLAN.--The plan required by subsection (a)
shall be submitted to the Secretary annually for review and
approval. The Secretary shall have the authority to review
and approve or disapprove such State plans, and to propose
changes to such plans.
"(c) SUBMISSION OF PROGRESS REPORTS.--Each State shall submit
reports, in such form, and containing such information as the
Secretary may, from time to time, require, and shall comply
with such additional provisions as the Secretary may from
time to time find are necessary to verify the accuracy of
such reports but are not overly burdensome to the State.
"(d) WAIVER OF PLAN REQUIREMENT.--At the discretion of the
Secretary, the Secretary may waive any or all of the
requirements of this section on the written request of a
State, except that such waiver shall not be granted unless
the State implements an alternative treatment plan that
fulfills the objectives of this section.
"(e) DEFINITION.--As used in this section, the term 'drug
abuse portion' means the amount of a State's allotment under
section 1912A that is required by this subpart, or by any
other law, to be used for programs or activities relating to
drug abuse.".
(b) REGULATIONS AND EFFECTIVE DATES.--(1) The Secretary of Health and
Human Services shall promulgate regulations to carry out
section 1916B of the Public Health Service Act (as added by
subsection (a)) not later than 6 months after the date of
enactment of this section.
(2)(A)Sections 1916B(a) (4) and (5) of such Act (as added by
subsection (a)) shall become effective on October 1
of the second fiscal year beginning after the date
that final regulations under paragraph (1) are
published in the Federal Register.
(B) The remaining provision of such section 1916B
shall become effective on October 1 of the first
fiscal year beginning after the date final
regulations under paragraph (1) are published in
the Federal Register.
SEC. 206. DRUG-FREE SCHOOLS.
(a) ELEMENTARY AND SECONDARY EDUCATION.--(1) Title XII of the Higher
Education Act of 1965 (20 U.S.C. 1001 et seq.), is amended by
inserting at the end thereof the following new section 1213:
"DRUG AND ALCOHOL ABUSE PREVENTION
"SEC. 1213. (a) Notwithstanding any other law, no
institution of higher education shall be eligible
to receive funds or any other form of financial
assistance under any Federal program, including
participation in any federally funded or guaranteed
student loan program, unless it certifies to the
Secretary that it has adopted and has implemented a
program to prevent the use of illicit drugs and the
abuse of alcohol by students and employees that, at
a minimum, includes--
"(1) the annual distribution to each
student and employee of--
"(A) standards of conduct that
clearly prohibit, at a minimum,
the unlawful possession, use,
or distribution of illicit
drugs and alcohol by students
and employees on its property
or as a part of any of its
activities;
"(B) a description of
applicable legal sanctions
under local, State, or Federal
law for the unlawful
possession or distribution of
illicit drugs and alcohol;
"(C) a description of the
health risks associated with
the use of illicit drugs and
the abuse of alcohol;
"(D) a description of any drug
or alcohol counseling,
treatment, or rehabilitation
programs that are available to
employees or students; and
"(E) a clear statement that the
institution will impose
sanctions on students and
employees (consistent with
local, State, and Federal
laws), and a description of
those sanctions, up to and
including expulsion or
termination of employment and
referral for prosecution, for
violations of the standards of
conduct required by paragraph
(1)(A);
"(2) provisions for drug testing; and
"(3) a biennial review by the institution
of its program to--
"(A) determine its
effectiveness and implement
changes to the program if they
are needed; and
"(B) ensure that the sanctions
required by paragraph (1)(E)
are consistently enforced.
"(b) Each institution of higher education that
provides the certification required by subsection
(a) shall, upon request, make available to the
Secretary and to the public a copy of each item
required by subsection (a)(1) as well as the
results of the biennial review required by
subsection (a)(2).
"(c)(1) The Secretary shall publish regulations to
implement and enforce this section,
including regulations that provide for--
"(A) the periodic review of a
representative sample of
programs required by subsection
(a); and
"(B) sanctions, up to and
including the termination of
any form of financial
assistance, for institutions of
higher education that fail to
implement their programs or to
consistently enforce their
sanctions.
"(2) The sanctions required by subsection
(a)(1)(E) may include the completion of
an appropriate rehabilitation program".
(2) Paragraph (1) shall take effect on October 1, 1990.
(b) DRUG AND ALCOHOL ABUSE PREVENTION.--(1) Part D of the Drug-Free
Schools and Communities Act of 1986 (20 U.S.C. 3171 et seq.)
is amended by adding at the end thereof a new section 5145 to
read as follows:
"CERTIFICATION OF DRUG AND ALCOHOL ABUSE
PREVENTION PROGRAMS.
"SEC. 5145. (a) Notwithstanding any other law, no
local educational agency shall be eligible to
receive funds or any other form of financial
assistance under any Federal program unless it
certifies to the State educational agency that it
has adopted and has implemented a program to
prevent the use of illicit drugs and alcohol by
students or employees that, at a minimum,
includes--
"(1) mandatory, age-appropriate,
developmentally based drug and alcohol
education and prevention programs (which
address the legal, social, and health
consequences of drug and alcohol use and
which provide information about effective
techniques for resisting peer pressure to
use illicit drugs or alcohol) for
students in all grades of the schools
operated or served by the applicant, from
early childhood level through grade 12;
"(2) conveying to students that the use
of illicit drugs and alcohol is wrong and
harmful;
"(3) standards of conduct that are
applicable to students and employees in
all the applicant's schools and that
clearly prohibit, at a minimum, the
possession, use, or distribution of
illicit drugs and alcohol by students and
employees on school premises or as part
of any of its activities;
"(4) a clear statement that sanctions
(consistent with local, State, and
Federal law), up to and including
expulsion or termination of employment
and referral for prosecution, will be
imposed on students and employees who
violate the standards of conduct required
by paragraph (3) and a description of
those sanctions;
"(5) information about any available drug
and alcohol counseling and rehabilitation
programs that are available to students
and employees;
"(6) a requirement that parents,
students, and employees be given a copy
of the standards of conduct required by
paragraph (3) and the statement of
sanctions required by paragraph (4);
"(7) notifying parents, students, and
employees that compliance with the
standards of conduct required by
paragraph (3) is mandatory;
"(8) provisions for drug testing; and
"(9) a biennial review by the applicant
of its program to--
"(A) determine its
effectiveness and implement
changes to the program if they
are needed; and
"(B) ensure that the sanctions
required by paragraph (4) are
consistently enforced.
"(b) Each local educational agency that provides
the certification required by subsection (a) shall,
upon request, make available to the Secretary, the
State educational agency, and the public full
information about the elements of its program
required by subsection (a), including the results
of its biennial review.
"(c) Each State educational agency shall certify to
the Secretary that it has adopted and has
implemented a program to prevent the use of illicit
drugs and the abuse of alcohol by its students and
employees that is consistent with the program
required by subsection (a) of this section. The
State educational agency shall, upon request, make
available to the Secretary and to the public full
information about the elements of its program.
"(d)(1) The Secretary shall publish regulations to
implement and enforce the provisions of
this section, including regulations that
provide for--
"(A) the periodic review by
State educational agencies of a
representative sample of
programs required by subsection
(a); and
"(B) sanctions, up to and
including the termination of
any form of financial
assistance, for local
educational agencies that fail
to implement their programs or
to consistently enforce their
sanctions.
"(2) The sanctions required by subsection
(a)(1) through (4) may included the
completion of an appropriate
rehabilitation program.".
(2) The Drug-Free Schools and Communities Act of 1986 is
further amended in section 5126(c)(2) by--
(A) striking subparagraphs (E), (F), and (G); and
(B) redesignating subparagraphs (H) through (M) as
subparagraphs (E) through (J), respectively.
(3) Paragraphs (1) and (2) shall take effect on October 1,
1990.
SEC. 207. DRUG-FREE TRANSPORTATION.
(a) SHORT TITLE.--This section may be cited as the 'Transportation
Employee Testing Act'.
(b) FINDINGS.--The Congress finds that--
(1) alcohol abuse and illegal drug use pose significant
dangers to the safety and welfare of the Nation;
(2) millions of the Nation's citizens utilize transportation
by aircraft, railroads, trucks, and buses, and depend on the
operators of aircraft, railroads, trucks, and buses to
perform in a safe and responsible manner;
(3) the greatest efforts must be expended to eliminate the
abuse of alcohol and the use of illegal drugs, whether on or
off duty, by persons who are involved in the operation of
aircraft, railroads, trucks, and buses;
(4) the use of alcohol and illegal drugs has been
demonstrated to affect significantly the performance of
persons who use them, and has been proven to have been a
critical factor in transportation accidents;
(5) the testing of uniformed personnel of the Armed Forces
has shown that the most effective deterrent to abuse of
alcohol and use of illegal drugs is increased testing,
including random testing;
(6) adequate safeguards can be implemented to ensure that
testing for abuse of alcohol or use of illegal drugs is
performed in a manner that protects a person's right of
privacy, ensures that no person is harassed by being treated
differently from other persons, and ensures that no person's
reputation or career development is unduly threatened or
harmed; and
(7) rehabilitation is a critical component of any testing
program for abuse of alcohol or use of illegal drugs, and
should be made available to persons, as appropriate.
(C) AMENDMENT OF THE FEDERAL AVIATION ACT.--(1) Title VI of the Federal
Aviation Act of 1958 (49 App. U.S.C. 1421 et seq.) is amended
by adding at the end thereof the following:
"ALCOHOL AND CONTROLLED SUBSTANCES TESTING
"TESTING PROGRAM
"SEC. 613. (a)(1) The Administrator shall, in the
interest of aviation safety, prescribe regulations
not later than 12 months after the date of
enactment of this section. Such regulations shall
establish a program that requires air carriers and
foreign air carriers to conduct preemployment,
reasonable suspicion, random, and post-accident
testing of airmen, crewmembers, airport security
screening contract personnel, and other air
carrier employees responsible for safety-sensitive
functions (as determined by the Administrator) for
use, in violation of law, of alcohol or a
controlled substances. The Administrator may also
prescribe regulations, as the Administrator
considers appropriate in the interest of safety,
for the conduct of periodic recurring testing of
such employees for such use in violation of law.
"(2) The Administrator shall establish a program
applicable to employees of the Federal Aviation
Administration whose duties include responsibility
for safety-sensitive functions. Such programs
shall provide for preemployment, reasonable
suspicion, random, an post-accident testing for
use, in violation of law, of alcohol or a
controlled substance. The Administrator may also
prescribe regulations, as the Administrator
considers appropriate in the interest of safety,
for the conduct of periodic testing of such
employees for such use in violation of law.
"(3) In prescribing regulations under the programs
required by this subsection, the Administrator
shall require, as the Administrator considers
appropriate, the suspension or revocation of any
certificate issued to such a person, or the
disqualification or dismissal of any such person,
in accordance with this section, in any instance
where a test conduct and confirmed under this
section indicates that such person has used, in
violation of law, alcohol or a controlled
substance.
"PROHIBITION OF SERVICE
"(b)(1) No person may use, in violation of law,
alcohol or a controlled substance after the date of
enactment of this section and serve as an airman,
crewmember, airport security screening contract
personnel, air carrier employee responsible for
safety-sensitive functions (as determined by the
Administrator), or employee of the Federal Aviation
Administration with responsibility for
safety-sensitive functions.
"(2) No person who is determined to have used, in
violation of law, alcohol or a controlled substance
after the date of enactment of this section shall
serve as an airman, crewmember, airport security
screening contract personnel, air carrier employee
responsible for safety-sensitive functions (as
determined by the Administrator), or employee of
the Federal Aviation Administration with
responsibility for safety-sensitive functions
unless such person has completed a program of
rehabilitation described in subsection (c).
"(3) Any such person determined by the
Administrator to have used, in violation of law,
alcohol or a controlled substance after the date of
enactment of this section who--
"(A) engaged in such use while on duty;
"(B) prior to such use had undertaken or
completed a rehabilitation program
described in subsection (c) of this
section;
"(C) following such determination refuses
to undertake such rehabilitation program;
or
"(D) following such determination fails
to complete such a rehabilitation
program,
shall not be permitted to perform the duties
relating to air transportation which such person
performed prior to the date of such determination.
"PROGRAM FOR REHABILITATION
"(c)(1) The Administrator shall prescribe
regulations setting forth requirements for
rehabilitation programs which at a minimum provide
for the identification and opportunity for
treatment of employees referred to in subsection
(a)(1) in need of assistance in resolving problems
with the use, in violation of law, of alcohol or
controlled substances. Each air carrier or foreign
air carrier is encouraged to make such a program
available to all of its employees in addition to
those employees referred to in subsection (a)(1).
The Administrator shall determine the circumstances
under which such employees shall be required to
participate in such a program. Nothing in this
subsection shall preclude any air carrier or
foreign air carrier from establishing a program
under this subsection in cooperation with any other
air carrier or foreign air carrier.
"(2) The Administrator shall establish and maintain
a rehabilitation program which at a minimum
provides for the identification and opportunity for
treatment of those employees of the Federal
Aviation Administration whose duties include
responsibility for safety-sensitive functions who
are in need of assistance in resolving problems
with the use of alcohol or controlled substances.
"PROCEDURES
"(d) In establishing the program required under
subsection (a) of this section, the Administrator
shall development requirements which shall--
"(1) promote, to the maximum extent
practicable, individual privacy in the
collection of specimen samples;
"(2) with respect to laboratories and
testing procedures for controlled
substances, incorporate the Department of
Health and Human Services scientific and
technical guidelines dated April 11,
1988, and any amendments thereto,
including mandatory guidelines which--
"(A) establish comprehensive
standards for all aspects of
laboratory controlled
substances testing and
laboratory procedures to be
applied in carrying out this
section, including standards
that require the use of the
best available technology for
ensuring full reliability and
accuracy of controlled
substances tests and strict
procedures governing the chain
of custody of specimen samples
collected for controlled
substances testing;
"(B) establish the minimum list
of controlled substances for
which persons may be tested;
and
"(C) establish appropriate
standards and procedures for
periodic review of laboratories
and criteria for certification
and revocation of certification
of laboratories to perform
controlled substances testing
in carrying out this section;
"(3) require that all laboratories
involved in the controlled substances
testing of any person under this section
shall have the capability and facility,
at such laboratory, of performing
screening and confirmation tests;
"(4) provide that all tests that indicate
the use, in violation of law, of alcohol
or a controlled substance by any person
shall be confirmed by a scientifically
recognized method of testing capable of
providing quantitative data regarding
alcohol or a controlled substance;
"(5) provide that each specimen sample be
subdivided, secured, and labeled in the
presence of the tested person and that a
portion thereof be retained in a secure
manner to prevent the possibility of
tampering, so that if the person's
confirmation test results are positive
the person has an opportunity to have the
retained portion assayed by a
confirmation test done independently at a
second certified laboratory if the person
requests the independent test within 3
days after being advised of the results
of the confirmation test;
"(6) ensure appropriate safeguards for
testing to detect and quantify alcohol in
breath and body fluid samples, including
urine and blood, through the development
of regulations as may be necessary and in
consultation with the Department of
Health and Human Services;
"(7) provide for the confidentiality of
test results and medical information
(other than information relating to
alcohol or a controlled substance) of
employees, except that this paragraph
shall not preclude the use of test
results for the orderly imposition of
appropriate sanctions under this section;
and
"(8) ensure that employees are selected
for tests by nondiscriminatory and
impartial methods, so that no employee is
harassed by being treated differently
from other employees in similar
circumstances.
"EFFECT ON OTHER LAWS AND REGULATIONS
"(e)(1) No State or local government shall adopt or
have in effect any law, rule, regulation,
ordinance, standard, or order that is inconsistent
with the regulations promulgated under this
section, except that the regulations promulgated
under this section shall not be construed to
preempt provisions of State criminal law which
impose sanctions for reckless conduct leading to
actual loss of life, injury, or damage to property,
whether the provisions apply specifically to
employees of an air carrier or foreign air carrier
or to the general public.
"(2) Nothing in this section shall be construed to
restrict the discretion of the Administrator to
continue in force, amend, or further supplement any
regulations issued before the date of enactment of
this section that govern the use of alcohol and
controlled substances by airmen, crewmembers,
airport security screening contract personnel, air
carrier employees responsible for safety-sensitive
functions (as determined by the Administrator), or
employees of the Federal Aviation Administration
with responsibility for safety-sensitive functions.
"(3) In prescribing regulations under this section,
the Administrator shall establish requirements
applicable to foreign air carriers that are
consistent with the international obligations of
the United States, and the Administrator shall
take into consideration any applicable laws and
regulations of foreign countries. The Secretary of
State and the Secretary of Transportation, jointly,
shall call on the member countries of the
International Civil Aviation Organization to
strengthen and enforce existing standards to
prohibit the use, in violation of law, of alcohol
or a controlled substance by crewmembers in
international civil aviation.
"DEFINITION
"(f) For the purposes of this section, the term
"controlled substance" means any substance under
section 102(6) of the Controlled Substances Act
(21 U.S.C. 802(6)) specified by the
Administrator.".
(2) The portion of the table of contents of the Federal
Aviation Act of 1958 relating to title VI is amended by
adding at the end thereof the following:
"Sec. 613. Alcohol and controlled substances testing.
"(a) Testing program.
"(b) Prohibition on service.
"(c) Program for rehabilitation.
"(d) Procedures.
"(e) Effect on other laws and regulations.
"(f) Definition.".
(d) AMENDMENT OF THE FEDERAL RAILROAD SAFETY ACT.--Section 202 of the
Federal Railroad Safety Act of 1970 (45 U.S.C. 431) is amended by
adding at the end thereof the following new subsection:
"(r)(1) In the interest of safety, the Secretary shall, not
later than 12 months after the date of enactment of this
subsection, issue rules, regulations, standards, and orders
relating to alcohol and drug use in railroad operations.
Such regulations shall establish a program which--
"(A) requires railroads to conduct preemployment,
reasonable suspicion, random, and post-accident
testing of all railroad employees responsible for
safety-sensitive functions (as determined by the
Secretary) for use, in violation of law, of alcohol
or a controlled substance;
"(B) requires, as the Secretary considers
appropriate, disqualification for an established
period of time or dismissal of any employee
determined to have used or to have been impaired by
alcohol while on duty; and
"(C) requires, as the Secretary considers
appropriate, disqualification for an established
period of time or dismissal of any employee
determined to have used a controlled substance,
whether on duty or not on duty, except as permitted
for medical purposes by law and any rules,
regulations, standards, or orders issued under this
title.
The Secretary may also issue rules, regulations, standards,
and orders, as the Secretary considers appropriate in the
interest of safety, requiring railroads to conduct periodic
testing of railroad employees responsible for such safety
sensitive functions, for use of alcohol or a controlled
substance in violation of law. Nothing in this subsection
shall be construed to restrict the discretion of the
Secretary to continue in force, amend, or further supplement
any rules, regulations, standards, and orders governing the
use of alcohol and controlled substances in railroad
operations issued before the date of enactment of this
subsection.
"(2) In carrying out this subsection, the Secretary shall
develop requirements which shall--
"(A) promote, to the maximum extent practicable,
individual privacy in the collection of specimen
samples;
"(B) with respect to laboratories and testing
procedures for controlled substances, incorporate
the Department of Health and Human Services
scientific and technical guidelines dated April 11,
1988, and any amendments thereto, including
mandatory guidelines which--
"(i) establish comprehensive standards
for all aspects of laboratory controlled
substances testing and laboratory
procedures to be applied in carrying out
this subsection, including standards that
require the use of the best available
technology for ensuring the full
reliability and accuracy of controlled
substances tests and strict procedures
governing the chain of custody of
specimen samples collected for controlled
substances testing;
"(ii) establish the minimum list of
controlled substances for which persons
may be tested; and
"(iii) establish appropriate standards
and procedures for periodic review of
laboratories and criteria for
certification and revocation of
certification of laboratories to perform
controlled substances testing in carrying
out this subsection;
"(C) require that all laboratories involved in the
controlled substances testing of any employee under
this subsection shall have the capability and
facility, at such laboratory, of performing
screening and confirmation tests;
"(D) provide that all tests which indicate the use,
in violation of law, of alcohol or a controlled
substance by any employee shall be confirmed by a
scientifically recognized method of testing capable
of providing quantitative data regarding alcohol or
a controlled substance;
"(E) provide that each specimen sample be
subdivided, secured, and labeled in the presence of
the tested person and that a portion thereof be
retained in a secure manner to prevent the
possibility of tampering, so that in the event the
person's confirmation test results are positive the
person has an opportunity to have the retained
portion assayed by a confirmation test done
independently at a second certified laboratory if
the person requests the independent test within 3
days after being advised of the results of the
confirmation test;
"(F) ensure appropriate safeguards for testing to
detect and quantify alcohol in breath and body
fluid samples, including urine and blood, through
the development of regulations as may be necessary
and in consultation with the Department of Health
and Human Services;
"(G) provides for the confidentiality of test
results and medical information (other than
information relating to alcohol or a controlled
substance) of employees, except that the provisions
of this subparagraph shall not preclude the use of
test results for the orderly imposition of
appropriate sanctions under this subsection; and
"(H) ensure that employees are selected for tests
by nondiscriminatory and impartial methods, so that
no employee is harassed by being treated
differently from other employees in similar
circumstances.
"(3) The Secretary shall issue rules, regulations, standards,
or orders setting forth requirements for rehabilitation
programs which at a minimum provide for the identification
and opportunity for treatment of railroad employees
responsible for safety-sensitive functions (as determined by
the Secretary) in need of assistance in resolving problems
with the use, in violation of law, of alcohol or a controlled
substance. Each railroad is encouraged to make such a
program available to all of its employees in addition to
those employees responsible for safety-sensitive functions.
The Secretary shall determine the circumstances under which
such employees shall be required to participate in such
program. Nothing in this paragraph shall preclude a railroad
from establishing a program under this paragraph in
cooperation with any other railroad.
"(4) In carrying out the provisions of this subsection, the
Secretary shall establish requirements that are consistent
with the international obligations of the United States, and
the Secretary shall take into consideration any applicable
laws and regulations of foreign countries.
"(5) For the purposes of this subsection, the term
'controlled substance' means any substance under section
102(6) of the Controlled Substances Act (21 U.S.C. 802(6))
specified by the Secretary.".
(e) AMENDMENT OF THE COMMERCIAL MOTOR VEHICLE SAFETY ACT.--(1) The
Commercial Motor Vehicle Safety Act of 1986 (49 App. U.S.C.
2701 et seq.) is amended by adding at the end thereof the
following new section:
"SEC. 12020. ALCOHOL AND CONTROLLED SUBSTANCES
TESTING.
"(a) REGULATIONS.--The Secretary shall, in the
interest of commercial motor vehicle safety, issue
regulations not later than 12 months after the date
of enactment of this section. Such regulations
shall establish a program which requires motor
carriers to conduct preemployment, reasonable
suspicion, random, and post-accident testing of the
operators of commercial motor vehicles for use, in
violation of law, of alcohol or a controlled
substance. The Secretary may also issue
regulations, as the Secretary considers appropriate
in the interest of safety, for the conduct of
periodic testing of such operations for such use in
violation of law.
"(b) TESTING.--
"(1) POST-ACCIDENT TESTING.--In issuing
such regulations, the Secretary shall
require that post-accident testing of the
operator of a commercial motor vehicle be
conducted in the case of any accident
involving a commercial motor vehicle in
which occurs loss of human life, or, as
determined by the Secretary, other serious
accidents involving bodily injury or
significant property damage.
"(2) TESTING AS PART OF MEDICAL
EXAMINATION.--Nothing in subsection (a)
shall preclude the Secretary from
providing in such regulations that such
testing be conducted as part of the
medical examination required by subpart E
of part 391 of title 49, Code of Federal
Regulations, with respect to operators of
commercial motor vehicles to whom such
part is applicable.
"(c) PROGRAM FOR REHABILITATION.--The Secretary
shall issue regulations setting forth requirements
for rehabilitation programs which provide for the
identification and opportunity for treatment of
operators of commercial motor vehicles who are
determined to have used, in violation of law or
Federal regulation, alcohol or a controlled
substance. The Secretary shall determine the
circumstances under which such operators shall be
required to participate in such program. Nothing
in this subsection shall preclude a motor carrier
from establishing a program under this subsection
in cooperation with any other motor carrier.
"(d) PROCEDURES FOR TESTING.--In establishing the
program required under subsection (a) of this
section, the Secretary shall develop requirements
which shall--
"(1) promote, to the maximum extent
practicable, individual privacy in the
collection of specimen samples;
"(2) with respect to laboratories and
testing procedures for controlled
substances, incorporate the Department of
Health and Human Services scientific and
technical guidelines dated April 11,
1988, and any subsequent amendments
thereto, including mandatory guidelines
which--
"(A) establish comprehensive
standards for all aspects of
laboratory controlled
substances testing and
laboratory procedures to be
applied in carrying out this
section, including standards
which require the use of the
best available technology for
ensuring the full reliability
and accuracy of controlled
substances tests and strict
procedures governing the chain
of custody of specimen samples
collected for controlled
substances testing;
"(B) establish the minimum list
of controlled substances for
which individuals may be
tested; and
"(C) establish appropriate
standards and procedures for
periodic review of laboratories
and criteria for certification
and revocation of certification
of laboratories to perform
controlled substances testing
in carrying out this section;
"(3) require that all laboratories
involved in the testing of any individual
under this section shall have the
capability and facility, at such
laboratory, of performing screening and
confirmation tests;
"(4) provide that all tests which
indicate the use, in violation of law or
Federal regulation, of alcohol or a
controlled substance by any individual
shall be confirmed by a scientifically
recognized method of testing capable of
providing quantitative data regarding
alcohol or a controlled substance;
"(5) provide that each specimen sample be
subdivided, secured, and labeled in the
presence of the tested individual and
that a portion thereof be retained in a
secure manner to prevent the possibility
of tampering, so that in the event the
individual's confirmation test results
are positive the individual has an
opportunity to have the retained portion
assayed by a confirmation test done
independently at a second certified
laboratory if the individual requests the
independent test within 3 days after
being advised of the results of the
confirmation test;
"(6) ensure appropriate safeguards for
testing to detect and quantify alcohol in
breath and body fluid samples, including
urine and blood, through the development
of regulations as may be necessary and in
consultation with the Department of
Health and Human Services;
"(7) provide for the confidentiality of
test results and medical information
(other than information relating to
alcohol or a controlled substance) of
employees, except that the provisions of
this paragraph shall not preclude the use
of test results for the orderly
imposition of appropriate sanctions under
this section; and
"(8) ensure that employees are selected
for tests by nondiscriminatory and
impartial methods, so that no employee is
harassed by being treated differently
from other employees in similar
circumstances.
"(e) EFFECT ON OTHER LAWS AND REGULATIONS.--
"(1) STATE AND LOCAL LAW AND
REGULATIONS.--No State or local
government shall adopt or have in effect
any law, rule, regulation, ordinance,
standard, or order that is inconsistent
with the regulations issued under this
section, except that the regulations
issued under this section shall not be
construed to preempt provisions of State
criminal law which impose sanctions for
reckless conduct leading to actual loss
of life, injury, or damage to property,
whether the provisions apply specifically
to commercial motor vehicle employees, or
to the general public.
"(2) OTHER REGULATIONS ISSUED BY
SECRETARY.--Nothing in this section shall
be construed to restrict the discretion
of the Secretary to continue in force,
amend, or further supplement any
regulations governing the use of alcohol
or controlled substances by commercial
motor vehicle employees issued before the
date of enactment of this section.
"(3) INTERNATIONAL OBLIGATIONS.--In
issuing regulations under this section,
the Secretary shall only establish
requirements that are consistent with the
international obligations of the United
States, and the Secretary shall take into
consideration any applicable laws and
regulations of foreign countries.
"(f) APPLICATION OF PENALTIES.--
"(1) EFFECT ON OTHER PENALTIES.--Nothing
in this section shall be construed to
supersede any penalty applicable to the
operator of a commercial motor vehicle
under this title or any other provision
of law..
"(2) DETERMINATION OF SANCTIONS.--The
Secretary shall determine appropriate
sanctions for commercial motor vehicle
operators who are determined, as a result
of tests conducted and confirmed under
this section, to have used, in violation
of law or Federal regulation, alcohol or
a controlled substance but are not under
the influence of alcohol or a controlled
substance as provide in this title.
"(g) DEFINITION.--(1) For the purposes of this section, the
term 'controlled substance' means any substance under section
102(6) of the Controlled Substances Act (21 U.S.C. 802(6))
specified by the Secretary.".
(2) The table of contents of the Commercial Motor Vehicle
Safety Act of 1986 (Public Law 99-570; 100 Stat. 5223) is
amended by adding at the end thereof the following:
"Sec. 12020. Alcohol and controlled substances
testing.".
(3) The Secretary shall design within 9 months after the date
of enactment of this subsection, and implement within 15
months after the date of enactment of this subsection, a
pilot test program for the purpose of testing the operators
of commercial motor vehicles on a random basis to determine
whether an operator has used, in violation of law or Federal
regulation, alcohol or a controlled substance. The pilot
test program shall be administered as part of the Motor
Carrier Safety Assistance Program.
(4) The Secretary shall solicit the participation of State
which are interested in participating in such program and
shall select four States to participate in the program.
(5) The Secretary shall ensure that the states selected
pursuant to this section are representative of varying
geographical and population characteristics of the Nation and
that the selection takes into consideration the historical
geographical incidence of commercial motor vehicle accidents
involving loss of human life.
(6) The pilot program authorized by this section shall
continue for a period of one year. The Secretary shall
consider alternative methodologies for implementing a system
of random testing of operators of commercial motor vehicles.
(7) Not later than 30 months after the date of enactment of
this section, the Secretary shall prepare and submit to the
Congress a comprehensive report setting forth the results of
the pilot program conducted under this subsection. Such
report shall include any recommendations of the Secretary
concerning the desirability and implementation of a system
for the random testing of operators of commercial motor
vehicles.
(8) For the purposes of carrying out this subsection, there
shall be available to the Secretary $5,000,000 from funds
made available to carry out section 404 of the Surface
Transportation Assistance Act of 1982 (49 App. U.S.C. 2304)
for fiscal year 1990.
(9) For the purposes of this subsection, the term "commercial
motor vehicle" shall have the meaning given to such term in
section 12019(6) of the Commercial Motor Vehicle Safety Act
of 1986 (49 App. U.S.C. 2716(6)).
(f) AMENDMENT OF THE URBAN MASS TRANSPORTATION ACT.--The Urban Mass
Transportation Act of 1964 is amended by adding at the end thereof the
following new section:
"ALCOHOL AND CONTROLLED SUBSTANCES TESTING
"SEC. 26. (a) REGULATIONS.--The Secretary shall, in the
interest of mass transportation safety, issue regulations
within 12 months after the date of enactment of this section.
Such regulations shall establish a program which requires
each recipient of assistance under this Act to conduct
preemployment, reasonable suspicion, random, and postaccident
testing of the operators of mass transportation vehicles for
use, in violation of law or Federal regulation, of alcohol or
a controlled substance. The Secretary may also issue
regulations, as the Secretary considers appropriate in the
interest of safety, for the conduct of periodic recurring
testing of such operators for such use in violation of law or
Federal regulation.
"(b) POSTACCIDENT TESTING.--In issuing such regulations, the
Secretary shall require that postaccident testing of the
operator of a mass transportation vehicle be conducted in the
case of any accident involving a mass transportation vehicle
in which occurs loss of human life, or, as determined by the
Secretary, other serious accidents involving bodily injury or
significant property damage.
"(c) PROGRAM FOR REHABILITATION.--The Secretary shall issue
regulations setting forth requirements for rehabilitation
programs which provide for the identification and opportunity
for treatment of operators of mass transportation vehicles
who are determined to have used, in violation of law or
Federal regulation, alcohol or a controlled substance. The
Secretary shall determine the circumstances under which such
operators shall be required to participate in such a program.
Nothing in this subsection shall preclude a recipient from
establishing a program under this subsection in cooperation
with any other recipient.
"(d) PROCEDURES FOR TESTING.--In establishing the program
required under subsection (a) of this section, the Secretary
shall develop requirements which shall--
"(1) promote, to the maximum extent practicable,
individual privacy in the collection of specimen
samples;
"(2) with respect to laboratories and testing
procedures for controlled substances, incorporate
the Department of Health and Human Services
scientific and technical guidelines dated April 11,
1988, and any subsequent amendments thereto,
including mandatory guidelines which--
"(A) establish comprehensive standards
for all aspects of laboratory controlled
substances testing and laboratory
procedures to be applied in carrying out
this section, including standards which
require the use of the best available
technology for ensuring the full
reliability and accuracy of controlled
substances tests and strict procedures
governing the chain of custody of
specimen samples collected for controlled
substances testing;
"(B) establish the minimum list of
controlled substances for which
individuals may be tested; and
"(C) establish appropriate standards and
procedures for periodic review of
laboratories and criteria for
certification and revocation of
certification of laboratories to perform
controlled substances testing in carrying
out this section;
"(3) require that all laboratories involved in the
testing of any individual under this section shall
have the capability and facility, at such
laboratory, of performing screening and
confirmation tests;
"(4) provide that all tests which indicate the use,
in violation of law or Federal regulation, of
alcohol or a controlled substance by any individual
shall be confirmed by a scientifically recognized
method of testing capable of providing quantitative
data regarding alcohol or a controlled substance;
"(5) provide that each specimen sample be
subdivided, secured, and labeled in the presence of
the tested individual and that a portion thereof be
retained in a secure manner to prevent the
possibility of tampering, so that in the event the
individual's confirmation test results are positive
the individual has an opportunity to have the
retained portion assayed by a confirmation test
done independently at a second certified laboratory
if the individual requests the independent test
within 3 days after being advised of the results of
the confirmation test;
"(6) ensure appropriate safeguards for testing to
detect and quantify alcohol in breath and body
fluid samples, including urine and blood, through
the development of regulations as may be necessary
and in consultation with the Department of Health
and Human Services;
"(7) provide for the confidentiality of test
results and medical information (other than
information relating to alcohol or a controlled
substance) of employees, except that the provisions
of this paragraph shall not preclude the use of
test results for the orderly imposition of
appropriate sanctions under this section; and
"(8) ensure that employees are selected for tests
by nondiscriminatory and impartial methods, so that
no employee is harassed by being treated
differently from other employees in similar
circumstances.
"(e) EFFECT ON OTHER LAWS AND REGULATIONS.--
"(1) STATE AND LOCAL LAW AND REGULATIONS.--No State
or local government shall adopt or have in effect
any law, rule, regulation, ordinance, standard, or
order that is inconsistent with the regulations
issued under this section, except that the
regulations issued under this section shall not be
construed to preempt provisions of State criminal
law which impose sanctions for reckless conduct
leading to actual loss of life, injury, or damage
to property.
"(2) OTHER REGULATIONS ISSUED BY
SECRETARY.--Nothing in this section shall be
construed to restrict the discretion of the
Secretary to continue in force, amend, or further
supplement any regulations governing the use of
alcohol or controlled substances by mass
transportation employees issued before the date of
enactment of this section.
"(3) INTERNATIONAL OBLIGATIONS.--In issuing
regulations under this section, the Secretary shall
only establish requirements that are consistent
with the international obligations of the United
States, and the Secretary shall take into
consideration any applicable laws and regulations
of foreign countries.
"(f) APPLICATION OF PENALTIES.--
"(1) EFFECT ON OTHER PENALTIES.--Nothing in this
section shall be construed to supersede any penalty
applicable under this title or any other provision
of law..
"(2) DETERMINATION OF SANCTIONS.--The Secretary
shall determine appropriate sanctions for mass
transportation vehicle operators who are
determined, as a result of tests conducted and
confirmed under this section, to have used, in
violation of law or Federal regulation, alcohol or
a controlled substance but are not under the
influence of alcohol or a controlled substance as
provide in this title.
"(g) DEFINITION.--(1) For the purposes of this
section, the term 'controlled substance' means any
substance under section 102(6) of the Controlled
Substances Act (21 U.S.C. 802(6)) specified by the
Secretary.".
SEC. 208. MONETARY AWARDS FOR CERTAIN INFORMATION RELATING TO THE
UNLAWFUL SALE OF CONTROLLED SUBSTANCES.
Section 524z(c)(1) of title 28, United States Code is amended--
(1) by striking "Justice--" and inserting "Justice:";
(2) in subparagraph (A)--
(A) by striking "the" in the first place it appears
and inserting "The"; and
(B) by striking the semicolon at the end and
inserting a period; and
(3) in subparagraph (B)--
(A) by striking "the" the first place it appears
and inserting "The"; and
(B) by striking the semicolon at the end and
inserting a period; and
(4) in subparagraph (C)--
(A) by striking "the" the first place it appears
and inserting "The"; and
(B) by striking the semicolon at the end and
inserting a period;
(5) in subparagraph (D)--
(A) by striking "the" the first place it appears
and inserting "The"; and
(B) by striking the semicolon at the end and
inserting a period;
(6) in subparagraph (E)--
(A) by striking "disbursements" and inserting
"Disbursements"; and
(B) by striking the semicolon at the end and
inserting a period;
(7) in subparagraph (F)--
(A) by striking "for" the first place it appears
and inserting "For"; and
(B) by striking the semicolon at the end and
inserting a period;
(8) in subparagraph (G)--
(A) by striking "for" the first place it appears
and inserting "For"; and
(B) by striking the semicolon at the end and
inserting a period;
(9) in subparagraph (H)--
(A) by striking "after" and inserting "After";
(B) by striking "(H)" and inserting "(I)"; and
(10) by inserting after subparagraph (G) the following:
"(H)(i) For the payment of an award to any person
or persons who provide information leading to the
arrest and conviction under Federal law of any
individual or individuals for the unlawful sale, or
possession for sale, of a controlled substance or a
controlled substance analogue. The aggregate
amount of such award shall be equal to 50 percent
of the fair market value (as of the date of
forfeiture) of all property forfeited to the United
States as a result of such conviction and pursuant
to a law enforced or administered by the Department
of Justice: _Provided_, That payment of such
awards shall not reduce the amount of such moneys
or property available for distribution to State and
local law enforcement agencies.
"(ii) For the payment to the State or States in
which the Federal offense was committed by such
individual or individuals, of an incentive award to
encourage such State or States, at their option, to
establish a program (including outreach) to pay
rewards to persons who provide information leading
to the arrest and conviction under State law of
individuals for the unlawful sale, or possession
for sale, of controlled substances or controlled
substance analogues. The aggregate amount of such
incentive award shall be equal to 5 percent of the
fair market value (as of the date of forfeiture) of
all property forfeited to the United States as a
result of the convictions referred to in clause (i)
and pursuant to a law enforced or administered by
the Department of Justice.
"(iii) For the purposes of this subparagraph--
"(I) the term 'controlled substance' has
the meaning stated in section 102(6) of
the Controlled Substances Act;
"(II) the term 'controlled substance
analogue' has the meaning stated in
section 102(32) of the Controlled
Substances Act; and
"(III) the term 'individual' does not
include an individual who is convicted
under Federal or State law for the
unlawful sale, or possession for sale, of
a controlled substance or a controlled
substances analogue.".
TITLE III--AUTHORIZATION OF APPROPRIATIONS
SEC. 301. AUTHORIZATION OF APPROPRIATIONS.
There are authorized to be appropriated such sums as are necessary to
carry out this Act.
SEC. 302. SEVERABILITY.
If any provision of this Act or any amendment made by this Act, or the
application of any such provision or amendment to any person or
circumstance is held invalid, the validity of any other such provision
or amendment, and the application of such provisions or amendment to
other persons and circumstances, shall not be affected thereby.
*********************************************************************
Editor's Comment: Well, I hope you enjoyed the first issue. I have no
reason to believe that there will not be many more to come. I am sorry if
this issue is a somewhat large. We had so much information, that we just
had to pack it in. The Rivendell BBS will be up as of May 1, 1991. We are
not sure of the number yet, but as soon as we find out, we will post it on
the current Rivendell BBS. (713) 481-3448. Please do not call this number
after May 1. I would like to extend my special thanks to Homer Mandrill for
that exclusive editorial and to the dudes at Beer*Net for the input. I hope
all of you are as happy with the first issue as I am. I would love nothing
more than to hear from our readers. Please write, call the BBS, or drop me
a line on Internet. All mailing/calling info is at the top of the magazine.
This issue came out almost two months early. I thought it would be hell to
do, but it was smooth as it could have ever been. But, send in those
articles and editorials. I will fit them in somewhere. Please state if you
would like to remain anonymous, use your handle, or real name. We will give
you the courtesy of any option you desire. Many thanks to the guys at NIA
for the plug. Keep on Rockin JD & LM! Well, thats the show, and I'm outta
here.
The Desert Fox