You are on page 1of 61

U.S.

Supreme Court Territory to a State, those rule apply in the trials of criminal
cases in the federal courts sitting in that State. P. 277 U. S.
Olmstead v. United States, 277 U.S. 438 (1928) 466.

Olmstead v. United States 7. Under the common law, the admissibility of evidence is not
affected by the fact of its having been obtained illegally. P. 277
U.S. 467.
Nos. 493, 532 and 533
8. The rule excluding from the federal Courts evidence of crime
Argued February 20, 21, 1928 procured by government officers by methods forbidden by the
Fourth and Fifth Amendments is an exception to the common
Decided June 4, 1928 law rule. Id.

277 U.S. 438 9. Without the sanction of an Act of Congress, federal courts
have no discretion to exclude evidence, the admission of which
CERTIORARI TO THE CIRCUIT COURT OF APPEALS is not unconstitutional, because it was unethically procured.
P. 277 U. S. 468.

FOR THE NINTH CIRCUIT


10. The statute of Washington, adopted in 1909, making the
interception of telephone messages a misdemeanor cannot
Syllabus affect the rules of evidence applicable in federal courts in
criminal cases. Id.
1. Use in evidence in a criminal trial in a federal court of an
incriminating telephone conversation voluntarily conducted by 19 F. (2d) 842, 848, 850, affirmed.
the accused and secretly overheard from a tapped wire by a
government officer does not compel the accused to be a
witness against himself in violation of the Fifth Amendment. CERTIORARI, 276 U.S. 609, to judgments of the Circuit Court
P. 277 U. S. 462. of Appeals affirming convictions of conspiracy to violate the
Prohibition Act. See 5 F.2d 712; 7 F.2d 756, 760. The order
granting certiorari confined the hearing to the question whether
2. Evidence of a conspiracy to violate the Prohibition Act was the use in evidence of private telephone conversations,
obtained by government officers by secretly tapping the lines of intercepted by means of wiretapping, violated the Fourth and
a telephone company connected with the chief office and some Fifth Amendments.
of the residences of the conspirators, and thus clandestinely
overhearing and recording their telephonic conversations
concerning the conspiracy and in aid of its execution. The Page 277 U. S. 455
tapping connections were made in the basement of a large
office building and on public streets, and no trespass was MR. CHIEF JUSTICE TAFT delivered the opinion of the Court.
committed upon any property of the defendants. Held, that the
obtaining of the evidence and its use at the trial did not violate These cases are here by certiorari from the Circuit Court of
the Fourth Amendment. Pp. 457- 277 U. S. 466. Appeals for the Ninth Circuit. 19 F.2d 842 and 850. The petition
in No. 493 was filed August 30, 1927; in Nos. 532 and 533,
3. The principle of liberal construction applied to the September 9, 1927. They were granted with the distinct
Amendment to effect its purpose in the interest of liberty will limitation that the hearing should be confined to the single
not justify enlarging it beyond the possible practical meaning of question whether the use of evidence of private telephone
"persons, houses, papers, and effects," or so applying conversations between the defendants and others, intercepted
"searches and seizures" as to forbid hearing or sight. P. 277 U. by means of wiretapping amounted to a violation of the Fourth
S. 465. and Fifth Amendments.

4. The policy of protecting the secrecy of telephone messages The petitioners were convicted in the District Court for the
by making them, when intercepted, inadmissible as evidence in Western District of Washington of a conspiracy to violate the
federal criminal trials may be adopted by Congress through National Prohibition Act by unlawfully possessing, transporting
legislation, but it is not for the courts to adopt it by attributing an and importing intoxicating liquors and maintaining nuisances,
enlarged and unusual meaning to the Fourth Amendment. and by selling intoxicating liquors. Seventy-two others in
P. 277 U. S. 465. addition to the petitioners were indicted. Some were not
apprehended, some were acquitted, and others pleaded guilty.
5. A provision in an order granting certiorari limiting the review
to a single specific question does not deprive the Court of The evidence in the records discloses a conspiracy of amazing
jurisdiction to decide other questions presented by the record. magnitude to import, possess and sell liquor unlawfully.
P. 277 U. S. 466.
Page 277 U. S. 456
6. The common law of evidence having prevailed in the State
of Washington since a time antedating her transformation from It involved the employment of not less than fifty persons, of two
a seagoing vessels for the transportation of liquor to British
Columbia, of smaller vessels for coastwise transportation to the
Page 277 U. S. 439 State of Washington, the purchase and use of a ranch beyond

1
the suburban limits of Seattle, with a large underground cache seizures shall not be violated, and no warrants shall issue but
for storage and a number of smaller caches in that city, the upon probable cause, supported by oath or affirmation and
maintenance of a central office manned with operators, the particularly describing the place to be searched and the
employment of executives, salesmen, deliverymen, persons or things to be seized."
dispatchers, scouts, bookkeepers, collectors and an attorney.
In a bad month, sales amounted to $176,000; the aggregate for And the Fifth: "No person . . . shall be compelled, in any
a year must have exceeded two millions of dollars. criminal case, to be a witness against himself."

Olmstead was the leading conspirator and the general Page 277 U. S. 458
manager of the business. He made a contribution of $10,000 to
the capital; eleven others contributed $1,000 each. The profits
were divided one-half to Olmstead and the remainder to the It will be helpful to consider the chief cases in this Court which
other eleven. Of the several offices in Seattle, the chief one bear upon the construction of these Amendments.
was in a large office building. In this there were three
telephones on three different lines. There were telephones in Boyd v. United States, 116 U. S. 616, was an information filed
an office of the manager in his own home, at the homes of his by the District Attorney in the federal court in a cause of
associates, and at other places in the city. Communication was seizure and forfeiture against thirty-five cases of plate glass,
had frequently with Vancouver, British Columbia. Times were which charged that the owner and importer, with intent to
fixed for the deliveries of the "stuff," to places along Puget defraud the revenue, made an entry of the imported
Sound near Seattle, and from there the liquor was removed merchandise by means of a fraudulent or false invoice. It
and deposited in the caches already referred to became important to show the quantity and value of glass
contained in twenty-nine cases previously imported. The fifth
One of the chief men was always on duty at the main office to section of the Act of June 22, 1874, provided that, in cases not
receive orders by telephones and to direct their filling by a criminal under the revenue laws, the United States Attorney,
corps of men stationed in another room -- the " bull pen." The whenever he thought an invoice belonging to the defendant
call numbers of the telephones were given to those known to would tend to prove any allegation made by the United States,
be likely customers. At times, the sales amounted to 200 cases might, by a written motion describing the invoice and setting
of liquor per day. forth the allegation which he expected to prove, secure a notice
from the court to the defendant to produce the invoice, and, if
the defendant refused to produce it, the allegations stated in
The information which led to the discovery of the conspiracy the motion should be taken as confessed, but if produced, the
and its nature and extent was largely obtained by intercepting United States Attorney should be permitted, under the direction
messages on the telephones of the conspirators by four federal of the court, to make an examination of the invoice, and might
prohibition officers. Small offer the same in evidence. This Act had succeeded the Act of
1867, which provided that, in such cases, the District Judge, on
Page 277 U. S. 457 affidavit of any person interested, might issue a warrant to the
marshal to enter the premises where the invoice was and take
wires were inserted along the ordinary telephone wires from possession of it and hold it subject to the order of the judge.
the residences of four of the petitioners and those leading from This had been preceded by the Act of 1863 of a similar tenor,
the chief office. The insertions were made without trespass except that it directed the warrant to the collector, instead of
upon any property of the defendants. They were made in the the marshal. The United States Attorney followed the Act of
basement of the large office building. The taps from house 1874 and compelled the production of the invoice.
lines were made in the streets near the houses.
The court held the Act of 1874 repugnant to the Fourth and
The gathering of evidence continued for many months. Fifth Amendments. As to the Fourth Amendment, Justice
Conversations of the conspirators, of which refreshing Bradley said (page 116 U. S. 621):
stenographic notes were currently made, were testified to by
the government witnesses. They revealed the large business Page 277 U. S. 459
transactions of the partners and their subordinates. Men at the
wires heard the orders given for liquor by customers and the "But, in regard to the Fourth Amendment, it is contended that,
acceptances; they became auditors of the conversations whatever might have been alleged against the constitutionality
between the partners. All this disclosed the conspiracy charged of the acts of 1863 and 1867, that of 1874, under which the
in the indictment. Many of the intercepted conversations were order in the present case was made, is free from constitutional
not merely reports, but parts of the criminal acts. The evidence objection because it does not authorize the search and seizure
also disclosed the difficulties to which the conspirators were of books and papers, but only requires the defendant or
subjected, the reported news of the capture of vessels, the claimant to produce them. That is so; but it declares that, if he
arrest of their men and the seizure of cases of liquor in garages does not produce them, the allegations which it is affirmed they
and other places. It showed the dealing by Olmstead, the chief will prove shall be taken as confessed. This is tantamount to
conspirator, with members of the Seattle police, the messages compelling their production, for the prosecuting attorney will
to them which secured the release of arrested members of the always be sure to state the evidence expected to be derived
conspiracy, and also direct promises to officers of payments as from them as strongly as the case will admit of. It is true that
soon as opportunity offered. certain aggravating incidents of actual search and seizure,
such as forcible entry into a man's house and searching
The Fourth Amendment provides -- amongst his papers, are wanting, and, to this extent, the
proceeding under the Act of 1874 is a mitigation of that which
"The right of the people to be secure in their persons, houses, was authorized by the former acts; but it accomplishes the
papers, and effects against unreasonable searches and substantial object of those acts in forcing from a party evidence
against himself. It is our opinion, therefore, that a compulsory

2
production of a man's private papers to establish a criminal "Thus, the case is not that of knowledge acquired through the
charge against him, or to forfeit his property, is within the scope wrongful act of a stranger, but it must be assumed that the
of the Fourth Amendment to the Constitution in all cases in Government planned, or at all events ratified, the whole
which a search and seizure would be, because it is a material performance."
ingredient, and effects the sole object and purpose of search
and seizure." And it held that the illegal character of the original seizure
characterized the entire proceeding, and, under
Concurring, Mr. Justice Miller and Chief Justice Waite said that the Weeks case, the seized papers must be restored.
they did not think the machinery used to get this evidence
amounted to a search and seizure, but they agreed that the In Amos v. United States, 255 U. S. 313, the defendant was
Fifth Amendment had been violated. convicted of concealing whiskey on which the tax had not been
paid. At the trial, he presented a petition asking that private
The statute provided an official demand for the production of a property seized in a search of his house and store "within his
paper or document by the defendant for official search and use curtilage" without warrant should be returned. This was denied.
as evidence on penalty that, by refusal, he should be A woman who claimed to be his wife was told by the revenue
conclusively held to admit the incriminating officers that they had come to search the premises for violation
of the revenue law. She opened the door; they entered, and
Page 277 U. S. 460 found whiskey. Further searches in the house disclosed more.
It was held that this action constituted a violation of the Fourth
Amendment, and that the denial of the motion to restore the
character of the document as charged. It was certainly no whiskey and to exclude the testimony was error.
straining of the language to construe the search and seizure
under the Fourth Amendment to include such official
procedure. In Gouled v. The United States, 255 U. S. 298, the facts were
these: Gouled and two others were charged with conspiracy to
defraud the United States. One pleaded guilty, and another
The next case, and perhaps the most important, is Weeks v. was acquitted. Gouled prosecuted error. The matter was
United States, 232 U. S. 383 -- a conviction for using the mails presented here on questions propounded by the lower court.
to transmit coupons or tickets in a lottery enterprise. The The first related to the admission in evidence of a paper
defendant was arrested by a police officer without a warrant. surreptitiously taken from the office of the defendant by one
After his arrest, other police officers and the United States acting under the direction
marshal went to his house, got the key from a neighbor,
entered the defendant's room and searched it, and took
possession of various papers and articles. Neither the marshal Page 277 U. S. 462
nor the police officers had a search warrant. The defendant
filed a petition in court asking the return of all his property. The of an officer of the Intelligence Department of the Army of the
court ordered the return of everything not pertinent to the United States. Gouled was suspected of the crime. A private in
charge, but denied return of relevant evidence. After the jury the U.S. Army, pretending to make a friendly call on him,
was sworn, the defendant again made objection, and, on gained admission to his office and, in his absence, without
introduction of the papers, contended that the search without warrant of any character, seized and carried away several
warrant was a violation of the Fourth and Fifth Amendments, documents. One of these belonging to Gouled, was delivered
and they were therefore inadmissible. This court held that such to the United States Attorney, and by him introduced in
taking of papers by an official of the United States, acting evidence. When produced, it was a surprise to the defendant.
under color of his office, was in violation of the constitutional He had had no opportunity to make a previous motion to
rights of the defendant, and, upon making seasonable secure a return of it. The paper had no pecuniary value, but
application, he was entitled to have them restored, and that, by was relevant to the issue made on the trial. Admission of the
permitting their use upon the trial, the trial court erred. paper was considered a violation of the Fourth Amendment.

The opinion cited with approval language of Mr. Justice Field Agnello v. United States, 269 U. S. 20, held that the Fourth and
in Ex parte Jackson, 96 U. S. 727, 96 U. S. 733, saying that the Fifth Amendments were violated by admission in evidence of
Fourth Amendment, as a principle of protection, was applicable contraband narcotics found in defendant's house, several
to sealed letters and packages in the mail, and that, blocks distant from the place of arrest, after his arrest, and
consistently with it, such matter could only be opened and seized there without a warrant. Under such circumstances, the
examined upon warrants issued on oath or affirmation seizure could not be justified as incidental to the arrest.
particularly describing the thing to be seized.
There is no room in the present case for applying the Fifth
In Silverthorne Lumber Company v. United States, 251 U. S. Amendment unless the Fourth Amendment was first violated.
385, the defendants were arrested at their homes and There was no evidence of compulsion to induce the defendants
to talk over their many telephones, They were continually and
Page 277 U. S. 461 voluntarily transacting business without knowledge of the
interception. Our consideration must be confined to the Fourth
Amendment.
detained in custody. While so detained, representatives of the
Government, without authority, went to the office of their
company and seized all the books, papers and documents The striking outcome of the Weeks case and those which
found there. An application for return of the things was followed it was the sweeping declaration that the Fourth
opposed by the District Attorney, who produced a subpoena for Amendment, although not referring to or limiting the use of
certain documents relating to the charge in the indictment then evidence in courts, really forbade its introduction if obtained by
on file. The court said: government officers through a violation of the Amendment.

3
Theretofore, many had supposed that, under the ordinary 3929, which forbids any postmaster or other person to open
common law rules, if the tendered evidence was pertinent, the any letter not addressed to himself. It is plainly within the words
method of obtaining it was of the Amendment to say that the unlawful rifling by a
government agent of a sealed letter is a search and seizure of
Page 277 U. S. 463 the sender's papers or effects. The letter is a paper, an effect,
and in the custody of a Government that forbids carriage
except under its protection.
unimportant. This was held by the Supreme Judicial Court of
Massachusetts in Commonwealth v. Dana, 2 Metcalf, 329, 337.
There it was ruled that the only remedy open to a defendant The United States takes no such care of telegraph or
whose rights under a state constitutional equivalent of the telephone messages as of mailed sealed letters. The
Fourth Amendment had been invaded was by suit and Amendment does not forbid what was done here. There was
judgment for damages, as Lord Camden held in Entick v. no searching. There was no seizure. The evidence was
Carrington, 19 Howell State Trials, 1029. Mr. Justice Bradley secured by the use of the sense of hearing, and that only.
made effective use of this case in Boyd v. United States. But in There was no entry of the houses or offices of the defendants.
the Weeks case, and those which followed, this Court decided
with great emphasis, and established as the law for the federal Page 277 U. S. 465
courts, that the protection of the Fourth Amendment would be
much impaired unless it was held that not only was the official By the invention of the telephone fifty years ago and its
violator of the rights under the Amendment subject to action at application for the purpose of extending communications, one
the suit of the injured defendant, but also that the evidence can talk with another at a far distant place. The language of the
thereby obtained could not be received. Amendment cannot be extended and expanded to include
telephone wires reaching to the whole world from the
The well known historical purpose of the Fourth Amendment, defendant's house or office. The intervening wires are not part
directed against general warrants and writs of assistance, was of his house or office any more than are the highways along
to prevent the use of governmental force to search a man's which they are stretched.
house, his person, his papers and his effects, and to prevent
their seizure against his will. This phase of the misuse of This Court, in Carroll v. United States, 267 U. S. 132, 267 U. S.
governmental power of compulsion is the emphasis of the 149, declared:
opinion of the Court in the Boyd case. This appears too in
the Weeks case, in the Silverthorne case, and in
the Amos case. "The Fourth Amendment is to be construed in the light of what
was deemed an unreasonable search and seizure when it was
adopted and in a manner which will conserve public interests
Gouled v. United States carried the inhibition against as well as the interests and rights of individual citizens."
unreasonable searches and seizures to the extreme limit. Its
authority is not to be enlarged by implication, and must be
confined to the precise state of facts disclosed by the record. A Justice Bradley, in the Boyd case, and Justice Clark in
representative of the Intelligence Department of the Army, the Gouled case, said that the Fifth Amendment and the Fourth
having by stealth obtained admission to the defendant's office, Amendment were to be liberally construed to effect the
seized and carried away certain private papers valuable for purpose of the framers of the Constitution in the interest of
evidential purposes. This was held an unreasonable search liberty. But that cannot justify enlargement of the language
and seizure within the Fourth Amendment. A stealthy entrance employed beyond the possible practical meaning of houses,
in such circumstances persons, papers, and effects, or so to apply the words search
and seizure as to forbid hearing or sight.
Page 277 U. S. 464
Hester v. United States, 265 U. S. 57, held that the testimony
of two officers of the law who trespassed on the defendant's
became the equivalent to an entry by force. There was actual land, concealed themselves one hundred yards away from his
entrance into the private quarters of defendant, and the taking house, and saw him come out and hand a bottle of whiskey to
away of something tangible. Here we have testimony only of another was not inadmissible. While there was a trespass,
voluntary conversations secretly overheard. there was no search of person, house, papers or
effects. United States v. Lee, 274 U. S. 559, 274 U. S.
The Amendment itself shows that the search is to be of 563; Eversole v. State, 106 Tex.Cr. 567.
material things -- the person, the house, his papers, or his
effects. The description of the warrant necessary to make the Congress may, of course, protect the secrecy of telephone
proceeding lawful is that it must specify the place to be messages by making them, when intercepted, inadmissible in
searched and the person or things to be seized. evidence in federal criminal trials by direct legislation,

It is urged that the language of Mr. Justice Field in Ex parte Page 277 U. S. 466
Jackson, already quoted, offers an analogy to the interpretation
of the Fourth Amendment in respect of wiretapping. But the
analogy fails. The Fourth Amendment may have proper and thus depart from the common law of evidence. But the
application to a sealed letter in the mail because of the courts may not adopt such a policy by attributing an enlarged
constitutional provision for the Post Office Department and the and unusual meaning to the Fourth Amendment. The
relations between the Government and those who pay to reasonable view is that one who installs in his house a
secure protection of their sealed letters. See Revised Statutes, telephone instrument with connecting wires intends to project
§§ 3978 to 3988, whereby Congress monopolizes the carriage his voice to those quite outside, and that the wires beyond his
of letters and excludes from that business everyone else, and § house and messages while passing over them are not within
the protection of the Fourth Amendment. Here, those who

4
intercepted the projected voices were not in the house of either all evidence in the procuring of which government officials took
party to the conversation. part by methods forbidden by the Fourth and Fifth
Amendments. Many state courts do not follow
Neither the cases we have cited nor any of the many federal the Weeks case. People v. Defore, 242 N.Y. 13. But those who
decisions brought to our attention hold the Fourth Amendment do treat it as an exception to the general common law rule, and
to have been violated as against a defendant unless there has required by constitutional limitations. Hughes v. State, 145
been an official search and seizure of his person, or such a Tenn. 544, 551, 566; State v. Wills, 91 W.Va. 659, 677; State
seizure of his papers or his tangible material effects, or an v. Slamon, 73 Vt. 212, 214, 215; Gindrat v. People, 138 Ill. 103,
actual physical invasion of his house "or curtilage" for the 111; People v. Castree, 311 Ill. 392, 396, 397; State v.
purpose of making a seizure.
Page 277 U. S. 468
We think, therefore, that the wiretapping here disclosed did not
amount to a search or seizure within the meaning of the Fourth Gardner, 77 Mont. 8, 21; State v. Fahn, 53 N.Dak. 203, 210.
Amendment. The common law rule must apply in the case at bar. Nor can
we, without the sanction of congressional enactment, subscribe
What has been said disposes of the only question that comes to the suggestion that the courts have a discretion to exclude
within the terms of our order granting certiorari in these cases. evidence the admission of which is not unconstitutional
But some of our number, departing from that order, have because unethically secured. This would be at variance with
concluded that there is merit in the two-fold objection overruled the common law doctrine generally supported by authority.
in both courts below -- that evidence obtained through There is no case that sustains, nor any recognized text book
intercepting of telephone messages by government agents was that gives color to, such a view. Our general experience shows
inadmissible because the mode of obtaining it was unethical, that much evidence has always been receivable although not
and a misdemeanor under the law of Washington. To avoid obtained by conformity to the highest ethics. The history of
any misapprehension of our views of that objection, we shall criminal trials shows numerous cases of prosecutions of oath-
deal with it in both of its phases. bound conspiracies for murder, robbery, and other crimes
where officers of the law have disguised themselves and joined
the organizations, taken the oaths and given themselves every
While a Territory, the English common law prevailed in appearance of active members engaged in the promotion of
Washington, and thus continued after her admission in 1889. crime, for the purpose of securing evidence. Evidence secured
The rules of evidence in criminal cases in courts of the United by such means has always been received.
States sitting there, consequently, are those of the common
law. United States v. Reid, 12 How. 361,
A standard which would forbid the reception of evidence if
obtained by other than nice ethical conduct by government
Page 277 U. S. 467 officials would make society suffer and give criminals greater
immunity than has been known heretofore. In the absence of
53 U. S. 363, 53 U. S. 366; Logan v. United States, 144 U. S. controlling legislation by Congress, those who realize the
263, 144 U. S. 301; Rosen v. United States, 245 U. S. difficulties in bringing offenders to justice may well deem it wise
467; Withaup v. United States, 127 Fed. 530, 534; Robinson v. that the exclusion of evidence should be confined to cases
United States, 292 Fed. 683, 685. where rights under the Constitution would be violated by
admitting it.
The common law rule is that the admissibility of evidence, is
not affected by the illegality of the means by which it was The statute of Washington, adopted in 1909, provides
obtained. Professor Greenleaf, in his work on evidence, vol. 1, (Remington Compiled Statutes, 1922, § 26518) that:
12th ed., by Redfield, § 254(a) says:
"Every person . . . who shall intercept, read or in any manner
"It may be mentioned in this place, that though papers and interrupt or delay the sending of a message over any telegraph
other subjects of evidence may have been illegally taken from or telephone line . . . shall be guilty of a misdemeanor
the possession of the party against whom they are offered, or
otherwise unlawfully obtained, this is no valid objection to their Page 277 U. S. 469
admissibility, if they are pertinent to the issue. The court will not
take notice how they were obtained, whether lawfully or
unlawfully, nor will it form an issue, to determine that question." "

Mr. Jones, in his work on the same subject, refers to Mr. This statute does not declare that evidence obtained by such
Greenleaf's statement and says: interception shall be inadmissible, and, by the common law
already referred to, it would not be. People v. McDonald, 177
App.Div. (N.Y.) 806. Whether the State of Washington may
"Where there is no violation of a constitutional guaranty, the prosecute and punish federal officers violating this law and
verity of the above statement is absolute." those whose messages were intercepted may sue them civilly
is not before us. But clearly a statute, passed twenty years
Vol. 5, § 2075, note 3. after the admission of the State into the Union cannot affect the
rules of evidence applicable in courts of the United States in
The rule is supported by many English and American cases criminal cases. Chief Justice Taney, in United States v.
cited by Jones in vol. 5, 2075, note 3, and § 2076, note 6, and Reid, 12 How. 361, 53 U. S. 363, construing the 34th section of
by Wigmore, vol. 4, § 2183. It is recognized by this Court, the Judiciary Act, said:
in Adams v. New York, 192 U. S. 585. The Weeks case
announced an exception to the common law rule by excluding

5
"But it could not be supposed, without very plain words to show obtained. But that somewhat rudimentary mode of disposing of
it, that Congress intended to give the states the power of the question has been overthrown by Weeks v. United
prescribing the rules of evidence in trials for offenses against States, 232 U. S. 383, and the cases that have followed it. I
the United States. For this construction would place the have said that we are free to choose between two principles of
criminal jurisprudence of one sovereignty under the control of policy. But if we are to confine ourselves to precedent and
another." logic, the reason for excluding evidence obtained by violating
the Constitution seems to me logically to lead to excluding
See also Withaup v. United States, 127 Fed. 530, 534. evidence obtained by a crime of the officers of the law.

The judgments of the Circuit Court of Appeals are affirmed. MR. JUSTICE BRANDEIS, dissenting.
The mandates will go down forthwith under Rule 31.
The defendants were convicted of conspiring to violate the
Affirmed. National Prohibition Act. Before any of the persons now
charged had been arrested or indicted, the telephones by
means of which they habitually communicated with one
MR. JUSTICE HOLMES: another and with others had been tapped by federal officers.
To this end, a lineman of long experience in wiretapping was
My brother BRANDEIS has given this case so exhaustive an employed on behalf of the Government and at its expense. He
examination that I desire to add but a few words. While I do not tapped eight telephones, some in the homes of the persons
deny it, I am not prepared to say that the penumbra of the charged, some in their offices. Acting on behalf of the
Fourth and Fifth Amendments covers the defendant, although I Government and in their official capacity, at least six other
fully agree that Courts are apt to err by sticking too closely to prohibition agents listened over the tapped wires and reported
the words of a law where those words import a policy that goes the messages taken. Their operations extended over a period
beyond them. Gooch v. Oregon Short line R.R. Co., 258 U. S. of nearly five months. The typewritten record of the notes of
22, 258 U. S. 24. But I think, as MR. JUSTICE BRANDEIS conversations overheard occupies 775 typewritten pages. By
says, that, apart from the Constitution, the Government ought objections seasonably made and persistently renewed, the
not to use defendants objected to the admission of the evidence obtained
by wiretapping on the ground that the Government's
Page 277 U. S. 470 wiretapping constituted an unreasonable search and seizure in
violation of the Fourth Amendment, and that the use as
evidence of the conversations overheard compelled the
evidence obtained and only obtainable by a criminal act. There defendants to be witnesses against themselves in violation of
is no body of precedents by which we are bound, and which the Fifth Amendment.
confines us to logical deduction from established rules.
Therefore we must consider the two objects of desire, both of
which we cannot have, and make up our minds which to The Government makes no attempt to defend the methods
choose. It is desirable that criminals should be detected, and, employed by its officers. Indeed, it concedes
to that end, that all available evidence should be used. It also is
desirable that the Government should not itself foster and pay Page 277 U. S. 472
for other crime, when they are the means by which the
evidence is to be obtained. If it pays its officers for having got that, if wiretapping can be deemed a search and seizure within
evidence by crime I do not see why it may not as well pay them the Fourth Amendment, such wiretapping as was practiced in
for getting it in the same way, and I can attach no importance the case at bar was an unreasonable search and seizure, and
to protestations of disapproval if it knowingly accepts and pays that the evidence thus obtained was inadmissible. But it relies
and announces that, in future it will pay for the fruits. We have on the language of the Amendment, and it claims that the
to choose, and, for my part, I think it a less evil that some protection given thereby cannot properly be held to include a
criminals should escape than that the Government should play telephone conversation.
an ignoble part.
"We must never forget," said Mr. Chief Justice Marshall
For those who agree with me, no distinction can be taken in McCulloch v. Maryland, 4 Wheat. 316, 17 U. S. 407, "that it
between the Government as prosecutor and the Government is a constitution we are expounding." Since then, this Court has
as judge. If the existing code does not permit district attorneys repeatedly sustained the exercise of power by Congress, under
to have a hand in such dirty business, it does not permit the various clauses of that instrument, over objects of which the
judge to allow such iniquities to succeed. See Silverthorne Fathers could not have dreamed. See Pensacola Telegraph
Lumber Co. v. United States, 251 U. S. 385. And if all that I Co. v. Western Union Telegraph Co., 96 U. S. 1, 96 U. S.
have said so far be accepted, it makes no difference that, in 9; Northern Pacific Ry. Co. v. North Dakota, 250 U. S.
this case, wiretapping is made a crime by the law of the State, 135; Dakota Central Telephone Co. v. South Dakota, 250 U. S.
not by the law of the United States. It is true that a State cannot 163; Brooks v. United States, 267 U. S. 432. We have likewise
make rules of evidence for Courts of the United States, but the held that general limitations on the powers of Government, like
State has authority over the conduct in question, and I hardly those embodied in the due process clauses of the Fifth and
think that the United States would appear to greater advantage Fourteenth Amendments, do not forbid the United States or the
when paying for an odious crime against State law than when States from meeting modern conditions by regulations which,
inciting to the disregard of its own. I am aware of the often "a century ago, or even half a century ago, probably would
repeated statement that, in a criminal proceeding, the Court will have been rejected as arbitrary and oppressive." Village of
not take notice of the manner in which papers offered in Euclid v. Ambler Realty Co., 272 U. S. 365, 272 U. S.
evidence have been 387; Buck v. Bell, 274 U. S. 200. Clauses guaranteeing to the
individual protection against specific abuses of power must
Page 277 U. S. 471 have a similar capacity of adaptation to a changing world. It

6
was with reference to such a clause that this Court said, long as civil liberty lives in the United States. This Court there
in Weems v. United States, 217 U. S. 349, 217 U. S. 373: reviewed the history that lay behind the Fourth and Fifth
Amendments. We said with reference to Lord Camden's
"Legislation, both statutory and constitutional, is enacted, it is judgment in Entick v. Carrington, 19 Howell's State Trials 1030:
true, from an experience of evils, but its general language
should not, therefore, be necessarily confined to the form that "The principles laid down in this opinion affect the very
evil had theretofore taken. Time works changes, brings into essence of constitutional liberty and security. They reach
existence new conditions farther than the concrete form of the case there before the
court, with its adventitious circumstances; they apply to all
Page 277 U. S. 473 invasions on the part of the Government and its employes of
the sanctities of a man's home and the privacies of life. It is not
the breaking of his doors, and the rummaging of his drawers,
and purposes. Therefore, a principle, to be vital, must be that constitutes the essence of the offence; but it is the
capable of wider application than the mischief which gave it invasion of his indefeasible right of personal security,
birth. This is peculiarly true of constitutions. They are not
ephemeral enactments, designed to meet passing occasions.
They are, to use the words of Chief Justice Marshall 'designed Page 277 U. S. 475
to approach immortality as nearly as human institutions can
approach it.' The future is their care, and provision for events of personal liberty and private property, where that right has
good and bad tendencies of which no prophecy can be made. never been forfeited by his conviction of some public offence --
In the application of a constitution, therefore, our contemplation it is the invasion of this sacred right which underlies and
cannot be only of what has been, but of what may be. Under constitutes the essence of Lord Camden's judgment. Breaking
any other rule, a constitution would indeed be as easy of into a house and opening boxes and drawers are
application as it would be deficient in efficacy and power. Its circumstances of aggravation; but any forcible and compulsory
general principles would have little value, and be converted by extortion of a man's own testimony or of his private papers to
precedent into impotent and lifeless formulas. Rights declared be used as evidence of a crime or to forfeit his goods is within
in words might be lost in reality." the condemnation of that judgment. In this regard, the Fourth
and Fifth Amendments run almost into each other. [Footnote
When the Fourth and Fifth Amendments were adopted, "the 3]"
form that evil had theretofore taken" had been necessarily
simple. Force and violence were then the only means known to In Ex parte Jackson, 96 U. S. 727, it was held that a sealed
man by which a Government could directly effect self- letter entrusted to the mail is protected by the Amendments.
incrimination. It could compel the individual to testify -- a The mail is a public service furnished by the Government. The
compulsion effected, if need be, by torture. It could secure telephone is a public service furnished by its authority. There
possession of his papers and other articles incident to his is, in essence, no difference between the sealed letter and the
private life -- a seizure effected, if need be, by breaking and private telephone message. As Judge Rudkin said below:
entry. Protection against such invasion of "the sanctities of a
man's home and the privacies of life" was provided in the "True, the one is visible, the other invisible; the one is tangible,
Fourth and Fifth Amendments by specific language. Boyd v. the other intangible; the one is sealed, and the other unsealed,
United States, 116 U. S. 616, 116 U. S. 630. But "time works but these are distinctions without a difference."
changes, brings into existence new conditions and purposes."
Subtler and more far-reaching means of invading privacy have
become available to the Government. Discovery and invention The evil incident to invasion of the privacy of the telephone is
have made it possible for the Government, by means far more far greater than that involved in tampering with the mails.
effective than stretching upon the rack, to obtain disclosure in Whenever a telephone line is tapped, the privacy of the
court of what is whispered in the closet. persons at both ends of the line is invaded and all
conversations
Page 277 U. S. 474
Page 277 U. S. 476
Moreover, "in the application of a constitution, our
contemplation cannot be only of what has, been but of what between them upon any subject, and, although proper,
may be." The progress of science in furnishing the Government confidential and privileged, may be overheard. Moreover, the
with means of espionage is not likely to stop with wiretapping. tapping of one man's telephone line involves the tapping of the
Ways may someday be developed by which the Government, telephone of every other person whom he may call or who may
without removing papers from secret drawers, can reproduce call him. As a means of espionage, writs of assistance and
them in court, and by which it will be enabled to expose to a general warrants are but puny instruments of tyranny and
jury the most intimate occurrences of the home. Advances in oppression when compared with wiretapping.
the psychic and related sciences may bring means of exploring
unexpressed beliefs, thoughts and emotions. "That places the Time and again, this Court in giving effect to the principle
liberty of every man in the hands of every petty officer" was underlying the Fourth Amendment, has refused to place an
said by James Otis of much lesser intrusions than these. unduly literal construction upon it. This was notably illustrated
[Footnote 1] To Lord Camden, a far slighter intrusion seemed in the Boyd case itself. Taking language in its ordinary
"subversive of all the comforts of society." [Footnote 2] Can it meaning, there is no "search" or "seizure" when a defendant is
be that the Constitution affords no protection against such required to produce a document in the orderly process of a
invasions of individual security? court's procedure. "The right of the people to be secure in their
persons, houses, papers, and effects, against unreasonable
A sufficient answer is found in Boyd v. United States, 116 U. S. searches and seizures" would not be violated, under any
616, 116 U. S. 627-630, a case that will be remembered as ordinary construction of language, by compelling obedience to

7
a subpoena. But this Court holds the evidence inadmissible pain, pleasure and satisfactions of life are to be found in
simply because the information leading to the issue of the material things. They sought to protect Americans in their
subpoena has been unlawfully secured. Silverthorne Lumber beliefs, their thoughts, their emotions and their sensations.
Co. v. United States, 251 U. S. 385. Literally, there is no They conferred, as against the Government, the right to be let
"search" or "seizure" when a friendly visitor abstracts papers alone -- the most comprehensive of rights, and the right most
from an office; yet we held in Gouled v. United States, 255 U. valued by civilized men. To protect that right, every
S. 298, that evidence so obtained could not be used. No court unjustifiable intrusion by the Government upon the privacy of
which looked at the words of the Amendment, rather than at its the individual, whatever the means employed, must be deemed
underlying purpose, would hold, as this Court did in Ex parte a violation of the Fourth Amendment. And the use, as evidence
Jackson, 96 U. S. 727, 96 U. S. 733, that its protection
extended to letters in the mails. The provision against self- Page 277 U. S. 479
incrimination in the Fifth Amendment has been given an
equally broad construction. The language is: "No person shall
be compelled in any criminal case to be a witness against in a criminal proceeding, of facts ascertained by such intrusion
himself." Yet we have held not only that the must be deemed a violation of the Fifth.

Page 277 U. S. 477 Applying to the Fourth and Fifth Amendments the established
rule of construction, the defendants' objections to the evidence
obtained by wiretapping must, in my opinion, be sustained. It
protection of the Amendment extends to a witness before a is, of course, immaterial where the physical connection with the
grand jury, although he has not been charged with telephone wires leading into the defendants' premises was
crime, Counselman v. Hitchcock, 142 U. S. 547, 142 U. S. 562, made. And it is also immaterial that the intrusion was in aid of
586, but that: law enforcement. Experience should teach us to be most on
our guard to protect liberty when the Government's purposes
"[i]t applies alike to civil and criminal proceedings, wherever the are beneficent. Men born to freedom are naturally alert to repel
answer might tend to subject to criminal responsibility him who invasion of their liberty by evil-minded rulers. The greatest
gives it. The privilege protects a mere witness as fully as it dangers to liberty lurk in insidious encroachment by men of
does one who is also a party defendant." zeal, well meaning but without understanding. [Footnote 12]

McCarthy v. Arndsten, 266 U. S. 34, 266 U. S. 40. The narrow Independently of the constitutional question, I am of opinion
language of the Amendment has been consistently construed that the judgment should be reversed. By the laws of
in the light of its object, Washington, wiretapping is a crime. [Footnote 13] Pierce's

"to insure that a person should not be compelled, when acting Page 277 U. S. 480
as a witness in any investigation, to give testimony which might
tend to show that he himself had committed a crime. The Code, 1921, § 8976(18). To prove its case, the Government
privilege is limited to criminal matters, but it is as broad as the was obliged to lay bare the crimes committed by its officers on
mischief against which it seeks to guard." its behalf. A federal court should not permit such a prosecution
to continue. Compare Harkin v. Brundage, 276 U. S.
Counselman v. Hitchcock, supra, p. 142 U. S. 562. 36, id., 604.

Decisions of this Court applying the principle of the Boyd case Page 277 U. S. 481
have settled these things. Unjustified search and seizure
violates the Fourth Amendment, whatever the character of the The situation in the case at bar differs widely from that
paper; [Footnote 4] whether the paper when taken by the presented in Burdeau v. McDowell, 256 U. S. 465. There, only
federal officers was in the home, [Footnote 5] in an office, a single lot of papers was involved. They had been obtained by
[Footnote 6] or elsewhere; [Footnote 7] whether the taking was a private detective while acting on behalf of a private party;
effected by force, [Footnote 8] by without the knowledge of any federal official; long before
anyone had thought of instituting a
Page 277 U. S. 478
Page 277 U. S. 482
fraud, [Footnote 9] or in the orderly process of a court's
procedure. [Footnote 10] From these decisions, it follows federal prosecution. Here, the evidence obtained by crime was
necessarily that the Amendment is violated by the officer's obtained at the Government's expense, by its officers, while
reading the paper without a physical seizure, without his even acting on its behalf; the officers who committed these crimes
touching it, and that use, in any criminal proceeding, of the are the same officers who were charged with the enforcement
contents of the paper so examined -- as where they are of the Prohibition Act; the crimes of these officers were
testified to by a federal officer who thus saw the document, or committed for the purpose of securing evidence with which to
where, through knowledge so obtained, a copy has been obtain an indictment and to secure a conviction. The evidence
procured elsewhere [Footnote 11] -- any such use constitutes a so obtained constitutes the warp and woof of the Government's
violation of the Fifth Amendment. case. The aggregate of the Government evidence occupies
306 pages of the printed record. More than 210 of them are
The protection guaranteed by the Amendments is much filled by recitals of the details of the wiretapping and of facts
broader in scope. The makers of our Constitution undertook to ascertained thereby. [Footnote 14] There is literally no other
secure conditions favorable to the pursuit of happiness. They evidence of guilt on the part of some of the defendants except
recognized the significance of man's spiritual nature, of his that illegally obtained by these officers. As to nearly all the
feelings, and of his intellect. They knew that only a part of the defendants (except those who admitted guilt), the evidence

8
relied upon to secure a conviction consisted mainly of that contamination. The rule is one, not of action, but of inaction. It
which these officers had so obtained by violating the state law. is sometimes

As Judge Rudkin said below: Page 277 U. S. 485

"Here we are concerned with neither eavesdroppers nor spoken of as a rule of substantive law. But it extends to matters
thieves. Nor are we concerned with the acts of private of procedure, as well. [Footnote 20] A defense may be waived.
individuals. . . . We are concerned only with the acts of federal It is waived when not pleaded. But the objection that the
agents whose powers are limited and controlled by the plaintiff comes with unclean hands will be taken by the court
Constitution of the United States." itself. [Footnote 21] It will be taken despite the wish to the
contrary of all the parties to the litigation. The court protects
The Eighteenth Amendment has not, in terms, empowered itself.
Congress to authorize anyone to violate the criminal laws of a
State. And Congress has never purported to do so. Compare Decency, security and liberty alike demand that government
Maryland v. Soper, 270 U. S. 9. The terms of appointment of officials shall be subjected to the same rules of conduct that
federal prohibition agents do not purport to confer upon them are commands to the citizen. In a government of laws,
authority to violate any criminal law. Their superior officer, the existence of the government will be imperiled if it fails to
Secretary of the Treasury, has not instructed them to commit observe the law scrupulously. Our Government is the potent,
the omnipresent teacher. For good or for ill, it teaches the
Page 277 U. S. 483 whole people by its example. Crime is contagious. If the
Government becomes a lawbreaker, it breeds contempt for
law; it invites every man to become a law unto himself; it invites
crime on behalf of the United States. It may be assumed that anarchy. To declare that, in the administration of the criminal
the Attorney General of the United States did not give any such law, the end justifies the means -- to declare that the
instruction. [Footnote 15] Government may commit crimes in order to secure the
conviction of a private criminal -- would bring terrible
When these unlawful acts were committed, they were crimes retribution. Against that pernicious doctrine this Court should
only of the officers individually. The Government was innocent, resolutely set its face.
in legal contemplation, for no federal official is authorized to
commit a crime on its behalf. When the Government, having [Footnote 1]
full knowledge, sought, through the Department of Justice, to
avail itself of the fruits of these acts in order to accomplish its
own ends, it assumed moral responsibility for the officers' Otis' Argument against Writs of Assistance. See Tudor, James
crimes. Compare The Paquete Habana, 189 U. S. 453, 189 U. Otis, p. 66; John Adams, Works, Vol. II, p. 524; Minot,
S. 465; O'Reilly deCamara v. Brooke, 209 U. S. 45, 209 U. S. Continuation of the History of Massachusetts Bay, Vol. II, p 95.
52; Dodge v. United States, 272 U. S. 530, 272 U. S.
532; Gambino v. United States, 275 U. S. 310. And if this Court [Footnote 2]
should permit the Government, by means of its officers' crimes,
to effect its purpose of punishing the defendants, there would Entick v. Carrington, 19 Howell's State Trials, 1030, 1066.
seem to be present all the elements of a ratification. If so, the
Government itself would become a lawbreaker.
[Footnote 3]
Will this Court, by sustaining the judgment below, sanction
such conduct on the part of the Executive? The governing In Interstate Commerce Commission v. Brimson, 154 U. S.
principle has long been settled. It is that a court will not redress 447, 154 U. S. 479, the statement made in the Boyd case was
a wrong when he who invokes its aid has unclean hands. repeated, and the Court quoted the statement of Mr. Justice
[Footnote 16] The maxim of unclean hands comes Field in In re Pacific Railway Commission, 32 Fed. 241, 250:

Page 277 U. S. 484 "Of all the rights of the citizen, few are of greater importance or
more essential to his peace and happiness than the right of
personal security, and that involves not merely protection of his
from courts of equity. [Footnote 17] But the principle prevails person from assault, but exemption of his private affairs,
also in courts of law. Its common application is in civil actions books, and papers, from the inspection and scrutiny of others.
between private parties. Where the Government is the actor, Without the enjoyment of this right, all others would lose half
the reasons for applying it are even more persuasive. Where their value."
the remedies invoked are those of the criminal law, the reasons
are compelling. [Footnote 18]
The Boyd case has been recently reaffirmed in Silverthorne
Lumber Co. v. United States, 251 U. S. 385, in Gouled v.
The door of a court is not barred because the plaintiff has United States, 255 U. S. 298, and in Byars v. United
committed a crime. The confirmed criminal is as much entitled States, 273 U. S. 28.
to redress as his most virtuous fellow citizen; no record of
crime, however long, makes one an outlaw. The court's aid is
denied only when he who seeks it has violated the law in [Footnote 4]
connection with the very transaction as to which he seeks legal
redress. [Footnote 19] Then aid is denied despite the Gouled v. United States, 255 U. S. 298.
defendant's wrong. It is denied in order to maintain respect for
law; in order to promote confidence in the administration of [Footnote 5]
justice; in order to preserve the judicial process from

9
Weeks v. United States, 232 U. S. 383; Amos v. United In the following states, it is a criminal offense to intercept a
States, 255 U. S. 313; Agnello v. United States, 269 U. S. message sent by telegraph and/or telephone: Alabama, Code,
20; Byars v. United States, 273 U. S. 28. 1923, § 5256; Arizona, Revised Statutes, 1913, Penal Code, §
692; Arkansas, Crawford & Moses Digest, 1921, § 10246;
[Footnote 6] California, Deering's Penal Code, 1927, § 640; Colorado,
Compiled Laws, 1921, § 6969; Connecticut, General Statutes,
1918, § 6292; Idaho, Compiled Statutes, 1919, §§ 8574, 8586;
Boyd v. United States, 116 U. S. 616; Hale v. Henkel, 201 U. Illinois, Revised Statutes, 1927, c. 134, § 21; Iowa, Code,
S. 43, 201 U. S. 70; Silverthorne Lumber Co. v. United 1927, § 13121; Kansas, Revised Statutes, 1923, c. 17, § 1908;
States, 251 U. S. 385; Gouled v. United States, 255 U. S. Michigan Compiled Laws, 1915, § 15403; Montana, Penal
298; Marron v. United States, 275 U. S. 192. Code, 1921, § 11518; Nebraska, Compiled Statutes, 1922, §
7115; Nevada, Revised Laws, 1912, §§ 4608, 6572(18); New
[Footnote 7] York, Consolidated Laws, c. 40, § 1423(6); North Dakota,
Compiled Laws, 1913, § 10231; Ohio, Page's General Code,
Ex parte Jackson, 96 U. S. 727, 96 U. S. 733; Carroll v. United 1926, § 13402; Oklahoma, Session Laws, 1923, c. 46; Oregon,
States, 267 U. S. 132, 267 U. S. 156; Gambino v. United Olson's Laws, 1920, § 2265; South Dakota, Revised Code,
States, 275 U. S. 310. 1919, § 4312; Tennessee, Shannon's Code, 1919, §§ 1839,
1840; Utah, Compiled Laws, 1917, § 8433; Virginia, Code,
1924, § 4477(2), (3); Washington, Pierce's Code, 1921, §
[Footnote 8] 8976(18); Wisconsin, Statutes, 1927, § 348.37; Wyoming,
Compiled Statutes, 1920, § 7148. Compare State v.
Weeks v. United States, 232 U. S. 383; Silverthorne Lumber Behringer, 19 Ariz. 502; State v. Norsko, 76 Wash. 472.
Co. v. United States, 251 U. S. 385; Amos v. United
States, 255 U. S. 313; Carroll v. United States, 267 U. S. In the following states. it is a criminal offense for a company
132, 267 U. S. 156; Agnello v. United States, 269 U. S. engaged in the transmission of messages by telegraph and/or
20; Gambino v. United States, 275 U. S. 310. telephone, or its employees, or, in many instances, persons
conniving with them, to disclose or to assist in the disclosure of
[Footnote 9] any message: Alabama, Code, 1923, §§ 5543, 5545; Arizona,
Revised Statutes, 1913, Penal Code, §§ 621, 623, 691;
Arkansas, Crawford & Moses Digest, 1921, § 10250;
Gouled v. United States, 255 U. S. 298.
California, Deering's Penal Code, 1927, §§ 619, 621, 639, 641;
Colorado, Compiled Laws, 1921, §§ 6966, 6968, 6970;
[Footnote 10] Connecticut, General Statutes, 1918, § 6292; Florida, Revised
General Statutes, 1920, §§ 5754, 5755; Idaho, Compiled
Boyd v. United States, 116 U. S. 616; Hale v. Henkel, 201 U. Statutes, 1919, §§ 8568, 8570; Illinois, Revised Statutes, 1927,
S. 43, 201 U. S. 70. See Gouled v. United States, 255 U. S. c. 134, §§ 7, 7a; Indiana, Burns' Revised Statutes, 1926, §
298; Byars v. United States, 273 U. S. 28; Marron v. United 2862; Iowa, Code, 1924, § 8305; Louisiana, Acts, 1918, c. 134,
States, 275 U. S. 192. p. 228; Maine, Revised Statutes, 1916, c. 60, § 24; Maryland,
Bagby's Code, 1926, § 489; Michigan, Compiled Statutes,
1915, § 15104; Minnesota, General Statutes, 1923, §§ 10423,
[Footnote 11]
10424; Mississippi, Hemingway's Code, 1927, § 1174;
Missouri, Revised Statutes, 1919, § 3605; Montana, Penal
Silverthorne Lumber Co. v. United States, 251 U. S. Code, 1921, § 11494; Nebraska, Compiled Statutes, 1922, §
385. Compare Gouled v. United States, 255 U. S. 298, 255 U. 7088; Nevada, Revised Laws, 1912, §§ 4603, 4605, 4609,
S. 307. In Stroud v. United States, 251 U. S. 15, and Hester v. 4631; New Jersey, Compiled Statutes, 1910, p. 5319; New
United States, 265 U. S. 57, the letter and articles admitted York, Consolidated Laws, c. 40, §§ 552, 553; North Carolina,
were not obtained by unlawful search and seizure. They were Consolidated Statutes, 1919, §§ 4497, 4498, 4499; North
voluntary disclosures by the defendant. Compare Smith v. Dakota, Compiled Laws, 1913, § 10078; Ohio, Page's General
United States, 2 F.2d 715; United States v. Lee, 274 U. S. 559. Code, 1926, §§ 13388, 13419; Oklahoma, Session Laws,
1923, c. 46; Oregon, Olson's Laws, 1920, §§ 2260, 2262,
[Footnote 12] 2266; Pennsylvania, Statutes, 1920, §§ 6306, 6308, 6309;
Rhode Island, General Laws, 1923, § 6104; South Dakota,
Revised Code, 1919, §§ 4346, 9801; Tennessee, Shannon's
The point is thus stated by counsel for the telephone Code, 1919, §§ 1837, 1838; Utah, Compiled Laws, 1917, §§
companies, who have filed a brief as amici curiae:
8403, 8405, 8434; Washington, Pierce's Code, 1921, §§ 8982,
8983, Wisconsin, Statutes, 1927, § 348.36.
"Criminals will not escape detection and conviction merely
because evidence obtained by tapping wires of a public The Alaskan Penal Code, Act of March 3, 1899, c. 429, 30
telephone system is inadmissible, if it should be so held; but, in Stat. 1253, 1278, provides that,
any event, it is better that a few criminals escape than that the
privacies of life of all the people be exposed to the agents of
the government, who will act at their own discretion, the honest "if any officer, agent, operator, clerk, or employee of any
and the dishonest, unauthorized and unrestrained by the telegraph company, or any other person, shall willfully divulge
courts. Legislation making wiretapping a crime will not suffice if to any other person than the party from whom the same was
the courts nevertheless hold the evidence to be lawful." received, or to whom the same was addressed, or his agent or
attorney, any message received or sent, or intended to be sent,
over any telegraph line, or the contents, substance, purport,
[Footnote 13] effect, or meaning of such message, or any part thereof, . . .
the person so offending shall be deemed guilty of a

10
misdemeanor, and shall be punished by a fine not to exceed [Footnote 17]
one thousand dollars or imprisonment not to exceed one year,
or by both such fine and imprisonment, in the discretion of the See Creath's Administrator v. Sims, 5 How. 192, 46 U. S.
court." 204; Kennett v. Chambers, 14 How. 38, 55 U. S. 49; Randall v.
Howard, 2 Black, 585, 67 U. S. 586; Wheeler v. Sage, 1 Wall.
The Act of October 29, 1918, c.197, 40 Stat. 1017, provided: 518, 68 U. S. 530; Dent v. Ferguson, 132 U. S. 50, 132 U. S.
64; Pope Manufacturing Co. v. Gormully, 144 U. S. 224, 144 U.
"That whoever, during the period of governmental operation of S. 236; Miller v. Ammon, 145 U. S. 421, 145 U. S.
the telephone and telegraph systems of the United States . . . , 425; Hazelton v. Sheckells, 202 U. S. 71, 202 U. S.
shall, without authority and without the knowledge and consent 79. Compare International News Service v. Associated
of the other users thereof, except as may be necessary for Press, 248 U. S. 215, 248 U. S. 245.
operation of the service, tap any telegraph or telephone line, or
willfully interfere with the operation of such telephone and [Footnote 18]
telegraph systems or with the transmission of any telephone or
telegraph message, or with the delivery of any such message, Compare State v. Simmons, 39 Kan. 262, 264-265; State v.
or whoever being employed in any such telephone or telegraph Miller, 44 Mo.App. 159, 163-164; In re Robinson, 29 Neb.
service, shall divulge the contents of any such telephone or 135; Harris v. State, 15 Tex.App. 629, 634-635, 639.
telegraph message to any person not duly authorized to
receive the same, shall be fined not exceeding $1,000 or
imprisoned for not more than one year, or both." [Footnote 19]

The Radio Act, February 23, 1927, c. 169, § 27, 44 Stat. 1162, See Armstrong v. Toler, 11 Wheat. 258; Brooks v. Martin, 2
1172, provides that Wall 70; Planters' Bank v. Union Bank, 16 Wall. 483, 83 U. S.
499-500; Houston & Texas Central R.R. Co. v. Texas, 177 U.
S. 66, 177 U. S. 99; Bothwell v. Buckbee, Mears Co., 275 U. S.
"no person not being authorized by the sender shall intercept 274.
any message and divulge or publish the contents, substance,
purport, effect, or meaning of such intercepted message to any
person." [Footnote 20]

[Footnote 14] See Lutton v. Benin, 11 Mod. 50; Barlow v. Hall, 2 Anst.
461; Wells v. Gurney, 8 Barn. & Cress. 769; Ilsley v.
Nichols, 12 Pick. 270; Carpenter v. Spooner, 2 Sandf.
The above figures relate to Case No. 493. In Nos. 532-533, the 717; Metcalf v. Clark, 41 Barb. 45; Williams ads. Reed, 29
Government evidence fills 278 pages, of which 140 are recitals N.J.L. 385; Hill v. Goodrich, 32 Conn. 588; Townsend v.
of the evidence obtained by wiretapping. Smith, 47 Wis. 623; Blandin v. Ostrander, 239 Fed. 700; Harkin
v. Brundage, 276 U.S. 36, id., 604.
[Footnote 15]
[Footnote 21]
According to the Government's brief, p. 41, "The Prohibition
Unit of the Treasury disclaims it [wiretapping], and the Coppell v. Hall, 7 Wall. 542, 74 U. S. 558; Oscanyan v. Arms
Department of Justice has frowned on it." See also "Prohibition Co., 103 U. S. 261, 103 U. S. 267; Higgins v. McCrea, 116 U.
Enforcement," 69th Congress,2d Session, Senate Doc. S. 671, 116 U. S. 685. Compare Evans v. Richardson, 3 Mer.
No.198, pp. IV, V, 13, 15, referred to Committee, January 25, 469; Norman v. Cole, 3 Esp. 253; Northwestern Salt Co. v.
1927; also same, Part 2. Electrolytic Alkali Co., [1913] 3 K.B. 422.

[Footnote 16] MR. JUSTICE BUTLER, dissenting.

See Hannay v. Eve, 3 Cranch 242, 7 U. S. 247; Bank of the I sincerely regret that I cannot support the opinion and
United States v. Owens, 2 Pet. 527, 27 U. S. 538; Bartle v. judgments of the Court in these cases.
Coleman, 4 Pet. 184, 29 U. S. 188; Kennett v. Chambers, 14
How. 38, 55 U. S. 52; Marshall v. Baltimore & Ohio R.R.
Co., 16 How. 314, 57 U. S. 334; Tool Co. v. Norris, 2 Wall Page 277 U. S. 486
45, 69 U. S. 54; The Ouachita Cotton, 6 Wall. 521, 73 U. S.
532; Coppell v. Hall, 7 Wall. 542; Forsyth v. Woods, 11 Wall. The order allowing the writs of certiorari operated to limit
484, 78 U. S. 486; Hanauer v. Doane, 12 Wall. 342, 79 U. S. arguments of counsel to the constitutional question. I do not
349; Trist v. Child, 21 Wall. 441, 88 U. S. 448; Meguire v. participate in the controversy that has arisen here as to
Corwine, 101 U. S. 108, 101 U. S. 111; Oscanyan v. Arms whether the evidence was inadmissible because the mode of
Co., 103 U. S. 261; Irwin v. Williar, 110 U. S. 499, 110 U. S. obtaining it was unethical and a misdemeanor under state law.
510; Woodstock Iron Co. v. Richmond & Danville Extension I prefer to say nothing concerning those questions, because
Co., 129 U. S. 643; Gibbs v. Consolidated Gas Co., 130 U. S. they are not within the jurisdiction taken by the order.
396, 130 U. S. 411; Embrey v. Jemison, 131 U. S. 336, 131 U.
S. 348; West v. Camden, 135 U. S. 507, 135 U. S. The Court is required to construe the provision of the Fourth
521; McMullen v. Hoffman, 174 U. S. 639, 174 U. S. Amendment that declares:
654; Hazelton v. Sheckells, 202 U. S. 71; Crocker v. United
States, 240 U. S. 74, 240 U. S. 78. Compare Holman v.
Johnson, 1 Cowp. 341.

11
"The right of the people to be secure in their persons, houses, This Court has always construed the Constitution in the light of
papers and effects, against unreasonable searches and the principles upon which it was founded.
seizures, shall not-be violated."
Page 277 U. S. 488
The Fifth Amendment prevents the use of evidence obtained
through searches and seizures in violation of the rights of the The direct operation or literal meaning of the words used do
accused protected by the Fourth Amendment. not measure the purpose or scope of its provisions. Under the
principles established and applied by this Court, the Fourth
The single question for consideration is this: may the Amendment safeguards against all evils that are like and
Government, consistently with that clause, have its officers equivalent to those embraced within the ordinary meaning of its
whenever they see fit, tap wires, listen to, take down, and words. That construction is consonant with sound reason, and
report the private messages and conversations transmitted by in full accord with the course of decisions since McCulloch v.
telephones? Maryland. That is the principle directly applied in
the Boyd case.
The United States maintains that
When the facts in these cases are truly estimated, a fair
"The 'wiretapping' operations of the federal prohibition agents application of that principle decides the constitutional question
were not a 'search and seizure' in violation of the security of in favor of the petitioners. With great deference, I think they
the 'persons, houses, papers and effects' of the petitioners in should be given a new trial.
the constitutional sense or within the intendment of the Fourth
Amendment." * Ex parte Jackson, 96 U. S. 727. Boyd v. United States, 116
U. S. 616. Weeks v. United States, 232 U. S. 383. Silverthorne
The Court, adhering to and reiterating the principles laid down Lumber Co. v. United States, 251 U. S. 385. Gouled v. United
and applied in prior decisions * construing the search and States, 255 U. S. 298. Amos v. United States, 255 U. S. 313.
seizure clause, in substance adopts the contention of the
Government. MR. JUSTICE STONE, dissenting.

The question at issue depends upon a just appreciation of the I concur in the opinions of MR. JUSTICE HOLMES and MR.
facts. JUSTICE BRANDEIS. I agree also with that of MR. JUSTICE
BUTLER so far as it deals with the merits. The effect of the
Page 277 U. S. 487 order granting certiorari was to limit the argument to a single
question, but I do not understand that it restrains the Court
from a consideration of any question which we find to be
Telephones are used generally for transmission of messages presented by the record, for, under Jud.Code, § 240(a), this
concerning official, social, business and personal affairs, Court determines a case here on certiorari "with the same
including communications that are private and privileged -- power and authority, and with like effect, as if the cause had
those between physician and patient, lawyer and client, parent been brought [here] by unrestricted writ of error or appeal."
and child, husband and wife. The contracts between telephone
companies and users contemplate the private use of the
facilities employed in the service. The communications belong
to the parties between whom they pass. During their
transmission, the exclusive use of the wire belongs to the
persons served by it. Wiretapping involves interference with the
wire while being used. Tapping the wires and listening in by the
officers literally constituted a search for evidence. As the
communications passed, they were heard and taken down.

In Boyd v. United States, 116 U. S. 616, there was no "search


or seizure" within the literal or ordinary meaning of the words,
nor was Boyd -- if these constitutional provisions were read
strictly according to the letter -- compelled in a "criminal case"
to be a "witness" against himself. The statute, there held
unconstitutional because repugnant to the search and seizure Katz v. United States, 389 U.S. 347 (1967)
clause, merely authorized judgment for sums claimed by the
Government on account of revenue if the defendant failed to Katz v. United States
produce his books, invoices and papers. The principle of that
case has been followed, developed and applied in this and No. 35
many other courts. And it is in harmony with the rule of liberal
construction that always has been applied to provisions of the
Constitution safeguarding personal rights (Byars v. United Argued October 17, 1967
States, 273 U. S. 28, 273 U. S. 32), as well as to those
granting governmental powers. McCulloch v. Maryland, 4 Decided December 18, 1967
Wheat. 316, 17 U. S. 404, 17 U. S. 406, 17 U. S. 407, 17 U. S.
421. Marbury v. Madison, 1 Cranch 137, 5 U. S. 153, 5 U. S.
389 U.S. 347
176. Cohens v. Virginia, 6 Wheat. 264. Myers v. United
States, 272 U. S. 52.

12
CERTIORARI TO THE UNITED STATES COURT OF Page 389 U. S. 349
APPEALS
because "[t]here was no physical entrance into the area
FOR THE NINTH CIRCUIT occupied by [the petitioner]." [Footnote 2] We granted certiorari
in order to consider the constitutional questions thus
Syllabus presented. [Footnote 3]

Petitioner was convicted under an indictment charging him with The petitioner has phrased those questions as follows:
transmitting wagering information by telephone across state
lines in violation of 18 U.S.C. § 1084. Evidence of petitioner's "A. Whether a public telephone booth is a constitutionally
end of the conversations, overheard by FBI agents who had protected area so that evidence obtained by attaching an
attached an electronic listening and recording device to the electronic listening recording device to the top of such a booth
outside of the telephone booth from which the calls were made, is obtained in violation of the right to privacy of the user of the
was introduced at the trial. The Court of Appeals affirmed the booth. "
conviction, finding that there was no Fourth Amendment
violation, since there was "no physical entrance into the area Page 389 U. S. 350
occupied by" petitioner.
"B. Whether physical penetration of a constitutionally protected
Held: area is necessary before a search and seizure can be said to
be violative of the Fourth Amendment to the United States
1. The Government's eavesdropping activities violated the Constitution."
privacy upon which petitioner justifiably relied while using the
telephone booth, and thus constituted a "search and seizure" We decline to adopt this formulation of the issues. In the first
within the meaning of the Fourth Amendment. Pp. 389 U. S. place, the correct solution of Fourth Amendment problems is
350-353. not necessarily promoted by incantation of the phrase
"constitutionally protected area." Secondly, the Fourth
(a) The Fourth Amendment governs not only the seizure of Amendment cannot be translated into a general constitutional
tangible items, but extends as well to the recording of oral "right to privacy." That Amendment protects individual privacy
statements. Silverman v. United States, 365 U. S. 505, 365 U. against certain kinds of governmental intrusion, but its
S. 511. P. 389 U. S. 353. protections go further, and often have nothing to do with
privacy at all. [Footnote 4] Other provisions of the Constitution
(b) Because the Fourth Amendment protects people, rather protect personal privacy from other forms of governmental
than places, its reach cannot turn on the presence or absence invasion. [Footnote 5] But the protection of a
of a physical intrusion into any given enclosure. The "trespass" person's general right to privacy -- his right to be let alone by
doctrine of Olmstead v. United States, 277 U. S. 438, other people [Footnote 6] -- is, like the
and Goldman v. United States, 316 U. S. 129, is no longer
controlling. Pp. 389 U. S. 351, 389 U. S. 353. Page 389 U. S. 351

2. Although the surveillance in this case may have been so protection of his property and of his very life, left largely to the
narrowly circumscribed that it could constitutionally have been law of the individual States. [Footnote 7]
authorized in advance, it was not in fact conducted pursuant to
the warrant procedure which is a constitutional precondition of Because of the misleading way the issues have been
such electronic surveillance. Pp. 389 U. S. 354-359. formulated, the parties have attached great significance to the
characterization of the telephone booth from which the
369 F.2d 130, reversed. petitioner placed his calls. The petitioner has strenuously
argued that the booth was a "constitutionally protected area."
Page 389 U. S. 348 The Government has maintained with equal vigor that it was
not. [Footnote 8] But this effort to decide whether or not a given
"area," viewed in the abstract, is "constitutionally protected"
MR. JUSTICE STEWART delivered the opinion of the Court. deflects attention from the problem presented by this case.
[Footnote 9] For the Fourth Amendment protects people, not
The petitioner was convicted in the District Court for the places. What a person knowingly exposes to the public, even
Southern District of California under an eight-count indictment in his own home or office, is not a subject of Fourth
charging him with transmitting wagering information by Amendment protection. See Lewis v. United States, 385 U. S.
telephone from Los Angeles to Miami and Boston, in violation 206, 385 U. S. 210; United States v. Lee, 274 U. S. 559, 274
of a federal statute. [Footnote 1] At trial, the Government was U. S. 563. But what he seeks to preserve as private, even in an
permitted, over the petitioner's objection, to introduce evidence area accessible to the public, may be constitutionally protected.
of the petitioner's end of telephone conversations, overheard
by FBI agents who had attached an electronic listening and Page 389 U. S. 352
recording device to the outside of the public telephone booth
from which he had placed his calls. In affirming his conviction,
the Court of Appeals rejected the contention that the See Rios v. United States, 364 U. S. 253; Ex parte Jackson, 96
recordings had been obtained in violation of the Fourth U. S. 727, 96 U. S. 733.
Amendment,
The Government stresses the fact that the telephone booth
from which the petitioner made his calls was constructed partly

13
of glass, so that he was as visible after he entered it as he position is that its agents acted in an entirely defensible
would have been if he had remained outside. But what he manner: they did not begin their electronic surveillance until
sought to exclude when he entered the booth was not the investigation of the petitioner's activities had established a
intruding eye -- it was the uninvited ear. He did not shed his strong probability that he was using the telephone in question
right to do so simply because he made his calls from a place to transmit gambling information to persons in other States, in
where he might be seen. No less than an individual in a violation of federal law. Moreover, the surveillance was limited,
business office, [Footnote 10] in a friend's apartment, [Footnote both in scope and in duration, to the specific purpose of
11] or in a taxicab, [Footnote 12] a person in a telephone booth establishing the contents of the petitioner's unlawful telephonic
may rely upon the protection of the Fourth Amendment. One communications. The agents confined their surveillance to the
who occupies it, shuts the door behind him, and pays the toll brief periods during which he used the telephone booth,
that permits him to place a call is surely entitled to assume that [Footnote 14] and they took great care to overhear only the
the words he utters into the mouthpiece will not be broadcast to conversations of the petitioner himself. [Footnote 15]
the world. To read the Constitution more narrowly is to ignore
the vital role that the public telephone has come to play in Accepting this account of the Government's actions as
private communication. accurate, it is clear that this surveillance was so narrowly
circumscribed that a duly authorized magistrate, properly
The Government contends, however, that the activities of its notified of the need for such investigation, specifically informed
agents in this case should not be tested by Fourth Amendment of the basis on which it was to proceed, and clearly apprised of
requirements, for the surveillance technique they employed the precise intrusion it would entail, could constitutionally have
involved no physical penetration of the telephone booth from authorized, with appropriate safeguards, the very limited
which the petitioner placed his calls. It is true that the absence search and seizure that the Government asserts, in fact, took
of such penetration was at one time thought to foreclose further place. Only last Term we sustained the validity of
Fourth Amendment inquiry, Olmstead v. United States, 277 U.
S. 438, 277 U. S. 457, 277 U. S. 464, 277 U. S. 466; Goldman Page 389 U. S. 355
v. United States, 316 U. S. 129, 316 U. S. 134-136, for that
Amendment was thought to limit only searches and seizures of
tangible such an authorization, holding that, under sufficiently "precise
and discriminate circumstances," a federal court may empower
government agents to employ a concealed electronic device
Page 389 U. S. 353 "for the narrow and particularized purpose of ascertaining the
truth of the . . . allegations" of a "detailed factual affidavit
property. [Footnote 13] But "[t]he premise that property alleging the commission of a specific criminal offense." Osborn
interests control the right of the Government to search and v. United States, 385 U. S. 323, 385 U. S. 329-330. Discussing
seize has been discredited." Warden v. Hayden, 387 U. S. that holding, the Court in Berger v. New York, 388 U. S. 41,
294, 387 U. S. 304. Thus, although a closely divided Court said that "the order authorizing the use of the electronic device"
supposed in Olmstead that surveillance without any trespass in Osborn "afforded similar protections to those . . . of
and without the seizure of any material object fell outside the conventional warrants authorizing the seizure of tangible
ambit of the Constitution, we have since departed from the evidence." Through those protections, "no greater invasion of
narrow view on which that decision rested. Indeed, we have privacy was permitted than was necessary under the
expressly held that the Fourth Amendment governs not only circumstances." Id. at 388 U. S. 57. [Footnote 16] Here, too, a
the seizure of tangible items, but extends as well to the similar
recording of oral statements, overheard without any "technical
trespass under . . . local property law." Silverman v. United Page 389 U. S. 356
States, 365 U. S. 505, 365 U. S. 511. Once this much is
acknowledged, and once it is recognized that the Fourth
Amendment protects people -- and not simply "areas" -- judicial order could have accommodated "the legitimate needs
against unreasonable searches and seizures, it becomes clear of law enforcement" [Footnote 17] by authorizing the carefully
that the reach of that Amendment cannot turn upon the limited use of electronic surveillance.
presence or absence of a physical intrusion into any given
enclosure. The Government urges that, because its agents relied upon the
decisions in Olmstead and Goldman, and because they did no
We conclude that the underpinnings more here than they might properly have done with prior
of Olmstead and Goldman have been so eroded by our judicial sanction, we should retroactively validate their conduct.
subsequent decisions that the "trespass" doctrine there That we cannot do. It is apparent that the agents in this case
enunciated can no longer be regarded as controlling. The acted with restraint. Yet the inescapable fact is that this
Government's activities in electronically listening to and restraint was imposed by the agents themselves, not by a
recording the petitioner's words violated the privacy upon judicial officer. They were not required, before commencing the
which he justifiably relied while using the telephone booth, and search, to present their estimate of probable cause for
thus constituted a "search and seizure" within the meaning of detached scrutiny by a neutral magistrate. They were not
the Fourth Amendment. The fact that the electronic device compelled, during the conduct of the search itself, to observe
employed to achieve that end did not happen to penetrate the precise limits established in advance by a specific court order.
wall of the booth can have no constitutional significance. Nor were they directed, after the search had been completed,
to notify the authorizing magistrate in detail of all that had been
seized. In the absence of such safeguards, this Court has
Page 389 U. S. 354 never sustained a search upon the sole ground that officers
reasonably expected to find evidence of a particular crime and
The question remaining for decision, then, is whether the voluntarily confined their activities to the least intrusive
search and seizure conducted in this case complied with
constitutional standards. In that regard, the Government's Page 389 U. S. 357

14
means consistent with that end. Searches conducted without It is so ordered.
warrants have been held unlawful "notwithstanding facts
unquestionably showing probable cause," Agnello v. United MR. JUSTICE MARSHALL took no part in the consideration or
States, 269 U. S. 20, 269 U. S. 33, for the Constitution requires decision of this case.
"that the deliberate, impartial judgment of a judicial officer . . .
be interposed between the citizen and the police. . . ." Wong
Sun v. United States, 371 U. S. 471, 371 U. S. 481-482. "Over [Footnote 1]
and again, this Court has emphasized that the mandate of the
[Fourth] Amendment requires adherence to judicial 18 U.S.C. § 1084. That statute provides in pertinent part:
processes," United States v. Jeffers, 342 U. S. 48, 342 U. S.
51, and that searches conducted outside the judicial process, "(a) Whoever being engaged in the business of betting or
without prior approval by judge or magistrate, are per wagering knowingly uses a wire communication facility for the
se unreasonable under the Fourth Amendment [Footnote 18] -- transmission in interstate or foreign commerce of bets or
subject only to a few specifically established and well wagers or information assisting in the placing of bets or wagers
delineated exceptions. [Footnote 19] on any sporting event or contest, or for the transmission of a
wire communication which entitles the recipient to receive
It is difficult to imagine how any of those exceptions could ever money or credit as a result of bets or wagers, or for information
apply to the sort of search and seizure involved in this case. assisting in the placing of bets or wagers, shall be fined not
Even electronic surveillance substantially contemporaneous more than $10,000 or imprisoned not more than two years, or
with an individual's arrest could hardly be deemed an "incident" both."
of that arrest. [Footnote 20]
"(b) Nothing in this section shall be construed to prevent the
Page 389 U. S. 358 transmission in interstate or foreign commerce of information
for use in news reporting of sporting events or contests, or for
Nor could the use of electronic surveillance without prior the transmission of information assisting in the placing of bets
authorization be justified on grounds of "hot pursuit." [Footnote or wagers on a sporting event or contest from a State where
21] And, of course, the very nature of electronic surveillance betting on that sporting event or contest is legal into a State in
precludes its use pursuant to the suspect's consent. [Footnote which such betting is legal."
22]
[Footnote 2]
The Government does not question these basic principles.
Rather, it urges the creation of a new exception to cover this 369 F.2d 130, 134
case. [Footnote 23] It argues that surveillance of a telephone
booth should be exempted from the usual requirement of [Footnote 3]
advance authorization by a magistrate upon a showing of
probable cause. We cannot agree. Omission of such
authorization 386 U. S. 954. The petition for certiorari also challenged the
validity of a warrant authorizing the search of the petitioner's
premises. In light of our disposition of this case, we do not
"bypasses the safeguards provided by an objective reach that issue.
predetermination of probable cause, and substitutes instead
the far less reliable procedure of an after-the-event justification
for the . . . search, too likely to be subtly influenced by the We find no merit in the petitioner's further suggestion that his
familiar shortcomings of hindsight judgment." indictment must be dismissed. After his conviction was affirmed
by the Court of Appeals, he testified before a federal grand jury
concerning the charges involved here. Because he was
Beck v. Ohio, 379 U. S. 89, 379 U. S. 96. And bypassing a compelled to testify pursuant to a grant of immunity, 48 Stat.
neutral predetermination of the scope of a search leaves 1096, as amended, 47 U.S.C. § 409(l), it is clear that the fruit of
individuals secure from Fourth Amendment his testimony cannot be used against him in any future trial.
But the petitioner asks for more. He contends that. his
Page 389 U. S. 359 conviction must be vacated and the charges against him
dismissed lest he be "subjected to [a] penalty . . . on account of
violations "only in the discretion of the police." Id. at 379 U. S. [a] . . . matter . . . concerning which he [was] compelled . . . to
97. testify. . . ." 47 U.S.C. § 409(l). Frank v. United States, 347
F.2d 486. We disagree. In relevant part, § 409(l) substantially
repeats the language of the Compulsory Testimony Act of
These considerations do not vanish when the search in 1893, 27 Stat. 443, 49 U.S.C. § 46, which was Congress'
question is transferred from the setting of a home, an office, or response to this Court's statement that an immunity statute can
a hotel room to that of a telephone booth. Wherever a man supplant the Fifth Amendment privilege against self-
may be, he is entitled to know that he will remain free from incrimination only if it affords adequate protection from future
unreasonable searches and seizures. The government agents prosecution or conviction. Counselman v. Hitchcock, 142 U. S.
here ignored "the procedure of antecedent justification . . . that 547, 142 U. S. 585-586. The statutory provision here involved
is central to the Fourth Amendment," [Footnote 24] a was designed to provide such protection, see Brown v. United
procedure that we hold to be a constitutional precondition of States, 359 U. S. 41, 359 U. S. 45-46, not to confer immunity
the kind of electronic surveillance involved in this case. from punishment pursuant to a prior prosecution and
Because the surveillance here failed to meet that condition, adjudication of guilt. Cf. Regina v. United States, 364 U. S.
and because it led to the petitioner's conviction, the judgment 507, 364 U. S. 513-514.
must be reversed.

15
[Footnote 4] Silverthorne Lumber Co. v. United States, 251 U. S. 385.

"The average man would very likely not have his feelings [Footnote 11]
soothed any more by having his property seized openly than by
having it seized privately and by stealth. . . . And a person can Jones v. United States, 362 U. S. 257.
be just as much, if not more, irritated, annoyed and injured by
an unceremonious public arrest by a policeman as he is by a
seizure in the privacy of his office or home." [Footnote 12]

Griswold v. Connecticut, 381 U. S. 479, 381 U. S. Rios v United States, 364 U. S. 253.
509 (dissenting opinion of MR. JUSTICE BLACK).
[Footnote 13]
[Footnote 5]
See Olmstead v. United States, 277 U. S. 438, 277 U. S. 464-
The First Amendment, for example, imposes limitations upon 466. We do not deal in this case with the law of detention or
governmental abridgment of "freedom to associate and privacy arrest under the Fourth Amendment.
in one's associations." NAACP v. Alabama, 357 U. S. 449, 357
U. S. 462. The Third Amendment's prohibition against the [Footnote 14]
unconsented peacetime quartering of soldiers protects another
aspect of privacy from governmental intrusion. To some extent, Based upon their previous visual observations of the petitioner,
the Fifth Amendment too "reflects the Constitution's concern for the agents correctly predicted that he would use the telephone
. . . . . . the right of each individual "to a private enclave where booth for several minutes at approximately the same time each
he may lead a private life."'" Tehan v. Shott, 382 U. S. 406, 382 morning. The petitioner was subjected to electronic
U. S. 416. Virtually every governmental action interferes with surveillance only during this predetermined period. Six
personal privacy to some degree. The question in each case is recordings, averaging some three minutes each, were obtained
whether that interference violates a command of the United and admitted in evidence. They preserved the petitioners end
States Constitution. of conversations concerning the placing of bets and the receipt
of wagering information.
[Footnote 6]
[Footnote 15]
See Warren & Brandeis, The Right to Privacy, 4
Harv.L.Rev.193 (1890). On the single occasion when the statements of another person
were inadvertently intercepted, the agents refrained from
[Footnote 7] listening to them.

See, e.g., Time, Inc. v. Hill, 385 U. S. 374. Cf. Breard v. [Footnote 16]
Alexandria, 341 U. S. 622; Kovacs v. Cooper, 336 U. S. 77.
Although the protections afforded the petitioner in Osborn were
[Footnote 8] "similar . . . to those . . . of conventional warrants," they were
not identical. A conventional warrant ordinarily serves to notify
In support of their respective claims, the parties have compiled the suspect of an intended search. But if Osborn had been told
competing lists of "protected areas" for our consideration. It in advance that federal officers intended to record his
appears to be common ground that a private home is such an conversations, the point of making such recordings would
area, Weeks v. United States, 232 U. S. 383, but that an open obviously have been lost; the evidence in question could not
field is not. Hester v. United States, 265 U. S. 57. Defending have been obtained. In omitting any requirement of advance
the inclusion of a telephone booth in his list the petitioner notice, the federal court that authorized electronic surveillance
cites United States v. Stone, 232 F. Supp. 396, and United in Osborn simply recognized, as has this Court, that officers
States v. Madison, 32 L.W. 2243 (D.C. Ct.Gen.Sess.). Urging need not announce their purpose before conducting an
that the telephone booth should be excluded, the Government otherwise authorized search if such an announcement would
finds support in United States v. Borgese, 235 F. Supp. 286. provoke the escape of the suspect or the destruction of critical
evidence. See Ker v. California, 374 U. S. 23, 374 U. S. 37-41.
[Footnote 9]
Although some have thought that this "exception to the notice
requirement where exigent circumstances are
It is true that this Court has occasionally described its present," id. at 374 U. S. 39, should be deemed inapplicable
conclusions in terms of "constitutionally protected areas," see, where police enter a home before its occupants are aware that
e.g., Silverman v. United States, 365 U. S. 505, 365 U. S. officers are present, id. at 374 U. S. 55-58 (opinion of MR.
510, 365 U. S. 512; Lopez v. United States, 373 U. S. 427, 373 JUSTICE BRENNAN), the reasons for such a limitation have
U. S. 438-439; Berger v. New York, 388 U. S. 41, 388 U. S. no bearing here. However true it may be that "[i]nnocent
57, 388 U. S. 59, but we have never suggested that this citizens should not suffer the shock, fright or embarrassment
concept can serve as a talismanic solution to every Fourth attendant upon an unannounced police intrusion," id. at 374 U.
Amendment problem. S. 57, and that "the requirement of awareness . . . serves to
minimize the hazards of the officers' dangerous
[Footnote 10] calling," id. at 374 U. S. 57-58, these considerations are not

16
relevant to the problems presented by judicially authorized "[t]he Fourth Amendment does not require police officers to
electronic surveillance. delay in the course of an investigation if to do so would gravely
endanger their lives or the lives of others,"
Nor do the Federal Rules of Criminal Procedure impose an
inflexible requirement of prior notice.Rule 41(d) does require Warden v. Hayden, 387 U. S. 294, 387 U. S. 298-299, there
federal officers to serve upon the person searched a copy of seems little likelihood that electronic surveillance would be a
the warrant and a receipt describing the material obtained, but realistic possibility in a situation so fraught with urgency.
it does not invariably require that this be done before the
search takes place. Nordelli v. United States, 24 F.2d 665, [Footnote 22]
666-667.
A search to which an individual consents meets Fourth
Thus, the fact that the petitioner in Osborn was unaware that Amendment requirements, Zap v. United States, 328 U. S.
his words were being electronically transcribed did not prevent 624, but, of course, "the usefulness of electronic surveillance
this Court from sustaining his conviction, and did not prevent depends on lack of notice to the suspect." Lopez v. United
the Court in Berger from reaching the conclusion that the use States, 373 U. S. 427, 373 U. S. 463 (dissenting opinion of MR.
of the recording device sanctioned in Osborn was entirely JUSTICE BRENNAN).
lawful. 388 U. S. 41, 388 U. S. 57.
[Footnote 23]
[Footnote 17]
Whether safeguards other than prior authorization by a
Lopez v. United States, 373 U. S. 427, 373 U. S. magistrate would satisfy the Fourth Amendment in a situation
464 (dissenting opinion of MR. JUSTICE BRENNAN). involving the national security is a question not presented by
this case.
[Footnote 18]
[Footnote 24]
See, e.g., Jones v. United States, 357 U. S. 493, 357 U. S.
497-499; Rios v. United States, 364 U. S. 253, 364 U. S. See Osborn v. United States, 385 U. S. 323, 385 U. S. 330.
261; Chapman v. United States, 365 U. S. 610, 365 U. S. 613-
615; Stoner v. California, 376 U. S. 483, 376 U. S. 486-487.
MR. JUSTICE DOUGLAS, with whom MR. JUSTICE
BRENNAN joins, concurring.
[Footnote 19]
While I join the opinion of the Court, I feel compelled to reply to
See, e.g., Carroll v. United States, 267 U. S. 132, 267 U. S. the separate concurring opinion of my Brother WHITE, which I
153, 156; McDonald v. United States, 335 U. S. 451, 335 U. S. view as a wholly unwarranted green light for the Executive
454-456; Brinegar v. United States, 338 U. S. 160, 338 U. S. Branch to resort to electronic eavesdropping without a warrant
174-177; Cooper v. California, 386 U. S. 58; Warden v. in cases which the Executive Branch itself labels "national
Hayden, 387 U. S. 294, 387 U. S. 298-300. security" matters.

[Footnote 20] Neither the President nor the Attorney General is a magistrate.
In matters where they believe national security may be
In Agnello v. United States, 269 U. S. 20, 269 U. S. 30, the involved, they are not detached, disinterested, and neutral as a
Court stated: court or magistrate must be. Under the separation of powers
created by the Constitution, the Executive Branch is not
"The right without a search warrant contemporaneously to supposed to be neutral and disinterested. Rather it should
search persons lawfully arrested while committing crime and to vigorously investigate
search the place where the arrest is made in order to find and
seize things connected with the crime as its fruits or as the Page 389 U. S. 360
means by which it was committed, as well as weapons and
other things to effect an escape from custody, is not to be and prevent breaches of national security and prosecute those
doubted." who violate the pertinent federal laws. The President and
Attorney General are properly interested parties, cast in the
Whatever one's view of "the longstanding practice of searching role of adversary, in national security cases. They may even be
for other proofs of guilt within the control of the accused found the intended victims of subversive action. Since spies and
upon arrest," United States v. Rabinowitz, 339 U. S. 56, 339 U. saboteurs are as entitled to the protection of the Fourth
S. 61; cf. id. at 339 U. S. 71-79 (dissenting opinion of Mr. Amendment as suspected gamblers like petitioner, I cannot
Justice Frankfurter), the concept of an "incidental" search agree that, where spies and saboteurs are involved adequate
cannot readily be extended to include surreptitious surveillance protection of Fourth Amendment rights is assured when the
of an individual either immediately before, or immediately after, President and Attorney General assume both the position of
his arrest. "adversary and prosecutor" and disinterested, neutral
magistrate.
[Footnote 21]
There is, so far as I understand constitutional history, no
Although distinction under the Fourth Amendment between types of
crimes. Article III, § 3, gives "treason" a very narrow definition,

17
and puts restrictions on its proof. But the Fourth Amendment property was not required. This view of the Fourth Amendment
draws no lines between various substantive offenses. The was followed in Wong Sun v. United States, 371 U. S. 471,
arrests in cases of "hot pursuit" and the arrests on visible or at 371 U. S. 485, and Berger v. New York, 388 U. S. 41, at
other evidence of probable cause cut across the board, and 51. Also compare Osborn v. United States, 385 U. S. 323,
are not peculiar to any kind of crime. at 385 U. S. 327. In Silverman, we found it unnecessary to
reexamine Goldman v. United States, 316 U. S. 129, which
I would respect the present lines of distinction, and not had held that electronic surveillance accomplished without the
improvise because a particular crime seems particularly physical penetration of petitioner's premises by a tangible
heinous. When the Framers took that step, as they did with object did not violate the Fourth Amendment. This case
treason, the worst crime of all, they made their purpose requires us to reconsider Goldman, and I agree that it should
manifest. now be overruled. * Its limitation on Fourth Amendment
protection is, in the present day, bad physics as well as bad
law, for reasonable expectations of privacy may be defeated by
MR. JUSTICE HARLAN, concurring. electronic as well as physical invasion.

I join the opinion of the Court, which I read to hold only (a) that Finally, I do not read the Court's opinion to declare that no
an enclosed telephone booth is an area where, like a interception of a conversation one-half of which occurs in a
home, Weeks v. United States, 232 U. S. 383, and unlike a public telephone booth can be reasonable in the absence of a
field, Hester v. United States, 265 U. S. 57, a person has a warrant. As elsewhere under the Fourth Amendment, warrants
constitutionally protected reasonable expectation of privacy; (b) are the general rule, to which the legitimate needs of law
that electronic, as well as physical, intrusion into a place that is enforcement may demand specific exceptions. It will be time
in this sense private may constitute a violation of the Fourth enough to consider any such exceptions when an appropriate
Amendment, occasion presents itself, and I agree with the Court that this is
not one.
Page 389 U. S. 361
* I also think that the course of development evinced
and (c) that the invasion of a constitutionally protected area by by Silverman. supra, Wong Sun., supra, Berger, supra, and
federal authorities is, as the Court has long held, presumptively today's decision must be recognized as overruling Olmstead v.
unreasonable in the absence of a search warrant. United States, 277 U. S. 438, which essentially rested on the
ground that conversations were not subject to the protection of
As the Court's opinion states, "the Fourth Amendment protects the Fourth Amendment.
people, not places." The question, however, is what protection
it affords to those people. Generally, as here, the answer to MR. JUSTICE WHITE, concurring.
that question requires reference to a "place." My understanding
of the rule that has emerged from prior decisions is that there is I agree that the official surveillance of petitioner's telephone
a twofold requirement, first that a person have exhibited an conversations in a public booth must be subjected
actual (subjective) expectation of privacy and, second, that the
expectation be one that society is prepared to recognize as
"reasonable." Thus, a man's home is, for most purposes, a Page 389 U. S. 363
place where he expects privacy, but objects, activities, or
statements that he exposes to the "plain view" of outsiders are to the test of reasonableness under the Fourth Amendment
not "protected," because no intention to keep them to himself and that, on the record now before us, the particular
has been exhibited. On the other hand, conversations in the surveillance undertaken was unreasonable absent a warrant
open would not be protected against being overheard, for the properly authorizing it. This application of the Fourth
expectation of privacy under the circumstances would be Amendment need not interfere with legitimate needs of law
unreasonable. Cf. Hester v. United States, supra. enforcement.*

The critical fact in this case is that "[o]ne who occupies it, [a In joining the Court's opinion, I note the Court's
telephone booth] shuts the door behind him, and pays the toll acknowledgment that there are circumstances in which it is
that permits him to place a call is surely entitled to assume" reasonable to search without a warrant. In this connection,
that his conversation is not being intercepted. Ante at 389 U. S. in footnote 23 the Court points out that today's decision does
352. The point is not that the booth is "accessible to the public" not reach national security cases Wiretapping to protect the
at other times, ante at 389 U. S. 351, but that it is a temporarily security of the Nation has been authorized by successive
private place whose momentary occupants' expectations of Presidents. The present Administration would apparently save
freedom from intrusion are recognized as reasonable. Cf. Rios national security cases from restrictions against
v. United States, 364 U. S. 253. wiretapping. See Berger v. New York, 388 U. S. 41, 388 U. S.
112-118 (1967) (WHITE, J.,
In Silverman v. United States, 365 U. S. 505, we held that
eavesdropping accomplished by means of an electronic device Page 389 U. S. 364
that penetrated the premises occupied by petitioner was a
violation of the Fourth Amendment. dissenting). We should not require the warrant procedure and
the magistrate's judgment if the President of the United States
Page 389 U. S. 362 or his chief legal officer, the Attorney General, has considered
the requirements of national security and authorized electronic
That case established that interception of conversations surveillance as reasonable.
reasonably intended to be private could constitute a "search
and seizure." and that the examination or taking of physical

18
* In previous cases, which are undisturbed by today's decision, particularly describing the place to be searched and the
the Court has upheld, as reasonable under the Fourth persons or things to be seized."
Amendment, admission at trial of evidence obtained (1) by an
undercover police agent to whom a defendant speaks without The first clause protects "persons, houses, papers, and effects
knowledge that he is in the employ of the police, Hoffa v. against unreasonable searches and seizures. . . ." These
United States, 385 U. S. 293 (1966); (2) by a recording device words connote the idea of tangible things with size, form, and
hidden on the person of such an informant, Lopez v. United weight, things capable of being searched, seized, or both. The
States, 373 U. S. 427 (1963); Osborn v. United States, 385 U. second clause of the Amendment still further establishes its
S. 323 (1966), and (3) by a policeman listening to the secret Framers' purpose to limit its protection to tangible things by
microwave transmissions of an agent conversing with the providing that no warrants shall issue but those "particularly
defendant in another location, On Lee v. United States, 343 U. describing the place to be searched, and the persons or things
S. 747 (1952). When one man speaks to another, he takes all to be seized." A conversation overheard by eavesdropping,
the risks ordinarily inherent in so doing, including the risk that whether by plain snooping or wiretapping, is not tangible and,
the man to whom he speaks will make public what he has under the normally accepted meanings of the words, can
heard. The Fourth Amendment does not protect against neither be searched nor seized. In addition the language of the
unreliable (or law-abiding) associates. Hoffa v. United States, second clause indicates that the Amendment refers not only to
supra. It is but a logical and reasonable extension of this something tangible so it can be seized, but to something
principle that a man take the risk that his hearer, free to already in existence, so it can be described. Yet the Court's
memorize what he hears for later verbatim repetitions, is interpretation would have the Amendment apply to overhearing
instead recording it or transmitting it to another. The present future conversations, which, by their very nature, are
case deals with an entirely different situation, for as the Court nonexistent until they take place. How can one "describe" a
emphasizes the petitioner "sought to exclude . . . the uninvited future conversation, and, if one cannot, how can a magistrate
ear," and spoke under circumstances in which a reasonable issue a warrant to eavesdrop one in the future? It is argued
person would assume that uninvited ears were not listening. that information showing what

MR. JUSTICE BLACK, dissenting. Page 389 U. S. 366

If I could agree with the Court that eavesdropping carried on by is expected to be said is sufficient to limit the boundaries of
electronic means (equivalent to wiretapping) constitutes a what later can be admitted into evidence; but does such
"search" or "seizure," I would be happy to join the Court's general information really meet the specific language of the
opinion For on that premise, my Brother STEWART sets out Amendment, which says "particularly describing"? Rather than
methods in accord with the Fourth Amendment to guide States using language in a completely artificial way, I must conclude
in the enactment and enforcement of laws passed to regulate that the Fourth Amendment simply does not apply to
wiretapping by government. In this respect, today's opinion eavesdropping.
differs sharply from Berger v. New York, 388 U. S. 41, decided
last Term, which held void on its face a New York statute
authorizing wiretapping on warrants issued by magistrates on Tapping telephone wires, of course, was an unknown
showings of probable cause. The Berger case also set up what possibility at the time the Fourth Amendment was adopted. But
appeared to be insuperable obstacles to the valid passage of eavesdropping (and wiretapping is nothing more than
such wiretapping laws by States. The Court's opinion in this eavesdropping by telephone) was, as even the majority opinion
case, however, removes the doubts about state power in this in Berger, supra, recognized,
field and abates to a large extent the confusion and near-
paralyzing effect of the Berger holding. Notwithstanding these "an ancient practice which, at common law, was condemned
good efforts of the Court, I am still unable to agree with its as a nuisance. 4 Blackstone, Commentaries 168. In those
interpretation of the Fourth Amendment. days, the eavesdropper listened by naked ear under the eaves
of houses or their windows, or beyond their walls seeking out
My basic objection is two-fold: (1) I do not believe that the private discourse."
words of the Amendment will bear the meaning given them by
today's decision, and (2) I do not believe that it is the proper 388 U.S. at 388 U. S. 45. There can be no doubt that the
role of this Court to rewrite the Amendment in order "to bring it Framers were aware of this practice, and, if they had desired to
into harmony with the times," and thus reach a result that many outlaw or restrict the use of evidence obtained by
people believe to be desirable. eavesdropping, I believe that they would have used the
appropriate language to do so in the Fourth Amendment. They
Page 389 U. S. 365 certainly would not have left such a task to the ingenuity of
language-stretching judges. No one, it seems to me, can read
the debates on the Bill of Rights without reaching the
While I realize that an argument based on the meaning of conclusion that its Framers and critics well knew the meaning
words lacks the scope, and no doubt the appeal, of broad of the words they used, what they would be understood to
policy discussions and philosophical discourses on such mean by others, their scope and their limitations. Under these
nebulous subjects as privacy, for me, the language of the circumstances, it strikes me as a charge against their
Amendment is the crucial place to look in construing a written scholarship, their common sense and their candor to give to
document such as our Constitution. The Fourth Amendment the Fourth Amendment's language the eavesdropping meaning
says that the Court imputes to it today.

"The right of the people to be secure in their persons, houses, I do not deny that common sense requires, and that this Court
papers, and effects, against unreasonable searches and often has said, that the Bill of Rights' safeguards should be
seizures, shall not be violated, and no Warrants shall issue, but given a liberal construction. This
upon probable cause, supported by Oath or affirmation, and

19
Page 389 U. S. 367 It should be noted that the Court in Olmstead based its
decision squarely on the fact that wiretapping or eavesdropping
principle, however, does not justify construing the search and does not violate the Fourth Amendment. As shown supra in the
seizure amendment as applying to eavesdropping or the cited quotation from the case, the Court went to great pains to
"seizure" of conversations. The Fourth Amendment was aimed examine the actual language of the Amendment, and found
directly at the abhorred practice of breaking in, ransacking and that the words used simply could not be stretched to cover
searching homes and other buildings and seizing people's eavesdropping. That there was no trespass was not the
personal belongings without warrants issued by magistrates. determinative factor, and indeed the Court, in citing Hester v.
The Amendment deserves, and this Court has given it, a liberal United States, 265 U. S. 57, indicated that, even where there
construction in order to protect against warrantless searches of was a trespass, the Fourth Amendment does not automatically
buildings and seizures of tangible personal effects. But, until apply to evidence obtained by "hearing or
today, this Court has refused to say that eavesdropping comes
within the ambit of Fourth Amendment restrictions. See, e.g., Page 389 U. S. 369
Olmstead v. United States, 277 U. S. 438 (1928), and Goldman
v. United States, 316 U. S. 129 (1942). sight." The Olmstead majority characterized Hester as holding

So far, I have attempted to state why I think the words of the "that the testimony of two officers of the law who trespassed on
Fourth Amendment prevent its application to eavesdropping. It the defendant's land, concealed themselves one hundred
is important now to show that this has been the traditional view yards away from his house, and saw him come out and hand a
of the Amendment's scope since its adoption, and that the bottle of whiskey to another, was not inadmissible. While there
Court's decision in this case, along with its amorphous holding was a trespass, there was no search of person, house, papers
in Berger last Term, marks the first real departure from that or effects."
view.
277 U.S. at 277 U. S. 465. Thus, the clear holding of
The first case to reach this Court which actually involved a the Olmstead and Goldman cases, undiluted by any question
clear-cut test of the Fourth Amendment's applicability to of trespass, is that eavesdropping, in both its original and
eavesdropping through a wiretap was, of course, Olmstead, modern forms, is not violative of the Fourth Amendment.
supra. In holding that the interception of private telephone
conversations by means of wiretapping was not a violation of
the Fourth Amendment, this Court, speaking through Mr. Chief While my reading of the Olmstead and Goldman cases
Justice Taft, examined the language of the Amendment and convinces me that they were decided on the basis of the
found, just as I do now, that the words could not be stretched inapplicability of the wording of the Fourth Amendment to
to encompass overheard conversations: eavesdropping, and not on any trespass basis, this is not to
say that unauthorized intrusion has not played an important
role in search and seizure cases. This Court has adopted an
"The Amendment itself shows that the search is to be of exclusionary rule to bar evidence obtained by means of such
material things -- the person, the house, his papers or his intrusions. As I made clear in my dissenting opinion in Berger
effects. The description of the warrant necessary to make the v. New York, 388 U. S. 41, 388 U. S. 76, I continue to believe
proceeding lawful, is that this exclusionary rule formulated in Weeks v. United
States, 232 U. S. 383, rests on the "supervisory power" of this
Page 389 U. S. 368 Court over other federal courts and is not rooted in the Fourth
Amendment. See Wolf v. Colorado, concurring opinion, 338 U.
that it must specify the place to be searched and the person or S. 338 U.S. 25, 338 U. S. 39, at 40. See also Mapp v.
things to be seized. . . ." Ohio, concurring opinion, 367 U. S. 367 U.S. 643, 367 U. S.
661-666. This rule has caused the Court to refuse to accept
evidence where there has been such an intrusion regardless of
"* * * *" whether there has been a search or seizure in violation of the
Fourth Amendment. As this Court said in Lopez v. United
"Justice Bradley in the Boyd case [Boyd v. United States, 116 States, 373 U. S. 427, 373 U. S. 438-439
U. S. 616], and Justice Clark[e] in the Gouled case [Gouled v.
United States, 255 U. S. 298], said that the Fifth Amendment "The Court has in the past sustained instances of 'electronic
and the Fourth Amendment were to be liberally construed to eavesdropping' against constitutional challenge when devices
effect the purpose of the framers of the Constitution in the have been used to enable government agents to overhear
interest of liberty. But that cannot justify enlargement of the conversations which would have been beyond the reach of the
language employed beyond the possible practical meaning of human ear [citing
houses, persons, papers, and effects, or so to apply the words
search and seizure as to forbid hearing or sight."
Page 389 U. S. 370
277 U.S. at 277 U. S. 464-465.
Olmstead and Goldman]. It has been insisted only that the
electronic device not be planted by an unlawful physical
Goldman v. United States, 316 U. S. 129, is an even clearer invasion of a constitutionally protected area. Silverman v.
example of this Court's traditional refusal to consider United States."
eavesdropping as being covered by the Fourth Amendment.
There, federal agents used a detectaphone, which was placed
on the wall of an adjoining room, to listen to the conversation of To support its new interpretation of the Fourth Amendment,
a defendant carried on in his private office and intended to be which, in effect, amounts to a rewriting of the language, the
confined within the four walls of the room. This Court, referring Court's opinion concludes that "the underpinnings
to Olmstead, found no Fourth Amendment violation. of Olmstead and Goldman have been . . . eroded by our

20
subsequent decisions. . . ." But the only cases cited as "intangibles," such as conversation, and the following
accomplishing this "eroding" are Silverman v. United ambiguous statement is quoted from the opinion: "The premise
States, 365 U. S. 505, and Warden v. Hayden, 387 U. S. 294. that property interests control the right of the Government to
Neither of these cases search and seize has been discredited." 387 U.S. at 387 U. S.
"eroded" Olmstead or Goldman. Silverman is an interesting 304. But far from being concerned
choice, since there the Court expressly refused to reexamine
the rationale of Olmstead or Goldman although such a Page 389 U. S. 372
reexamination was strenuously urged upon the Court by the
petitioners' counsel. Also, it is significant that, in Silverman, as
the Court described it, "the eavesdropping was accomplished with eavesdropping, Warden v. Hayden upholds the seizure of
by means of an unauthorized physical penetration into the clothes, certainly tangibles by any definition. The discussion of
premises occupied by the petitioners," 365 U.S. at 365 U. S. property interests was involved only with the common law rule
509, thus calling into play the supervisory exclusionary rule of that the right to seize property depended upon proof of a
evidence. As I have pointed out above, where there is an superior property interest.
unauthorized intrusion, this Court has rejected admission of
evidence obtained regardless of whether there has been an Thus, I think that, although the Court attempts to convey the
unconstitutional search and seizure. The majority's decision impression that, for some reason,
here relies heavily on the statement in the opinion that the today Olmstead and Goldman are no longer good law, it must
Court "need not pause to consider whether or not there was a face up to the fact that these cases have never been overruled,
technical trespass under the local property law relating to party or even "eroded." It is the Court's opinions in this case
walls." (At 365 U. S. 511.) Yet this statement should not and Berger which, for the first time since 1791, when the
becloud the fact that, time and again, the opinion emphasizes Fourth Amendment was adopted, have declared that
that there has been an unauthorized intrusion: eavesdropping is subject to Fourth Amendment restrictions and
that conversations can be "seized."* I must align myself with all
"For a fair reading of the record in this case shows that the those judges who up to this year have never been able to
eavesdropping was accomplished by means of impute such a meaning to the words of the Amendment.
an unauthorized physical penetration into the premises
occupied by the petitioners." Page 389 U. S. 373

(At 365 U. S. 509, emphasis added.) "Eavesdropping Since I see no way in which the words of the Fourth
Amendment can be construed to apply to eavesdropping, that
Page 389 U. S. 371 closes the matter for me. In interpreting the Bill of Rights, I
willingly go as far as a liberal construction of the language
takes me, but I simply cannot in good conscience give a
accomplished by means of such a physical intrusion is beyond meaning to words which they have never before been thought
the pale of even those decisions. . . ." (At 365 U. S. 509, to have and which they certainly do not have in common
emphasis added.) "Here . . . the officers overheard the ordinary usage. I will not distort the words of the Amendment in
petitioners' conversations only by usurping part of the order to "keep the Constitution up to date" or "to bring it into
petitioners' house or office. . . ." (At 365 U. S. 511, emphasis harmony with the times." It was never meant that this Court
added.) "[D]ecision here . . . is based upon the reality of have such power, which, in effect, would make us a
an actual intrusion. . . ." (At 365 U. S. 512, emphasis added.) continuously functioning constitutional convention.
"We find no occasion to reexamine Goldman here, but we
decline to go beyond it, by even a fraction of an inch." (At 365
U. S. 512, emphasis added.) As if this were not enough, With this decision the Court has completed, I hope, its rewriting
Justices Clark and Whittaker concurred with the following of the Fourth Amendment, which started only recently when the
statement: Court began referring incessantly to the Fourth Amendment not
so much as a law against unreasonable searches and seizures
as one to protect an individual's privacy. By clever word
"In view of the determination by the majority that juggling, the Court finds it plausible to argue that language
the unauthorized physical penetration into petitioners' premises aimed specifically at searches and seizures of things that can
constituted sufficient trespass to remove this case from the be searched and seized may, to protect privacy, be applied to
coverage of earlier decisions, we feel obliged to join in the eavesdropped evidence of conversations that can neither be
Court's opinion." searched nor seized. Few things happen to an individual that
do not affect his privacy in one way or another. Thus, by
(At 365 U. S. 513, emphasis added.) As I made clear in my arbitrarily substituting the Court's language, designed to protect
dissent in Berger, the Court in Silverman held the evidence privacy, for the Constitution's language, designed to protect
should be excluded by virtue of the exclusionary rule, and "I against unreasonable searches and seizures, the Court has
would not have agreed with the Court's opinion in Silverman . . made the Fourth Amendment its vehicle for holding all laws
. had I thought that the result depended on finding a violation of violative of the Constitution which offend the Court's broadest
the Fourth Amendment. . . ." 388 U.S. at 388 U. S. 79-80. In concept of privacy. As I said in Griswold v. Connecticut, 381 U.
light of this and the fact that the Court expressly refused to S. 479,
reexamine Olmstead and Goldman, I cannot read Silverman as
overturning the interpretation stated very plainly "The Court talks about a constitutional 'right of privacy' as
in Olmstead and followed in Goldman that eavesdropping is though there is some constitutional provision or provisions
not covered by the Fourth Amendment. forbidding any law ever to be passed which might abridge the
'privacy'
The other "eroding" case cited in the Court's opinion is Warden
v. Hayden, 387 U. S. 294. It appears that this case is cited for Page 389 U. S. 374
the proposition that the Fourth Amendment applies to

21
of individuals. But there is not."

(Dissenting opinion, at 381 U. S. 508.) I made clear in that


dissent my fear of the dangers involved when this Court uses
the "broad, abstract and ambiguous concept" of "privacy" as a
"comprehensive substitute for the Fourth Amendment's
guarantee against unreasonable searches and seizures.'" (See
generally dissenting opinion at 381 U. S. 507-527.)

The Fourth Amendment protects privacy only to the extent that


it prohibits unreasonable searches and seizures of "persons,
houses, papers, and effects." No general right is created by the
Amendment so as to give this Court the unlimited power to
hold unconstitutional everything which affects privacy. Certainly
the Framers, well acquainted as they were with the excesses
of governmental power, did not intend to grant this Court such
omnipotent lawmaking authority as that. The history of
governments proves that it is dangerous to freedom to repose
such powers in courts.

For these reasons, I respectfully dissent.

* The first paragraph of my Brother HARLAN's concurring


opinion is susceptible of the interpretation, although probably
not intended, that this Court "has long held" eavesdropping to
be a violation of the Fourth Amendment and therefore
"presumptively unreasonable in the absence of a search
warrant." There is no reference to any long line of cases, but
simply a citation to Silverman, and several cases following it, to
establish this historical proposition. In the first place, as I have
indicated in this opinion, I do not read Silverman as holding any
such thing, and, in the second place, Silverman was decided in
1961. Thus, whatever it held, it cannot be said it "has [been]
long held." I think my Brother HARLAN recognizes this later in
his opinion when he admits that the Court must now
overrule Olmstead and Goldman. In having to overrule these
cases in order to establish the holding the Court adopts today,
it becomes clear that the Court is promulgating new doctrine
instead of merely following what it "has long held." This is
emphasized by my Brother HARLAN's claim that it is "bad
physics" to adhere to Goldman. Such an assertion simply
illustrates the propensity of some members of the Court to rely
on their limited understanding of modern scientific subjects in
order to fit the Constitution to the times and give its language a
meaning that it will not tolerate.

22
Internet Censorship, Freedom to Read Foundation, Inc., Health
Sciences Libraries Consortium, Hotwired Ventures LLC,
Interactive Digital Software Association, Interactive Services
Association, Magazine Publishers of America, Microsoft
Corporation, The Microsoft Network, LLC, National Press
Photographers Association, Netcom On-Line Communications
Services, Inc., Newspaper Association of America, Opnet, Inc.,
Prodigy Services Company, Society of Professional
Journalists, and Wired Ventures, Ltd.

Anthony J. Coppolino, Jason R. Baron, Patricia M. Russotto,


Mary E. Kostel, Craig Blackwell, Theodore C. Hirt, U.S.
Department of Justice, Civil Division, Washington, DC; Mark R.
Kmetz, U.S. Attorney's Office, Philadelphia, PA (Frank M.
Hunger, Asst. Attorney General, U.S. Department of Justice,
Civil Division; Michael R. Stiles, U.S. Attorney, Philadelphia,
PA; Dennis G. Linder, Lucinda Love, U.S. Department of
Justice, Civil Division, on briefs), for defendants Janet Reno
and Department of Justice.

James D. Crawford, Carl A. Solano, Jennifer DuFault James,


Theresa E. Loscalzo, Joseph T. Lukens, Schnader, Harrison,
Segal & Lewis, Philadelphia, PA, for amici curiae Authors
Guild, American Society of Journalists and Authors, Ed Carp,
Coalition for Positive Sexuality, CONNECTnet, Creative on
AOL, Tri Dang Do, Feminists for Free Expression, Margarita La
929 F. Supp. 824 (1996) Cabe, Maggie La Noue, LoD Communications, Peter Ludlow,
AMERICAN CIVIL LIBERTIES UNION, et al., Palmer Museum of Art, Chuck More, Rod Morgan, Pen
v. American Center, Philadelphia Magazine, PSINet, Inc., Eric S.
Janet RENO, Attorney General of the United States. Raymond, Reporters Committee for Freedom of the Press,
AMERICAN LIBRARY ASSOCIATION, INC., et al., Don Rittner, The Sexuality Information & Education Council of
v. the United States, Lloyd K. Stires, Peter J. Swanson, Kristi
UNITED STATES DEP'T OF JUSTICE, et al. Thomas, Web Communications, and Miryam Ehrlic Williamson.
Civil Action Nos. 96-963, 96-1458.
Cathleen A. Cleaver, Director of Legal Studies, Family
United States District Court, E.D. Pennsylvania. Research Council, Washington, DC, Bruce A. Taylor, National
June 11, 1996. Law Center for Children And Families, Fairfax, VA, for amici
curiae The National Law Center for Children and Families,
Family Research Council, "Enough is Enough" Campaign,
*825 Christopher A. Hansen, Marjorie Heins, Ann Beeson,
National Coalition for the Protection of Children of Children &
Steven R. Shapiro, Catherine Weiss, Laura Abel, American
Families, Morality in Media.
Civil Liberties Union Foundation, New York City; Stefan
Presser, ACLU of Pennsylvania, Philadelphia, PA; David L.
Sobel, Marc Rotenberg, Electronic Privacy Information Center, L. Theodore Hoppe, Jr., Black & Associates, P.C., Media, PA,
Washington, DC; Mike Godwin, Electronic Frontier Foundation, Jay Alan Sekulow, Colby M. May, James M. Henderson, Sr.,
San Francisco, CA; Roger Evans, Planned Parenthood American Center for Law & Justice, Washington, DC, for
Foundation of America, New York City, for plaintiffs: American amicus curiae the Family Life Project of the American Center
Civil Liberties Union, Human Rights Watch, Electronic Privacy for Law and Justice.
Information Center, Electronic Frontier Foundation, Journalism
Education Association, Computer Professionals for Social Andre L. Dennis, Stradley, Ronon, Stevens & Young,
Responsibility, National Writers Union, ClariNet Philadelphia, PA, for amici curiae The Laboratory for Computer
Communications Corp., Institute for Global Communications, Science of the Massachusetts Institute of Technology and
Stop Prisoner Rape, Inc., AIDS Education Global Information Michael L. Dertouzos, Director.
System, Bibliobytes, Queer Resources Directory, Critical Path
AIDS Project, Inc., Wildcat Press, Inc., Declan McCullagh,
Before SLOVITER, Chief Circuit Judge, and BUCKWALTER
Brock Meeks, John Troyer, Jonathan Wallace, and Planned
and DALZELL, District Judges.
Parenthood Federation of America, Inc.

Bruce J. Ennis, Jr., Ann M. Kappler, John B. Morris, Jr., Jenner


ADJUDICATION ON MOTIONS FOR PRELIMINARY
& Block, Washington, DC, Ronald P. Schiller, Piper &
INJUNCTION
Marbury, *826 Philadelphia, PA, for plaintiffs: American Library
I.
Association, Inc., America Online, Inc., American Booksellers
INTRODUCTION
Association, Inc., American Booksellers Foundation for Free
Procedural Background
Expression, American Society of Newspaper Editors, Apple
Computer, Inc., Association of American Publishers, Inc.,
Association of Publishers, Editors and Writers, Citizens Internet Before us are motions for a preliminary injunction filed by
Empowerment Coalition, Commercial Internet Exchange plaintiffs who challenge on constitutional grounds provisions of
Association, CompuServe Incorporated, Families Against the Communications Decency Act of 1996 (CDA or "the Act"),

23
which constitutes Title V of the *827 Telecommunications Act Shortly thereafter, the American Library Association, Inc. (the
of 1996, signed into law by the President on February 8, ALA) and others[3] filed *828 a similar action at C.A. No. 96-
1996.[1] Telecommunications Act of 1996, Pub.L. No. 104-104, 1458. On February 27, 1996, Chief Judge Sloviter, again
§ 502, 110 Stat. 56, 133-35. Plaintiffs include various pursuant to § 561(a) of the CDA and upon request, convened
organizations and individuals who, inter alia, are associated the same three-judge court pursuant to 28 U.S.C. § 2284. The
with the computer and/or communications industries, or who actions were consolidated pursuant to Fed. R.Civ.P. 42(a), "for
publish or post materials on the Internet, or belong to various all matters relating to the disposition of motions for preliminary
citizen groups. See ACLU Complaint (¶¶ 7-26), ALA First injunction in these cases, including the hearing on such
Amended Complaint (¶¶ 3, 12-33). motions."

The defendants in these actions are Janet Reno, the Attorney The parties were afforded expedited discovery in connection
General of the United States, and the United States with the motions for preliminary injunction, and they cooperated
Department of Justice. For convenience, we will refer to these with Judge Dalzell, who had been assigned the case
defendants as the Government. Plaintiffs contend that the two management aspects of the litigation. While the discovery was
challenged provisions of the CDA that are directed to proceeding, and with the agreement of the parties, the court
communications over the Internet which might be deemed began receiving evidence at the consolidated hearings which
"indecent" or "patently offensive" for minors, defined as were conducted on March 21 and 22, and April 1, 12 and 15,
persons under the age of eighteen, infringe upon rights 1996. In order to expedite the proceedings, the parties worked
protected by the First Amendment and the Due Process closely with Judge Dalzell and arranged to stipulate to many of
Clause of the Fifth Amendment. the underlying facts and to place much of their cases in chief
before the court by sworn declarations, so that the hearings
Plaintiffs in Civil Action Number 96-963, in which the lead were largely devoted to cross-examination of certain of the
plaintiff is the American Civil Liberties Union (the ACLU), [2] filed witnesses whose declarations had been filed. The parties
their action in the United States District Court for the Eastern submitted proposed findings of fact and post-hearing
District of Pennsylvania on the day the Act was signed, and memoranda on April 29, and the court heard extensive oral
moved for a temporary restraining order to enjoin enforcement argument on May 10, 1996.[4]
of these two provisions of the CDA. On February 15, 1996,
following an evidentiary hearing, Judge Ronald L. Buckwalter,
to whom the case had been assigned, granted a limited Statutory Provisions at Issue
temporary restraining order, finding in a Memorandum that 47
U.S.C. § 223(a) (1) (B) ("the indecency provision" of the CDA) Plaintiffs focus their challenge on two provisions of section 502
was unconstitutionally vague. On the same day, Chief Judge of the CDA which amend 47 U.S.C. §§ 223(a) and 223(d).
Dolores K. Sloviter, Chief Judge of the United States Court of
Appeals for the Third Circuit, having been requested by the
parties and the district court to convene a three-judge court, Section 223(a) (1) (B) provides in part that any person in
pursuant to § 561(a) of the CDA, appointed such a court interstate or foreign communications who, "by means of a
consisting of, in addition to Judge Buckwalter, Judge Stewart telecommunications device,"[5] "knowingly ...
Dalzell of the same district, and herself, as the circuit judge makes, *829 creates, or solicits" and "initiates the
required by 28 U.S.C. § 2284. transmission" of "any comment, request, suggestion, proposal,
image or other communication which is obscene
or indecent, knowing that the recipient of the communication is
After a conference with the court, the parties entered into a under 18 years of age," "shall be criminally fined or
stipulation, which the court approved on February 26, 1996, imprisoned." (emphasis added).
wherein the Attorney General agreed that:
Section 223(d) (1) ("the patently offensive provision"), makes it
a crime to use an "interactive computer service"[6] to "send" or
she will not initiate any investigations or prosecutions for "display in a manner available" to a person under age 18, "any
violations of 47 U.S.C. § 223(d) for conduct occurring after comment, request, suggestion, proposal, image, or other
enactment of this provision until the three-judge court hears communication that, in context, depicts or describes, in terms
Plaintiffs' Motion for Preliminary Injunction ... and has decided patently offensive as measured by contemporary community
the motion. standards, sexual or excretory activities or organs, regardless
of whether the user of such service placed the call or initiated
The Attorney General's commitment was qualified to the extent the communication."
that she retained:
Plaintiffs also challenge on the same grounds the provisions in
§ 223(a) (2) and § 223(d) (2), which make it a crime for anyone
her full authority to investigate or prosecute any violation of § to "knowingly permit[] any telecommunications facility under
223(a) (1) (B), as amended, and § 223(d) as to conduct which [his or her] control to be used for any activity prohibited" in §§
occurs or occurred during any period of time after enactment of 223(a) (1) (B) and 223(d) (1). The challenged provisions
these provisions (including for the period of time to which this impose a punishment of a fine, up to two years imprisonment,
stipulation applies) should the Court deny plaintiffs' motion or, if or both for each offense.
the motion is granted, should these provisions ultimately be
upheld. Plaintiffs make clear that they do not quarrel with the statute to
the extent that it covers obscenity or child pornography, which
Stipulation, ¶ 4, in C.A. No. 96-963. were already proscribed before the CDA's adoption. See 18
U.S.C. §§ 1464-65 (criminalizing obscene material); id. §§
2251-52 (criminalizing child pornography); see also New York
v. Ferber, 458 U.S. 747, 102 S. Ct. 3348, 73 L. Ed. 2d 1113

24
(1982); Miller v. California, 413 U.S. 15, 93 S. Ct. 2607, 37 L. (B) has restricted access to such communication by requiring
Ed. 2d 419 (1973). use of a verified credit card, debit account, adult access code,
or adult personal identification number.
Plaintiffs in the ACLU action also challenge the provision of the
CDA that criminalizes speech over the Internet that transmits (6) The [Federal Communications] Commission may describe
information about abortions or abortifacient drugs and devices, measures which are reasonable, effective, and appropriate to
through its amendment of 18 U.S.C. § 1462(c). That section restrict access to prohibited communications under subsection
now prohibits the sending and receiving of information over the (d) of this section. Nothing in this section authorizes the
Internet by any means regarding "where, how, or of whom, or Commission to enforce, or is intended to provide the
by what means any [drug, medicine, article, or thing designed, Commission with the authority to approve, sanction, or permit,
adapted, or intended for producing abortion] may be obtained the use of such measures. The Commission shall have no
or made". The Government has stated that it does not contest enforcement authority over the failure to utilize such
plaintiffs' challenge to the enforceability of the provision of the measures....
CDA as it relates to 18 U.S.C. § 1462(c).[7]
II.
As part of its argument that the CDA passes constitutional FINDINGS OF FACT
muster, the Government cites the CDA's "safe harbor"
defenses in new § 223(e) of 47 U.S.C., which provides:
All parties agree that in order to apprehend the legal questions
at issue in these cases, it is necessary to have a clear
understanding of the exponentially growing, world-wide
(e) Defenses medium that is the Internet, which presents unique issues
relating to the application of First Amendment jurisprudence
In addition to any other defenses available by law: and due process requirements to this new and evolving
method of communication. For this reason all parties insisted
on having extensive evidentiary hearings before the three-
(1) No person shall be held to have violated subsection (a) or judge court. The court's Findings of fact are made pursuant to
(d) of this section solely for providing access or connection to Fed.R.Civ.P. 52(a). The history and basic technology of this
or from a facility, system, or network not under that person's medium are not in dispute, and the first forty-eight paragraphs
control, including transmission, downloading, intermediate of the following Findings of fact are derived from the like-
storage, access software, or other related capabilities that are numbered paragraphs of a stipulation[8] the parties filed with
incidental to providing such access or connection that does not the court.[9]
include the creation of the content of the communication.

(2) The defenses provided by paragraph (1) of this subsection The Nature of Cyberspace
shall not be applicable to a person who is a conspirator with an The Creation of the Internet and the Development of
entity actively involved in the creation *830 or knowing Cyberspace
distribution of communications that violate this section, or who
knowingly advertises the availability of such communications.
1. The Internet is not a physical or tangible entity, but rather a
giant network which interconnects innumerable smaller groups
(3) The defenses provided in paragraph (1) of this subsection of linked computer networks. It is thus a network of networks.
shall not be applicable to a person who provides access or This is best understood if one considers what a linked group of
connection to a facility, system, or network engaged in the computers referred to here as a "network" is, and what it does.
violation of this section that is owned or controlled by such Small networks are now ubiquitous (and are often called "local
person. area *831 networks"). For example, in many United States
Courthouses, computers are linked to each other for the
purpose of exchanging files and messages (and to share
(4) No employer shall be held liable under this section for the
equipment such as printers). These are networks.
actions of an employee or agent unless the employee's or
agent's conduct is within the scope of his or her employment or
agency and the employer (A) having knowledge of such 2. Some networks are "closed" networks, not linked to other
conduct, authorizes or ratifies such conduct, or (B) recklessly computers or networks. Many networks, however, are
disregards such conduct. connected to other networks, which are in turn connected to
other networks in a manner which permits each computer in
any network to communicate with computers on any other
(5) It is a defense to a prosecution under subsection (a) (1) (B) network in the system. This global Web of linked networks and
or (d) of this section, or under subsection (a) (2) of this section computers is referred to as the Internet.
with respect to the use of a facility for an activity under
subsection (a) (1) (B) that a person
3. The nature of the Internet is such that it is very difficult, if not
impossible, to determine its size at a given moment. It is
(A) has taken, in good faith, reasonable, effective, and indisputable, however, that the Internet has experienced
appropriate actions under the circumstances to restrict or extraordinary growth in recent years. In 1981, fewer than 300
prevent access by minors to a communication specified in such computers were linked to the Internet, and by 1989, the
subsections, which may involve any appropriate measures to number stood at fewer than 90,000 computers. By 1993, over
restrict minors from such communications, including any 1,000,000 computers were linked. Today, over 9,400,000 host
method which is feasible under available technology; or computers worldwide, of which approximately 60 percent
located within the United States, are estimated to be linked to
the Internet. This count does not include the personal

25
computers people use to access the Internet using modems. In transmission, and re-routing, would likely occur in a matter of
all, reasonable estimates are that as many as 40 million people seconds.
around the world can and do access the enormously flexible
communication Internet medium. That figure is expected to 9. Messages between computers on the Internet do not
grow to 200 million Internet users by the year 1999. necessarily travel entirely along the same path. The Internet
uses "packet switching" communication protocols that allow
4. Some of the computers and computer networks that make individual messages to be subdivided into smaller "packets"
up the Internet are owned by governmental and public that are then sent independently to the destination, and are
institutions, some are owned by non-profit organizations, and then automatically reassembled by the receiving computer.
some are privately owned. The resulting whole is a While all packets of a given message often travel along the
decentralized, global medium of communications or same path to the destination, if computers along the route
"cyberspace" that links people, institutions, corporations, and become overloaded, then packets can be re-routed to less
governments around the world. The Internet is an international loaded computers.
system. This communications medium allows any of the
literally tens of millions of people with access to the Internet to 10. At the same time that ARPANET was maturing (it
exchange information. These communications can occur subsequently ceased to exist), similar networks developed to
almost instantaneously, and can be directed either to specific link universities, research facilities, businesses, and individuals
individuals, to a broader group of people interested in a around the world. These other formal or loose networks
particular subject, or to the world as a whole. included BITNET, CSNET, FIDONET, and USENET.
Eventually, each of these networks (many of which overlapped)
5. The Internet had its origins in 1969 as an experimental were themselves linked together, allowing users of any
project of the Advanced Research Project Agency ("ARPA"), computers linked to any one of the networks to transmit
and was called ARPANET. This network linked computers and communications to users of computers on other networks. It is
computer networks owned by the military, defense contractors, this series of linked networks (themselves linking computers
and university laboratories conducting defense-related and computer networks) that is today commonly known as the
research. The network later allowed researchers across the Internet.
country to access directly and to use extremely powerful
supercomputers located at a few key universities and 11. No single entity academic, corporate, governmental, or
laboratories. As it evolved far beyond its research origins in the non-profit administers the Internet. It exists and functions as a
United States to encompass universities, corporations, and result of the fact that hundreds of thousands of separate
people around the world, the ARPANET came to be called the operators of computers and computer networks independently
"DARPA Internet," and finally just the "Internet." decided to use common data transfer protocols to exchange
communications and information with other computers (which
6. From its inception, the network was designed to be a in turn exchange communications and information with still
decentralized, self-maintaining series of redundant links other computers). There is no centralized storage location,
between computers and computer networks, capable of rapidly control point, or communications channel for the Internet, and it
transmitting communications without direct human involvement would not be technically feasible for a single entity to control all
or control, and with the automatic ability to re-route of the information conveyed on the Internet.
communications if one or more individual links were damaged
or otherwise unavailable. Among other goals, this redundant
system of linked computers was designed to allow vital How Individuals Access the Internet
research and communications to continue even if portions of
the network were damaged, say, in a war.
12. Individuals have a wide variety of avenues to access
cyberspace in general, and the Internet in particular. In terms
7. To achieve this resilient nationwide (and ultimately global) of physical access, there are two common methods to
communications medium, the ARPANET encouraged the establish an actual link to the Internet. First, one can use a
creation of multiple links to and from each computer (or computer or computer terminal that is directly (and usually
computer network) on the network. Thus, a computer located in permanently) connected to a computer network that is itself
Washington, D.C., might be linked (usually using dedicated directly or indirectly connected to the Internet. Second, one can
telephone lines) to other computers in neighboring states or on use a "personal computer" with a "modem" to connect over a
the Eastern seaboard. Each of those computers could in turn telephone line to a larger computer or computer network that is
be linked to other computers, which themselves would be itself directly or indirectly connected to the Internet. As detailed
linked to other computers. below, both direct and modem connections are made available
to people by a wide variety of academic, governmental, or
8. A communication sent over this redundant series of linked commercial entities.
computers could travel any of a number of routes to its
destination. Thus, a message sent from a computer in 13. Students, faculty, researchers, and others affiliated with the
Washington, D.C., to a computer in Palo *832 Alto, California, vast majority of colleges and universities in the United States
might first be sent to a computer in Philadelphia, and then be can access the Internet through their educational institutions.
forwarded to a computer in Pittsburgh, and then to Chicago, Such access is often via direct connection using computers
Denver, and Salt Lake City, before finally reaching Palo Alto. If located in campus libraries, offices, or computer centers, or
the message could not travel along that path (because of may be through telephone access using a modem from a
military attack, simple technical malfunction, or other reason), student's or professor's campus or off-campus location. Some
the message would automatically (without human intervention colleges and universities install "ports" or outlets for direct
or even knowledge) be re-routed, perhaps, from Washington, network connections in each dormitory room or provide access
D.C. to Richmond, and then to Atlanta, New Orleans, Dallas, via computers located in common areas in dormitories. Such
Albuquerque, Los Angeles, and finally to Palo Alto. This type of access enables students and professors to use information and

26
content provided by the college or university itself, and to use networks. In addition to allowing access to the extensive
the vast amount of research resources and other information content available within each online service, the services also
available on the Internet worldwide. allow subscribers to link to the much larger resources of the
Internet. Full access to the online service (including access to
14. Similarly, Internet resources and access are sufficiently the Internet) can be obtained for modest monthly or hourly
important to many corporations and other employers that those fees. The major commercial online services have almost twelve
employers link their office computer networks *833 to the million individual subscribers across the United States.
Internet and provide employees with direct or modem access
to the office network (and thus to the Internet). Such access 20. In addition to using the national commercial online
might be used by, for example, a corporation involved in services, individuals can also access the Internet using some
scientific or medical research or manufacturing to enable (but not all) of the thousands of local dial-in computer services,
corporate employees to exchange information and ideas with often called "bulletin board systems" or "BBSs." With an
academic researchers in their fields. investment of as little as $2,000.00 and the cost of a telephone
line, individuals, non-profit organizations, advocacy groups,
15. Those who lack access to the Internet through their schools and businesses can offer their own dial-in computer "bulletin
or employers still have a variety of ways they can access the board" service where friends, members, subscribers, or
Internet. Many communities across the country have customers can exchange ideas and information. BBSs range
established "free-nets" or community networks to provide their from single computers with only one telephone line into the
citizens with a local link to the Internet (and to provide local- computer (allowing only one user at a time), to single
oriented content and discussion groups). The first such computers with many telephone lines into the computer
community network, the Cleveland Free-Net Community (allowing multiple simultaneous *834 users), to multiple linked
Computer System, was established in 1986, and free-nets now computers each servicing multiple dial-in telephone lines
exist in scores of communities as diverse as Richmond, (allowing multiple simultaneous users). Some (but not all) of
Virginia, Tallahassee, Florida, Seattle, Washington, and San these BBS systems offer direct or indirect links to the Internet.
Diego, California. Individuals typically can access free-nets at Some BBS systems charge users a nominal fee for access,
little or no cost via modem connection or by using computers while many others are free to the individual users.
available in community buildings. Free-nets are often operated
by a local library, educational institution, or non-profit 21. Although commercial access to the Internet is growing
community group. rapidly, many users of the Internet such as college students
and staff do not individually pay for access (except to the
16. Individuals can also access the Internet through many local extent, for example, that the cost of computer services is a
libraries. Libraries often offer patrons use of computers that are component of college tuition). These and other Internet users
linked to the Internet. In addition, some libraries offer telephone can access the Internet without paying for such access with a
modem access to the libraries' computers, which are credit card or other form of payment.
themselves connected to the Internet. Increasingly, patrons
now use library services and resources without ever physically
entering the library itself. Libraries typically provide such direct Methods to Communicate Over the Internet
or modem access at no cost to the individual user.
22. Once one has access to the Internet, there are a wide
17. Individuals can also access the Internet by patronizing an variety of different methods of communication and information
increasing number of storefront "computer coffee shops," exchange over the network. These many methods of
where customers while they drink their coffee can use communication and information retrieval are constantly
computers provided by the shop to access the Internet. Such evolving and are therefore difficult to categorize concisely. The
Internet access is typically provided by the shop for a small most common methods of communications on the Internet (as
hourly fee. well as within the major online services) can be roughly
grouped into six categories:
18. Individuals can also access the Internet through
commercial and non-commercial "Internet service providers"
that typically offer modem telephone access to a computer or (1) one-to-one messaging (such as "e-mail"),
computer network linked to the Internet. Many such providers
including the members of plaintiff Commercial Internet
(2) one-to-many messaging (such as "list-serv"),
Exchange Association are commercial entities offering Internet
access for a monthly or hourly fee. Some Internet service
providers, however, are non-profit organizations that offer free (3) distributed message databases (such as "USENET
or very low cost access to the Internet. For example, the newsgroups"),
International Internet Association offers free modem access to
the Internet upon request. Also, a number of trade or other (4) real time communication (such as "Internet Relay Chat"),
non-profit associations offer Internet access as a service to
members.
(5) real time remote computer utilization (such as "telnet"), and
19. Another common way for individuals to access the Internet
is through one of the major national commercial "online (6) remote information retrieval (such as "ftp," "gopher," and
services" such as America Online, CompuServe, the Microsoft the "World Wide Web").
Network, or Prodigy. These online services offer nationwide
computer networks (so that subscribers can dial-in to a local Most of these methods of communication can be used to
telephone number), and the services provide extensive and transmit text, data, computer programs, sound, visual images
well organized content within their own proprietary computer (i.e., pictures), and moving video images.

27
23. One-to-one messaging. One method of communication on 26. There are newsgroups on more than fifteen thousand
the Internet is via electronic mail, or "e-mail," comparable in different subjects. In 1994, approximately 70,000 messages
principle to sending a first class letter. One can address and were posted to newsgroups each day, and those messages
transmit a message to one or more other people. E-mail on the were distributed to the approximately 190,000 computers or
Internet is not routed through a central control point, and can computer networks that participate in the USENET newsgroup
take many and varying paths to the recipients. Unlike postal system. Once the messages reach the approximately 190,000
mail, simple e-mail generally is not "sealed" or secure, and can receiving computers or computer networks, they are available
be accessed or viewed on intermediate computers between the to individual users of those computers or computer networks.
sender and recipient (unless the message is encrypted). Collectively, almost 100,000 new messages (or "articles") are
posted to newsgroups each day.
24. One-to-many messaging. The Internet also contains
automatic mailing list services (such as "listservs"), [also 27. Real time communication. In addition to transmitting
referred to by witnesses as "mail exploders"] that allow messages that can be later read or accessed, individuals on
communications about particular subjects of interest to a group the Internet can engage in an immediate dialog, in "real time",
of people. For example, people can subscribe to a "listserv" with other people on the Internet. In its simplest forms, "talk"
mailing list on a particular topic of interest to them. The allows one-to-one communications and "Internet Relay Chat"
subscriber can submit messages on the topic to the listserv (or IRC) allows two or more to type messages to each other
that are forwarded (via e-mail), either automatically or through that almost immediately appear on the others' computer
a human moderator overseeing the listserv, to anyone who has screens. IRC is analogous to a telephone party line, using a
subscribed to the mailing list. A recipient of such a message computer and keyboard rather than a telephone. With IRC,
can reply to the message and have the reply also distributed to however, at any one time there are thousands of different party
everyone on the mailing list. This service provides the lines available, in which collectively tens of thousands of users
capability to keep abreast of developments or events in a are engaging in conversations on a huge range of subjects.
particular subject area. Most listserv-type mailing lists Moreover, one can create a new party line to discuss a
automatically forward all incoming messages to all mailing list different topic at any time. Some IRC conversations are
subscribers. There are thousands of such mailing list services "moderated" or include "channel operators."
on the Internet, collectively with hundreds of thousands of
subscribers. Users of "open" listservs typically can add or 28. In addition, commercial online services such as America
remove their names from the mailing list automatically, with no Online, CompuServe, the Microsoft Network, and Prodigy have
direct human involvement. Listservs may also be their own "chat" systems allowing their members to converse.
"closed," i.e., only allowing for one's acceptance into the
listserv by a human moderator.
29. Real time remote computer utilization. Another method to
use information on the Internet is to access and control remote
25. Distributed message databases. Similar in function to computers in "real time" using "telnet." For example, using
listservs but quite different in how communications are telnet, a researcher at a university would be able to use the
transmitted are distributed message databases such as computing power of a supercomputer located at a different
"USENET newsgroups." User-sponsored newsgroups are university. A student can use telnet to connect to a remote
among the most popular and widespread applications of library to access the library's online card catalog program.
Internet services, and cover all imaginable topics of interest to
users. Like listservs, newsgroups are open discussions and
exchanges on particular topics. Users, however, need not 30. Remote information retrieval. The final major category of
subscribe to the discussion mailing list in advance, but communication may be the most well known use of the Internet
can *835 instead access the database at any time. Some the search for and retrieval of information located on remote
USENET newsgroups are "moderated" but most are open computers. There are three primary methods to locate and
access. For the moderated newsgroups,[10] all messages to the retrieve information on the Internet.
newsgroup are forwarded to one person who can screen them
for relevance to the topics under discussion. USENET 31. A simple method uses "ftp" (or file transfer protocol) to list
newsgroups are disseminated using ad hoc, peer to peer the names of computer files available on a remote computer,
connections between approximately 200,000 computers (called and to transfer one or more of those files to an individual's local
USENET "servers") around the world. For unmoderated computer.
newsgroups, when an individual user with access to a
USENET server posts a message to a newsgroup, the 32. Another approach uses a program and format named
message is automatically forwarded to all adjacent USENET "gopher" to guide an individual's *836 search through the
servers that furnish access to the newsgroup, and it is then resources available on a remote computer.
propagated to the servers adjacent to those servers, etc. The
messages are temporarily stored on each receiving server,
where they are available for review and response by individual
users. The messages are automatically and periodically purged The World Wide Web
from each system after a time to make room for new
messages. Responses to messages, like the original 33. A third approach, and fast becoming the most well-known
messages, are automatically distributed to all other computers on the Internet, is the "World Wide Web." The Web utilizes a
receiving the newsgroup or forwarded to a moderator in the "hypertext" formatting language called hypertext markup
case of a moderated newsgroup. The dissemination of language (HTML), and programs that "browse" the Web can
messages to USENET servers around the world is an display HTML documents containing text, images, sound,
automated process that does not require direct human animation and moving video. Any HTML document can include
intervention or review. links to other types of information or resources, so that while
viewing an HTML document that, for example, describes
resources available on the Internet, one can "click" using a

28
computer mouse on the description of the resource and be 39. Each of these links takes the user of the site from the
immediately connected to the resource itself. Such "hyperlinks" beginning of the Findings to the appropriate section within this
allow information to be accessed and organized in very flexible Adjudication. Links may also take the user from the original
ways, and allow people to locate and efficiently view related Web site to another Web site on another computer connected
information even if the information is stored on numerous to the Internet. These links from one computer to another, from
computers all around the world. one document to another across the *837 Internet, are what
unify the Web into a single body of knowledge, and what
34. Purpose. The World Wide Web (W3C) was created to makes the Web unique. The Web was designed with a
serve as the platform for a global, online store of knowledge, maximum target time to follow a link of one tenth of a second.
containing information from a diversity of sources and
accessible to Internet users around the world. Though 40. Publishing. The World Wide Web exists fundamentally as a
information on the Web is contained in individual computers, platform through which people and organizations can
the fact that each of these computers is connected to the communicate through shared information. When information is
Internet through W3C protocols allows all of the information to made available, it is said to be "published" on the Web.
become part of a single body of knowledge. It is currently the Publishing on the Web simply requires that the "publisher" has
most advanced information system developed on the Internet, a computer connected to the Internet and that the computer is
and embraces within its data model most information in running W3C server software. The computer can be as simple
previous networked information systems such as ftp, gopher, as a small personal computer costing less than $1500 dollars
wais, and Usenet. or as complex as a multi-million dollar mainframe computer.
Many Web publishers choose instead to lease disk storage
35. History. W3C was originally developed at CERN, the space from someone else who has the necessary computer
European Particle Physics Laboratory, and was initially used to facilities, eliminating the need for actually owning any
allow information sharing within internationally dispersed teams equipment oneself.
of researchers and engineers. Originally aimed at the High
Energy Physics community, it has spread to other areas and 41. The Web, as a universe of network accessible information,
attracted much interest in user support, resource recovery, and contains a variety of documents prepared with quite varying
many other areas which depend on collaborative and degrees of care, from the hastily typed idea, to the
information sharing. The Web has extended beyond the professionally executed corporate profile. The power of the
scientific and academic community to include communications Web stems from the ability of a link to point to any document,
by individuals, non-profit organizations, and businesses. regardless of its status or physical location.

36. Basic Operation. The World Wide Web is a series of 42. Information to be published on the Web must also be
documents stored in different computers all over the Internet. formatted according to the rules of the Web standards. These
Documents contain information stored in a variety of formats, standardized formats assure that all Web users who want to
including text, still images, sounds, and video. An essential read the material will be able to view it. Web standards are
element of the Web is that any document has an address sophisticated and flexible enough that they have grown to meet
(rather like a telephone number). Most Web documents contain the publishing needs of many large corporations, banks,
"links." These are short sections of text or image which refer to brokerage houses, newspapers and magazines which now
another document. Typically the linked text is blue or publish "online" editions of their material, as well as
underlined when displayed, and when selected by the user, the government agencies, and even courts, which use the Web to
referenced document is automatically displayed, wherever in disseminate information to the public. At the same time, Web
the world it actually is stored. Links for example are used to publishing is simple enough that thousands of individual users
lead from overview documents to more detailed documents, and small community organizations are using the Web to
from tables of contents to particular pages, but also as cross- publish their own personal "home pages," the equivalent of
references, footnotes, and new forms of information structure. individualized newsletters about that person or organization,
which are available to everyone on the Web.
37. Many organizations now have "home pages" on the Web.
These are documents which provide a set of links designed to 43. Web publishers have a choice to make their Web sites
represent the organization, and through links from the home open to the general pool of all Internet users, or close them,
page, guide the user directly or indirectly to information about thus making the information accessible only to those with
or relevant to that organization. advance authorization. Many publishers choose to keep their
sites open to all in order to give their information the widest
38. As an example of the use of links, if these Findings were to potential audience. In the event that the publishers choose to
be put on a World Wide Web site, its home page might contain maintain restrictions on access, this may be accomplished by
links such as those: assigning specific user names and passwords as a prerequisite
to access to the site. Or, in the case of Web sites maintained
for internal use of one organization, access will only be allowed
* THE NATURE OF CYBERSPACE from other computers within that organization's local
network.[11]
* CREATION OF THE INTERNET AND THE DEVELOPMENT
OF CYBERSPACE 44. Searching the Web. A variety of systems have developed
that allow users of the Web to search particular information
* HOW PEOPLE ACCESS THE INTERNET among all of the public sites that are part of the Web. Services
such as Yahoo, Magellan, Altavista, Webcrawler, and Lycos
* METHODS TO COMMUNICATE OVER THE INTERNET are all services known as "search engines" which allow users
to search for Web sites that contain certain categories of
information, or to search for key words. For example, a Web

29
user looking for the text of Supreme Court opinions would type some parents may consider inappropriate for their children,
the words "Supreme Court" into a search engine, and then be various entities have begun to build systems intended to
presented with a list of World Wide Web sites that contain enable parents to control the material which comes into their
Supreme Court information. This list would actually be a series homes and may be accessible to their children. The World
of links to those sites. Having searched out a number of sites Wide Web Consortium launched the PICS ("Platform for
that might contain the desired information, the user would then Internet Content Selection") program in order to develop
follow individual links, browsing through the information on technical standards that would support parents' ability to filter
each site, until the desired material is found. For many content and screen material that their children see on the Web.
providers on the Web, the ability to be found by these search
engines is very important. 50. The Consortium intends that PICS will provide the ability for
third parties, as well as individual content providers, to rate
45. Common standards. The Web links together disparate content on the Internet in a variety of ways. When fully
information on an evergrowing number of Internet-linked implemented, PICS-compatible World Wide Web browsers,
computers by setting common information storage formats Usenet News Group readers, and other Internet applications,
(HTML) and a common language for the exchange of Web will provide parents the ability to choose from a variety of rating
documents (HTTP). *838 Although the information itself may services, or a combination of services.
be in many different formats, and stored on computers which
are not otherwise compatible, the basic Web standards provide 51. PICS working group [PICS-WG] participants include many
a basic set of standards which allow communication and of the major online services providers, commercial internet
exchange of information. Despite the fact that many types of access providers, hardware and software companies, major
computers are used on the Web, and the fact that many of internet content providers, and *839 consumer organizations.
these machines are otherwise incompatible, those who Among active participants in the PICS effort are:
"publish" information on the Web are able to communicate with
those who seek to access information with little difficulty
because of these basic technical standards.
Adobe Systems, Inc.
46. A distributed system with no centralized control. Running
on tens of thousands of individual computers on the Internet, Apple Computer
the Web is what is known as a distributed system. The Web
was designed so that organizations with computers containing America Online
information can become part of the Web simply by attaching
their computers to the Internet and running appropriate World
Wide Web software. No single organization controls any AT & T
membership in the Web, nor is there any single centralized
point from which individual Web sites or services can be Center for Democracy and Technology
blocked from the Web. From a user's perspective, it may
appear to be a single, integrated system, but in reality it has no
centralized control point. CompuServe

47. Contrast to closed databases. The Web's open, distributed, Delphi Internet Services
decentralized nature stands in sharp contrast to most
information systems that have come before it. Private Digital Equipment Corporation
information services such as Westlaw, Lexis/Nexis, and Dialog,
have contained large storehouses of knowledge, and can be
accessed from the Internet with the appropriate passwords and IBM
access software. However, these databases are not linked
together into a single whole, as is the World Wide Web. First floor

48. Success of the Web in research, education, and political


First Virtual Holdings Incorporated
activities. The World Wide Web has become so popular
because of its open, distributed, and easy-to-use nature.
Rather than requiring those who seek information to purchase France Telecom
new software or hardware, and to learn a new kind of system
for each new database of information they seek to access, the FTP Software
Web environment makes it easy for users to jump from one set
of information to another. By the same token, the open nature
of the Web makes it easy for publishers to reach their intended Industrial Technology Research Institute of Taiwan
audiences without having to know in advance what kind of
computer each potential reader has, and what kind of software Information Technology Association of America
they will be using.

Institut National de Recherche en Informatique et en


Automatique (INRIA)
Restricting Access to Unwanted On-Line Material[12]
PICS
Interactive Services Association
49. With the rapid growth of the Internet, the increasing
popularity of the Web, and the existence of material online that MCI

30
Microsoft Software

MIT/LCS/World Wide Web Consortium 54. For over a year, various companies have marketed stand
alone software that is intended to enable parents and other
adults to limit the Internet access of children. Examples of such
NCD software include: Cyber Patrol, CYBERsitter, The Internet
Filter, Net Nanny, Parental Guidance, SurfWatch, Netscape
NEC Proxy Server, and WebTrack. The market for this type of
software is growing, and there is increasing competition among
software providers to provide products.
Netscape Communications Corporation

NewView Cyber Patrol

O'Reilly and Associates 55. As more people, particularly children, began to use the
Internet, Microsystems Software, Inc. decided to develop and
Open Market market Internet software intended to empower parents to
exercise individual choice over what material their children
could access. Microsystems' stated intent is to develop a
Prodigy Services Company product which would give parents comfort that their children
can reap the benefits of the Internet while shielding them from
Progressive Networks objectionable or *840 otherwise inappropriate materials based
on the parents' own particular tastes and values. Microsystems'
product, Cyber Patrol, was developed to address this need.
Providence Systems/Parental Guidance
56. Cyber Patrol was first introduced in August 1995, and is
Recreational Software Advisory Council currently available in Windows and Macintosh versions. Cyber
Patrol works with both direct Internet Access providers (ISPs,
SafeSurf e.g., Netcom, PSI, UUnet), and Commercial Online Service
Providers (e.g., America Online, CompuServ, Prodigy,
Microsoft). Cyber Patrol is also compatible with all major World
SoftQuad, Inc. Wide Web browsers on the market (e.g., Netscape, Navigator,
Mosaic, Prodigy's Legacy and Skimmer browsers, America
Songline Studios Online, Netcom's NetCruiser, etc.). Cyber Patrol was the first
parental empowerment application to be compatible with the
PICS standard. In February of 1996, Microsystems put the first
Spyglass PICS ratings server on the Internet.

SurfWatch Software 57. The CyberNOT list contains approximately 7000 sites in
twelve categories. The software is designed to enable parents
to selectively block access to any or all of the twelve
Telequip Corp.
CyberNOT categories simply by checking boxes in the Cyber
Patrol Headquarters (the Cyber Patrol program manager).
Time Warner Pathfinder These categories are:

Viacom Nickelodeon[13]
Violence/Profanity: Extreme cruelty, physical or emotional acts
52. Membership in the PICS-WG includes a broad cross- against any animal or person which are primarily intended to
section of companies from the computer, communications, and hurt or inflict pain. Obscene words, phrases, and profanity
content industries, as well as trade associations and public defined as text that uses George Carlin's seven censored
interest groups. PICS technical specifications have been words more often than once every fifty messages or pages.
agreed to, allowing the Internet community to begin to deploy
products and services based on the PICS-standards. Partial Nudity: Full or partial exposure of the human anatomy
except when exposing genitalia.
53. Until a majority of sites on the Internet have been rated by
a PICS rating service, PICS will initially function as a "positive" Nudity: Any exposure of the human genitalia.
ratings system in which only those sites that have been rated
will be displayed using PICS compatible software. In other
words, PICS will initially function as a site inclusion list rather Sexual Acts (graphic or text): Pictures or text exposing anyone
than a site exclusion list. The default configuration for a PICS or anything involved in explicit sexual acts and lewd and
compatible Internet application will be to block access to all lascivious behavior, including masturbation, copulation,
sites which have not been rated by a PICS rating service, while pedophilia, intimacy and involving nude or partially nude
allowing access to sites which have a PICS rating for people in heterosexual, bisexual, lesbian or homosexual
appropriate content.[14] encounters. Also includes phone sex ads, dating services,
adult personals, CD-ROM and videos.

31
World Wide Web Server. At the end of the seven day trial
Gross Depictions (graphic or text): Pictures or descriptive text period, users are offered the opportunity to purchase the
of anyone or anything which are crudely vulgar, deficient in complete version of Cyber Patrol or provide Microsystems
civility or behavior, or showing scatological impropriety. some basic demographic information in exchange for unlimited
Includes such depictions as maiming, bloody figures, indecent use of the Home Edition. The demographic information is used
depiction of bodily functions. for marketing and research purposes. Since January of 1996,
over 10,000 demonstration copies of Cyber Patrol have been
downloaded from Microsystems' Web site.
Racism/Ethnic Impropriety: Prejudice or discrimination against
any race or ethnic culture. Ethnic or racist jokes and slurs. Any
text that elevates one race over another. 61. Cyber Patrol is also available from Retail outlets as
NetBlocker Plus. NetBlocker Plus sells for $19.95, which
includes five weeks of updates to the CyberNOT list.
Satanic/Cult: Worship of the devil; affinity for evil, wickedness.
Sects or groups that potentially coerce individuals to grow, and
keep, membership. 62. Microsystems also sells Cyber Patrol into a growing market
in schools. As more classrooms become connected to the
Internet, many teachers want to ensure that their students can
Drugs/Drug Culture: Topics dealing with the use of illegal drugs receive the benefit of the Internet without encountering material
for entertainment. This would exclude current illegal drugs they deem educationally inappropriate.
used for medicinal purposes (e.g., drugs used to treat victims
of AIDS). Includes substances used for other than their primary
purpose to alter the individual's state of mind such as glue 63. Microsystems is working with the Recreational Software
sniffing. Advisory Council (RSAC), a non-profit corporation which
developed rating systems for video games, to implement the
RSAC rating system for the Internet.
Militant/Extremist: Extremely aggressive and combative
behaviors, radicalism, advocacy of extreme political measures.
64. The next release of Cyber Patrol, expected in second
Topics include extreme political groups that advocate violence
quarter of this year, will give parents the ability to use any PICS
as a means to achieve their goal.
rating service, including the RSAC rating service, in addition to
the Microsystems CyberNOT list.
Gambling: Of or relating to lotteries, casinos, betting, numbers
games, on-line sports or financial betting including non- 65. In order to speed the implementation of PICS and
monetary dares. encourage the development of PICS-compatible Internet
applications, Microsystems maintains a server on the Internet
Questionable/Illegal: Material or activities of a dubious nature which contains its CyberNOT list. The server provides software
which may be illegal in any or all jurisdictions, such as illegal developers with access to a PICS rating service, and allows
business schemes, chain letters, software piracy, and copyright software developers to test their products' ability to interpret
infringement. standard PICS labels. Microsystems is also offering its PICS
client test program for Windows free of charge. The client
program can be used by developers of PICS rating services to
Alcohol, Beer & Wine: Material pertaining to the sale or test their services and products.
consumption of alcoholic beverages. Also includes sites and
information relating to tobacco products.
SurfWatch
58. Microsystems employs people to search the Internet for
sites containing material in these categories. Since new sites
are constantly coming online, Microsystems updates the 66. Another software product, SurfWatch, is also designed to
CyberNOT list on a weekly basis. Once installed on the home allow parents and other concerned users to filter unwanted
PC, the copy of Cyber Patrol receives automatic updates material on the Internet. SurfWatch is available for both Apple
to *841 the CyberNOT list over the Internet every seven days. Macintosh, Microsoft Windows, and Microsoft Windows 95
Operating Systems, and works with direct Internet Access
Providers (e.g., Netcom, PSI, UUnet, AT & T, and more than
59. In February of 1996, Microsystems signed a licensing 1000 other Internet Service Providers).
arrangement with CompuServe, one of the leading commercial
online services with over 4.3 million subscribers. CompuServe
provides Cyber Patrol free of charge to its subscribers. 67. The suggested retail price of Surf-Watch Software is
Microsystems the same month signed a licensing arrangement $49.95, with a street price of between $20.00 and $25.00. The
with Prodigy, another leading commercial online service with product is also available as part of CompuServe/Spry Inc.'s
over 1.4 million subscribers. Prodigy will provide Cyber Patrol Internet in a Box for Kids, which includes access to Spry's Kids
free of charge of its subscribers. only Internet service and a copy of SurfWatch. Internet in a Box
for Kids retails for approximately $30.00. The subscription
service, which updates the SurfWatch blocked site list
60. Cyber Patrol is also available directly from Microsystems automatically with new sites each month, is available for $5.95
for $49.95, which includes a six month subscription to the per month or $60.00 per year. The subscription is included as
CyberNOT blocked sites list (updated automatically once every part of the Internet in a Box for Kids program, and is also
seven days). After six months, parents can receive six months provided as a low-cost option from Internet Service Providers.
of additional updates for $19.95, or twelve months for $29.95.
Cyber Patrol Home Edition, a limited version of Cyber Patrol, is
available free of charge on the Internet. To obtain either *842 68. SurfWatch is available at over 12,000 retail locations,
version, parents download a seven day demonstration version including National stores such as Comp USA, Egghead
of the full Cyber Patrol product from the Microsystems Internet Software, Computer City, and several national mail order

32
outlets. SurfWatch can also be ordered directly from its own bulletin boards, newsgroups, and chat rooms frequently have
site on the World Wide Web, and through the Internet non-commercial goals. For the economic and technical
Shopping Network. reasons set forth in the following paragraphs, the Internet is an
especially attractive means for not-for-profit entities or public
69. Plaintiffs America Online (AOL), Microsoft Network, and interest groups to reach their desired audiences. There are
Prodigy all offer parental control options free of charge to their examples in the parties' stipulation of some of the non-
members. AOL has established an online area designed commercial uses that the Internet serves. *843 Plaintiff Human
specifically for children. The "Kids Only" parental control Rights Watch, Inc., offers information on its Internet site
feature allows parents to establish an AOL account for their regarding reported human rights abuses around the world.
children that accesses only the Kids Only channel on America Plaintiff National Writers Union provides a forum for writers on
Online.[15] issues of concern to them. Plaintiff Stop Prisoner Rape, Inc.,
posts text, graphics, and statistics regarding the incidence and
prevention of rape in prisons. Plaintiff Critical Path AIDS
70. AOL plans to incorporate PICS-compatible capability into Project, Inc., offers information on safer sex, the transmission
its standard Web browser software, and to make available to of HIV, and the treatment of AIDS.
subscribers other PICS-compatible Web browsers, such as the
Netscape software.
76. Such diversity of content on the Internet is possible
because the Internet provides an easy and inexpensive way for
71. Plaintiffs CompuServe and Prodigy give their subscribers a speaker to reach a large audience, potentially of millions. The
the option of blocking all access to the Internet, or to particular start-up and operating costs entailed by communication on the
media within their proprietary online content, such as bulletin Internet are significantly lower than those associated with use
boards and chat rooms. of other forms of mass communication, such as television,
radio, newspapers, and magazines. This enables operation of
72. Although parental control software currently can screen for their own Web sites not only by large companies, such as
certain suggestive words or for known sexually explicit sites, it Microsoft and Time Warner, but also by small, not-for-profit
cannot now screen for sexually explicit images unaccompanied groups, such as Stop Prisoner Rape and Critical Path AIDS
by suggestive text unless those who configure the software are Project. The Government's expert, Dr. Dan R. Olsen,[17] agreed
aware of the particular site. that creation of a Web site would cost between $1,000 and
$15,000, with monthly operating costs depending on one's
73. Despite its limitations, currently available user-based goals and the Web site's traffic. Commercial online services
software suggests that a reasonably effective method by which such as America Online allow subscribers to create Web pages
parents can prevent their children from accessing sexually free of charge. Any Internet user can communicate by posting
explicit and other material which parents may believe is a message to one of the thousands of newsgroups and bulletin
inappropriate for their children will soon be widely available. boards or by engaging in an on-line "chat", and thereby reach
an audience worldwide that shares an interest in a particular
topic.

Content on the Internet


77. The ease of communication through the Internet is
facilitated by the use of hypertext markup language (HTML),
74. The types of content now on the Internet defy easy which allows for the creation of "hyperlinks" or "links". HTML
classification. The entire card catalogue of the Carnegie Library enables a user to jump from one source to other related
is online, together with journals, journal abstracts, popular sources by clicking on the link. A link might take the user from
magazines, and titles of compact discs. The director of the Web site to Web site, or to other files within a particular Web
Carnegie Library, Robert Croneberger, testified that on-line site. Similarly, by typing a request into a search engine, a user
services are the emerging trend in libraries generally. Plaintiff can retrieve many different sources of content related to the
Hotwired Ventures LLC organizes its Web site into information search that the creators of the engine have collected.
regarding travel, news and commentary, arts and
entertainment, politics, and types of drinks. Plaintiff America
Online, Inc., not only creates chat rooms for a broad variety of 78. Because of the technology underlying the Internet, the
topics, but also allows members to create their own chat rooms statutory term "content provider,"[18] which is equivalent to the
to suit their own tastes. The ACLU uses an America Online traditional "speaker," may actually be a hybrid of speakers.
chat room as an unmoderated forum for people to debate civil Through the use of HTML, for example, Critical Path and Stop
liberties issues. Plaintiffs' expert, Scott Bradner, [16] estimated Prisoner Rape link their Web sites to several related
that 15,000 newsgroups exist today, and he described his own databases, and a user can immediately jump from the home
interest in a newsgroup devoted solely to Formula 1 racing pages of these organizations to the related databases simply
cars. America Online makes 15,000 bulletin boards available to by clicking on a link. America Online creates chat rooms for
its subscribers, who post between 200,000 and 250,000 particular discussions but also allows subscribers to create
messages each day. Another plaintiffs' expert, Howard their own chat rooms. Similarly, a newsgroup gathers postings
Rheingold, participates in "virtual communities" that simulate on a particular topic and distributes them to the newsgroup's
social interaction. It is no exaggeration to conclude that the subscribers. Users of the Carnegie Library can read on-line
content on the Internet is as diverse as human thought. versions of Vanity Fair and Playboy, and America Online's
subscribers can peruse the New York Times, Boating, and
other periodicals. Critical Path, Stop Prisoner Rape, America
75. The Internet is not exclusively, or even primarily, a means Online and the Carnegie Library all make available content of
of commercial communication. Many commercial entities other speakers over whom they have little or no editorial
maintain Web sites to inform potential consumers about their control.
goods and services, or to solicit purchases, but many other
Web sites exist solely for the dissemination of non-commercial
information. The other forms of Internet communication e-mail, 79. Because of the different forms of Internet communication, a
user of the Internet may speak or listen interchangeably,

33
blurring the distinction between "speakers" and "listeners" on described above in Findings 1 through 4), any network
the Internet. Chat rooms, e-mail, and newsgroups are connected to the Internet has the capacity to send and receive
interactive forms of communication, providing the user with the information to any other network. Hotwired Ventures, for
opportunity both to speak and to listen. example, cannot prevent its materials on mixology from
entering communities that have no interest in that topic.
80. It follows that unlike traditional media, the barriers to entry
as a speaker on the Internet do not differ significantly from the 87. Demonstrations at the preliminary injunction hearings
barriers to entry as a listener. Once one has entered showed that it takes several steps to enter cyberspace. At the
cyberspace, one may engage in the dialogue that occurs there. most fundamental level, a user must have access to a
In the argot of *844 the medium, the receiver can and does computer with the ability to reach the Internet (typically by way
become the content provider, and vice-versa. of a modem). A user must then direct the computer to connect
with the access provider, enter a password, and enter the
81. The Internet is therefore a unique and wholly new medium appropriate commands to find particular data. On the World
of worldwide human communication. Wide Web, a user must normally use a search engine or enter
an appropriate address. Similarly, accessing newsgroups,
bulletin boards, and chat rooms requires several steps.
Sexually Explicit Material On the Internet
88. Communications over the Internet do not "invade" an
individual's home or appear on one's computer screen
82. The parties agree that sexually explicit material exists on unbidden. Users seldom encounter content "by accident." A
the Internet. Such material includes text, pictures, and chat, document's title or a description of the document will usually
and includes bulletin boards, newsgroups, and the other forms appear before the document itself takes the step needed to
of Internet communication, and extends from the modestly view it, and in many cases the user will receive detailed
titillating to the hardest-core. information about a site's content before he or she need take
the step to access the document. Almost all sexually explicit
83. There is no evidence that sexually-oriented material is the images are preceded by warnings as to the content. Even the
primary type of content on this new medium. Purveyors of such Government's witness, Agent Howard Schmidt, Director of the
material take advantage of the same ease of access available Air *845 Force Office of Special Investigation, testified that the
to all users of the Internet, including establishment of a Web "odds are slim" that a user would come across a sexually
site. explicit site by accident.

84. Sexually explicit material is created, named, and posted in 89. Evidence adduced at the hearing showed significant
the same manner as material that is not sexually explicit. It is differences between Internet communications and
possible that a search engine can accidentally retrieve material communications received by radio or television. Although
of a sexual nature through an imprecise search, as content on the Internet is just a few clicks of a mouse away
demonstrated at the hearing. Imprecise searches may also from the user, the receipt of information on the Internet
retrieve irrelevant material that is not of a sexual nature. The requires a series of affirmative steps more deliberate and
accidental retrieval of sexually explicit material is one directed than merely turning a dial. A child requires some
manifestation of the larger phenomenon of irrelevant search sophistication and some ability to read to retrieve material and
results. thereby to use the Internet unattended.

85. Once a provider posts content on the Internet, it is available


to all other Internet users worldwide. Similarly, once a user Obstacles to Age Verification on the Internet
posts a message to a newsgroup or bulletin board, that
message becomes available to all subscribers to that 90. There is no effective way to determine the identity or the
newsgroup or bulletin board. For example, when the age of a user who is accessing material through e-mail, mail
UCR/California Museum of Photography posts to its Web site exploders, newsgroups or chat rooms. An e-mail address
nudes by Edward Weston and Robert Mapplethorpe to provides no authoritative information about the addressee, who
announce that its new exhibit will travel to Baltimore and New may use an e-mail "alias" or an anonymous remailer. There is
York City, those images are available not only in Los Angeles, also no universal or reliable listing of e-mail addresses and
Baltimore, and New York City, but also in Cincinnati, Mobile, or corresponding names or telephone numbers, and any such
Beijing wherever Internet users live. Similarly, the safer sex listing would be or rapidly become incomplete. For these
instructions that Critical Path posts to its Web site, written in reasons, there is no reliable way in many instances for a
street language so that the teenage receiver can understand sender to know if the e-mail recipient is an adult or a minor.
them, are available not just in Philadelphia, but also in Provo The difficulty of e-mail age verification is compounded for mail
and Prague. A chat room organized by the ACLU to discuss exploders such as listservs, which automatically send
the United States Supreme Court's decision in FCC v. Pacifica information to all e-mail addresses on a sender's list.
Foundation would transmit George Carlin's seven dirty words Government expert Dr. Olsen agreed that no current
to anyone who enters. Messages posted to a newsgroup technology could give a speaker assurance that only adults
dedicated to the Oklahoma City bombing travel to all were listed in a particular mail exploder's mailing list.
subscribers to that newsgroup.
91. Because of similar technological difficulties, individuals
86. Once a provider posts its content on the Internet, it cannot posting a message to a newsgroup or engaging in chat room
prevent that content from entering any community. Unlike the discussions cannot ensure that all readers are adults, and Dr.
newspaper, broadcast station, or cable system, Internet Olsen agreed. Although some newsgroups are moderated, the
technology necessarily gives a speaker a potential worldwide moderator's control is limited to what is posted and the
audience. Because the Internet is a network of networks (as moderator cannot control who receives the messages.

34
92. The Government offered no evidence that there is a There was testimony by several witnesses that Visa and
reliable way to ensure that recipients and participants in such Mastercard are in the process of developing means of credit
fora can be screened for age. The Government presented no card verification over the Internet.
evidence demonstrating the feasibility of its suggestion that
chat rooms, newsgroups and other fora that contain material 98. Verification by credit card, if and when operational, will
deemed indecent could be effectively segregated to "adult" or remain economically and practically unavailable for many of
"moderated" areas of cyberspace. the non-commercial plaintiffs in these actions. The
Government's expert "suspect[ed]" that verification agencies
93. Even if it were technologically feasible to block minors' would decline to process a card unless it accompanied a
access to newsgroups and similar fora, there is no method by commercial transaction. There was no evidence to the
which the creators of newsgroups which contain discussions of contrary.
art, politics or any other subject that could potentially elicit
"indecent" contributions could limit the blocking of access by 99. There was evidence that the fee charged by verification
minors to such "indecent" material and still allow them access agencies to process a card, whether for a purchase or not, will
to the remaining content, even if the overwhelming majority of preclude use of the credit-card verification defense by many
that content was not indecent. non-profit, non-commercial Web sites, and there was no
evidence to the contrary. Plaintiffs' witness Patricia Nell
94. Likewise, participants in MUDs (Multi-User Dungeons) and Warren, an author whose free Web site allows users to
MUSEs (Multi-User Simulation Environments) do not know purchase gay and lesbian literature, testified that she must pay
whether the other participants are adults or minors. Although $1 per verification to a verification agency. Her Web site can
MUDs and MUSEs require a password for permanent absorb this cost because it arises in connection with the sale of
participants, they need not give their real name nor verify their books available there.
age, and there is no current technology to enable the
administrator of these fantasy worlds to know if the participant 100. Using credit card possession as a surrogate for age, and
is an adult or a minor. requiring use of a credit card to enter a site, would impose a
significant economic cost on non-commercial entities. Critical
95. Unlike other forms of communication on the Internet, there Path, for example, received 3,300 hits daily from February 4
is technology by which an operator of a World Wide Web through March 4, 1996. If Critical Path must pay a fee every
server may interrogate a user of a Web site. An HTML time a user initially enters its site, then, to provide free access
document can include a fill-in-the-blank "form" to request to its non-commercial site, it would incur a monthly cost far
information from a visitor to a Web site, and this information beyond its modest resources. The ACLU's Barry Steinhardt
can be transmitted back to the Web server and be processed testified that maintenance of a credit card verification system
by a computer program, usually a Common Gateway Interface for all visitors to the ACLU's Web site would require it to shut
(cgi) script. The Web server could then grant or deny access to down its Web site because the projected cost would exceed its
the information sought. The cgi script is the means by which a budget.
Web site can process a fill-in form and thereby screen visitors
by requesting a credit card number or adult password. 101. Credit card verification would significantly delay the
retrieval of information on the Internet. Dr. Olsen, the expert
96. Content providers who publish on the World Wide Web via testifying for the Government, agreed that even "a minute is
one of the large commercial online services, such as America [an] absolutely unreasonable [delay] ... [P]eople will not put up
Online or CompuServe, could not use an online age verification with a minute." Plaintiffs' expert Donna Hoffman similarly
system that requires cgi *846 script because the server testified that excessive delay disrupts the "flow" on the Internet
software of these online services available to subscribers and stifles both "hedonistic" and "goal-directed" browsing.
cannot process cgi scripts. There is no method currently
available for Web page publishers who lack access to cgi 102. Imposition of a credit card requirement would completely
scripts to screen recipients online for age. bar adults who do not have a credit card and lack the
resources to obtain one from accessing any blocked material.
At this time, credit card verification is effectively unavailable to
The Practicalities of the Proffered Defenses a substantial number of Internet content providers as a
potential defense to the CDA.
Note: The Government contends the CDA makes available
three potential defenses to all content providers on the Internet:
credit card verification, adult verification by password or adult Adult Verification by Password
identification number, and "tagging".
103. The Government offered very limited evidence regarding
the operation of existing age verification systems, and the
Credit Card Verification evidence offered was not based on personal knowledge.
AdultCheck and Verify, existing systems which appear to be
97. Verification[19] of a credit card number over the Internet is used for accessing *847 commercial pornographic sites,
not now technically possible. Witnesses testified that neither charge users for their services. Dr. Olsen admitted that his
Visa nor Mastercard considers the Internet to be sufficiently knowledge of these services was derived primarily from
secure under the current technology to process transactions in reading the advertisements on their Web pages. He had not
that manner. Although users can and do purchase products interviewed any employees of these entities, had not
over the Internet by transmitting their credit card number, the personally used these systems, had no idea how many people
seller must then process the transaction with Visa or are registered with them, and could not testify to the reliability
Mastercard offline using phone lines in the traditional way. of their attempt at age verification.

35
104. At least some, if not almost all, non-commercial Path, to review all of its material because it has only one full
organizations, such as the ACLU, Stop Prisoner Rape or and one part-time employee.
Critical Path AIDS Project, regard charging listeners to access
their speech as contrary to their goals of making their materials 111. The task of screening and tagging cannot be done simply
available to a wide audience free of charge. by using software which screens for certain words, as Dr.
Olsen acknowledged, and we find that determinations as to
105. It would not be feasible for many non-commercial what is indecent require human judgment.
organizations to design their own adult access code screening
systems because the administrative burden of creating and 112. In lieu of reviewing each file individually, a content
maintaining a screening system and the ongoing costs involved provider could tag its entire site but this would prevent minors
is beyond their reach. There was testimony that the costs from accessing *848 much material that is not "indecent" under
would be prohibitive even for a commercial entity such as the CDA.
HotWired, the online version of Wired magazine.
113. To be effective, a scheme such as the -L18 proposal
106. There is evidence suggesting that adult users, particularly would require a worldwide consensus among speakers to use
casual Web browsers, would be discouraged from retrieving the same tag to label "indecent" material. There is currently no
information that required use of a credit card or password. such consensus, and no Internet speaker currently labels its
Andrew Anker testified that HotWired has received many speech with the -L18 code or with any other widely-recognized
complaints from its members about HotWired's registration label.
system, which requires only that a member supply a name, e-
mail address and self-created password. There is concern by
commercial content providers that age verification 114. Tagging also assumes the existence of software that
requirements would decrease advertising and revenue recognizes the tags and takes appropriate action when it notes
because advertisers depend on a demonstration that the sites tagged speech. Neither commercial Web browsers nor user-
are widely available and frequently visited. based screening software is currently configured to block a -
L18 code. Until such software exists, all speech on the Internet
will continue to travel to whomever requests it, without
107. Even if credit card verification or adult password hindrance. Labelling speech has no effect in itself on the
verification were implemented, the Government presented no transmission (or not) of that speech. Neither plaintiffs nor the
testimony as to how such systems could ensure that the user Government suggest that tagging alone would shield minors
of the password or credit card is in fact over 18. The burdens from speech or insulate a speaker from criminal liability under
imposed by credit card verification and adult password the CDA. It follows that all speech on any topic that is available
verification systems make them effectively unavailable to a to adults will also be available to children using the Internet
substantial number of Internet content providers. (unless it is blocked by screening software running on the
computer the child is using).

The Government's "Tagging" Proposal 115. There is no way that a speaker can use current
technology to know if a listener is using screening software.
108. The feasibility and effectiveness of "tagging" to restrict
children from accessing "indecent" speech, as proposed by the 116. Tags can not currently activate or deactivate themselves
Government has not been established. "Tagging" would depending on the age or location of the receiver. Critical Path,
require content providers to label all of their "indecent" or which posts on-line safer sex instructions, would be unable to
"patently offensive" material by imbedding a string of imbed tags that block its speech only in communities where it
characters, such as "XXX," in either the URL or HTML. If a may be regarded as indecent. Critical Path, for example, must
user could install software on his or her computer to recognize choose either to tag its site (blocking its speech in all
the "XXX" tag, the user could screen out any content with that communities) or not to tag, blocking its speech in none.
tag. Dr. Olsen proposed a "-L18" tag, an idea he developed for
this hearing in response to Mr. Bradner's earlier testimony that
certain tagging would not be feasible.
The Problems of Offshore Content and Caching
109. The parties appear to agree that it is technologically
feasible "trivial", in the words of plaintiffs' expert to imbed tags 117. A large percentage, perhaps 40% or more, of content on
in URLs and HTML, and the technology of tagging underlies the Internet originates outside the United States. At the
both plaintiffs' PICS proposal and the Government's "-L18" hearing, a witness demonstrated how an Internet user could
proposal. access a Web site of London (which presumably is on a server
in England), and then link to other sites of interest in England.
A user can sometimes discern from a URL that content is
110. The Government's tagging proposal would require all coming from overseas, since InterNIC allows a content
content providers that post arguably "indecent" material to provider to imbed a country code in a domain name.[20] Foreign
review all of their online content, a task that would be content is otherwise indistinguishable from domestic content
extremely burdensome for organizations that provide large (as long as it is in English), since foreign speech is created,
amounts of material online which cannot afford to pay a large named, and posted in the same manner as domestic speech.
staff to review all of that material. The Carnegie Library would There is no requirement that foreign speech contain a country
be required to hire numerous additional employees to review code in its URL. It is undisputed that some foreign speech that
its online files at an extremely high cost to its limited budget. travels over the Internet is sexually explicit.
The cost and effort would be substantial for the Library and
frequently prohibitive for others. Witness Kiroshi Kuromiya
testified that it would be impossible for his organization, Critical 118. The use of "caching" makes it difficult to determine
whether the material originated from foreign or domestic

36
sources. Because of the high cost of using the trans-Atlantic
and trans-Pacific cables, and because the high demand on III.
those cables leads to bottleneck delays, content is often CONCLUSIONS OF LAW
"cached", or temporarily stored, on servers in the United
States. Material from a foreign source in Europe can travel Plaintiffs have established a reasonable probability of eventual
over the trans-Atlantic cable to the receiver in the United success in the litigation by demonstrating that §§ 223(a) (1) (B)
States, and pass through a domestic caching server which and 223(a) (2) of the CDA are unconstitutional on their face to
then stores a copy for subsequent retrieval. This domestic the extent that they reach indecency. Sections 223(d) (1) and
caching server, rather than the original foreign server, will send 223(d) (2) of the CDA are unconstitutional on their face.
the material from the cache to the subsequent receivers, Accordingly, plaintiffs have shown irreparable injury, no party
without placing a demand on the trans-oceanic cables. This has any interest in the enforcement of an unconstitutional law,
shortcut effectively eliminates most of the distance for both the and therefore the public interest will be served by granting the
request and the information and, hence, most of the delay. The preliminary injunction. Elrod v. Burns, 427 U.S. 347, 373-74, 96
caching server discards the stored information according to its S. Ct. 2673, 2689-90, 49 L. Ed. 2d 547 (1976); Hohe v.
configuration (e.g., after a certain time or as the demand for the Casey, 868 F.2d 69, 72 (3d Cir.), cert. denied, 493 U.S. 848,
information diminishes). Caching therefore advances core 110 S. Ct. 144, 107 L. Ed. 2d 102 (1989); Acierno v. New
Internet values: the cheap and speedy retrieval of information. Castle County, 40 F.3d 645, 653 (3d Cir. 1994). The motions
for preliminary injunction will therefore be granted.
119. Caching is not merely an international phenomenon.
Domestic content providers *849 store popular domestic The views of the members of the Court in support of these
material on their caching servers to avoid the delay of conclusions follow.
successive searches for the same material and to decrease the
demand on their Internet connection. America Online can
cache the home page of the New York Times on its servers SLOVITER, Chief Circuit Judge:
when a subscriber first requests it, so that subsequent
subscribers who make the same request will receive the same
home page, but from America Online's caching service rather A.
than from the New York Times's server.[21] Statutory Provisions

120. Put simply, to follow the example in the prior paragraph, As noted in Part I, Introduction, the plaintiffs' motion for a
America Online has no control over the content that the New preliminary injunction is confined to portions of two provisions
York Times posts to its Web site, and the New York Times has of the Communications Decency Act of 1996, § 223(a) and §
no control over America Online's distribution of that content 223(d), which they contend violate their First Amendment free
from a caching server. speech and Fifth Amendment due process rights. To facilitate
reference, I set forth those provisions in full. Section 223(a),
the "indecency" provision, subjects to criminal penalties of
Anonymity imprisonment of no more than two years or a fine or both
anyone who:
121. Anonymity is important to Internet users who seek to
access sensitive information, such as users of the Critical Path
AIDS Project's Web site, the users, particularly gay youth, of *850 1) in interstate or foreign communications ...
Queer Resources Directory, and users of Stop Prisoner Rape
(SPR). Many members of SPR's mailing list have asked to (B) by means of a telecommunications device knowingly
remain anonymous due to the stigma of prisoner rape.
(i) makes, creates, or solicits, and
Plaintiffs' Choices Under the CDA
(ii) initiates the transmission of, any comment, request,
suggestion, proposal, image, or other communication which is
122. Many speakers who display arguably indecent content on
obscene or indecent, knowing that the recipient of the
the Internet must choose between silence and the risk of
communication is under 18 years of age, regardless of whether
prosecution. The CDA's defenses credit card verification, adult
the maker of such communication placed the call or initiated
access codes, and adult personal identification numbers are
the communication; ...
effectively unavailable for non-commercial, not-for-profit
entities.
(2) knowingly permits any telecommunications facility under his
123. The plaintiffs in this action are businesses, libraries, non- control to be used for any activity prohibited by paragraph (1)
with the intent that it be used for such activity.
commercial and not-for-profit organizations, and educational
societies and consortia. Although some of the material that
plaintiffs post online such as information regarding protection (emphasis added).
from AIDS, birth control or prison rape is sexually explicit and
may be considered "indecent" or "patently offensive" in some The term "telecommunications device" is specifically defined
communities, none of the plaintiffs is a commercial purveyor of not to include "the use of an interactive computer service," as
what is commonly termed "pornography." that is covered by section 223(d) (1).

Section 223(d), the "patently offensive" provision, subjects to


criminal penalties anyone who:

37
To obtain a preliminary injunction, plaintiffs must establish that
(1) in interstate or foreign communications knowingly they are likely to prevail on the merits and that they will suffer
irreparable harm if injunctive relief is not granted. We also must
consider whether the potential harm to the defendant from
(A) uses an interactive computer service to send to a specific
issuance of a temporary restraining order outweighs possible
person or persons under 18 years of age, or
harm to the plaintiffs if such relief is denied, and whether the
granting of injunctive relief is in the public
(B) uses any interactive computer service to display in a interest. See Campbell Soup Co. v. ConAgra, Inc., 977 F.2d
manner available to a person under 18 years of age, any 86, 90-91 (3d Cir.1992); Bradley v. Pittsburgh Bd. of
comment, request, suggestion, proposal, image or other Educ., 910 F.2d 1172, 1175 (3d Cir.1990).
communication that, in context, depicts or describes, in terms
patently offensive as measured by contemporary community In a case in which the injury alleged is a threat to First
standards, sexual or excretory activities or organs, regardless Amendment interests, the finding of irreparable injury is often
of whether the use of such service placed the call or initiated tied to the likelihood of success on the merits. In Elrod v.
the communication; or Burns, 427 U.S. 347, 96 S. Ct. 2673, 49 L. Ed. 2d 547 (1976),
the Supreme Court emphasized that "the loss of First
(2) knowingly permits any telecommunications facility under Amendment freedoms, for even minimal periods of time,
such person's control to be used for an activity prohibited by unquestionably constitutes irreparable injury." Id. at 373, 96 S.
paragraph (1) with the intent that it be used for such activity. Ct. at 2690 (citing New York Times Co. v. United States, 403
U.S. 713, 91 S. Ct. 2140, 29 L. Ed. 2d 822 (1971)).
(emphasis added).
Subjecting speakers to criminal penalties for speech that is
constitutionally protected in itself raises the spectre of
Two aspects of these provisions stand out. First, we are
irreparable harm. Even if a court were unwilling to draw that
dealing with criminal provisions, subjecting violators to
conclusion from the language of the statute itself, plaintiffs
substantial penalties. Second, the provisions on indecent and
have introduced ample evidence that the challenged
patently offensive communications are not parallel.
provisions, if not enjoined, will have a chilling effect on their
free expression. Thus, this is not a case in which we are
The government uses the term "indecent" interchangeably with dealing with a mere incidental inhibition on speech, see Hohe
"patently offensive" and advises that it so construes the statute v. Casey, 868 F.2d 69, 73 (3d Cir.), cert. denied, 493 U.S. 848,
in light of the legislative history and the Supreme Court's 110 S. Ct. 144, 107 L. Ed. 2d 102 (1989), but with a regulation
analysis of the word "indecent" in FCC v. Pacifica that directly penalizes speech.
Foundation, 438 U.S. 726, 98 S. Ct. 3026, 57 L. Ed. 2d 1073
(1978). However, the CDA does not define "indecent."
Nor could there be any dispute about the public interest factor
Notwithstanding Congress' familiarity with Pacifica, it enacted §
which must be taken into account before a court grants a
223(a), covering "indecent" communications, without any
preliminary injunction. No long string of citations is necessary
language confining "indecent" to descriptions or depictions of
to find that the public interest weighs in favor of having access
"sexual or excretory activities or organs," language it included
to a free flow of constitutionally protected speech. See,
in the reference to "patently offensive" in § 223(d) (1) (B). Nor
e.g., Turner Broadcasting System, Inc. v. FCC, ___ U.S. ___,
does § 223(a) contain the phrase "in context," which the
___, 114 S. Ct. 2445, 2458, 129 L. Ed. 2d 497 (1994); Virginia
government believes is relevant.
Bd. of Pharmacy v. Virginia Citizens Consumer Council, 425
U.S. 748, 763-65, 96 S. Ct. 1817, 1826-27, 48 L. Ed. 2d 346
The failure to define "indecent" in § 223(a) is thus arguably a (1976).
negative pregnant and subject to "the rule of construction that
an express statutory requirement here, contrasted with
Thus, if plaintiffs have shown a likelihood of success on the
statutory silence there, shows an intent to confine the
requirement to the specified instance." Field v. Mans, ___ U.S. merits, they will have shown the irreparable injury needed to
entitle them to a preliminary injunction.
___, ___, 116 S. Ct. 437, 442, 133 L. Ed. 2d 351 (1995). See
also Gozlon-Peretz v. United States, 498 U.S. 395, 404, 111 S.
Ct. 840, 846-47, 112 L. Ed. 2d 919 (1991) ("`[W]here Congress
includes particular language in one section of a statute but C.
omits it in another section of the same Act, it is generally Applicable Standard of Review
presumed that Congress acts intentionally and purposely in the
disparate inclusion or exclusion'") (quoting Russello v. United The CDA is patently a government-imposed content-based
States, 464 U.S. 16, 23, 104 S. Ct. 296, 300, 78 L. Ed. 2d 17 restriction on speech, and the speech at issue, whether
(1983)). denominated "indecent" or "patently offensive," is entitled to
constitutional protection. See Sable Communications of
Plaintiffs note the difference but do not press this as a basis for California, Inc. v. FCC, 492 U.S. 115, 126, 109 S. Ct. 2829,
distinguishing between the two sections in their preliminary 2836-37, 106 L. Ed. 2d 93 (1989). As such, the regulation is
injunction arguments and therefore I will also use the words subject to strict scrutiny, and will only be upheld if it is justified
interchangeably for this purpose, leaving open the issue for by a compelling government interest and if it is narrowly
consideration *851 at the final judgment stage if it becomes tailored to effectuate that interest. Sable, 492 U.S. at 126, 109
relevant. S.Ct. at 2836-37; see also Turner Broadcasting, ___ U.S. at
___, 114 S. Ct. at 2459 (1994). "[T]he benefit gained [by a
content-based restriction] must outweigh the loss of
constitutionally protected rights." Elrod v. Burns, 427 U.S. at
B.
363, 96 S. Ct. at 2685.
Preliminary Injunction Standard

38
The government's position on the applicable standard has of Jacksonville, 422 U.S. 205, 212-213, 95 S. Ct. 2268, 2274,
been less than pellucid but, despite some references to a 45 L. Ed. 2d 125 (1975) (citations omitted).
somewhat lesser burden employed in broadcasting cases, it
now appears to have conceded that it has the burden of proof In Erznoznik, the Court rejected an argument that an ordinance
to show both a compelling interest and that the statute prohibiting the display of films containing nudity at drive-in
regulates least restrictively. Tr. of Preliminary Injunction movie theatres served a compelling interest in protecting minor
Hearing at 121 (May 10, 1996). In any event, the evidence and passersby from the influence of such films. The Court held that
our Findings of Fact based thereon show that Internet the prohibition was unduly broad, and explained that "[s]peech
communication, while unique, is more akin to telephone that is neither obscene as to youths nor subject to some other
communication, at issue in Sable, than to broadcasting, at legitimate proscription cannot be suppressed solely to protect
issue in Pacifica, because, as with the telephone, an Internet the young from ideas or images that a legislative body thinks
user must act affirmatively and deliberately to unsuitable for them." 422 U.S. at 213-14, 95 S. Ct. at 2275. As
retrieve *852 specific information online. Even if a broad search Justice Scalia noted in Sable, "[t]he more pornographic what is
will, on occasion, retrieve unwanted materials, the user virtually embraced within the ... category of `indecency,' the more
always receives some warning of its content, significantly reasonable it becomes to insist upon greater assurance of
reducing the element of surprise or "assault" involved in insulation from minors." Sable, 492 U.S. at 132, 109 S. Ct. at
broadcasting. Therefore, it is highly unlikely that a very young 2840 (Scalia, J., concurring). It follows that where non-
child will be randomly "surfing" the Web and come across pornographic, albeit sexually explicit, material also falls within
"indecent" or "patently offensive" material. the sweep of the statute, the interest will not be as compelling.

Judge Dalzell's separate opinion fully explores the reasons for In part, our consideration of the government's showing of a
the differential treatment of radio and television broadcasting "compelling interest" trenches upon the vagueness issue,
for First Amendment purposes from that accorded other means discussed in detail in Judge Buckwalter's opinion but equally
of communication. It follows that to the extent the Court pertinent to First Amendment analysis. Material routinely
employed a less than strict scrutiny standard of review acceptable according to the standards of New York City, such
in Pacifica and other broadcasting cases, see, e.g., Red Lion as *853 the Broadway play Angels in America which concerns
Broadcasting Co. v. FCC, 395 U.S. 367, 89 S. Ct. 1794, 23 L. homosexuality and AIDS portrayed in graphic language, may
Ed. 2d 371 (1969), there is no reason to employ a less than be far less acceptable in smaller, less cosmopolitan
strict scrutiny standard of review in this case. communities of the United States. Yet the play garnered two
Tony Awards and a Pulitzer prize for its author, and some
uninhibited parents and teachers might deem it to be material
D. to be read or assigned to eleventh and twelfth graders. If
The Nature of the Government's Interest available on the Internet through some libraries, the text of the
play would likely be accessed in that manner by at least some
The government asserts that shielding minors from access to students, and it would also arguably fall within the scope of the
indecent materials is the compelling interest supporting the CDA.
CDA. It cites in support the statements of the Supreme Court
that "[i]t is evident beyond the need for elaboration that a There has been recent public interest in the female genital
State's interest in `safeguarding the physical and psychological mutilation routinely practiced and officially condoned in some
well-being of a minor' is `compelling,'" New York v. Ferber, 458 countries. News articles have been descriptive, and it is not
U.S. 747, 756-57, 102 S. Ct. 3348, 3354, 73 L. Ed. 2d 1113 stretching to assume that this is a subject that occupies news
(1982) (quoting Globe Newspaper Co. v. Superior Court, 457 groups and chat rooms on the Internet. We have no assurance
U.S. 596, 607, 102 S. Ct. 2613, 2620, 73 L. Ed. 2d 248 that these discussions, of obvious interest and relevance to
(1982)), and "there is a compelling interest in protecting the older teenage girls, will not be viewed as patently offensive
physical and psychological well-being of minors. This interest even in context in some communities.
extends to shielding minors from the influence of literature that
is not obscene by adult standards." Sable, 492 U.S. at 126, Other illustrations abound of non-obscene material likely to be
109 S. Ct. at 2836. It also cites the similar quotation appearing available on the Internet but subject to the CDA's criminal
in Fabulous Assoc., Inc. v. Pennsylvania Public Utility provisions. Photographs appearing in National Geographic or a
Comm'n, 896 F.2d 780, 787 (3d Cir.1990). travel magazine of the sculptures in India of couples copulating
in numerous positions, a written description of a brutal prison
Those statements were made in cases where the potential rape, or Francesco Clemente's painting
harm to children from the material was evident. Ferber involved "Labirinth," see Def.Exh. 125, all might be considered to "depict
the constitutionality of a statute which prohibited persons from or describe, in terms patently offensive as measured by
knowingly promoting sexual performances by children under 16 contemporary community standards, sexual or excretory
and distributing material depicting such activities or organs." 47 U.S.C. § 223(d) (1). But the
performances. Sable and Fabulous involved the FCC's ban on government has made no showing that it has a compelling
"dial-a-porn" (dealing by definition with pornographic telephone interest in preventing a seventeen-year-old minor from
messages). In contrast to the material at issue in those cases, accessing such images.
at least some of the material subject to coverage under the
"indecent" and "patently offensive" provisions of the CDA may By contrast, plaintiffs presented testimony that material that
contain valuable literary, artistic or educational information of could be considered indecent, such as that offered by Stop
value to older minors as well as adults. The Supreme Court Prisoner Rape or Critical Path AIDS project, may be critically
has held that "minors are entitled to a significant measure of important for certain older minors. For example, there was
First Amendment protection, and only in relatively narrow and testimony that one quarter of all new HIV infections in the
well-defined circumstances may government bar public United States is estimated to occur in young people between
dissemination of protected materials to them." Erznoznik v. City the ages of 13 and 20, an estimate the government made no

39
effort to rebut. The witnesses believed that graphic material With the possible exception of an e-mail to a known recipient,
that their organizations post on the Internet could help save most content providers cannot determine the identity and age
lives, but were concerned about the CDA's effect on their right of every user accessing their material. Considering separately
to do so. content providers that fall roughly into two categories, we have
found that no technology exists which allows those posting on
The government counters that this court should defer to the category of newsgroups, mail exploders or chat rooms to
legislative conclusions about this matter. However, where First screen for age. Speakers using those forms of communication
Amendment rights are at stake, "[d]eference to a legislative cannot control who receives the communication, and in most
finding cannot limit judicial inquiry." Sable, 492 U.S. at 129, instances are not aware of the identity of the recipients. If it is
109 S. Ct. at 2838 (quoting Landmark Communications, Inc. v. not feasible for speakers who communicate via these forms of
Virginia, 435 U.S. 829, 843, 98 S. Ct. 1535, 1544, 56 L. Ed. 2d communication to conduct age screening, they would have to
1 (1978)). "[W]hatever deference is due legislative findings reduce the level of communication to that which is appropriate
would not foreclose our independent judgment of the facts for children in order to be protected under the statute. This
bearing on an issue of constitutional law." Id. would effect a complete ban even for adults of some
expression, albeit "indecent," to which they are constitutionally
entitled, and thus would be unconstitutional under the holding
Moreover, it appears that the legislative "findings" the in Sable, 492 U.S. at 131, 109 S. Ct. at 2839.
government cites concern primarily testimony and statements
by legislators about the prevalence of obscenity, child
pornography, and sexual solicitation of children on the Internet. Even as to content providers in the other broad category, such
Similarly, at the hearings before us the government introduced as the World Wide Web, where efforts at age verification are
exhibits of sexually explicit material through the testimony of technically feasible through the use of Common Gateway
Agent Howard Schmidt, which consisted primarily of the same Interface (cgi) scripts (which enable creation of a document
type of hard-core pornographic materials (even if not that can process information provided by a Web visitor), the
technically obscene) which concerned Congress and which fill Findings of Fact show that as a practical matter, non-
the shelves of "adult" book and magazine stores. Plaintiffs commercial organizations and even many commercial
emphasize that they do not challenge the Act's restrictions on organizations using the Web would find it prohibitively
speech not protected by the First Amendment, such as expensive and burdensome to engage in the methods of age
obscenity, child pornography or harassment of children. Their verification proposed by the government, and that even if they
suit is based on their assertion, fully supported by their could attempt to age verify, there is little assurance that they
evidence and our findings, that the CDA reaches much farther. could successfully filter out minors.

I am far less confident than the government that its quotations The government attempts to circumvent this problem by
from earlier cases in the Supreme Court signify that it has seeking to limit the scope of the statute to those content
shown a compelling interest in regulating the vast range of providers who are commercial pornographers, and urges that
online material covered or potentially covered by the CDA. we do likewise in our obligation to save a congressional
Nonetheless, I acknowledge that there is certainly a compelling enactment from facial unconstitutionality wherever possible.
government interest to shield a substantial number of minors But in light of its plain language and its legislative history, the
from some of the online material that motivated Congress to CDA cannot reasonably be read as limited to commercial
enact the CDA, and do not rest my decision on the inadequacy pornographers. A court may not impose a narrowing
of the government's showing in this regard. construction on a statute unless it is "readily susceptible" to
such a construction. Virginia v. American Booksellers
Ass'n, 484 U.S. 383, 397, 108 S. Ct. 636, 645, 98 L. Ed. 2d
782 (1988). The court may not "rewrite a ... law to conform it to
*854 E. constitutional requirements." Id. Although we may prefer an
The Reach of the Statute interpretation of a statute that will preserve the constitutionality
of the statutory scheme, United States v. Clark, 445 U.S. 23,
Whatever the strength of the interest the government has 27, 100 S. Ct. 895, 899-900, 63 L. Ed. 2d 171 (1980), we do
demonstrated in preventing minors from accessing "indecent" not have license to rewrite a statute to "create distinctions
and "patently offensive" material online, if the means it has where none were intended." American Tobacco Co. v.
chosen sweeps more broadly than necessary and thereby Patterson, 456 U.S. 63, 72 n. 6, 102 S. Ct. 1534, 1539 n. 6, 71
chills the expression of adults, it has overstepped onto rights L. Ed. 2d 748 (1982); see also Consumer Party v. Davis, 778
protected by the First Amendment. Sable, 492 U.S. at 131, 109 F.2d 140, 147 (3d Cir.1985). The Court has often stated that
S. Ct. at 2839. "absent a clearly expressed legislative intention to the contrary,
[statutory] language must ordinarily be regarded as
The plaintiffs argue that the CDA violates the First Amendment conclusive." Escondido Mut. Water Co. v. La Jolla Band of
because it effectively bans a substantial category of protected Mission Indians, 466 U.S. 765, 772, 104 S. Ct. 2105, 2110,
(1984) *855 (quoting North Dakota v. United States, 460 U.S.
speech from most parts of the Internet. The government
responds that the Act does not on its face or in effect ban 300, 312, 103 S. Ct. 1095, 1102, 75 L. Ed. 2d 77 (1983)).
indecent material that is constitutionally protected for adults.
Thus one of the factual issues before us was the likely effect of It is clear from the face of the CDA and from its legislative
the CDA on the free availability of constitutionally protected history that Congress did not intend to limit its application to
material. A wealth of persuasive evidence, referred to in detail commercial purveyors of pornography. Congress
in the Findings of Fact, proved that it is either technologically unquestionably knew how to limit the statute to such entities if
impossible or economically prohibitive for many of the plaintiffs that was its intent, and in fact it did so in provisions relating to
to comply with the CDA without seriously impeding their dial-a-porn services. See 47 U.S.C. § 223(b) (2) (A)
posting of online material which adults have a constitutional (criminalizing making any indecent telephone communication
right to access. "for commercial purposes"). It placed no similar limitation in the
CDA. Moreover, the Conference Report makes clear that

40
Congress did not intend to limit the application of the statute to First, it is difficult to characterize a criminal statute that hovers
content providers such as those which make available the over each content *856 provider, like the proverbial sword of
commercial material contained in the government's exhibits, Damocles, as a narrow tailoring. Criminal prosecution, which
and confirms that Congress intended "content regulation of carries with it the risk of public obloquy as well as the expense
both commercial and non-commercial providers." Conf.Rep. at of court preparation and attorneys' fees, could itself cause
191. See also, 141 Cong. Rec. S8089 (daily ed. June 9, 1995) incalculable harm. No provider, whether an individual, non-
(Statement of Senator Exon). profit corporation, or even large publicly held corporation, is
likely to willingly subject itself to prosecution for a
The scope of the CDA is not confined to material that has a miscalculation of the prevalent community standards or for an
prurient interest or appeal, one of the hallmarks of obscenity, error in judgment as to what is indecent. A successful defense
because Congress sought to reach farther. Nor did Congress to a criminal prosecution would be small solace indeed.
include language that would define "patently offensive" or
"indecent" to exclude material of serious value. It follows that to Credit card and adult verification services are explicitly referred
narrow the statute in the manner the government urges would to as defenses in § 223(e) (5) (B) of the CDA. As is set forth
be an impermissible exercise of our limited judicial function, fully in the detailed Findings of Fact, these defenses are not
which is to review the statute as written for its compliance with technologically or economically feasible for most providers.
constitutional mandates.
The government then falls back on the affirmative defense to
I conclude inexorably from the foregoing that the CDA reaches prosecution provided in § 223(e) (5) (A) for a person who "has
speech subject to the full protection of the First Amendment, at taken, in good faith, reasonable, effective, and appropriate
least for adults.[1] In questions of the witnesses and in colloquy actions under the circumstances to restrict or prevent access
with the government attorneys, it became evident that even if by minors to a communication specified in such subsections ...
"indecent" is read as parallel to "patently offensive," the terms including any method which is feasible under available
would cover a broad range of material from contemporary technology." The government emphasizes that "effective" does
films, plays and books showing or describing sexual activities not require 100% restriction, and that this defense is "open-
(e.g., Leaving Las Vegas) to controversial contemporary art ended" and requires only reasonable efforts based on current
and photographs showing sexual organs in positions that the technology.
government conceded would be patently offensive in some
communities (e.g., a Robert Mapplethorpe photograph But, as the evidence made clear, there is no such technology
depicting a man with an erect penis). at this time. The government proffered as one option that
would constitute a valid affirmative defense under § 223(e) (5)
We have also found that there is no effective way for many (A) a "tagging" scheme conceived by Dr. Olsen in response to
Internet content providers to limit the effective reach of the this lawsuit whereby a string of characters would be imbedded
CDA to adults because there is no realistic way for many in all arguably indecent or patently offensive material. Our
providers to ascertain the age of those accessing their Findings of Fact set forth fully the reasons why we found that
materials. As a consequence, we have found that "[m]any the feasibility and effectiveness of tagging in the manner
speakers who display arguably indecent content on the Internet proposed by the government has not been established. All
must choose between silence and the risk of prosecution." parties agree that tagging alone does nothing to prevent
Such a choice, forced by sections 223(a) and (d) of the CDA, children from accessing potentially indecent material, because
strikes at the heart of speech of adults as well as minors. it depends upon the cooperation of third parties to block the
material on which the tags are embedded. Yet these third
parties, over which the content providers have no control, are
F. not subject to the CDA. I do not believe a statute is narrowly
Whether CDA is Narrowly Tailored tailored when it subjects to potential criminal penalties those
who must depend upon third parties for the effective operation
of a statutory defense.
In the face of such a patent intrusion on a substantial category
of protected speech for adults, there is some irony in
considering whether the statute is narrowly tailored or, as Most important, the government's "tagging" proposal is purely
sometimes put, whether Congress has used the least hypothetical and offers no currently operative defense to
restrictive means to achieve a compelling government Internet content providers. At this time, there is no agreed-upon
interest. See Sable, 492 U.S. at 126, 109 S. Ct. at 2836-37. It "tag" in existence, and no web browsers or user-based
would appear that the extent of the abridgement of the screening systems are now configured to block tagged
protected speech of adults that it has been shown the CDA material. Nor, significantly, has the government stipulated that
would effect is too intrusive to be outweighed by the a content provider could avoid liability simply by tagging its
government's asserted interest, whatever its strength, in material.
protecting minors from access to indecent material.
Nonetheless, the formulation of the inquiry requires that we Third, even if the technology catches up, as the government
consider the government's assertion that the statute is narrowly confidently predicts, there will still be a not insignificant burden
drafted, and I proceed to do so. attached to effecting a tagging defense, a burden one should
not have to bear in order to transmit information protected
In this case, the government relies on the statutory defenses under the constitution. For example, to effect tagging content
for its argument of narrow tailoring. There are a number of providers must review all of their material currently published
reasons why I am not persuaded that the statutory defenses online, as well as all new material they post in the future, to
can save the CDA from a conclusion of facial determine if it could be considered "patently offensive" in any
unconstitutionality. community nationwide. This would be burdensome for all
providers, but for the many not-for-profit entities which currently

41
post thousands of Web pages, this burden would be one prosecution for placing on the Internet works of serious literary
impossible to sustain. or artistic merit. That would require a broad trust indeed from a
generation of judges not far removed from the attacks on
Finally, the viability of the defenses is intricately tied to the James Joyce's Ulysses as obscene. See United States v. One
clarity of the CDA's scope. Because, like Judge Buckwalter, Book Entitled Ulysses, 72 F.2d 705 (2d Cir.1934); see
and for many of the reasons he gives, I believe that "indecent" also Book Named "John Cleland's Memoirs of a Woman of
and "patently offensive" are inherently vague, particularly in Pleasure" v. Attorney General of Mass., 383 U.S. 413, 86 S.
light of the government's inability to identify the relevant Ct. 975, 16 L. Ed. 2d 1 (1966). Even if we were to place
community by whose standards the material will be judged, I confidence in the reasonable judgment of the representatives
am not persuaded by the government that the statutory of the Department of Justice who appeared before us, the
defenses in § 223(e) provide effective protection from the Department is not a monolithic structure, and individual U.S.
unconstitutional reach of the statute. Attorneys in the various districts of the country have or appear
to exercise some independence, as reflected by the
Department's tolerance of duplicative challenges in this very
Minors would not be left without any protection from exposure case.
to patently unsuitable material on the Internet should the
challenged provisions of the CDA be preliminarily enjoined.
Vigorous enforcement of current obscenity and child But the bottom line is that the First Amendment should not be
pornography laws should suffice to address the problem interpreted to require us to entrust the protection it affords to
the *857 government identified in court and which concerned the judgment of prosecutors. Prosecutors come and go. Even
Congress. When the CDA was under consideration by federal judges are limited to life tenure. The First Amendment
Congress, the Justice Department itself communicated its view remains to give protection to future generations as well. I have
that it was not necessary because it was prosecuting online no hesitancy in concluding that it is likely that plaintiffs will
obscenity, child pornography and child solicitation under prevail on the merits of their argument that the challenged
existing laws, and would continue to do so.[2] It follows that the provisions of the CDA are facially invalid under both the First
CDA is not narrowly tailored, and the government's attempt to and Fifth Amendments.
defend it on that ground must fail.
BUCKWALTER, District Judge:

G.
Preliminary Injunction A.

When Congress decided that material unsuitable for minors I believe that plaintiffs should prevail in this litigation.
was available on the Internet, it could have chosen to assist
and support the development of technology that would enable *858 My conclusion differs in part from my original
parents, schools, and libraries to screen such material from memorandum filed in conjunction with the request for a
their end. It did not do so, and thus did not follow the example Temporary Restraining Order. As part of the expedited review
available in the print media where non-obscene but indecent (per § 561 of the CDA), and in contrast to the limited
and patently offensive books and magazines abound. Those documentation available to me at the time of the T.R.O.
responsible for minors undertake the primary obligation to hearing, we have now gathered voluminous evidence
prevent their exposure to such material. Instead, in the CDA presented by way of sworn declarations, live testimony,
Congress chose to place on the speakers the obligation of demonstrative evidence, and other exhibits.[1] Based upon our
screening the material that would possibly offend some findings of fact derived from careful consideration of that
communities. evidence, I now conclude that this statute is overbroad and
does not meet the strict scrutiny standard in Sable
Whether Congress' decision was a wise one is not at issue Communications of California, Inc. v. FCC, 492 U.S. 115, 109
here. It was unquestionably a decision that placed the CDA in S. Ct. 2829, 106 L. Ed. 2d 93 (1989).
serious conflict with our most cherished protection the right to
choose the material to which we would have access. More specifically, I now find that current technology is
inadequate to provide a safe harbor to most speakers on the
The government makes what I view as an extraordinary Internet. On this issue, I concur in Chief Judge Sloviter's
argument in its brief. It argues that blocking technology needed opinion. In addition, I continue to believe that the word
for effective parental control is not yet widespread but that it "indecent" is unconstitutionally vague, and I find that the terms
"will imminently be in place." Government's Post-hearing "in context" and "patently offensive" also are so vague as to
Memorandum at 66. It then states that if we uphold the CDA, it violate the First and Fifth Amendments.
"will likely unleash the `creative genius' of the Internet
community to find a myriad of possible solutions." I can It is, of course, correct that statutes that attempt to regulate the
imagine few arguments less likely to persuade a court to content of speech presumptively violate the First
uphold a criminal statute than one that depends on future Amendment. See e.g. R.A.V. v. City of Saint Paul, 505 U.S.
technology to cabin the reach of the statute within 377, 381, 112 S. Ct. 2538, 2541-42, 120 L. Ed. 2d 305 (1992).
constitutional bounds. That is as it should be. The prohibition against Government's
regulation of speech cannot be set forth any clearer than in the
The government makes yet another argument that troubles me. language of the First Amendment itself. I suspect, however,
It suggests that the concerns expressed by the plaintiffs and that it may come as a surprise to many people who have not
the questions posed by the court reflect an exaggerated followed the evolution of constitutional law that, by implication
supposition of how it would apply the law, and that we should, at least, the First Amendment provides that Congress shall
in effect, trust the Department of Justice to limit the CDA's make no law abridging the freedom of speech unless that law
application in a reasonable fashion that would avoid advances a compelling governmental interest.[2] Our cherished

42
freedom of speech does not cover as broad a spectrum as one The reason for such an examination is obvious. If the
may have gleaned from a simple reading of the Amendment.[3] Government is going to intrude upon the sacred ground of the
First Amendment and tell its citizens that their exercise of
First Amendment jurisprudence has developed into a study of protected speech could land them in jail, the law imposing such
intertwining standards *859 and applications, perhaps as a a penalty must clearly define the prohibited speech not only for
necessary response to our ever-evolving culture and modes of the potential offender but also for the potential
communication.[4] enforcer. Kolender, 461 U.S. 352, 103 S. Ct. 1855; Hoffman
Estates, 455 U.S. 489, 102 S. Ct. 1186; Smith v. Goguen, 415
U.S. 566, 94 S. Ct. 1242, 39 L. Ed. 2d 605 (1974); Grayned v.
Essentially, my concerns are these: above all, I believe that the City of Rockford, 408 U.S. 104, 92 S. Ct. 2294, 33 L. Ed. 2d
challenged provisions are so vague as to violate both the First 222 (1972); Winters v. New York, 333 U.S. 507, 68 S. Ct. 665,
and Fifth Amendments, and in particular that Congress' 92 L. Ed. 840 (1948).
reliance on Pacifica is misplaced. In addition, I believe that
technology as it currently exists and it bears repeating that we
are at the preliminary injunction phase only cannot provide a In dealing with issues of vagueness and due process over the
safe harbor for most speakers on the Internet, thus rendering years, the Supreme Court has enunciated many notable
the statute unconstitutional under a strict scrutiny analysis. I principles. One concern with vague laws relates to the issue of
refer to Chief Judge Sloviter's more detailed analysis of this notice. The older cases have used phrases such as "a statute
issue. which either forbids or requires the doing of an act in terms so
vague that men of common intelligence must necessarily
guess at its meaning and differ as to its application violates the
While I believe that our findings of fact clearly show that as yet first essential of due process of law," Connally v. General
no defense is technologically feasible, and while I also have Const. Co., 269 U.S. 385, 391, 46 S. Ct. 126, 127, 70 L. Ed.
found the present Act to be unconstitutionally vague, I believe it 322 (1926) (citations omitted); "it will not do to hold an average
is too early in the development of this new medium to conclude man to the peril of indictment for the unwise exercise of his ...
that other attempts to regulate protected speech within the knowledge involving so many factors of varying effect that
medium will fail a challenge. That is to say that I specifically do neither the person to decide in advance nor the jury to try him
not find that any and all statutory regulation of protected after the fact can safely and certainly judge the result," Cline v.
speech on the Internet could not survive constitutional scrutiny. Frink Dairy Co., 274 U.S. 445, 465, 47 S. Ct. 681, 687, 71 L.
Prior cases have established that government regulation to Ed. 1146 (1927); and "[n]o one may be required at peril of life,
prevent access by minors to speech protected for adults, even liberty or property to speculate as to the meaning of penal
in media considered the vanguard of our First Amendment statutes. All are entitled to be informed as to what the State
protections, like print, may withstand a constitutional commands or forbids," Lanzetta v. New Jersey, 306 U.S. 451,
challenge. See e.g. Ginsberg v. New York, 390 U.S. 629, 636, 453, 59 S. Ct. 618, 619, 83 L. Ed. 888 (1939). Second, the
88 S. Ct. 1274, 1278, 20 L. Ed. 2d 195 (1968) ("`Material which Court has said that laws must provide precise standards for
is protected for distribution to adults is not necessarily those who apply them to prevent arbitrary and discriminatory
constitutionally protected from restriction upon its enforcement, because "[w]hen the legislature fails to provide
dissemination to children.'") (quoting Bookcase Inc. v. such minimal guidelines, a criminal statute may permit `a
Broderick, 18 N.Y.2d 71, 75, 271 N.Y.S.2d 947, 952, 218 standardless sweep [that] allows policemen, prosecutors, and
N.E.2d 668, 671 (1966), appeal dismissed, sub nom Bookcase, juries to pursue their personal predilections.'" Kolender, 461
Inc. v. Leary, 385 U.S. 12, 87 S. Ct. 81, 17 L. Ed. 2d 11 U.S. at 358, 103 S. Ct. at 1858 (citing Goguen, 415 U.S. at
(1966)). It should be noted that those restrictions that have 575, 94 S.Ct. at 1248). Finally, when First Amendment
been found constitutional were sensitive to the unique qualities concerns have been implicated, a stricter standard of
of the medium at which the restriction was aimed. examination for vagueness is imperative. "[T]his court has
intimated that stricter standards of permissible statutory
vagueness may be applied to a statute having a potentially
B. inhibiting effect on speech; a man may the less be required to
act at his peril here, because the free dissemination of ideas
This statute, all parties agree, deals with protected speech, the may be the loser." Smith v. California, 361 U.S. 147, 151, 80 S.
preservation of which has been extolled by court after court in Ct. 215, 217-18, 4 L. Ed. 2d 205 (1959). See also Hoffman
case after case as the keystone, the bulwark, the very heart of Estates, 455 U.S. at 499, 102 S. Ct. at 1193-94 ("[P]erhaps the
our democracy. What is more, the CDA attempts to regulate most important factor affecting the clarity that the Constitution
protected speech through criminal sanctions, thus implicating demands of a law is whether it threatens to inhibit the exercise
not only the First but also the Fifth Amendment of our of constitutionally protected rights. If, for example, the law
Constitution. The concept of due process is every bit as interferes with the right of free speech ..., a more stringent
important to our form of government as is free speech. If free vagueness test should apply.") (citations omitted).
speech is at the heart of our democracy, then surely due
process is the very lifeblood of our body politic; for without it, A case which sums up vagueness as it relates to due process
democracy could not survive. Distilled to its essence, due as succinctly as any other is Grayned v. City of Rockford. Here
process is, of course, nothing more and nothing less than fair the court said:
play. If our citizens cannot rely on fair play in their relationship
with their government, the stature of our government as a
shining example of democracy would be greatly diminished. I It is a basic principle of due process that an enactment is void
believe that an exacting or strict scrutiny of a statute which for vagueness if its prohibitions are not clearly defined. Vague
attempts to criminalize protected speech requires a word by laws offend several important values. First, because we
word look at that statute to be sure that it clearly sets *860 forth assume that man is free to steer between lawful and unlawful
as precisely as possible what constitutes a violation of the conduct, we insist that laws give the person of ordinary
statute. intelligence a reasonable opportunity to know what is
prohibited, so that he may act accordingly. Vague laws may

43
trap the innocent by not providing fair warning. Second, if (1978) and [Sable] and "New section 223(d) (1) codifies the
arbitrary and discriminatory enforcement is to be prevented, definition of indecency from [Pacifica].... The precise contours
laws must provide explicit standards for those who apply them. of the definition of indecency have varied.... The essence of the
A vague law impermissibly delegates basic policy matters to phrase patently offensive descriptions of sexual and excretory
policemen, judges, and juries for resolution on an ad hoc and activities has remained constant, however."). Therefore, I will
subjective basis, with the attendant dangers of arbitrary and acknowledge that the term indecency is "reasonably
discriminatory application. Third, but related, where a vague susceptible" to the definition offered in the Conference
statute "abut[s] upon sensitive areas of basic First Amendment Report *862 and might therefore adopt such a narrowing
freedoms," it "operates to inhibit the exercise of [those] construction if it would thereby preserve the constitutionality of
freedoms." *861 Uncertain meanings inevitably lead citizens to the statute. See Virginia v. American Booksellers
"`steer far wider of the unlawful zone' ... than if the boundaries Association, 484 U.S. 383, 397, 108 S. Ct. 636, 645, 98 L. Ed.
of the forbidden areas were clearly marked." 2d 782 (1988); Erznoznik v. City of Jacksonville, 422 U.S. 205,
95 S. Ct. 2268, 45 L. Ed. 2d 125 (1975).
Grayned, 408 U.S. at 108-109, 92 S. Ct. at 2298-99 (citations
omitted). Accepting these terms as synonymous, however, provides no
greater help to a speaker attempting to comply with the CDA.
At the same time, in considering the vagueness issue, as the Contrary to the Government's suggestion, Pacifica does not
Government correctly points out, "[C]ondemned to the use of answer the question of whether the terms pass constitutional
words, we can never expect mathematical certainty from our muster in the present case. In Pacifica, the Court did not
language." Grayned, 408 U.S. at 110, 92 S. Ct. at 2300. See consider a vagueness challenge to the term "indecent," but
also Hoffman Estates, 455 U.S. 489, 102 S. Ct. 1186; Hynes v. considered only whether the Government had the authority to
Mayor & Council of Oradell, 425 U.S. 610, 96 S. Ct. 1755, 48 regulate the particular broadcast at issue George Carlin's
L. Ed. 2d 243 (1976); Goguen, 415 U.S. 566, 94 S. Ct. 1242. In Monologue entitled "Filthy Words." In finding in the affirmative,
addition, it will always be true that the fertile legal "imagination the Court emphasized that its narrow holding applied only to
can conjure hypothetical cases in which the meaning of broadcasting, which is "uniquely accessible to children, even
[disputed] terms will be in nice question." American those too young to read." 438 U.S. at 749, 98 S. Ct. at 3040.
Communications Assn. v. Douds, 339 U.S. 382, 412, 70 S. Ct. Thus, while the Court sanctioned the FCC's time restrictions on
674, 691, 94 L. Ed. 925 (1950). Thus, as I considered the a radio program that repeatedly used vulgar language, the
vagueness issue I have kept in mind the observation of Justice Supreme Court did not hold that use of the term "indecent" in a
Holmes, denying a challenge to vagueness in Nash v. United statute applied to other media, particularly a criminal statute,
States, 229 U.S. 373, 33 S. Ct. 780, 57 L. Ed. 1232 (1913). To would be on safe constitutional ground.
Justice Holmes, "the law is full of instances where a man's fate
depends on his estimating rightly, that is, as the jury The Supreme Court more recently had occasion to consider a
subsequently estimates it, some matter of degree. If his statute banning "indecent" material in the dial-a-porn context
judgment is wrong, not only may he incur a fine or a short in Sable, 492 U.S. 115, and found that a complete ban on such
imprisonment ..., he may incur the penalty of death." Nash, 229 programming violated the First Amendment because it was not
U.S. at 377, 33 S. Ct. at 781. Even more recently the court has narrowly tailored to serve the purpose of limiting children's
stated that "due process does not require `impossible access to commercial pornographic telephone messages.
standards' of clarity." Kolender, 461 U.S. at 361, 103 S. Ct. at Once again, the Court did not consider a challenge to the term
1860 (quoting United States v. Petrillo, 332 U.S. 1, 7-8, 67 S. "indecent" on vagueness grounds, and indeed has never
Ct. 1538, 1542, 91 L. Ed. 1877 (1947)). It is with all of these directly ruled on this issue.
principles in mind, as they interplay with the unique features of
the Internet, that I have reached my conclusion. Several other courts have, however, upheld the use of the term
in statutes regulating different media. For example,
The fundamental constitutional principle that concerns me is in Information Providers' Coalition v. FCC, 928 F.2d 866 (9th
one of simple fairness, and that is absent in the CDA. The Cir.1991), the Ninth Circuit Court of Appeals considered
Government initially argues that "indecent" in this statute is the whether the term "indecent" in the 1989 Amendment to the
same as "patently offensive." I do not agree that a facial Communications Act regulating access to telephone dial-a-
reading of this statute supports that conclusion. The CDA does porn services and the FCC's implementing regulations was
not define the term "indecent," and the FCC has not void for vagueness. The FCC had defined "indecent" as "the
promulgated regulations defining indecency in the medium of description or depiction of sexual or excretory activities or
cyberspace. If "indecent" and "patently offensive" were organs in a patently offensive manner as measured by
intended to have the same meaning, surely section (a) could contemporary community standards for the telephone
have mirrored section (d)'s language.[5] Indecent in this statute medium." 928 F.2d at 874. Although recognizing that the
is an undefined word which, standing alone, offers no Supreme Court had never explicitly ruled on a vagueness
guidelines whatsoever as to its parameters. Interestingly, challenge to the term, the court read Sable and Pacifica as
another federal crime gives a definition to indecent entirely having implicitly accepted the use of this definition of
different from that proposed in the present case.[6] While not "indecent." The court further stated that the FCC's definition of
applicable here, this example shows the indeterminate nature "indecent" was no less imprecise than was the definition of
of the word and the need for clear definition, particularly in a "obscenity" as announced in Miller v. California, 413 U.S. 15,
statute which infringes upon protected speech. Although the 25, 93 S. Ct. 2607, 2615-16, 37 L. Ed. 2d 419 (1973), and thus
use of different terms in § 223(a) and (d) suggests that concluded that "indecent" as pertained to dial-a-porn
Congress intended that the terms have different meanings, the regulations must survive a vagueness challenge. See also Dial
Conference Report indicates an intention to treat § 223(a) as Information Services v. Thornburgh, 938 F.2d 1535 (2d
containing the same language as § 223(d). Conf.Rep. at 188- Cir.1991), (upholding the use of "indecent" in the same
89 ("The conferees intend that the term indecency ... has the amendment to the Communications Act and FCC
same meaning as established in FCC v. Pacifica regulations.); Action for Children's Television v. FCC, 932 F.2d
Foundation, 438 U.S. 726, 98 S. Ct. 3026, 57 L. Ed. 2d 1073

44
1504, 1508 (D.C.Cir.1991) (rejecting vagueness challenge to 94 S. Ct. 2887, 41 L. Ed. 2d 590 (1974); Miller, 413 U.S. at 30,
"indecency" provision in broadcast television regulations). [7] 93 S. Ct. at 2618 ("[O]ur nation is simply too big and too
diverse for this Court to reasonably expect that such standards
Notably, however, in these telephone and cable television [of what is patently offensive] could be articulated for all 50
cases the FCC had defined indecent as patently offensive by states in a single formulation."). However, the Conference
reference to contemporary community standards for that Report with regard to the CDA states that the Act is "intended
particular medium. See, e.g., Pacifica, 438 U.S. at 732, 98 S. to establish a uniform national standard of content regulation."
Ct. at 3031-32 (defining "indecent" by reference to terms Conf.Rep. at 191. This conflict inevitably leaves the reader of
"patently offensive as measured by contemporary community the CDA unable to discern the relevant "community standard,"
standards for the broadcast medium"); Dial Information and will undoubtedly cause Internet users to "steer far wider of
Services, 938 F.2d at 1540 (defining indecency by reference to the unlawful zone" than if the community standard to be
contemporary community standards for the telephone applied were clearly defined. The chilling effect on the Internet
medium). Here, the provision is not so limited. In fact, there is users' exercise of free speech is obvious. See Baggett v.
no effort to conform the restricting terms to the medium *863 of Bullitt, 377 U.S. 360, 372, 84 S. Ct. 1316, 1322-23, 12 L. Ed.
cyberspace, as is required under Pacifica and its progeny. 2d 377 (1964). This is precisely the vice of vagueness.

The Government attempts to save the "indecency" and In addition, the Government's argument that the challenged
"patently offensive" provisions by claiming that the provisions provisions will be applied only to "pornographic" materials, and
would only be used to prosecute pornographic works which, will not be applied to works with serious value is without
when considered "in context" as the statute requires, would be support in the CDA itself. Unlike in the obscenity context,
considered "indecent" or "patently offensive" in any community. indecency has not been defined to exclude works of serious
The Government thus contends that plaintiffs' fears of literary, artistic, political or scientific value, and therefore the
prosecution for publishing material about matters of health, art, Government's suggestion that it will not be used to prosecute
literature or civil liberties are exaggerated and unjustified. The publishers of such material is without foundation in the law
Government's argument raises two issues: first is the question itself. The Government's claim that the *864 work must be
of which "community standards" apply in cyberspace, under considered patently offensive "in context" does nothing to
the CDA; and second is the proposition that citizens should clarify the provision, for it fails to explain which context is
simply rely upon prosecutors to apply the statute relevant. "Context" may refer to, among other things, the
constitutionally. nature of the communication as a whole, the time of day it was
conveyed, the medium used, the identity of the speaker, or
whether or not it is accompanied by appropriate warnings. See
Are the contemporary community standards to be applied e.g., Pacifica, 438 U.S. at 741 n. 16, n. 17, 98 S. Ct. at 3036 n.
those of the vast world of cyberspace, in accordance with the 16, n. 17 (referring to "the context of the whole book," and to
Act's apparent intent to establish a uniform national standard of the unique interpretation of the First Amendment "in the
content regulation? The Government offered no evidence of broadcasting context").
any such national standard or nationwide consensus as to
what would be considered "patently offensive". On the
contrary, in supporting the use of the term "indecent" in the The thrust of the Government's argument is that the court
CDA, the Government suggests that, in part, this term was should trust prosecutors to prosecute only a small segment of
chosen as a means of insulating children from material not those speakers subject to the CDA's restrictions, and whose
restricted under current obscenity laws. This additional term is works would reasonably be considered "patently offensive"
necessary, the Government states, because "whether in every community. Such unfettered discretion to prosecutors,
something rises to the level of obscene is a legal conclusion however, is precisely what due process does not allow. "It will
that, by definition, may vary from community to community." not do to say that a prosecutor's sense of fairness and the
Govt.Brief at 31. In support of its argument, the Government Constitution would prevent a successful ... prosecution for
points to the Second Circuit's decision in United States v. some of the activities seemingly embraced within the sweeping
Various Articles of Obscene Merchandise, Schedule No. statutory definitions. The hazard of being prosecuted ...
2102, 709 F.2d 132, 134, 137 (2d Cir.1983), which upheld the nevertheless remains.... Well-intentioned prosecutors and
district court's conclusion that "detailed portrayals of genitalia, judicial safeguards do not neutralize the vice of a vague
sexual intercourse, fellatio, and masturbation" including the film law." Baggett, 377 U.S. at 373-74, 84 S. Ct. at 1323; see
"Deep Throat" and other pornographic films and magazines, also Keyishian v. Board of Regents, 385 U.S. 589, 599, 87 S.
are not obscene in light of the community standards prevailing Ct. 675, 681, 17 L. Ed. 2d 629 (1967) ("[i]t is no answer" to a
in New York City." What this argument indicates is that as vague law for the Government "to say that the statute would
interpretations of obscenity ebb and flow throughout various not be applied in such a case."). And we cannot overlook the
communities, restrictions on indecent material are meant to vagaries of politics. What may be, figuratively speaking, one
cover a greater or lesser quantity of material not reached by administration's pen may be another's sword.
each community's obscenity standard. It follows that to do this,
what constitutes indecency must be as open to fluctuation as The evidence and arguments presented by the Government
the obscenity standard and cannot be rigidly constructed as a illustrate the possibility of arbitrary enforcement of the Act. For
single national standard if it is meant to function as the example, one Government expert opined that any of the so-
Government has suggested. As Justice Scalia stated, "[t]he called "seven dirty words" used in the Carlin monologue would
more narrow the understanding of what is `obscene,' ... the be subject to the CDA and therefore should be "tagged," as
more pornographic what is embraced within the residual should paintings of nudes displayed on a museum's web site.
category of `indecency.'" Sable, 492 U.S. at 132, 109 S. Ct. at The Government has suggested in its brief, however, that the
2840 (Scalia, J. concurring). This understanding is consistent Act should not be so applied. See Govt.Brief at 37 (suggesting
with the case law, in which the Supreme Court has explained that "seven dirty words" if used "in the context of serious
that the relevant community is the one where the information is discussions" would not be subject to the Act). Even
accessed and where the local jury sits. See Sable, 492 U.S. at Government counsel was unable to define "indecency" with
125, 109 S. Ct. at 2836; Hamling v. United States, 418 U.S. 87, specificity. The Justice Department attorney could not respond

45
to numerous questions from the court regarding whether, for ideal." Turner Broadcasting Sys. v. FCC, ___ U.S. ___, ___,
example, artistic photographs of a nude man with an erect 114 S. Ct. 2445, 2458, 129 L. Ed. 2d 497 (1994). This general
penis, depictions of Indian statues portraying different methods rule is subject only to "narrow and well-understood
of copulation, or the transcript of a scene from a contemporary exceptions". Id. A law that, as here, regulates speech on the
play about AIDS could be considered "indecent" under the Act. basis of its content, is "presumptively invalid". R.A.V., 505 U.S.
at 381-82, 112 S. Ct. at 2542.
Plaintiffs also argue that section 223(e) (5) (A) of the CDA,
offering a defense for speakers who take "good faith, Two of the exceptions to this general rule deal with obscenity
reasonable, effective and appropriate actions under the (commonly understood to include so-called hardcore
circumstances to restrict or prevent access by minors to a pornography), Miller v. California, 413 U.S. 15, 93 S. Ct. 2607,
communication" covered by the Act, is unconstitutionally vague 37 L. Ed. 2d 419 (1973), and child pornography, New York v.
because it fails to specify what would constitute an effective Ferber, 458 U.S. 747, 102 S. Ct. 3348, 73 L. Ed. 2d 1113
defense to prosecution. The plain language of the safe harbor (1982). The Government can and does punish with criminal
provision indicates an effort to ensure that the statute limits sanction people who engage in these forms of speech. 18
speech in the least restrictive means possible by taking into U.S.C. §§ 1464-65 (criminalizing obscene material); id. §§
account emerging technologies in allowing for any and all 2251-52 (criminalizing child pornography). Indeed, the
"reasonable, effective and appropriate" approaches to Government could punish these forms of speech on the
restricting minors' access to the proscribed material. But, the Internet even without the CDA. E.g., United States v.
statute itself does not contain any description of what, other Thomas, 74 F.3d 701, 704-05 (6th Cir.1995) (affirming
than credit card verification and adult identification codes which obscenity convictions for the operation of a computer bulletin
we have established remain unavailable to most content board).
providers will protect a speaker from prosecution. Significantly,
although the FCC is authorized to specify measures that might The Government could also completely ban obscenity and
satisfy this defense, the FCC's views will not be definitive but child pornography from the Internet. No Internet speaker has a
will only "be admitted as evidence of good faith efforts" that the right to engage in these forms of speech, and no Internet
defendant has met the requirements of the defense. 47 U.S.C. listener has a right to receive them. Child pornography and
§ 223(e) (6). Thus, individuals attempting to comply with the obscenity have "no constitutional protection, and the
statute presently have no clear indication of what actions will government may ban [them] outright in certain media, or in
ensure that they will be insulated from criminal sanctions under all." Alliance for Community Media v. FCC, 56 F.3d 105, 112
the CDA. (D.C.Cir.1995) (citing R.A.V., 505 U.S. at 386-88, 112 S.Ct. at
2545), cert. granted sub nom. Denver Area Educ.
Telecommunications Consortium v. FCC, ___ U.S. ___, 116 S.
C. Ct. 471, 133 L. Ed. 2d 401 (1996); see also Ferber, 458 U.S. at
756, 102 S. Ct. at 3354. As R.A.V. notes, "`the freedom of
The consequences of posting indecent content are severe. [8] I speech' referred to by the First Amendment does not include a
recognize that people *865 must make judgments each and freedom to disregard these traditional limitations." R.A.V., 505
every day, many times in the most intimate of relationships and U.S. at 383, 112 S. Ct. at 2543.
that an error in judgment can have serious consequences. It is
also true that where those consequences involve penal The cases before us, however, are not about obscenity or child
sanctions, a criminal law or statute has more often than not pornography. Plaintiffs in these actions claim no right to
carefully defined the proscribed conduct. It is not so much that engage in these forms of speech in the future, nor does the
the accused needs these precise definitions, as it has been Government intimate that plaintiffs have engaged in these
said he or she rarely reads the law in advance. What is more forms of speech in the past.
important is that the enforcer of statutes must be guided by
clear and precise standards. In statutes that break into *866 This case is about "indecency", as that word has come to
relatively new areas, such as this one, the need for definition of be understood since the Supreme Court's decisions in FCC v.
terms is greater, because even commonly understood terms Pacifica Foundation, 438 U.S. 726, 98 S. Ct. 3026, 57 L. Ed.
may have different connotations or parameters in this new 2d 1073 (1978), and Sable Communications v. FCC, 492 U.S.
context.[9] Words cannot define conduct with mathematical 115, 109 S. Ct. 2829, 106 L. Ed. 2d 93 (1989). The legal
certainty, and lawyers, like the bright and intelligent ones now difficulties in these actions arise because of the special place
before us, will most certainly continue to devise ways by which that indecency occupies in the Supreme Court's First
to challenge them. This rationale, however, can neither support Amendment jurisprudence. While adults have a First
a finding of constitutionality nor relieve legislators from the very Amendment right to engage in indecent speech, Sable, 492
difficult task of carefully drafting legislation tailored to its goal U.S. at 126, 109 S.Ct. at 2836-37; see also Pacifica, 438 U.S.
and sensitive to the unique characteristics of, in this instance, at 747-48, 98 S. Ct. at 3039-40, the Supreme Court has also
cyberspace. held that the Government may, consistent with the
Constitution, regulate indecency on radio and television, and in
DALZELL, District Judge: the "dial-a-porn" context, as long as the regulation does not
operate as a complete ban. Thus, any regulation of indecency
in these areas must give adults access to indecent speech,
A. Introduction which is their right.

I begin with first principles: As a general rule, the Constitution The Government may only regulate indecent speech for a
forbids the Government from silencing speakers because of compelling reason, and in the least restrictive
their particular message. R.A.V. v. City of Saint Paul, 505 U.S. manner. Sable, 492 U.S. at 126, 109 S. Ct. at 2836-37. "It is
377, 381-82, 112 S. Ct. 2538, 2542, 120 L. Ed. 2d 305 (1992). not enough to show that the Government's ends are
"Our political system and cultural life rest upon this compelling; the means must be carefully tailored to achieve

46
those ends." Id. This "most exacting scrutiny", Turner, ___ U.S. L. Ed. 2d 101 (1992). This is so even if some applications
at ___, 114 S. Ct. at 2459, requires the Government to would be "constitutionally unobjectionable". Id.; see
"demonstrate that the recited harms are real, not merely also National Treasury Employees Union v. United States, 990
conjectural, and that the regulation will in fact alleviate these F.2d 1271, 1279-80 (D.C.Cir.1993) (Randolph, J.,
harms in a direct and material way." United States v. National concurring), aff'd, ___ U.S. ___, 115 S. Ct. 1003, 130 L. Ed. 2d
Treasury Employees Union, ___ U.S. ___, ___, 115 S. Ct. 964 (1995). Sometimes facial challenges require an inquiry into
1003, 1017, 130 L. Ed. 2d 964 (1995) (citing Turner, ___ U.S. a party's "standing" (i.e., whether a party may properly
at ___, 114 S.Ct. at 2450). Thus, although our analysis here challenge a law as facially invalid). See, e.g., Ferber, 458 U.S.
must balance ends and means, the scales tip at the outset in at 767-79, 102 S. Ct. at 3359-67. At other times a facial
plaintiffs' favor. This is so because "[r]egulations which permit challenge requires only an inquiry into the law's reach. See,
the Government to discriminate on the basis of the content of e.g., R.A.V., 505 U.S. at 390-91, 112 S. Ct. at 2547.[2] As I
the message cannot be tolerated under the First describe it in part C below, I have no question that plaintiffs
Amendment." Simon & Schuster, Inc. v. Members of the New here have standing to challenge the validity of the CDA, and,
York State Crime Victims Board, 502 U.S. 105, 116, 112 S. Ct. indeed, the Government has not seriously challenged plaintiffs'
501, 508, 116 L. Ed. 2d 476 (1991) (citation omitted). standing to do so. See, e.g., Virginia v. American Booksellers
Assoc., 484 U.S. 383, 392, 108 S. Ct. 636, 642-43, 98 L. Ed.
The Government argues that this case is really about 2d 782 (1988). Thus, the focus is squarely on the merits of
pornography on the Internet. Apart from hardcore and child plaintiffs' facial challenge.[3]
pornography, however, the word pornography does not have a
fixed legal meaning. When I use the word pornography in my I divide my legal analysis below into three parts. In Part B, I
analysis below, I refer to for-profit purveyors of sexually examine the traditional definition of indecency and relate it to
explicit, "adult" material similar to that at issue in Sable. the provisions of the CDA at issue in this action. From this
See 492 U.S. at 118, 109 S. Ct. at 2832. Pornography is analysis I conclude that § 223(a) and § 223(d) of the CDA
normally either obscene or indecent, as Justice Scalia noted in reach the same kind of speech. My analysis also convinces me
his concurrence in Sable. Id. at 132, 109 S. Ct. at 2839-40. I that plaintiffs are unlikely to succeed in their claim that the CDA
would avoid using such an imprecise (and overbroad) word, is unconstitutionally vague. In Part C, I address the
but I feel compelled to do so here, since Congress undoubtedly Government's argument that plaintiffs are not the CDA's target,
had such material in mind when it passed the nor would they likely face prosecution under the Act. Here, I
CDA. See S.Rep. No. 230, 104th Cong., 2d Sess. 187-91 conclude that plaintiffs could reasonably fear prosecution under
(1996), reprinted in 1996 U.S.C.C.A.N. 10, 200-05 the Act, even if some of their fears border on the farfetched. In
[hereinafter Senate Report]. Moreover, the Government has Part D, I consider the legal implications of the special attributes
defended the Act before this court by arguing that the Act could of Internet communication, as well as the effect that the CDA
be constitutionally applied to such material. would have on these attributes. In this Part I conclude that the
disruptive effect of the CDA on Internet communication, as well
Plaintiffs have, as noted, moved for a preliminary injunction. as the CDA's broad reach into protected speech, not only
The standards for such relief are well-settled. Plaintiffs seeking render the Act unconstitutional but also would render
preliminary injunctive relief must show (1) "[a] reasonable unconstitutional any regulation of protected speech on this new
probability of eventual success in the litigation" and (2) medium.
"irreparabl[e] injur[y] pendente lite" if relief is not
granted. Acierno v. New Castle County, 40 F.3d 645, 653 (3d
Cir.1994). We must also consider, if appropriate, (3) "the *868 B. Defining Indecency
possibility of harm to other interested persons from the grant or
denial of the injunction", and (4) "the public interest". Id.; see Although no court of appeals has ever to my knowledge upheld
also Opticians Ass'n v. Independent Opticians, 920 F.2d 187, a vagueness challenge to the meaning of "indecency", several
192 (3d Cir.1990). recent cases have grappled with the elusive meaning of that
word in the context of cable television and "dial-a-
In a First Amendment challenge, a plaintiff who meets the first porn". Alliance for Community Media v. FCC, 56 F.3d 105
prong of the test for a preliminary injunction will almost (D.C.Cir.1995), cert. granted, ___ U.S. ___, 116 S. Ct. 471,
certainly meet the second, since irreparable injury normally 133 L. Ed. 2d 401 (1996); Dial Information Serv. Corp. v.
arises out of the deprivation of speech rights, "for even minimal Thornburgh, 938 F.2d 1535 (2d Cir.1991), cert. denied, 502
periods of time". Elrod v. Burns, 427 U.S. 347, 373-74, 96 S. U.S. 1072, 112 S. Ct. 966, 117 L. Ed. 2d 132
Ct. 2673, 2689-90, 49 L. Ed. 2d 547 (1976); Hohe v. (1992); Information Providers' Coalition for Defense of the First
Casey, 868 F.2d 69, 72 (3d Cir.), cert. denied, 493 U.S. 848, Amendment v. FCC, 928 F.2d 866 (9th Cir.1991).
110 S. Ct. 144, 107 L. Ed. 2d 102 (1989). Of course, neither
the Government nor the public generally can claim an interest In Alliance for Community Media, 56 F.3d at 123-25, for
in the enforcement of an unconstitutional law. Thus, I focus my example, the District of Columbia Court of Appeals addressed
legal analysis today primarily on whether plaintiffs have shown prohibitions on indecent programming on certain cable
a likelihood of success on their claim that the CDA is television channels. That court noted that the FCC has codified
unconstitutional. *867 The issues of irreparable harm to the meaning of "`indecent' programming" on cable television as
plaintiffs, harm to third parties, and the public interest all flow "programming that describes or depicts sexual or excretory
from that determination.[1] activities or organs in a patently offensive manner as measured
by contemporary community standards for the cable
Plaintiffs' challenge here is a "facial" one. A law that regulates medium." Id. at 112 (citing what is now 47 C.F.R. § 76.701(g)).
the content of speech is facially invalid if it does not pass the
"most exacting scrutiny" that we have described above, or if it The FCC took a similar approach to the definition of
would "penalize a substantial amount of speech that is "indecency" in the "dial-a-porn" medium.[4] In Dial Information
constitutionally protected". Forsyth County v. Nationalist Services, 938 F.2d at 1540, the Second Circuit quoted the
Movement, 505 U.S. 123, 129-30, 112 S. Ct. 2395, 2401, 120

47
FCC's definition of indecent telephone communications in that (1989)." Senate Report at 188, reprinted in 1996 U.S.C.C.A.N.
context: at 201-02. The legislative history makes clear that Congress
did not intend to create a distinction in meaning when it used
the generic term "indecency" in § 223(a) and the definition of
[I]n the dial-a-porn context, we believe it is appropriate to that term in § 223(d).[7]
define indecency as the description or depiction of sexual or
excretory activities or organs in a patently offensive manner as There is no doubt that the CDA requires the most stringent
measured by contemporary community standards for the review for vagueness, since it is a criminal statute that
telephone medium. "threatens to inhibit the exercise of constitutionally protected
rights". Colautti v. Franklin, 439 U.S. 379, 391, 99 S. Ct. 675,
Id. at 1540 (citation omitted); see also Information Providers' 683, 58 L. Ed. 2d 596 (1979); see also Kolender v.
Coalition for Defense of the First Amendment v. FCC, 928 F.2d Lawson, 461 U.S. 352, 358 n. 8, 103 S. Ct. 1855, 1859 n. 8, 75
866, 876 (9th Cir.1991). L. Ed. 2d 903 (1983); Grayned, 408 U.S. at 108-09, 92 S. Ct. at
2298-99. My analysis here nevertheless leads ineluctably to
the conclusion that the definition of indecency is not
These three cases recognize that the FCC did not define unconstitutionally vague. The Miller definition of obscenity has
"indecency" for cable and dial-a-porn in a vacuum. Rather, it survived such challenges, see, e.g., Hamling v. United
borrowed from the Supreme Court's decision in FCC v. States, 418 U.S. 87, 118-19, 94 S. Ct. 2887, 2908-09, 41 L.
Pacifica Foundation, 438 U.S. 726, 98 S. Ct. 3026, 57 L. Ed. Ed. 2d 590 (1974); Fort Wayne Books, Inc. v. Indiana, 489 U.S.
2d 1073 (1978). In that case (which I describe in greater detail 46, 57, 109 S. Ct. 916, 924, 103 L. Ed. 2d 34 (1989), and the
below), the Supreme Court established the rough outline from definition of indecency contains a subset of the elements of
which the FCC fashioned its three-part definition. For the first obscenity. If the Miller test "give[s] the person of ordinary
two parts of the test, the Supreme Court emphasized the intelligence a reasonable opportunity to know what is
"importance of context" in examining arguably indecent prohibited, so that he may act accordingly", Grayned v. City of
material. Id. at 747 n. 25, 98 S. Ct. at 3039 n. 25. "Context" in Rockford, 408 U.S. 104, 108, 92 S. Ct. 2294, 2298-99, 33 L.
the Pacifica opinion includes consideration of both the Ed. 2d 222 (1972), the omission of parts of that test does not
particular medium from which the material originates and the warrant a contrary conclusion. See Dial Information
particular community that receives the material. Id. at 746, 98 Services, 938 F.2d at 1541-42. Similarly, since the definition of
S. Ct. at 3038-39 (assuming that the Carlin monologue "would indecency arose from the Supreme Court itself in Pacifica, we
be protected in other contexts"); id. at 748-51, 98 S. Ct. at may fairly imply that the Court did not believe its own
3039-41 (discussing the attributes of broadcast); see interpretation to invite "arbitrary and discriminatory
also Information Providers' Coalition, 928 F.2d at 876 enforcement" or "abut upon sensitive areas of basic First
(discussing the "content/context dichotomy"). Second, the Amendment freedoms". Grayned, 408 U.S. at 108-109, 92 S.
opinion limits its discussion to "patently offensive sexual and Ct. at 2299 (citations and alterations omitted). Sable, while not
excretory language", Pacifica, 438 U.S. at 747, 98 S. Ct. at explicitly addressing the issue of vagueness, reinforces this
3039, and this type of content has remained the FCC's conclusion. See Information Providers' Coalition, 928 F.2d at
touchstone. See, e.g., Alliance for Community Media, 56 F.3d 875-76 (citing Sable, 492 U.S. at 126-27, 109 S.Ct. at 2836-
at 112.[5] 37). It follows, then, that plaintiffs' vagueness challenge is not
likely to succeed on the merits and does not support
We have quoted from the CDA extensively above and I will preliminary injunctive relief.
only briefly rehearse that discussion here. Section 223(a) of the
CDA criminalizes "indecent" speech on the Internet. This is the The possible interpretations of the defenses in § 223(e) do not
"indecency" provision. Section 223(d) of the CDA addresses alter this conclusion. As a matter of statutory construction, §
speech that, "in context, depicts or describes, in terms patently 223(e) (5) (B) could not be clearer. This section, which imports
offensive as measured by contemporary community standards, the dial-a-porn defenses into the CDA, creates "specific and
sexual or excretory activities or organs". This is the "patently objective" methods to avoid liability. See Roberts v. United
offensive" provision. The foregoing discussion leads me to States Jaycees, 468 U.S. 609, 629, 104 S. Ct. 3244, 3255-56,
conclude that these two provisions describe the same kind of 82 L. Ed. 2d 462 (1984). Section 223(e) (5) (A) is more
speech. That is, the use of "indecent" in § 223(a) is shorthand suspect, since it arguably "fail[s] to describe with sufficient
for the longer description in § 223(d). Conversely, the longer particularity what a suspect must do in order to satisfy"
description in § 223(d) is itself the definition of "indecent" it. Kolender 461 U.S. *870 at 361, 103 S. Ct. at 1860.[8] Yet
speech. I believe Congress could *869 have used the word even though the defenses in both sections are unavailable to
"indecent" in both § 223(a) and § 223(d), or it could have used many Internet users, their unavailability does not render
the "patently offensive" description of § 223(d) in § 223(a), the liability provisions vague. Rather, their unavailability just
without a change in the meaning of the Act. I do not believe transforms § 223(a) and § 223(d) into a total ban, in violation
that Congress intended that this distinction alone would change of Butler v. Michigan, 352 U.S. 380, 383, 77 S. Ct. 524, 525-26,
the reach of either section of the CDA.[6] 1 L. Ed. 2d 412 (1957), and Sable, 492 U.S. at 127, 131, 109
S. Ct. at 2837, 2839. I am sensitive to plaintiffs' arguments that
The CDA's legislative history confirms this conclusion. There, the statute, as written, does not create safe harbors through
the conference committee explicitly noted that § 223(d) which all Internet users may shield themselves from liability.
"codifies the definition of indecency from FCC v. Pacifica Transcript of May 10, 1996, at 37-38. Here again, however, the
Foundation, 438 U.S. 726 [98 S. Ct. 3026, 57 L. Ed. 2d 1073] absence of safe harbors relates to the (over) breadth of a
(1978).... The conferees intend that the term indecency (and statute, and not its vagueness. See Sable, 492 U.S. at 127,
the rendition of the definition of that term in new section 502) 131, 109 S. Ct. at 2837, 2839.
has the same meaning as established in FCC v. Pacifica
Foundation, 438 U.S. 726 [98 S. Ct. 3026, 57 L. Ed. 2d 1073]
(1978) and Sable Communications of California, Inc. v. C. Plaintiffs' Likelihood of Prosecution Under the Act
FCC, 492 U.S. 115 [109 S. Ct. 2829, 106 L. Ed. 2d 93]

48
The Government has consistently argued that the speech of Here, even though it is perhaps unlikely that the Carnegie
many of the plaintiffs here is almost certainly not indecent. Library will ever stand in the dock for putting its card catalogue
They point, for example, to the educational and political content online, or that the Government will hale the ACLU into court for
of plaintiffs' speech, and they also suggest that the occasional its online quiz of the seven dirty words, we cannot ignore that
curse word in a card catalogue will probably not result in the Act could reach these activities. The definition of
prosecution. See Senate Report at 189, reprinted in 1996 indecency, like the definition of obscenity, is not a rigid formula.
U.S.C.C.A.N. at 203 ("Material with serious redeeming value is Rather, it confers a large degree of autonomy to individual
quite obviously intended to edify and educate, not to offend."). communities to set the bounds for decency for
In this section I address that argument. themselves. Cf. Sable, 492 U.S. at 125-26, 109 S. Ct. at 2836-
37. This is as it should be, since this flexibility recognizes that
I agree with the Government that some of plaintiffs' claims are ours is a country with diverse cultural and historical roots. See,
somewhat exaggerated, but hyperbolic claims do not in e.g., Hamling, 418 U.S. at 104-05, 94 S. Ct. at 2901 ("A juror is
themselves weigh in the Government's favor. In recent First entitled to draw on his own knowledge of the views of the
Amendment challenges, the Supreme Court has itself paid average person in the community or vicinage from which he
close attention to extreme applications of content-based laws. comes for making the required determination, just as he is
entitled to draw on his knowledge of the propensities of a
`reasonable' person in other areas of the law.").
In Simon & Schuster, Inc. v. Members of the New York State
Crime Victims Board, 502 U.S. 105, 112 S. Ct. 501, 116 L. Ed.
2d 476 (1991), the Court addressed the constitutionality of a Putting aside hyperbolic application, I also have little doubt that
law that required criminals to turn over to their victims any some communities could well consider plaintiffs' speech
income derived from books, movies, or other commercial indecent, and these plaintiffs couldperhaps shouldhave a
exploitation of their crimes. Id. at 109, 112 S. Ct. at 504-05. In legitimate fear of prosecution. In Action for Children's
its opinion, the Court evaluated the argument of an amicus Television v. FCC, 58 F.3d 654 (D.C.Cir.1995), the District of
curiae that the law's reach could include books such as The Columbia Court of Appeals summarized three broadcasts that
Autobiography of Malcolm X, Civil the FCC found indecent in the late 1980s:
Disobedience, and Confessions of Saint Augustine, and
authors such as Emma Goldman, Martin Luther King, Jr., Sir
Walter Raleigh, Jesse Jackson, and Bertrand Russell. Id. at The offending morning broadcast ... contained "explicit
121-22, 112 S. Ct. at 511. The Court credited the argument references to masturbation, ejaculation, breast size, penis size,
even while recognizing that it was laced with "hyperbole": sexual intercourse, nudity, urination, oral-genital contact,
erections, sodomy, bestiality, menstruation and testicles." The
remaining two were similarly objectionable.
The argument that [the] statute ... would prevent publication of
all of these works is hyperbolesome would have been written Id. at 657 (citing In re Infinity Broadcasting Corp., 3 FCC R.
without compensationbut the ... law clearly reaches a wide 930, 932 (1987)). In Infinity Broadcasting, one of the
range of literature that does not enable a criminal to profit from broadcasts that the FCC found indecent was an excerpt of a
his crime while a victim remains uncompensated. play about AIDS, finding that the excerpts "contained the
concentrated and repeated use of vulgar and shocking
Id. at 122, 112 S. Ct. at 511. If a content-based law language to portray graphic and lewd depictions of excretion,
"can produce such an outcome", id. at 123, 112 S. Ct. at 512 anal intercourse, ejaculation, masturbation, and oral-genital
(emphasis added), then Simon & Schuster allows us to sex". 3 FCC R. at 934.[9] To the FCC, even broadcasts with
consider those outcomes in our analysis. "public value ... addressing the serious problems posed by
AIDS" can be indecent if "that material is presented in
a manner that is patently offensive". Id. (emphasis in
Even more recently, in United States v. National Treasury original).[10]
Employees Union, ___ U.S. ___, 115 S. Ct. 1003, 130 L. Ed.
2d 964 (1995), the Court addressed the constitutionality of a
law that banned federal employees from accepting honoraria Yet, this is precisely the kind of speech that occurs, for
for publications unrelated to their work. Id. at ___, 115 S. Ct. at example, on Critical Path AIDS Project's Web site, which
1008. The Court noted that the law would reach "literary giants includes safer sex instructions written in street language for
like Nathaniel Hawthorne and Herman Melville, ... Walt easy comprehension. The Web site also describes the risk of
Whitman, ... and Bret Harte". Id. at ___, 115 S. Ct. at 1012. HIV transmission for particular sexual practices. The FCC's
This concern resurfaced later in the opinion, see id. at ___, 115 implication in In the Matter of King Broadcasting Co., 5 FCC R.
S. Ct. at 1015 ("[W]e cannot ignore the risk that [the ban] might 2971 (1990), that a "candid discussion[] of sexual topics" on
deprive us of the work of a future Melville or Hawthorne."), television was decent in part because it was "not presented in
even though a footnote immediately renders this concern at a pandering, titillating or vulgar manner" would be unavailing to
least hyperbolic: Critical Path, other plaintiffs, and some amici. These
organizations want to pander and titillate on their Web sites, at
least to a degree, to attract a teen audience and deliver their
message in an engaging and coherent way.[11]
These authors' familiar masterworks would survive the
honoraria ban as currently administered. *871 Besides
exempting all books, the [regulations implementing the ban] *872 In In re letter to Merrell Hansen, 6 FCC R. 3689 (1990),
protect fiction and poetry from the ban's coverage, although the the FCC found indecent a morning discussion between two
statute's language is not so clear. But some great artists deal announcers regarding Jim Bakker's alleged rape of Jessica
in fact as well as fiction, and some deal in both. Hahn. Id. Here, too, the FCC recognized that the broadcast
had public value. Id. (noting that the broadcast concerned "an
incident that was at the time `in the news'"). Yet, under the
Id. n. 16 (citations omitted). FCC's interpretation of Pacifica, "the merit of a work is `simply

49
one of the many variables' that make up a work's the sound truck and the street corner orator have differing
context". Id. (citation omitted). natures, values, abuses and dangers. Each ... is a law unto
itself". Kovacs v. Cooper, 336 U.S. 77, 97, 69 S. Ct. 448, 459,
One of the plaintiffs here, Stop Prisoner Rape, Inc., has as its 93 L. Ed. 513 (1949) (Jackson, J., concurring). The Supreme
core purpose the issue of prison rape. The organization Court has expressed this sentiment time and again since that
creates chat rooms in which members can discuss their date, and differential treatment of the mass media has become
experiences. Some amici have also organized Web sites established First Amendment doctrine. See, e.g., Turner
dedicated to survivors of rape, incest, and other sexual abuse. Broadcasting Sys., Inc. v. FCC, ___ U.S. ___, ___, 114 S. Ct.
These Web sites provide fora for the discussion and 2445, 2456, 129 L. Ed. 2d 497 (1994) ("It is true that our cases
contemplation of shared experiences. The operators of these have permitted more intrusive regulation of broadcast speakers
sites, and their participants, could legitimately fear prosecution than of speakers in other media."); Pacifica, 438 U.S. at 748,
under the CDA. 98 S. Ct. at 3039 ("We have long recognized that each medium
of expression presents special First Amendment
problems."); City of Los Angeles v. Preferred Communications,
With respect to vulgarity, the Government is in a similarly weak Inc., 476 U.S. 488, 496, 106 S. Ct. 2034, 2039, 90 L. Ed. 2d
position. In Pacifica, the Supreme Court held that multiple 480 (1986) ("Different communications media are treated
repetition of expletives could be indecent. Pacifica, 438 U.S. at differently for First Amendment purposes.") (Blackmun, J.,
750, 98 S. Ct. at 3040-41. Although the FCC did not follow this concurring); Metromedia, Inc. v. City of San Diego, 453 U.S.
rationale with respect to a broadcast of "a bona fide news 490, 500-01, 101 S. Ct. 2882, 2889, 69 L. Ed. 2d 800 (1981)
story" on National Public Radio, Letter to Mr. Peter Branton, 6 (plurality opinion) ("This Court has often faced the problem of
FCC R. 610 (1991), aff'd on other grounds sub nom. Branton v. applying the broad principles of the First Amendment to unique
FCC, 993 F.2d 906, 908 (D.C.Cir. 1993), the ACLU, a plaintiff forums of expression."). Thus, the Supreme Court has
here, could take little comfort from that administrative decision. established different rules for print, Miami Herald Publishing
It would need to discern, for example, whether a chat room that Co. v. Tornillo, 418 U.S. 241, 94 S. Ct. 2831, 41 L. Ed. 2d 730
it organized to discuss the meaning of the word fuck was more (1974), broadcast radio and television, see, e.g., Red Lion
like the Carlin monologue or more like a National Public Radio Broadcasting Co. v. FCC, 395 U.S. 367, 89 S. Ct. 1794, 23 L.
broadcast.[12] The Government's expert would have found Ed. 2d 371 (1969), cable television, Turner, ___ U.S. at ___ -
expletives indecent in a community consisting only of ___, 114 S. Ct. at 2456-57, and even
himself,[13] and his views undoubtedly and reasonablyreflect billboards, Metromedia, 453 U.S. at 501, 101 S. Ct. at 2889,
the view of many people. and drive-in movie theaters, Erznoznik v. City of
Jacksonville, 422 U.S. 205, 95 S. Ct. 2268, 45 L. Ed. 2d 125
In sum, I am less confident than the Government that societal (1975).
mores have changed so drastically since Pacifica that an
online equivalent of the Carlin monologue, or the Carlin This medium-specific approach to mass communication
monologue itself online, would pass muster under the CDA. examines the underlying technology of the communication to
Under existing precedent, plaintiffs' fear of prosecution under find the proper fit between First Amendment values and
the Act is legitimate, even though they are not the competing interests. In print media, for example, the proper fit
pornographers Congress had in mind when it passed the generally forbids governmental regulation of content, however
CDA.[14]Cf. City of Houston v. Hill, 482 U.S. 451, 459, 107 S. minimal. Tornillo, 418 U.S. at 258, 94 S. Ct. at 2839-40. In
Ct. 2502, 2508, 96 L. Ed. 2d 398 (1987). My discussion of the other media (billboards, for example), the proper fit may allow
effect and reach of the CDA, therefore, applies both to for some regulation of both content and of the underlying
plaintiffs' hyperbolic concerns and to their very real ones. technology (such as it is) of the
communication. Metromedia, 453 U.S. at 502, 101 S. Ct. at
2889-90.
D. A Medium-Specific Analysis
Radio and television broadcasting present the most expansive
The Internet is a new medium of mass communication. [15] As approach to medium-specific regulation of mass
such, the Supreme Court's First Amendment jurisprudence communication. As a result of the scarcity of band widths on
compels us to consider the special qualities of this new the electromagnetic spectrum, the Government holds broad
medium in determining whether the CDA is a constitutional authority both to parcel out the frequencies and to prohibit
exercise of governmental power. Relying on these special others from speaking on the same frequency:
qualities, which we have described at length in our Findings of
fact above, I conclude that the CDA is unconstitutional and that
the First Amendment denies Congress the power to regulate As a general matter, there are more would-be broadcasters
protected speech on the Internet. This analysis and than frequencies available in the electromagnetic spectrum.
conclusions are consistent with Congress's intent to avoid And if two broadcasters were to attempt to transmit over the
tortuous and piecemeal review of the CDA by authorizing same frequency in the same locale, they would interfere with
expedited, direct review in the Supreme Court "as a matter of one another's signals, so that neither could be heard at all. The
right" of interlocutory, and not merely final, orders upholding scarcity of broadcast frequencies thus required the
facial *873 challenges to the Act. See § 561(b) of the establishment of some regulatory mechanism to divide the
Telecommunications Act of 1996.[16] electromagnetic spectrum and assign specific frequencies to
particular broadcasters.

1. The Differential Treatment of Mass Communication Turner, ___ U.S. at ___, 114 S. Ct. at 2456 (citing FCC v.
Media League of Women Voters, 468 U.S. 364, 104 S. Ct. 3106, 82 L.
Ed. 2d 278 (1984)).
Nearly fifty years ago, Justice Jackson recognized that "[t]he
moving picture screen, the radio, the newspaper, the handbill,

50
*874 This scarcity also allows the Government to regulate The rationale of Pacifica rested on three overlapping
content even after it assigns a license: considerations. First, using as its example the Carlin
monologue before it, the Court weighed the value of indecent
speech and concluded that such speech "lie[s] at the periphery
In addition, the inherent physical limitation on the number of of First Amendment concerns." Id. at 743, 98 S. Ct. at 3037.
speakers who may use the broadcast medium has been Although the Court recognized that the FCC had threatened to
thought to require some adjustment in traditional First punish Pacifica based on the content of the Carlin
Amendment analysis to permit the Government to place limited monologue, id. at 742, 98 S. Ct. at 3036-37, it found that the
content restraints, and impose certain affirmative obligations, punishment would have been permissible because four-letter
on broadcast licensees. words "offend for the same reasons that obscenity
offends." Id. at 746, 98 S. Ct. at 3039 (footnote omitted). The
Court then described the place of four-letter words "in the
Id. at ___, 114 S. Ct. at 2457 (citing Red Lion, 395 U.S. at 390- hierarchy of first amendment values":
95, 89 S.Ct. at 1806-09; National Broadcasting Co. v. United
States, 319 U.S. 190, 63 S. Ct. 997, 87 L. Ed. 1344 (1943)).
Such utterances are no essential part of any exposition of
The broadcasting cases firmly establish that the Government ideas, and are of such slight social value as a step to truth
may force a licensee to offer content to the public that the that *875 any benefit that may be derived from them is clearly
licensee would otherwise not offer, thereby assuring that radio outweighed by the social interest in order and morality.
and television audiences have a diversity of content. In
broadcasting, "[i]t is the right of the public to receive suitable
access to social, political, esthetic, moral, and other ideas and Id. at 746, 98 S. Ct. at 3039 (citing Chaplinsky v. New
experiences which is crucial". Red Lion, 395 U.S. at 390, 89 S. Hampshire, 315 U.S. 568, 572, 62 S. Ct. 766, 769, 86 L. Ed.
Ct. at 1807; see also CBS, Inc. v. FCC, 453 U.S. 367, 395, 101 1031 (1942)).
S. Ct. 2813, 2829, 69 L. Ed. 2d 706 (1981) ("A licensed
broadcaster is `granted the free and exclusive use of a limited Second, the Court recognized that "broadcasting ... has
and valuable part of the public domain; when he accepts that received the most limited First Amendment protection." Id. at
franchise it is burdened by enforceable public obligations.'") 748, 98 S. Ct. at 3040. The Government may regulate
(citation omitted); Columbia Broadcasting Sys., Inc. v. broadcast consistent with the Constitution, even though the
Democratic Nat'l Comm., 412 U.S. 94, 110-11, 93 S. Ct. 2080, same regulation would run afoul of the First Amendment in the
2090-91, 36 L. Ed. 2d 772 (1973). These content restrictions print medium. Id. (comparing Red Lion Broadcasting Co. v.
include punishing licensees who broadcast inappropriate but FCC, 395 U.S. 367, 89 S. Ct. 1794, 23 L. Ed. 2d 371 (1969)
protected speech at an impermissible time. Pacifica, 438 U.S. with Miami Herald Publishing Co. v. Tornillo, 418 U.S. 241, 94
at 750-51, 98 S. Ct. at 3040-41. S. Ct. 2831, 41 L. Ed. 2d 730 (1974)). This is so because
broadcasting has a "uniquely pervasive presence in the lives of
In this case, the Government relies on the Pacifica decision in all Americans" and "is uniquely accessible to children, even
arguing that the CDA is a constitutional exercise of those too young to read." Pacifica, 438 U.S. at 748-49, 98 S.
governmental power. Since the CDA regulates indecent Ct. at 3040.
speech, and since Pacifica authorizes governmental regulation
of indecent speech (so the Government's argument goes), it Third, the Court found the FCC's sanction an administrative
must follow that the CDA is a valid exercise of governmental sanctionto be an appropriate means of regulating indecent
power. That argument, however, ignores Pacifica's roots as a speech. At the outset of the opinion, the Court disclaimed that
decision addressing the proper fit between broadcasting and its holding was a "consider[ation of] any question relating to the
the First Amendment. The argument also assumes that what is possible application of § 1464 as a criminal statute." Id. at 739
good for broadcasting is good for the Internet. n. 13, 98 S. Ct. at 3035. Later in the opinion, the Court
"emphasize[d] the narrowness of [its] holding", and explicitly
recognized that it had not held that the Carlin monologue would
2. The Scope of the Pacifica Decision justify a criminal prosecution. Id. at 750, 98 S. Ct. at 3040-41.
Instead, the Court allowed the FCC to regulate indecent
speech with administrative penalties under a "nuisance"
In FCC v. Pacifica Foundation, 438 U.S. 726, 98 S. Ct. 3026, rationale"like a pig in the parlor instead of the barnyard." Id. at
57 L. Ed. 2d 1073 (1978), the Supreme Court first decided 750, 98 S. Ct. at 3041 (citation omitted).
whether the Government had the power to regulate indecent
speech. Id. at 729, 98 S. Ct. at 3030. In Pacifica, a radio
listener complained about the broadcast of George Carlin's Time has not been kind to the Pacifica decision. Later cases
"Filthy Words" monologue at 2:00 p.m. on a Tuesday have eroded its reach, and the Supreme Court has repeatedly
afternoon. Id. at 729-30, 98 S. Ct. at 3030. The Carlin instructed against overreading the rationale of its holding.
monologue was replete with "the words you couldn't say on the
public ... airwaves ..., ever", and the listener had tuned in while First, in Bolger v. Youngs Drug Products Corp., 463 U.S. 60,
driving with his young son in New York. Id. The FCC issued a 103 S. Ct. 2875, 77 L. Ed. 2d 469 (1983), the Supreme Court
declaratory order, holding that it could have subjected the refused to extend Pacifica to a law unrelated to broadcasting.
Pacifica Foundation (owner of the radio station) to an In that case, a federal law prohibited the unsolicited mailing of
administrative sanction. Id. at 730, 98 S. Ct. at 3030. In its contraceptive advertisements. Id. at 61, 103 S. Ct. at 2877.
order the FCC also described the standards that it would use in The Government defended the law by claiming an interest in
the future to regulate indecency in the broadcast medium. Id. at protecting children from the advertisements. The Court rejected
731, 98 S. Ct. at 3030-31. The Supreme Court upheld the this argument as overbroad:
FCC's decision and confirmed the power of that agency to
regulate indecent speech. Id. at 750-51, 98 S. Ct. at 3040-41.

51
In [Pacifica], this Court did recognize that the Government's holding in Pacifica arose out of the scarcity rationale unique to
interest in protecting the young justified special treatment of an the underlying technology of broadcasting, and not out of the
afternoon broadcast heard by adults as well as children. At the end product that the viewer watches. That is, cable television
same time, the majority "emphasize[d] the narrowness of our has no less of a "uniquely pervasive presence"
holding", explaining that broadcasting is "uniquely pervasive" than broadcast television, nor is cable television more
and that it is "uniquely accessible to children, even those too "uniquely accessible to children" than
young to read." The receipt of mail is far less intrusive and broadcast. See Pacifica, 438 U.S. at 748-49, 98 S. Ct. at 3039-
uncontrollable. Our decisions have recognized that the special 40. From the viewer's perspective, cable and broadcast
interest of the Federal Government in regulation of the television are identical: moving pictures with sound from a box
broadcast media does not readily translate into a justification in the home. Whether one receives a signal through an
for regulation of other means of communication. antenna or through a dedicated wire, the end result is just
television in either case. In declining to extend broadcast's
Id. at 74, 103 S. Ct. at 2884 (citations and footnotes omitted) scarcity rationale for cable, the Supreme Court also implicitly
(emphasis in original) see also id. at 72, 103 S. Ct. at 2883 limited Pacifica the holding of which flows directly from that
("[T]he `short, though regular, journey from mail box to trash rationale.[19]
can ... is an acceptable burden, at least so far as the
Constitution is concerned.'") (citation omitted) (alterations in Turner thus confirms that the analysis of a particular medium of
original). mass communication must focus on the underlying technology
that brings the information to the user. In broadcast, courts
Second, in Sable Communications v. FCC, 492 U.S. 115, 109 focus on the limited number *877 of band widths and the risk of
S. Ct. 2829, 106 L. Ed. 2d 93 (1989), the Supreme Court again interference with those frequencies. See, e.g., Turner, ___ U.S.
limited Pacifica. In that case, the Court considered the validity at ___ - ___, 114 S. Ct. at 2456-57. In cable, courts focus on
of a ban on indecent "dial-a-porn" communications. Id. at 117- the number of channels, the different kinds of cable operators,
18, 109 S. Ct. at 2832.[17] As in Bolger, the Government argued and the cost to the consumer. Id. at ___, 114 S. Ct. at 2452.
that Pacifica justified a complete ban of that form of speech.
The Supreme Court disagreed, holding instead that Pacifica's I draw two conclusions from the foregoing analysis. First, from
"emphatically narrow" holding arose out of the "unique the Supreme Court's many decisions regulating different media
attributes of broadcasting". Id. *876 at 127, 109 S. Ct. at 2837. differently, I conclude that we cannot simply assume that the
The Court held that the ban was unconstitutional. Id. at 131, Government has the power to regulate protected speech over
109 S. Ct. at 2839. the Internet, devoting our attention solely to the issue of
whether the CDA is a constitutional exercise of that power.
Sable narrowed Pacifica in two ways. First, the Court implicitly Rather, we must also decide the validity of the underlying
rejected Pacifica's nuisance rationale for dial-a-porn, holding assumption as well, to wit, whether the Government has the
instead that the Government could only regulate the medium power to regulate protected speech at all. That decision must
"by narrowly drawn regulations designed to serve those take into account the underlying technology, and the actual and
interests without unnecessarily interfering with First potential reach, of that medium. Second, I conclude
Amendment freedoms". Id. at 126, 109 S. Ct. at 2836. (citation that Pacifica's holding is not persuasive authority here, since
omitted). Under this strict scrutiny, "[i]t is not enough to show plaintiffs and the Government agree that Internet
that the Government's ends are compelling; the means must communication is an abundant and growing resource. Nor
be carefully tailored to achieve those ends." Id.; see is Sable persuasive authority, since the Supreme Court's
also Fabulous Assoc. v. Pennsylvania Pub. Util. Comm., 896 holding in that case addressed only one particular type of
F.2d 780, 784-85 (3d Cir.1990). communication (dial-a-porn), and reached no conclusions
about the proper fit between the First Amendment and
telephone communications generally. Again, plaintiffs and the
Second, the Court concluded that the law, like a law it had Government here agree that the Internet provides content as
struck down in 1957, "denied adults their free speech rights by broad as the imagination.
allowing them to read only what was acceptable for
children". Sable, 492 U.S. at 126, 109 S. Ct. at 2837
(citing Butler v. Michigan, 352 U.S. 380, 77 S. Ct. 524, 1 L. Ed.
2d 412 (1957)). Thus, any regulation of dial-a-porn would have 3. The Effect of the CDA and the Novel Characteristics of
to give adults the opportunity to par-take of that Internet Communication
medium. Id. This conclusion echoes Bolger. See Bolger, 463
U.S. at 74, 103 S. Ct. at 2884 ("The level of discourse reaching Over the course of five days of hearings and many hundreds of
a mailbox simply cannot be limited to that which would be pages of declarations, deposition transcripts, and exhibits, we
suitable for a sand-box.").[18] have learned about the special attributes of Internet
communication. Our Findings of fact many of them undisputed
Finally, in Turner Broadcasting System, Inc. v. FCC, ___ U.S. express our understanding of the Internet. These Findings lead
___, 114 S. Ct. 2445, 129 L. Ed. 2d 497 (1994), the Supreme to the conclusion that Congress may not regulate indecency on
Court implicitly limited Pacifica once again when it declined to the Internet at all.
adopt the broadcast rationale for the medium of cable
television. The Court concluded that the rules for broadcast Four related characteristics of Internet communication have a
were "inapt" for cable because of the "fundamental transcendent importance to our shared holding that the CDA is
technological differences between broadcast and cable unconstitutional on its face. We explain these characteristics in
transmission". Id. at ___, 114 S. Ct. at 2457. our Findings of fact above, and I only rehearse them briefly
here. First, the Internet presents very low barriers to entry.
The legal significance to this case of Turner's refusal to apply Second, these barriers to entry are identical for both speakers
the broadcast rules to cable television cannot be and listeners. Third, as a result of these low barriers,
overstated. Turner's holding confirms beyond doubt that the astoundingly diverse content is available on the Internet.

52
Fourth, the Internet provides significant access to all who wish The CDA will also skew the relative parity among speakers that
to speak in the medium, and even creates a relative parity currently exists on the Internet. Commercial entities who can
among speakers. afford the costs of verification, or who would charge a user to
enter their sites, or whose content has mass appeal, will
To understand how disruptive the CDA is to Internet remain unaffected by the Act. Other users, such as Critical
communication, it must be remembered that the Internet Path or Stop Prisoner Rape, or even the ACLU, whose Web
evolved free of content-based considerations. Before the CDA, sites before the CDA were as equally accessible as the most
it only mattered how, and how quickly, a particular packet of popular Web sites, will be profoundly affected by the Act. This
data travelled from one point on the Internet to another. In its change would result in an Internet that mirrors broadcasting
earliest incarnation as the ARPANET, the Internet was for and print, *879 where economic power has become relatively
many years a private means of access among the military, coterminous with influence.
defense contractors, and defense-related researchers. The
developers of the technology focused on creating a medium Perversely, commercial pornographers would remain relatively
designed for the rapid transmittal of the information through unaffected by the Act, since we learned that most of them
overlapping and redundant connections, and without direct already use credit card or adult verification anyway.
human involvement. Out of these considerations evolved the Commercial pornographers normally provide a few free
common transfer protocols, packet switching, and the other pictures to entice a user into proceeding further into the Web
technology in which today's Internet users flourish. The content site. To proceed beyond these teasers, users must provide a
of the data was, before the CDA, an irrelevant consideration. credit card number or adult verification number. The CDA will
force these businesses to remove the teasers (or cover the
It is fair, then, to conclude that the benefits of the Internet to most salacious content with cgi scripts), but the core,
private speakers arose out of the serendipitous development of commercial product of these businesses will remain in place.
its underlying technology. As more networks joined the
"network of networks" that is the Internet, private speakers The CDA's wholesale disruption on the Internet will necessarily
have begun to take advantage of the medium. This should not affect adult participation in the medium. As some speakers
be surprising, since participation in the medium requires only leave or refuse to enter the medium, and others bowdlerize
that networks (and the individual users associated with them) their speech or erect the barriers that the Act envisions, and
agree to use the common data transfer protocols and other still others remove bulletin boards, Web sites, and newsgroups,
medium-specific technology. Participation does not require, adults will face a shrinking ability to participate in the medium.
and has never required, approval of a user's or network's Since much of the communication on the Internet is
content. participatory, i.e., is a form of dialogue, a decrease in the
number of speakers, speech fora, and permissible topics will
After the CDA, however, the content of a user's speech will diminish the worldwide dialogue that is the strength and signal
determine the extent of participation in the new medium. If a achievement of the medium.
speaker's content is even arguably indecent in some
communities, he must assess, inter alia, the risk of prosecution It is no answer to say that the defenses and exclusions of §
and the cost of *878 compliance with the CDA. Because the 223(e) mitigate the disruptive forces of the Act. We have
creation and posting of a Web site allows users anywhere in already found as facts that the defenses either are not
the country to see that site, many speakers will no doubt available to plaintiffs here or would impose excessive costs on
censor their speech so that it is palatable in every community. them. These defenses are also unavailable to participants in
Other speakers will decline to enter the medium at all. Unlike specific forms of Internet communication.
other media, there is no technologically feasible way for an
Internet speaker to limit the geographical scope of his speech I am equally dubious that the exclusions of § 223(e) would
(even if he wanted to), or to "implement[] a system for provide significant relief from the Act. The "common carrier"
screening the locale of incoming" requests. Sable 492 U.S. at exclusion of § 223(e) (1), for example, would not insulate
125, 109 S. Ct. at 2836. America Online from liability for the content it provides to its
subscribers. It is also a tricky question whether an America
The CDA will, without doubt, undermine the substantive, Online chat room devoted to, say, women's reproductive
speech-enhancing benefits that have flowed from the Internet. health, is or is not speech of the service itself, since America
Barriers to entry to those speakers affected by the Act would Online, at least to some extent, "creat[es] the content of the
skyrocket, especially for non-commercial and not-for-profit communication" simply by making the room available and
information providers. Such costs include those attributable to assigning it a topic. Even if America Online has no liability
age or credit card verification (if possible), tagging (if tagging is under this example, the service might legitimately choose not
even a defense under the Act[20]), and monitoring or review of to provide fora that led to the prosecution of its subscribers.
one's content. Similarly, it is unclear whether many caching servers are
devoted "solely" to the task of "intermediate storage". The
The diversity of the content will necessarily diminish as a "vicarious liability" exclusion of § 223(e) (4) would not, for
result. The economic costs associated with compliance with example, insulate either a college professor or her employer
the Act will drive from the Internet speakers whose content falls from liability for posting an indecent online reading assignment
within the zone of possible prosecution. Many Web sites, for her freshman sociology class.
newsgroups, and chat rooms will shut down, since users
cannot discern the age of other participants. In this respect, the We must of course give appropriate deference to the legislative
Internet would ultimately come to mirror broadcasting and print, judgments of Congress. See Sable, 492 U.S. at 129, 109 S. Ct.
with messages tailored to a mainstream society from speakers at 2838; Turner, ___ U.S. at ___ - ___, 114 S. Ct. at 2472-73
who could be sure that their message was likely decent in (Blackmun, J., concurring). After hearing the parties' testimony
every community in the country. and reviewing the exhibits, declarations, and transcripts, we
simply cannot in my view defer to Congress's judgment that the

53
CDA will have only a minimal impact on the technology of the The Supreme Court has also recognized that the advent of
Internet, or on adult participation in the medium. As cable television has not offered significant relief from this
in Sable, "[d]eference to a legislative finding cannot limit problem. Although the number of cable channels is
judicial inquiry when First Amendment rights are at exponentially greater than broadcast, Turner, ___ U.S. at ___,
stake." Sable, 492 U.S. at 129, 109 S. Ct. at 2838 (citation 114 S. Ct. at 2452, cable imposes relatively high entry
omitted). Indeed, the Government has not revealed Congress's costs, id. at ___ - ___, 114 S. Ct. at 2451-52 (noting that the
"extensive record" in addressing this issue, Turner, ___ U.S. at creation of a cable system requires "[t]he construction of [a]
___, 114 S. Ct. at 2472 (Blackmun, J., concurring), or physical infrastructure").
otherwise convinced me that the record here is somehow
factually deficient to the record before Congress when it Nevertheless, the Supreme Court has resisted governmental
passed the Act. efforts to alleviate these market dysfunctions. In Tornillo, the
Supreme Court held that market failure simply could not justify
the regulation of print, 418 U.S. at 258, 94 S. Ct. at 2839-40,
4. Diversity and Access on the Internet regardless of the validity of the criticisms of that medium, id. at
251, 94 S. Ct. at 2836. Tornillo invalidated a state "right-of-
Nearly eighty years ago, Justice Holmes, in dissent, wrote of reply" statute, which required a newspaper critical of a political
the ultimate constitutional importance of the "free trade in candidate to give that candidate equal time to reply to the
ideas": charges. Id. at 244, 94 S. Ct. at 2832-33. The Court held that
the statute would be invalid even if it imposed no cost on a
newspaper, because of the statute's intrusion into editorial
discretion:
[W]hen men have realized that time has upset many fighting
faiths, they may come to believe even more than they believe
the very foundations of their own conduct that the ultimate
good desired is better reached by free trade in ideas that the A newspaper is more than a passive receptacle or conduit for
best test of truth is the power of the thought to get itself news, comment, and advertising. The choice of material to go
accepted in the competition of the market.... into a newspaper, and the decisions made as to limitations on
the size and content of the paper, and treatment of public
issues and public officials whether fair or unfair constitute the
*880 Abrams v. United States, 250 U.S. 616, 630, 40 S. Ct. 17, exercise of editorial control and judgment.
22, 63 L. Ed. 1173 (1919) (Holmes, J., dissenting).
Id. at 258, 94 S. Ct. at 2840.
For nearly as long, critics have attacked this much-maligned
"marketplace" theory of First Amendment jurisprudence as
inconsistent with economic and practical reality. Most Similarly, in Turner, the Supreme Court rejected the
marketplaces of mass speech, they charge, are dominated by Government's argument that market dysfunction justified
a few wealthy voices. Miami Herald Publishing Co. v. deferential review of speech regulations for cable television.
Tornillo, 418 U.S. 241, 248-50, 94 S. Ct. 2831, 2834-36, 41 L. Even recognizing that the cable market "suffers certain
Ed. 2d 730 (1974). These voices dominate and to an extent, structural impediments", Turner, ___ U.S. at ___, 114 S. Ct. at
create the national debate. Id. Individual citizens' participation 2457, the Court could not accept the Government's conclusion
is, for the most part, passive. Id. at 251, 94 S. Ct. at 2836. that this dysfunction justified broadcast-type standards of
Because most people lack the money and time to buy a review, since "the mere assertion of dysfunction or failure in a
broadcast station or create a newspaper, they are limited to the speech market, without more, is not sufficient to shield a
role of listeners, i.e., as watchers of television or subscribers to speech regulation from the First Amendment standards
newspapers. Id. applicable to nonbroadcast media." Id. at ___, 114 S. Ct. at
2458. "[L]aws that single out the press, or certain elements
thereof, for special treatment `pose a particular danger of
Economic realities limit the number of speakers even further. abuse by the State,' and so are always subject to at least some
Newspapers competing with each other and with (free) degree of heightened First Amendment scrutiny." Id. (citation
broadcast tend toward extinction, as fixed costs drive omitted).[21]*881 The Court then eloquently reiterated that
competitors either to consolidate or leave the government-imposed, content-based speech regulations are
marketplace. Id. at 249-50, 94 S. Ct. at 2835-36. As a result, generally inconsistent with "[o]ur political system and cultural
people receive information from relatively few sources: life":

The elimination of competing newspapers in most of our large At the heart of the First Amendment lies the principle that each
cities, and the concentration of control of media that results person should decide for him or herself the ideas and beliefs
from the only newspaper's being owned by the same interests deserving of expression, consideration, and adherence. Our
which own a television station and a radio station, are political system and cultural life rest upon this ideal.
important components of this trend toward concentration of Government action that stifles speech on account of its
control of outlets to inform the public. message, or that requires the utterance of a particular
message favored by the Government, contravenes this
The result of these vast changes has been to place in a few essential right. Laws of this sort pose the inherent risk that the
hands the power to inform the American people and shape Government seeks not to advance a legitimate regulatory goal,
public opinion. but to suppress unpopular ideas or information or manipulate
the public debate through coercion rather than persuasion.
These restrictions "rais[e] the specter that the Government
Id. at 249-50, 94 S. Ct. at 2836.
may effectively drive certain ideas or viewpoints from the
marketplace."

54
Id. (citation omitted).
5. Protection of Children from Pornography
Both Tornillo and Turner recognize, in essence, that the cure
for market dysfunction (government-imposed, content-based I accept without reservation that the Government has a
speech restrictions) will almost always be worse than the compelling interest in protecting children from pornography.
disease. Here, however, I am hard-pressed even to identify the The proposition finds one of its clearest expressions in Mill,
disease. It is no exaggeration to conclude that the Internet has who recognized that his exposition regarding liberty itself "is
achieved, and continues to achieve, the most participatory meant to apply only to human beings in the maturity of their
marketplace of mass speech that this country and indeed the faculties":
world has yet seen. The plaintiffs in these actions correctly
describe the "democratizing" effects of Internet communication:
individual citizens of limited means can speak to a worldwide We are not speaking of children or of young persons below the
audience on issues of concern to them. Federalists and Anti- age which the law may fix as that of manhood or womanhood.
Federalists may debate the structure of their government Those who are still in a state to require being taken care of by
nightly, but these debates occur in newsgroups or chat rooms others must be protected against their own actions as well as
rather than in pamphlets. Modern-day Luthers still post their against external injury.
theses, but to electronic bulletin boards rather than the door of
the Wittenberg Schlosskirche. More mundane (but from a
constitutional perspective, equally important) dialogue occurs John Stuart Mill, On Liberty 69 (Gertrude Himmelfarb ed.,
between aspiring artists, or French cooks, or dog lovers, or fly Penguin Books 1982) (1859), cited in Harry Kalven Jr., A
fishermen. Worthy Tradition 54 (Jamie Kalven ed.1988).

Indeed, the Government's asserted "failure" of the Internet This rationale, however, is as dangerous as it is compelling.
rests on the implicit premise that too much speech occurs in Laws regulating speech for the protection of children have no
that medium, and that speech there is too available to the limiting principle, and a well-intentioned law restricting
participants. This is exactly the benefit of Internet protected speech on the basis of its content is, nevertheless,
communication, however. The Government, therefore, implicitly state-sponsored censorship. Regulations that "drive certain
asks this court to limit both the amount of speech on the ideas or viewpoints from the marketplace" for children's
Internet and the availability of that speech. This argument is benefit, Simon & Schuster, 502 U.S. at 116, 112 S. Ct. at 508,
profoundly repugnant to First Amendment principles. risk destroying the very "political system and cultural
life", Turner, ___ U.S. at ___, 114 S. Ct. at 2458, that they will
inherit when they come of age.
My examination of the special characteristics of Internet
communication, and review of the Supreme Court's medium-
specific First Amendment jurisprudence, lead me to conclude I therefore have no doubt that a Newspaper Decency Act,
that the Internet deserves the broadest possible protection passed because Congress discovered that young girls had
from government-imposed, content-based regulation. If "the read a front page article in the New York Times on female
First Amendment erects a virtually insurmountable barrier genital mutilation in Africa, would be
between government and the print media", Tornillo, 418 U.S. at unconstitutional. Tornillo, 418 U.S. at 258, 94 S. Ct. at 2839-
259, 94 S. Ct. at 2840 (White, J., concurring), even though the 40. Nor would a Novel Decency Act, adopted after legislators
print medium fails to achieve the hoped-for diversity in the had seen too many pot-boilers in convenience store book
marketplace of ideas, then that "insurmountable barrier" must racks, pass constitutional muster. Butler, 352 U.S. at 383, 77
also exist for a medium that succeeds in achieving that S. Ct. at 525-26. There is no question that a Village Green
diversity. If our Constitution "prefer[s] `the power of reason as Decency Act, the fruit of a Senator's over-hearing of a ribald
applied through public discussion'", id. (citation omitted), conversation between two adolescent boys on a park bench,
"[r]egardless of how beneficent-sounding the purposes of would be unconstitutional. Perry Education Ass'n v. Perry Local
controlling the press might be", id., even though "occasionally Educators' Ass'n, 460 U.S. 37, 45, 103 S. Ct. 948, 954-55, 74
debate on vital matters will not be comprehensive and ... all L. Ed. 2d 794 (1983). A Postal Decency Act, passed because
viewpoints may not be expressed", id. at 260, 94 S. Ct. at of constituent complaints about unsolicited lingerie catalogues,
2841, a medium that does capture comprehensive debate would also be unconstitutional. Bolger, 463 U.S. at 73, 103 S.
and does allow for the expression of all viewpoints should Ct. at 2883-84. In these forms of communication, regulations
receive at least the same protection from intrusion. on the basis of decency simply would not survive First
Amendment scrutiny.
Finally, if the goal of our First Amendment jurisprudence is the
"individual dignity and choice" that arises from "putting the The Internet is a far more speech-enhancing medium than
decision as to what views shall be voiced largely into the hands print, the village green, or the mails. Because it would
of each of us", Leathers v. Medlock, 499 U.S. 439, 448-49, necessarily affect the Internet itself, the CDA would necessarily
111 *882 S.Ct. 1438, 1444, 113 L. Ed. 2d 494 (1991) reduce the speech available for adults on the medium. This is a
(citing Cohen v. California, 403 U.S. 15, 24, 91 S. Ct. 1780, constitutionally intolerable result.
1787-88, 29 L. Ed. 2d 284 (1971)), then we should be
especially vigilant in preventing content-based regulation of a Some of the dialogue on the Internet surely tests the limits of
medium that every minute allows individual citizens actually to conventional discourse. Speech on the Internet can be
make those decisions. Any content-based regulation of the unfiltered, unpolished, and unconventional, even emotionally
Internet, no matter how benign the purpose, could burn the charged, sexually explicit, and vulgar in a word, "indecent" in
global village to roast the pig. Cf. Butler, 352 U.S. at 383, 77 S. many communities. But we should expect such speech to
Ct. at 525-26. occur in a medium in which citizens from all walks of life have a
voice. We should also protect the autonomy that such a
medium confers to ordinary people as well as media magnates.

55
Moreover, the CDA will almost certainly fail to accomplish the AND NOW, this 11th day of June, 1996, upon consideration of
Government's interest in shielding children from pornography plaintiffs' motions for preliminary injunction, and the
on the Internet. Nearly half of Internet communications memoranda of the parties and amici curiae in support and
originate outside the United States, and some percentage of opposition thereto, and after hearing, and upon the findings of
that figure represents pornography. Pornography from, say, fact and conclusions of law set forth in the accompanying
Amsterdam will be no less appealing to a child on the Internet Adjudication, it is hereby ORDERED that:
than pornography from New York City, and residents of
Amsterdam *883 have little incentive to comply with the 1. The motions are GRANTED;
CDA.[22]
2. Defendant Attorney General Janet Reno, and all acting
My analysis does not deprive the Government of all means of under her direction and control, are PRELIMINARILY
protecting children from the dangers of Internet ENJOINED from enforcing, prosecuting, investigating or
communication. The Government can continue to protect reviewing any matter premised upon:
children from pornography on the Internet through vigorous
enforcement of existing laws criminalizing obscenity and child
pornography. See United States v. Thomas, 74 F.3d 701, 704- (a) Sections 223(a) (1) (B) and 223(a) (2) of the
05 (6th Cir.1995). As we learned at the hearing, there is also a Communications Decency Act of 1996 ("the CDA"), Pub.L. No.
compelling need for public education about the benefits and 104-104, § 502, 110 Stat. 133, 133-36, to the extent such
dangers of this new medium, and the Government can fill that enforcement, prosecution, investigation, or review are based
role as well. In my view, our action today should only mean that upon allegations other than obscenity or child pornography;
the Government's permissible supervision of Internet content and
stops at the traditional line of unprotected speech.
(b) Sections 223(d) (1) and 223(d) (2) of the CDA;
Parents, too, have options available to them. As we learned at
the hearing, parents can install blocking software on their home *884 3. Pursuant to Fed.R.Civ.P. 65(c), plaintiffs need not post
computers, or they can subscribe to commercial online a bond for this injunction, see Temple Univ. v. White, 941 F.2d
services that provide parental controls. It is quite clear that 201, 220 (3d Cir.1991), cert. denied sub nom. Snider v. Temple
powerful market forces are at work to expand parental options Univ., 502 U.S. 1032, 112 S. Ct. 873, 116 L. Ed. 2d 778
to deal with these legitimate concerns. More fundamentally, (1992); and
parents can supervise their children's use of the Internet or
deny their children the opportunity to participate in the medium 4. The parties shall advise the Court, in writing, as to their
until they reach an appropriate age. See Fabulous, 896 F.2d at views regarding the need for further proceedings on the later of
788-89 (noting that "our society has traditionally placed" these (a) thirty-one days from the date of this Order, or (b) ten days
decisions "on the shoulders of the parent"). after final appellate review of this Order.

NOTES
E. Conclusion

[1] The CDA will be codified at 47 U.S.C. § 223(a) to (h). In the


Cutting through the acronyms and argot that littered the body of this Adjudication, we refer to the provisions of the CDA
hearing testimony, the Internet may fairly be regarded as a as they will ultimately be codified in the United States Code.
never-ending worldwide conversation. The Government may
not, through the CDA, interrupt that conversation. As the most
participatory form of mass speech yet developed, the Internet [2] The plaintiffs in this action are the American Civil Liberties
deserves the highest protection from governmental intrusion. Union; Human Rights Watch; Electronic Privacy Information
Center; Electronic Frontier Foundation; Journalism Education
Association; Computer Professionals for Social Responsibility;
True it is that many find some of the speech on the Internet to National Writers Union; Clarinet Communications Corp.;
be offensive, and amid the din of cyberspace many hear Institute for Global Communications; Stop Prisoner Rape; AIDS
discordant voices that they regard as indecent. The absence of Education Global Information System; Bibliobytes; Queer
governmental regulation of Internet content has unquestionably Resources Directory; Critical Path AIDS Project, Inc.; Wildcat
produced a kind of chaos, but as one of plaintiffs' experts put it Press, Inc.; Declan McCullagh dba Justice on Campus; Brock
with such resonance at the hearing: Meeks dba Cyberwire Dispatch; John Troyer dba The Safer
Sex Page; Jonathan Wallace dba The Ethical Spectacle; and
Planned Parenthood Federation of America, Inc. We refer to
What achieved success was the very chaos that the Internet is. these plaintiffs collectively as the ACLU.
The strength of the Internet is that chaos.[23]
[3] The plaintiffs in the second action, in addition to the ALA,
Just as the strength of the Internet is chaos, so the strength of are: America Online, Inc.; American Booksellers Association,
our liberty depends upon the chaos and cacophony of the Inc.; American Booksellers Foundation for Free Expression;
unfettered speech the First Amendment protects. American Society of Newspaper Editors; Apple Computer, Inc.;
Association of American Publishers, Inc.; Association of
For these reasons, I without hesitation hold that the CDA is Publishers, Editors and Writers; Citizens Internet
unconstitutional on its face. Empowerment Coalition; Commercial Internet Exchange
Association; Compu-Serve Incorporated; Families Against
Internet Censorship; Freedom to Read Foundation, Inc.; Health
Sciences Libraries Consortium; Hotwired Ventures LLC;
ORDER Interactive Digital Software Association; Interactive Services
Association; Magazine Publishers of America; Microsoft

56
Corporation; The Microsoft Network, L.L.C.; National Press to the Internet and such systems operated or services offered
Photographers Association; Netcom OnLine Communication by libraries or educational institutions."
Services, Inc.; Newspaper Association of America; Opnet, Inc.;
Prodigy Services Company; Society of Professional [7] In the Government's Opposition to plaintiffs' motion for a
Journalists; Wired Ventures, Ltd. We refer to these plaintiffs temporary restraining order in C.A. No. 96-963, it notes "the
collectively as the ALA. Department has a longstanding policy that previous such
provisions are unconstitutional and will not be enforced", and
The eight counts of the amended complaint in this action focus that both President Clinton and Attorney General Reno "have
on the CDA's amendment to 47 U.S.C. § 223, and do not made th[e] point clear" that no one will be prosecuted under
challenge the CDA's amendment of 18 U.S.C. § 1462(c). "the abortion-related provision of newly-amended 18 U.S.C. §
1462(c)." Opposition at 19, n. 11 (February 14, 1996). In view
[4] In addition, we have received briefs of amici of this "longstanding policy", the Government contends there is
curiae supporting and opposing plaintiffs' contentions. Arguing no realistic fear of prosecution and, so the argument goes, no
in favor of our granting the motions for preliminary injunction need for equitable relief. Id. In their post-hearing brief, the
are Authors Guild, American Society of Journalists and ACLU plaintiffs inform us that in view of the Government's
Authors, Ed Carp, Coalition for Positive Sexuality, statement, "they do not seek a preliminary injunction against
CONNECTnet, Creative Coalition on AOL, Tri Dang Do, the enforcement of § 1462(c)." Post-Trial Brief of ACLU
Feminists for Free Expression, Margarita Lacabe, Maggie Plaintiffs at 2 n. 2.
LaNoue, LoD Communications, Peter Ludlow, Palmer Museum
of Art, Chuck More, Rod Morgan, PEN American Center, [8] The court again expresses its appreciation to the parties for
Philadelphia Magazine, PSINet, Inc., Eric S. Raymond, their cooperative attitude in evolving the stipulation.
Reporters Committee for Freedom of the Press, Don Rittner,
The Sexuality Information and Education Council of the United [9] The Government has not by motion challenged the standing
States, Lloyd K. Stires, Peter J. Swanson, Kirsti Thomas, Web of any plaintiff in either case, and we harbor no doubts of our
Communications, and Miryam Ehrlich Williamson. Opposing own on that point, notwithstanding the Government's
the motion are the Family Life Project of the American Center suggestion in a footnote of its post-hearing
for Law and Justice and a group consisting of The National brief. See Defendants' Post-Hearing Memorandum at 37 n. 46
Law Center for Children and Families, Family Research ("Plaintiffs' assertions as to the speech at issue are so off-point
Council, "Enough Is Enough!" Campaign, National Coalition for as to raise standing concerns."). Descriptions of these
the Protection of Children and Families, and Morality in Media. plaintiffs, as well as of the nature and content of the speech
they contend is or may be affected by the CDA, are set forth in
[5] The Act does not define "telecommunications device". By paragraphs 70 through 356 at pages 30 through 103 of the
Order dated February 27, 1996, we asked the parties to parties' stipulation filed in these actions. These paragraphs will
address whether a modem is a "telecommunications device". not be reproduced here, but will be deemed adopted as
Plaintiffs and the Government answered in the affirmative, and Findings of the court.
we agree that the plain meaning of the phrase and the
legislative history of the Act strongly support their conclusion. [10] It became clear from the testimony that moderated
"Telecommunications" under 47 U.S.C. § 153(48) means "the newsgroups are the exception and unmoderated newsgroups
transmission, between or among points specified by the user, are the rule.
of information of the user's choosing, without change in the
form of content of the information as sent and received." The
plain meaning of "device" is "something that is formed or [11] The evidence adduced at the hearings provided detail to
formulated by design and usu[ally] with consideration of this paragraph of the parties' stipulation. See Findings 95 to
possible alternatives, experiment, and testing." Webster's Third 107.
New International Dictionary, 618 (1986). Clearly, the sponsors
of the CDA thought it would reach individual Internet users, [12] Testimony adduced at the hearing suggests that market
many of whom still connect through modems. See, e.g., 141 forces exist to limit the availability of material on-line that
Cong. Rec. S8329-46 (daily ed. June 14, 1995) (statements of parents consider inappropriate for their children. Although the
Sen. Exon and Sen. Coats). parties sharply dispute the efficacy of so-called "parental
empowerment" software, there is a sufficiently wide zone of
The resolution of the tension between the scope of agreement on what is available to restrict access to unwanted
"telecommunications device" and the scope of "interactive sites that the parties were able to enter into twenty-one
computer service" as defined in 47 U.S.C. § 230(a) (2), see paragraphs of stipulated facts on the subject, which form the
infra note 6, must await another day. It is sufficient for us to basis of paragraphs 49 through 69 of our Findings of fact.
conclude that the exclusion of § 223(h) (1) (B) is probably a Because of the rapidity of developments in this field, some of
narrow one (as the Government has argued), insulating an the technological facts we have found may become partially
interactive computer service from criminal liability under the obsolete by the time of publication of these Findings.
CDA but not insulating users who traffic in indecent and
patently offensive materials on the Internet through those [13] This membership is constantly growing, according to the
services. testimony of Albert Vezza, Chairman of the World Wide Web
Consortium. See also Defendants' Ex. D-167.
[6] The statute at § 509 amends 47 U.S.C. to add § 230(e) (2),
which defines such a service as "any information service, [14] See also Defendants' Ex. D-174 and the testimony of Mr.
system, or access software provider that provides or enables Vezza.
computer access by multiple users to a computer server,
including specifically a service or system that provides access

57
[15] From this point, our Findings are, unless noted, no longer (a) THREE-JUDGE DISTRICT COURT HEARING
based upon the parties' stipulation, but upon the record Notwithstanding any other provision of law, any civil action
adduced at the hearings. challenging the constitutionality, on its face, of this title or any
amendment made by this title, or any provision thereof, shall
[16] Mr. Bradner is a member of the Internet Engineering Task be heard by a district court of 3 judges convened pursuant to
Force, the group primarily responsible for Internet technical the provisions of section 2284 of title 28, United States Code.
standards, as well as other Internet-related associations Section 2284 states, in relevant part:
responsible for, among other things, the prevailing Internet
Protocols. He is also associated with Harvard University. § 2284. Three-judge court; when required; composition;
procedure
[17] Dr. Olsen chairs the Computer Science Department at
Brigham Young University in Provo, Utah, and is the recently- (b) In any action required to be heard and determined by a
appointed Director of the Human Computer Interaction Institute district court of three judges under subsection (a) of this
at Carnegie-Mellon University in Pittsburgh, Pennsylvania. section, the composition and procedure of the court shall be as
follows: ...
[18] The term "information content provider" is defined in § 509
of the CDA, at the new 47 U.S.C. § 230(e) (3), as "any person (3) A single judge may conduct all proceedings except the
or entity that is responsible, in whole or in part, for the creation trial.... He may grant a temporary restraining order on a specific
or development of information provided through the Internet or finding, based on evidence submitted, that specified irreparable
any other interactive computer service." damages will result if the order is not granted, which order,
unless previously revoked by the district judge, shall remain in
[19] By "verification", we mean the method by which a user force only until the hearing and determination by the district
types in his or her credit card number, and the Web site court of three judges of an application for a preliminary
ensures that the credit card is valid before it allows the user to injunction....
enter the site.
[2] Justice Kennedy argues in his opinion in Simon & Schuster
[20] InterNIC is a naming organization, not a regulator of v. New York Crime Victims Bd., 502 U.S. 105, 120, 112 S. Ct.
content. InterNIC and two other European organizations 501, 510-11, 116 L. Ed. 2d 476 (1991), that "[t]he regulated
maintain a master list of domain names to ensure that no content has the full protection of the First Amendment and this,
duplication occurs. Creators of Web sites must register their I submit, is itself a full and sufficient reason for holding the
domain name with InterNIC, and the agency will instruct the statute unconstitutional. In my view it is both unnecessary and
creator to choose another name if the new Web site has the incorrect to ask whether the state can show that the statute `is
name of an already-existing site. InterNIC has no control over necessary to serve a compelling state interest and is narrowly
content on a site after registration. drawn to achieve that end.'" In the present case, there is no
disagreement that indecent and patently offensive speech have
the full protection of the First Amendment.
[21] This paragraph and the preceding paragraph also illustrate
that a content provider might store its own material or someone
else's on a caching server. The goal saving money and time is [3] Not only has speech been divided up and given values with
the same in both cases. some types of speech given little or no protection (obscenity,
fighting words, possibly commercial speech) but also, by court
decisions over the years, it has been decided that the content
[1] It also probably covers speech protected by the First of speech can indeed be regulated provided that the regulation
Amendment for some minors a well, because it fails to limit its will directly and materially advance a compelling government
reach to that which is harmful for minors, an issue which it is interest, and that it is narrowly tailored to accomplish that
not necessary to decide in light of the other conclusions interest in the least restrictive manner. However, any content-
reached. based restriction must survive this most exacting
scrutiny. Sable, 492 U.S. 115, 109 S. Ct. 2829; Texas v.
[2] See 141 Cong.Rec. S8342 (daily ed. June 14, 1995) (letter Johnson, 491 U.S. 397, 109 S. Ct. 2533, 105 L. Ed. 2d 342
from Kent Markus, Acting Assistant Attorney General, U.S. (1989).
Department of Justice, to Senator Leahy).
[4] The plaintiffs have made facial challenges to the disputed
[1] If by virtue of the statute's authorization of expedited review provisions of the CDA on grounds of both vagueness and
of its constitutionality, "on its face," 47 U.S.C. § 561(a), we overbreadth. The approach taken and language used in
were strictly limited to looking at the words of the statute, I evaluating a statute under each of these doctrines commingles,
would stand by my T.R.O. opinion. However, in light of the and frequently is treated as a single approach. "We have
procedures which are required by 47 U.S.C. § 561(a) and 28 traditionally viewed vagueness and overbreadth as logically
U.S.C. § 2284, and were followed by this court in establishing related and similar doctrines." Kolender v. Lawson, 461 U.S.
an extensive record in this case, to ignore the evidence 352, 358 n. 8, 103 S. Ct. 1855, 1859 n. 8, 75 L. Ed. 2d 903
presented would be to ignore what an action for injunctive relief (1983) (citing Keyishian v. Board of Regents, 385 U.S. 589,
is all about. 609, 87 S. Ct. 675, 687, 17 L. Ed. 2d 629 (1967); NAACP v.
Button, 371 U.S. 415, 433, 83 S. Ct. 328, 338, 9 L. Ed. 2d 405
Section 561 reads as follows: (1963)). Even in cases where the court attempts to distinguish
these two doctrines, it acknowledges some interplay between
them. See e.g. Village of Hoffman Estates v. Flipside, Hoffman
§ 561. EXPEDITED REVIEW. Estates, Inc., 455 U.S. 489, 494, and n. 6, 102 S. Ct. 1186,
1191, and n. 6, 71 L. Ed. 2d 362 (1982).

58
In addition, when discussing overbreadth, one cannot avoid substantial amount of constitutionally protected conduct", id. As
reference to the same language used to describe and apply the in Hill, the Government's circular reasoningthat the law is
strict scrutiny standard to constitutionally protected constitutional because prosecutors would only apply it to those
activities. See e.g. Sable, 492 U.S. at 131, 109 S. Ct. at against whom it could constitutionally be appliedmust fail. See
2839; Roberts v. Jaycees, 468 U.S. 609, 623, 104 S. Ct. 3244, id. at 464-67, 107 S. Ct. at 2511-13.
3252-53, 82 L. Ed. 2d 462 (1984). While there are occasional
attempts to argue for clear distinctions among these [3] Plaintiffs have argued that we may consider their challenge
doctrines, see e.g. Kolender, 461 U.S. at 369, 103 S. Ct. at under the standards governing both "facial" and "as-applied"
1864-65 (White, J., Rehnquist, J. dissenting), such bright lines challenges. That is, they suggest that we may pass judgment
simply have not been, and most likely cannot be, drawn in this on the decency of the plaintiffs' speech, even if we are unable
area. to conclude that the act is facially unconstitutional. Surely this
procedural confusion arises out of the three opinions of the
[5] Comparing a different portion of each of these two D.C. Circuit in National Treasury Employees Union v. United
provisions suggests that different terms are not to be read to States, 990 F.2d 1271, 1279-80 (D.C.Cir. 1993), aff'd, ___ U.S.
mean the same thing. As written, section (a) pertains to ___, 115 S. Ct. 1003, 130 L. Ed. 2d 964.
telecommunications devices, and section (d) to interactive
computer services. While we have not entirely resolved the I doubt that we could undertake an as-applied inquiry, since we
tension between these definitions at this stage, it has been do not know the exact content of plaintiffs' speech. Indeed, it is
established that these terms are not synonymous, but are in impossible to know the exact content of some plaintiffs'
fact intended to denote different technologies. This, together speech, since plaintiffs themselves cannot know that content.
with the rule of statutory construction set forth in Chief Judge America Online, for example, cannot know what its subscribers
Sloviter's opinion, seems to suggest on the face of the statute will spontaneously say in chat rooms or post to bulletin boards.
that indecent and patently offensive also are not to be read as In any event, I need not address this issue, in the light of our
synonymous. disposition today.

[6] 18 U.S.C. § 1461 states, "The term `indecent' as used in [4] "Dial-a-porn" is a shorthand description of "sexually oriented
this section includes matter of a character tending to incite prerecorded telephone messages". Sable, 492 U.S. at 117-18,
arson, murder or assassination." 109 S. Ct. at 2832.

[7] Although the Supreme Court may rule on the vagueness [5] In turn, Pacifica's definition of indecency has its roots in the
question in the context of cable television regulation in Alliance Supreme Court's obscenity jurisprudence. Indecency includes
for Community Media v. FCC, 56 F.3d 105 (D.C.Cir.1995), some but not all of the elements of obscenity. See,
currently pending on certiorari before the Court, we will not e.g., Alliance for Community Media, 56 F.3d at 113-14 n. 4.
defer adjudication of this issue as the constitutionality of the
term in the cable context may not be determinative of its use in
cyberspace. [6] The reach of the two provisions is not coterminous,
however. As we explain in the introduction to this Adjudication,
§ 223(a) reaches the making, creation, transmission, and
[8] Each intentional act of posting indecent content for display initiation of indecent speech. Section 223(d) arguably reaches
shall be considered a separate violation of this subsection and more broadly to the "display" of indecent speech. I conclude
carries with it a fine, a prison term of up to two years, or both. here only that both sections refer to the identical type of
47 U.S.C. § 223(a), (d) and Conf.Rep. at 189. proscribed speech.

[9] As I have noted, the unique nature of the medium cannot be [7] At oral argument, counsel for the Government candidly
overemphasized in discussing and determining the vagueness recognized that "there's nothing quite like this statute before",
issue. This is not to suggest that new technology should drive and that the CDA's novelty raised some "legislative
constitutional law. To the contrary, I remain of the belief that craftsmanship problem[s]". Transcript of May 10, 1996, at 81-
our fundamental constitutional principles can accommodate 82. I believe that my analysis here makes sense in the light of
any technological achievements, even those the legislative history and the jurisprudence on which Congress
which, presently seem to many to be in the nature of a miracle relied in enacting the CDA. See Senate Report at
such as the Internet. 188, reprinted in 1996 U.S.C.C.A.N. at 201-02.

[1] By Order dated March 13, 1996, we asked the parties to [8] The counterargument is that § 223(e) (5) (A), when read
submit their views on questions regarding allocation of the together with § 223(e) (6), merely confers jurisdiction on the
burdens of proof in these cases. Since I believe that the FCC to prescribe the "reasonable, effective, and appropriate
outcome of these cases is clear regardless of the allocation of actions" that count as defenses. Congress employed a similar
proof between the parties, none of my conclusions in this scheme for dial-a-porn. See Dial Information Servs., 938 F.2d
opinion requires me to choose between the arguments that the at 1539 (citing 47 U.S.C. § 223(b) (3)); Information Providers'
parties have presented to us. Coalition, 928 F.2d at 871.

[2] Although I do not believe the statute is unconstitutionally [9] The play was "critically acclaimed and long-running in Los
vague, I agree with Judge Buckwalter that the Government's Angeles area theaters". Infinity Broadcasting, 3 FCC R. at 932.
promise not to enforce the plain reach of the law cannot
salvage its overbreadth. Even accepting the Government's
argument that prosecution of non-obscene pornography would [10] Analytically, it makes sense that indecent speech has
be a "legitimate application" of the CDA, City of Houston v. public value. After all, indecent speech is
Hill, 482 U.S. 451, 459, 107 S. Ct. 2502, 2508, 96 L. Ed. 2d nevertheless protected speech, see, e.g., Sable, 492 U.S. at
398 (1987), it is clear that the Act would "make unlawful a 126, 109 S. Ct. at 2836-37, and it must therefore have some

59
public value that underlies the need for protection. Obscenity, "dial-in services". Id. at 128, 109 S. Ct. at 2837-38. Since every
by contrast, has no public value, id. at 124, and thus has no telephone call at issue was, by definition, dial-a-porn, every
protection from proscription. telephone call was, by definition, either obscene or
indecent. Id. at 132, 109 S. Ct. at 2839-40 (Scalia, J.,
[11] Internet technology undercuts the Government's argument concurring).
that the "in context" element of §§ 223(a) and 223(d) would
insulate plaintiffs such as Critical Path from liability. See, Here, however, plaintiffs represent forty-seven different
e.g., Transcript of May 10, 1996, at 89-91. A user who clicks on speakers (including educational associations and consortia)
a link in the Critical Path database (see Findings 33, 77-78) who provide content to the Internet on a broad range of topics.
might travel to a highly graphic page in a larger HTML The limited reach of the Sable holding renders it inapt to the
document. The social value of that page, in context, might be Internet communications of the plaintiffs in these actions.
debatable, but the use of links effectively excerpts that
document by eliminating content unrelated to the link. [19] I note here, too, that we have found as a fact that
operation of a computer is not as simple as turning on a
[12] Moreover, because of the technology of Internet relay television, and that the assaultive nature of
chat, it would need to make this determination before it television, see Pacifica, 438 U.S. at 748-49, 98 S. Ct. at 3039-
organized the chat room, since it could not pre-screen the 40, is quite absent in Internet use. See Findings 87-89. The
discussion among the participants. Thus, it would need to use of warnings and headings, for example, will normally shield
predict, in advance, what the participants were likely to say. users from immediate entry into a sexually explicit Web site or
The participants would need to make a similar determination, newsgroup message. See Finding 88. The Government may
unaided (I expect) by First Amendment lawyers. well be right that sexually explicit content is just a few clicks of
a mouse away from the user, but there is an immense legal
[13] Testimony of April 12, 1996, at 235-36. significance to those few clicks.

[14] In this section I do not imply that the FCC has jurisdiction [20] In a May 3, 1996 letter to a three-judge court in the
to process Internet complaints in the same manner as it does Southern District of New York, John C. Keeney, Acting
for broadcast. The extent of the FCC's jurisdiction under the Assistant Attorney General in the Criminal Division of the
CDA is a sticky question not relevant here. See Senate Department of Justice, has advised that tagging would be
Report at 190-91, reprinted in 1996 U.S.C.C.A.N. at 204. "substantial evidence" in support of a § 223(e) (5) (A) defense:
Because the administrative decisions cited above arose out of
citizens' complaints to the FCC, however, they provide a kind Under present technology, non-commercial content providers
of surrogate insight into the kinds of speech that citizens have can take steps to list their site[s] in URL registries of covered
charged as indecent in the past. sites, register their site[s] with the marketplace of browsers and
blocking software (including listing an IP address), place their
[15] See Finding of fact 81. See also Symposium, Emerging material in a directory blocked by screening software, or take
Media: Technology and the First Amendment, 104 Yale L.J. other similarly effective affirmative steps to make their site[s]
1613 (1995). known to the world to allow the site[s] to be blocked. Under
present technology, it is the position of the Department of
Justice that, absent extraordinary circumstances, such efforts
[16] A narrow holding for this new medium also will not would constitute substantial evidence that a content provider
eliminate the chill to plaintiffs, who could well stifle the extent of had taken good faith, reasonable, effective, and appropriate
their participation in this new medium while awaiting a future actions under the circumstances to restrict or prevent access
iteration of the CDA. Such a holding would also lead Congress by minors to the covered material. The same would be true for
to believe that a rewritten CDA (using, for example, a "harmful tagging by content providers coupled with evidence that the tag
to minors" standard, see Senate Report at 189, reprinted would be screened by the marketplace of browsers and
in 1996 U.S.C.C.A.N. at 202) would pass constitutional muster. blocking software.
In my view, a holding consistent with the novel qualities of this
medium provides Congress with prompt and clear answers to
the questions that the CDA asks. Letter of May 3, 1996 from Acting Assistant Attorney General
John C. Keeney to Hons. Denise L. Cote, Leonard B. Sand,
and Jose A. Cabranes, attached to Defendants' Motion for
[17] The history of dial-a-porn regulation both before and Leave to File Supplemental Statement. On May 8, 1996, the
after Sable is tortuous, and involves the intervention of all three Government moved to file the Kenney letter in this action, and
branches of government. I will not rehearse that history here, we granted the motion as unopposed the next day.
deferring instead to the other courts that have recounted
it. See, e.g., Sable, 492 U.S. at 118-23, 109 S.Ct. at 2832-
35; Dial Information Serv., 938 F.2d at 1537-40; Information The letter certainly raises more questions than it answers. I
Providers Coalition, 928 F.2d at 870-73. wonder, for example, whether it is consistent with the plain
language of the Act simply for content providers to "make their
site[s] known to the world" and thereby "to allow [them] to be
[18] Sable is arguably not a decision about mass blocked", even though this form of notice alone would not
communication. Unlike Red Lion, Tornillo, or Turner, the Court reduce the availability of indecent content. Cf. Senate Report at
in Sable reached no conclusions about the proper fit between 178, 1996 U.S.C.C.A.N. at 201 (noting that § 223(d) "applies to
the First Amendment and governmental regulation of the content providers who post indecent material for online display
telephone. The case also includes no discussion of the without taking precautions that shield that material from
technology of the telephone generally. The plaintiff in that case, minors"). It is also an unanswered question whether the
a purveyor of dial-a-porn, challenged the statute only with Keeney letter would eliminate any of the CDA's chill, since the
respect to that type of content. Sable, 492 U.S. at 117-18, 109 Government acknowledged that the letter would not prohibit a
S. Ct. at 2832. Thus, the Court's opinion discussed only the United States Attorney from taking a contrary position in a

60
particular prosecution. See Defendants' May 9, 1996
Response to the May 8, 1996 Order of Court. The letter also
fails to mention how users who participate in chat rooms,
newsgroups, listservs, and e-mail might take advantage of §
223(e) (5) (A). Finally, it is undisputed that neither PICS nor the
hypothetical "-L18" tag are available to speakers using the
World Wide Web today, whom the Government has explicitly
reserved its right to prosecute should the CDA ultimately be
found constitutional. See Stipulation and Order of February 26,
1996, quoted supra.

[21] Turner examined certain "must-carry" provisions under an


intermediate scrutiny, since those laws imposed incidental
burdens on speech but did not directly regulate
content. Turner, ___ U.S. at ___, 114 S. Ct. at 2469. The Court
remanded the case to the district court without passing on the
constitutionality of the must-carry provisions. Id. at ___, 114 S.
Ct. at 2472.

[22] Arguably, a valid CDA would create an incentive for


overseas pornographers not to label their speech. If we upheld
the CDA, foreign pornographers could reap the benefit of
unfettered access to American audiences. A valid CDA might
also encourage American pornographers to relocate in foreign
countries or at least use anonymous remailers from foreign
servers.

[23] Testimony of March 22, 1996, at 167.

61

You might also like