Cybercourt: A Virtual Resolution of Differences
An Alternative Proposal for Law and Order in Cyberspace

The explosion of interest in computers and computer networks (the Internet in particular) during the early 1990s has brought with it a variety of phenomenon. Some of these phenomenon are positive outcomes of improved technology. Other phenomenon have less virtuous origins and consequences. As an increasing number of people begin to use cyberspace as a world in which to meet people, conduct commerce, and pursue alternative "Cyber" personalities, there will continue to be an increase in "cyber" disputes. These disputes may involve both criminal and civil complaints. At present, there is no systematic method for resolving such disputes within cyberspace. In line with those who suggest the usefulness of arbitration and settlement negotiations, this article suggests such a venue in cyberspace. In other words, this article describes a system termed "cybercourt".1 Part I of this article presents the need for such a system. Part II is an outline of the proposed Cybercourt system and a recommended procedure for implementation. Part III is a discussion of both the feasibility of such a system and the possible roadblocks which might be encountered.

I. The Need for a "Cybercourt"

Computer technology has advanced at quantum leaps. Computers have become more advanced with each passing month. The amount of information in CD-ROM format continues to grow. The possibilities within cyberspace have become unbelievable. One is now able to speak to an individual in real-time through Internet-Phone technology. The potential for electronic commerce continues to expand.2 Perhaps, the most visible phenomenon is the growth of information (and disinformation) avaliable on the Internet. This near instant access to information on almost every subject has far reaching possibilities.3 Citizens of the world are able to utilize and understand this information in ways unheard of just a decade ago. This will inevitably increase productivity and efficiency in a number of industries and businesses. Increased productivity will theoretically yield higher profit margins and a more stable economic system.4 In addition, the near instantaneous exchange of information between two or more locations will provide benefits in the fields of medicine, science, and academic research.5 These benefits can lead to improvements in the quality of life for all inhabitants of the world.

Unfortunately, the activity which has accompanied this explosion of interest in computers and computer networks has not been entirely virtuous. Indeed, there has been an increase in the number of computer crimes and a corresponding increase in the attempts to punish computer criminals.6 This has led to a chaotic and unpredictable effort on the part of law enforcement agencies to wipe out computer "hackers"7 and other computer criminals. While law enforcement agencies have made significant improvements since the first efforts at "hacker" crackdowns, their ability still lacks an aura of expertise.8 As a result, civil liberties continue to be discarded in favor of cleaning up the electronic highways. This is not altogether the fault of law enforcement agencies. They often are unprepared and ill-trained for the capture of computer criminals and the handling of related evidence.9 Unfortunately, there has yet to emerge a coherent and rational policy to address this growing problem.10 This necessity of such a proposal is validated by the overflow of state and federal courts in the United States and the increase in cyber citizens. This increase is inextricably tied to the increase in computer crimes11 , both complete and inchoate12, and cyber civil disputes.

One of the circumstances which supports the need for an alternative forum to resolve disputes arising out of cyberspace is the congested nature of the American Court System. This congestion or "litigation explosion"13 is found primarily in civil disputes.14 However, disputes involving computer crime may often find themselves in civil court. Similar to other crimes, victims often feel the need to pursue a civil dispute in order to obtain compensation for their injuries.15 Courts have often allowed restitution claims against those guilty of computer crimes in order to compensate a victim for his or her loss.16 Computer criminals have also been held liable for investigative costs incurred in uncovering a fraudulent scheme.17 Beyond criminal related civil disputes, the growth of electronic commerce, information availability, telemedicine, and other technologies have resulted in the potential for an increase in civil disputes in cyberspace. The congestion of the court system is often an unsatisfactory avenue for dispute resolution. Once a complaint is filed, it may be years before a trial is heard. In addition, during the interim, attorney fees and other costs will impose a significant burden on the parties involved in the dispute. An efficient and affordable alternative is needed in order to address current disputes in cyberspace as well as plan for the future as the cyber community continues to grow.

It is prudent to observe that many people believe that the court system and other dispute processing systems are in trouble.18 One of the problems causing this trouble is too much litigation. There is no doubt that our society has become litigious and looks to the court system for resolution of our disputes. This in itself is not an evil which needs to be dispelled or exorcised. Rather, it is an indication that people place some trust on the judicial system and look to a system to resolve disputes rather than taking matters in to their own hands. However, litigation imposes high costs on both the litigants and taxpayers.19 If it is possible to avoid these inherent high costs and provide a reasonable and reliable means of resolving disputes, it would seem the alternative could provide the benefits of the traditional court system while eliminating the detriments of the same system. However, any alternative forum for dispute resolution needs to be targeted for a specific area of law.20 It is for this reason, that the proposed Cybercourt be initially utilized for crimes and disputes isolated to incidents in cyberspace. That is, the Cybercourt would be limited to electronic and informatics law.21
Cybercourt could significantly reduce the costs to both the litigants who utilize the forum and the taxpayers who would otherwise be supporting the traditional court system in which their disputes would be litigated. First, because the forum itself is within cyberspace, access can be provided to every individual who has a dispute through his or her own computer. This would not only reduce the cost of utilizing a courtroom and the employees who would maintain the courtroom, but also significantly reduce costs of travel to and from traditional forums.22 At the same time, travel time for participants would be significantly reduced.23 Second, the costs in hiring and retaining lawyers will be reduced as well. Trial costs to attorneys would be reduced thereby reflecting in attorney's fees.24 Third, in disputes which require a jury, the jurors will have the same freedom as litigants. That is, they will be able to serve from home and not incur expenses nor loss of income. Therefore, jurors need not be paid for their service; serving as a juror would be part of the agreement in using the networks. Finally, costs to taxpayers will be reduced. Although there will be costs associated with maintaining the Cybercourt, they will not be as much as the costs were the same disputes to be resolved through the traditional court system. The nature of the electronic transmissions create a permanent document without the need for court reporters.25 There will also be no shortage of rooms in which to hold a hearing.26 These reasons suggest the viability of an alternative to the traditional court system if such an alternative can be more efficient and cost less than the current status quo. Cybercourt is such an efficient and cost-saving alternative. When the potential which Cybercourt has to offer is combined with the current and future state of computer crime, there is nothing but an imperative to implement the proposed alternative, Cybercourt.

II. Cybercourt

So, what is this cybercourt? How will it operate? Who will be those who sit as judges? The answers to these questions follow. However, the theory behind the cybercourt system is one of efficiency. This efficiency is economic, political, practical, and social. The economic efficiency would be evident in the minimization of costs both to the court system (i.e. taxpayers) and the litigants, or parties in the controversy. The system would be politically efficient because it would allow experimentation by various legislative bodies on efforts to control cyberspace and its inhabitants before rewriting regulations and laws to cover related cyber-offenses. In other words, cybercourt can be used as an experimental environment for lawmakers, politicians, cyber-citizens, academics, and more. Cybercourt's practical efficiency arises out of the accessibility to those policing cyberspace, the inhabitants of cyberspace who have been violated, and the violators charged with either civil or criminal misconduct. Finally, it will be socially efficient in that it will encourage the resolution of disputes through an environment from which the dispute arose and encourage peaceful and quick solutions.
Cyberspace is an environment which warrants its own judicial system. When this article first was written, response to such an idea in both newsgroup and real-world discussions suggested cyberspace as an enigma. In other words, cyberspace was suggested to be an environment which categorically fit into existing jurisdictions. Today, we realize these supposed jurisdictional lines are not so clear. Courts have attempted to place real-world jurisdictional boundaries and community standards on cyberspace.27 This simply must not be. Cyberspace is a phenomenon beyond real-world boundaries. Indeed, such a place can provoke

many of the same questions about this place that you ask about any place. Lawyers might ask, for example, whether it is public or private...An architect might ask whether the software and hardware, the architecture of this place, is conducive to sharing ideas. A mediator might ask whether one can build trust in this kind of place...It seems to me that when you have created an environment in which these questions can be asked, you have created a place, or something that can be spoken about as if it physically existed and we were all there....As for...the choice of law question: If cyberspace is a place, wouldn't it have its own law, Cyberlaw?28

Similarly, if cyberspace is a place, wouldn't it have its own court system, Cybercourt? These aspects of Cybercourt's efficiency form the basis on which this proposal is founded. This multifaceted efficiency model is the prolegomena to a new judicial order in cyberspace and the electronic frontier.

The idea of a Cybercourt is not entirely new. At least, utilizing electronic media for bringing together individuals for a specific purpose has been practiced for some time. Many of the professional networks (America Online, GEnie, and Compuserve) have message bases which are specifically targeted for specialized interests. However, a unique experiment was conducted in the summer of 1992. This experiment involved a group of individuals in the legal field who joined and contributed to a conference on the subject and future of electronic mail.29 The unique factor was that the conference was conducted via electronic mail.30 The results suggest that utilizing electronic media and cyberspace as forums for resolving disputes is both practical and efficient.31 Specifically, e-mail "has great potential as a mechanism for intra-organizational dispute resolution or group problem solving."32 The use of e-mail simulations were also suggested in creating an electronic community forum whereby law schools could address sensitive issues. Such issues might include grievances students have on the way in which the school operates or a particular class is run.33 Rather than a method by which individuals are attacked, such programs could foster improvements academically and administratively.34 Comments were offered as to the effectiveness of such a system in reducing costs of the legal system and increasing the benefits. One individual was not sure whether the immediate future could produce an "electronic court or formal arbitration" but that "there will be no reason why a formal court procedure cannot eventually be devised which will be appropriate for 'cyberspace.'"35 There is no reason why such a procedure cannot be devised. This is what this article proposes.

A. The Foundation of Cybercourt

The location of Cybercourt will be in cyberspace. Each site location located along the Internet (or other networks) can establish a Cybercourt location by using software currently available. This proposed software environment is what is used to create MUDs or Multi-User Dimensions.36 Typically, these dimensions are used as recreational environments for citizens along the information highway.37 Users of such dimensions log on and explore the particular dimension they have chosen to visit. Some of these dimensions are designed to fit a particular fantasy world motif (i.e. some are dungeons, space stations, etc.) The system operators of the local MUD are able to design the foundation of this motif to their specifications. Users are able to build upon this foundation and add unique, individual characteristics. One can "walk around, chat with other characters, explore dangerous monster-infested areas, solve puzzles, and even create...rooms, descriptions and items."38 Each MUD has an unique Internet address which is used to enter the chosen MUD domain. Theoretically, anyone connected to the Internet can attempt to access the particular MUD.39 Each MUD can implement procedures to prohibit entry to those who are undesirable and allow entry to those who have met the minimum qualifications.40 All of this is accomplished through software which can be run on particular computers and servers. It is in this realm of MUDding that Cybercourt would be established using this software.41

Each domain or site42 location would establish a Cybercourt in its computer system to handle complaints and violations within its domain. Violations and complaints would be based upon a set of policies, rules and regulations which the local cyber community has agreed upon as controlling in the local environment.43 Included in such a policy and use of the computer network would be an acknowledgement of the Cybercourt system and potential participation in its mechanations. Practically, it is not possible to have all of those in a community as large as a university to sit as judge or jury on a particular dispute. Rather, the theory behind Cybercourt would necessarily focus the will of the community by using representatives of the diverse groups who form the cyber community.

These representatives will perform three particular functions. First, there will be representatives who are charged with creating and updating policies, rules and regulations which control the local environment. Second, representatives will be chosen to sit on a panel charged with hearing and resolving disputes. Finally, representatives will be given positions which insure the operation of the system, including the enforcement of the policies adopted. The similarity to the tri-partite system of government utilized in most political domains in our country is not to go unnoticed. It is particularly this system which will be a base model from which to build and redefine the system which will govern cyberspace and the information highway. However, each of these functions is distinct from its real counterpart.

The representatives charged with drafting and publishing the local policies, rules and regulations will necessarily represent all groups indicative of the local population. While the local community may decide to implement their own method for electing or appointing representatives, it is suggested that the 'legislative' body be elected by those in each particular group. However, it is encouraged that the individuals elected to such a position hold some degree of experience with computers and cyberspace. Ideally, this will hold no problems for those concerned. That is, petitions and elections will be held within cyberspace only those with access may be elected. Initially, it is suggested that one individual be apportioned for each 1,000 individuals. This body of representatives would meet within cyberspace in the same environment created for holding Cybercourt.44 The initial objective of this body would be to adopt a set of policies, rules and regulations for providing stability in their cyber community. Included in this stability are protection of individual rights, the efficient operation of the system, and the security to protect the system.45 While each domain would be given the latitude to create their own policies, it is suggested that they adopt as a pattern a uniform set of policies. Currently, organizations have held conferences and other meetings to create a set of ethics and regulations to promote law and order in the electronic frontier.46 Use of the efforts already put forth by these groups would be an efficient and practical way in which to begin. It is necessary that these policies, rules and regulations encompass all of the potential cybercrimes identified above.
The representatives on the judicial panels should be appointed by those who are in control of the operation of the local cyber community. In addition, a consenting majority of the legislative representatives would be necessary for each panel member to acquire his or her seat. In this way, there can be background research completed on each of the candidates and these candidates will exemplify the policy and demeanor which is valued in the community. However, there must be at least one panel member who represents each of the local groups who form the cyber community. Ideally, one panel member for every ten thousand individuals would be the basis on which to form these panels and insure adequate representation. This panel would be charged with hearing the disputes which arise out of the policies adopted by the legislative body. It would be necessary for them to hear both sides (assuming there are only two) of the dispute and adequately distribute justice in the manner best suited for the local community. Sentencing guidelines should be adopted by this body in conformity with the national guidelines promoted by the Cybercourt Institution.47 In this way, no particular locality (jurisdiction) will be overzealous nor too lenient in the sanctions they issue to those convicted of crimes or found guilty of civil violations.

Finally, those who are in position to insure the operation of the local computer system and cyber community are those in an executive or administrative function. These individuals will more than likely be members of the Computer Department of the locality. The specific locality can find those best suited to adopt the responsibilities and fill the positions of this necessary function. Security measure should be as tight as possible. Those who are charged with insuring the security and policing the cyber community can make every effort to do so as long as their behavior does not move beyond the bounds of the Constitution and the policies handed down from the Cybercourt Institution.

As each domain establishes its local cybercourt system, the number of cybercourts will grow. As this growth continues, each of the local cyber communities will feed into a more comprehensive system. That is, for each region, there will be appeals courts in the Cybercourt system. Initially, it would be most fruitful to utilize the system adopted by the federal government in dividing the country into districts and circuits which feed into the Supreme Court. Each of the local cybercourts would feed into an appellate division, similar to the federal district courts. Appeals from such Cyber-district Courts would feed into a circuit division, similar to the federal circuit courts. There will then be a Supreme Cybercourt which each of the Cyber-circuit courts will feed into. Appeals from this Supreme Cybercourt would be taken to either state or federal courts as is applicable to the situation and parties.48 For purposes of cyberspace, citizenship will be recognized as the system or domain from which a user emanates.49

III. Implementation

In order to insure a smooth transition to such a comprehensive and novel approach to cyberspace and the information highway, it is suggested that the initial stages proceed incrementally. In this way, the problems and difficulties encountered may be addressed before they are spread throughout cyberspace out of control. The first stage is to initiate the project at one institution or domain. The model MUD program would be designed and constructed by the Cybercourt Institution and the institution chosen to be the Alpha site. The program would be similar to a "Halls of Government." In light of what has been outlined above, there would at least be three area in the MUD which can be accessed: the legislative, judicial, and executive or administrative. In addition, it might be helpful to program a "lobby," a "clerk's office," and a "library" into the Cybercourt environment.

The "lobby" would be the initial room in which users who log into the Cybercourt environment find themselves. In this room, there will be descriptions of the various aspects of Cybercourt and explanations on how to proceed further. The "library" would include documents relevant to the local community and other material on the information highway. The "clerk's office" would be where those who have a complaint or need to file suggestions, etc. can accomplish such ends. Others have suggested the formation of the network "equivalent of filing offices, containing contract, UCC and land record filings, where...contracts can be recorded in a Read-Only format accessible by those with appropriate clearance.....deeds, probated wills and liens public; contracts, trusts, wills of persons still living private..."50 While this is not advocated here at this point, the general idea is similar to the function a "clerk's office" and "library."
However, before arriving at such a point in time, the Alpha site must construct the program and utilize members of the local cyber community to test the program. When the program is in a ready state, the local cyber community would appoint and elect representatives to the three bodies of the Cybercourt system. It would then be the duty of the legislative body to deliberate and establish a standard policy to be controlling of their community. This policy must be made available to all who use the local system and those who access the local system through legitimate means.51 It may even be beneficial to adopt a contractual approach between being a member of the domain and agreeing to the policies set forth.52 The judicial body would follow by establishing sentencing guidelines. Finally, the executive body would establish such procedures as they deem necessary.

At first, the Alpha site would only here complaints which involve local participants. In this manner, the system can be tested in full operation mode. However, problems arise where an individual originating from a foreign site is violating the policy established at the Alpha site. It is at this point where cooperation is needed between domains and agencies of state and federal governments. If an individual from a foreign site violates a policy which the local site has adopted, it is necessary to provide some incentive for the violating party to participate. Three suggestions are offered. First, the foreign site, upon petition from the local site, can approve or disapprove temporary suspension of the violator's account and access. On the other hand, and perhaps more civil, the foreign site can explain to the violator that they have a choice to either submit to the local site's jurisdiction or have access removed unconditionally. Therefore, if one is acquitted or charged with a minor offense, his or her access need not be terminated or suspended (access will be needed to arrive at the local site.) Second, if an individual fails to place him or herself in the jurisdiction of the local site (at which the violation occurred), the state or federal government will become involved. That is, either there will be some arrangement with a "real-world" enforcement agency by which the violator is charged with real-world crimes (one of which would be failure to abide by Cybercourt policy) or the Cybercourt and the violated individual (or group) bring suit against the individual in civil court. There is no reason both can not be done at the same time. Third, if the violator chooses not to place him or herself in the local site's jurisdiction, the "trial" will proceed against the violator and a default judgment would be entered. Enforcement of such a default judgment would also require collaboration between "real-world" agencies and courts.
Hopefully, as the Alpha site becomes proficient and the prgram eliminates many of the bugs likely to be found, the program can be adopted and implemented at other locations. These locations would be strategically located throughout the United States. It would be logical to establish one Cybercourt in each circuit before expanding much further. These Beta sites would follow the same procedure as that of the Alpha site. Collaboration among the Beta sites would move the system toward a more universal approach and enable the sites to wield more authority. Success among the Beta sites would suggest establishing a Cybercourt in each of the districts. As this continues, eventually the Cybercourt system will be the ideal which has been advocated in this article. When this is realized, it is possible that the National Information Infrastructure will have evolved enough to combine both systems.

The future holds in store a multitude of fascinations for all of us. One can imagine Cybercourt becoming a virtual reality where we are able to see ourselves in the court rooms and antechambers. This would be a visual extension of the system envisioned in this article. However, it would only be as successful as our moralities and prejudices allow. One of the many advantages to the proposed system is that race, national origin, sexual orientation, "voice modulation, looks, grooming, posture, statute, dress," and other classifications on which people are judged become mute.53 It has been suggested that this quasi-anonyminity and "levelling" effect "offers the potential of creating an electronic forum for allowing open discussion of otherwise sensitive issues.54 When I communicate with an individual in cyberspace I am not concerned with what they look like but who they are. It is this beauty that risks being lost when visual stimulation is re-introduced. Until we are able to control our own prejudices or control their effect on our judgments, we should be satisfied with the system proposed. In this system, external factors which should have no part in deciding one way or another in a dispute will be eliminated.

IV. Toward a More Efficient and Just Cyberspace

The system that has been outlined above is an alternative to the established manner in which crimes and civil violations in cyberspace are handled. In an age where law enforcement agencies are learning how to police a system in which they are unfamiliar, and the present court system is overwhelmed with full dockets, an alternative which has the potential of establishing order on the new frontier while enabling those bodies to "catch up" should receive considerable attention. It is hoped this article will generate enough interest in the proposed system to warrant the initial stages suggested.

1 This article was originally presented to the Western Political Science Association at the 1995 Annual Meeting. Since then, I have substantially rewritten and supplemented the article for publication purposes and to make it again relevant, today, in 1997. The fact that the issue of a "cybercourt" has not been substantially addressed nor outright dismissed suggests the continued relevancy of such a discussion. Particularly, the discussion of "Virtual Magistrates" since this article was presented in 1995 suggests the viability of such a system.

2 See "Electronic Commerce" Wellbery, Mudd, etc.

3 While there are many guides to the information available in cyberspace, the book The Internet Yellow Pages provides directions to a wide variety of information on almost every subject. Hahn, Harley, and Rick Stout. The Internet Yellow Pages. Berkeley: Osborne McGraw-Hill, 1994. There are also several Yellow Page search engines on the World Wide Web (ie

4 An analysis of this economic impact is beyond the scope of the present article. It is noted, however, that many employers report an increase in lost time due to frivolous web surfing by employers. See: USA Today Dec. 8, 1995.

5 Notes on telemedicine.


7 While many prefer to use the term 'hacker' in its original and benign definition, I have used the term to mean a "malicious or inquisitive meddler who tries to discover information by poking around." Steele Jr., Guy L., Raphael Finkel, Donald Woods, Geoff Goodfellow and Mark Crispin, with assistance from the MIT and Stanford AI communities and Worcester Polytechnic Institute. "The Hacker's Dictionary." Obtained electronically. Original publication: New York: Harper and Row, 1983. This negative personification is what the public has come to understand it to mean and what law enforcement agencies have meant it to mean. For the traditional meaning of "computer hacker," see generally: Levy, Stephen. Hackers. New York: Dell, 1984.

8 The "Federal Guidelines for Searching and Seizing Computers" is indicative of the awareness law enforcement agencies have of the idiosyncracies in cyber law enforcement. The Guidelines are also indicative of efforts to abide by constitutional rights in cyberspace.

9 Hafner, Katie, and John Markoff. Cyberpunk: Outlaws and Hackers on the Computer Frontier. New York: Simon & Schuster, 1991. See page 88. They describe law enforcement agents who did not know what they were doing, or supposed to do. One officer lifted the phone from a modem which disrupted the transmissions that were in progress. The transmissions could have been used as evidence. While local and state agencies have begun to train special units in computer crime, most of the nations law enforcement officers and agents are unaware of the technology and quick paced change associated with computer crime.

10 As was previously mentioned, some have suggested a "virtual magistrate" type system. Particularly, Georgetown University is working on a "Virtual Magistrate Pilot Progran". However, in order to keep the two systems distinct, I have chosen not to discuss these alternative pilot programs. An analysis of the alternative programs will be a forthcoming project. At any rate, there does not exist a national program for resolving disputes in cyberspace.

11 Rather than discuss every possible crime and corresponding law in cyberspace, it is argued that for every situation in the real world, there can be a corresponding situation in cyberspace. If we understand that cyberspace mimics the interaction of human beings, we can see the potential for the corresponding crimes and injustices which inevitably follow.

12 Inchoate is used as it is defined in the Model Penal Code under criminal attempt; specifically, under Article 5, Section 5.01:

(1) Definition of Attempt. A person is guilty of an attempt to commit a crime if, acting with the kind of culpability otherwise required for commission of the crime, he:
(a) purposely engages in conduct which would constitute the crime if the attendant circumstances were as he believes them to be; or
(b) when causing a particular result is an element of the crime, does or omits to do anything with the purpose of causing or with the belief that it will cause such result without further conduct on his part; or
(c) purposely does or omits to do anything which, under the circumstances as he believes them to be, is an act or omission constituting a substantial step in a course of conduct planned to culminate in his commission of the crime.

13 It is recognized that there is a "litigation explosion controversy." However, for purposes of this article, a discussion into the merits of either side of the controversy is not necessary. It is sufficient to note that some may disagree with general comments in the article. The article is attempting to provide a more efficient alternative for dispute resolution within cyberspace. It makes no claims as to the need for general ADR in other areas of law. For more information, see generally:

14 As Section II will indicate, an increase in the number of computer crimes and an increase in the prosecution of computer criminals will necessarily increase the number of cases which arise in criminal courts.

15 Examples include tort remedies for infliction of emotional distress, trespass, assault, battery, etc. In relation to computer crime, victims may seek compensation for trespass via computer, recovery of stolen property, and more post-modern cyberspace crimes. These post-modern cyberspace crimes include rape, assault, and battery. See: Dibbell, Julian. "A Rape in Cyberspace." The Village Voice, December 21, 1993. Dibbell's article suggests that cybersex has indeed brought with it more than the pandering of sexual material. In fact, it is now possible to be raped in cyberspace. The cyber-rape occurred in a game called a MOO or MUD. These are computer programs which simulate a world. Users are able to create their own environments and traverse the environments others have created. It is also possible to participate in "real-time" conversation with other users. Many of the programs and games available on the Internet have themes or particular story lines. Dibbell relates the story of how a male user of one of these programs made profane and vulgar suggestions to two particular female users. The suggestions were more than words. This male used a device like a voodoo doll and was able to make it appear as if the female characters were doing particular actions to themselves. Dibbell relates how the two women involved were quite emotionally upset. He suggests that the mental impact of a rape in the real world or in cyberspace may indeed have the same depth. If this is true, then certainly the victims of this injustice felt humiliation and embarrassment. Is it possible for a "rape" to occur without bodies physically touching one another? Is it possible for mental rape to be an illegal offense? If the answer is "yes" to either of these, then this opens up another entire area of cyberlaw on which policy makers will have to make decisions which are particular to the crime in cyberspace.

16 ANNOTATION: MEASURE AND ELEMENTS OF RESTITUTION TO WHICH VICTIM IS ENTITLED UNDER STATE CRIMINAL STATUTE." 15 A.L.R.5th 391, sec. 9. Lawyers Co-operative Publishing Co. Citing State v. Holmberg (1989, Iowa) 449 NW2d 376: "a defendant convicted of computer theft can be ordered to make victim restitution in an amount beyond the offense to which the defendant pleaded guilty, such that the victim receives compensation for his or her total loss, though the lower tribunal's decision would be reversed due to lack of proof that the defendant caused more damage than the extent to which he admitted-- $500. The subject charges stemmed from the defendant's act of making unauthorized use of the victim's phone lines. While he was charged with computer theft in the first degree (a crime resulting in a loss of services or property of more than $5,000), he entered, per agreement, a plea to third-degree computer theft (involving more than $100 and less than $500 in loss). The lower tribunal ordered the defendant to make victim restitution of $12,603.27. On appeal, the defendant contended that the restitution order was necessarily limited by the parameters of the offense to which he entered his guilty plea. The court, on review, disagreed, noting that a restitution order can be extended to any amount which would be appropriate for tort recovery. In the instant matter, however, the court concluded, no proof was adduced which established that the defendant caused damage in excess of $500. --SUPP--
Also recognizing that defendant convicted of computer theft could be ordered to make restitution to his victim in amount of victim's actual loss: Commonwealth v Gerulis (1992) 420 Pa Super 266, 616 A2d 686, appden (Pa) 633 A2d 150." Obtained via LEXIS.

While the cases cited here were criminal, this is precedent for a victim to bring civil suit under the same theories.

17 Id., sec. 9a. "In State v Lindsly 106 Or App 459, 808 P2d 727 (1991), the court held that a defendant convicted of "computer crime" could be ordered to make victim restitution for the investigative costs expended by his victim in uncovering the defendant's fraudulently gained access to the telephone company's computer network. On appeal, the defendant specifically contended that the trial judge erred in imposing restitution in the sum of $36,840 for investigative expenses, as such costs are not contemplated by ORS 137.103(2), which provides for restitution to cover a victim's "pecuniary damage." The court, on review, held that the damages incurred by the victim in the instant matter were substantial, and that the victim suffered more than "inconvenience" or a temporary restriction on its work activities. That is, the court explained, investigation of the computer system break-in required expertise and specialized technology. The defendant caused damage to the system, the court added, because he retrieved and used valid passwords which had to thereafter be replaced."

18 Rowe, Thomas D. "American Law Institute Study on Paths to a 'Better Way': Litigation, Alternatives, and Accommodations: Background Paper." 1989 Duke L.J. 824.

19 ibid, page 826. Rowe cites from a Yale Law Journal Article ["Rethinking Fairness" Perspectives on the Litigation Process." 94 Yale L.J. 1643, 1644 (1985.)] "...there can be little doubt that the system is not working very well. Too many cases take too much time to be resolved and impose too much cost upon litigants and taxpayers alike."

20 Id. at 839.

21 I am purposely limiting the scope of the proposed Cybercourt in order to insure a workable project. In the future, one could reasonably imagine the same forum being used for a variety of legal disputes outside the cyber-community context. Indeed, it is hoped that success in this project may indeed lead to a more encompassing forum. Other alternatives for resolving disputes should continue to be explored. In fact, some suggestions in the area of dispute resolution may indeed encourage the use of Cybercourt. See generally: Varon, Jay N. "Promoting Settlements and Limiting Litigation Costs by Means of the Offer of Judgment: Some Suggestions For Using and Revising Rule 68." 33 Am. U.L. Rev. 813 (Summer 1984).

22 The impact this might have on diversity cases is a subject well-deserving of an article. There would no longer be any practical difficulties for trial participants traveling far into another state or jurisdiction's court. In addition, because it would no longer be necessary for one to travel to a distant court, there would be no other travel expenses. Indeed, one could almost continue working were the form sessions held at a convenient time. One other question would be with regard to the "minimal contacts" test: Does a computer user who travels through a modem have sufficient contacts in another state where a violated computer or victim sits? This is perhaps another reason for a structural dispute resolution system within cyberspace - where the boundaries are limitless - because disputes are adequately addressed only in a similar environment from which they arose.

23 See: Hardy, I. Trotter. "Symposium: Electronic Communications and Legal Change: Electronic Conferences: The Report of an Experiment." 6 Harv. J. Law and Tec 213 (Spring 1993), page 233, where conference participants saved on travel time. One participant remarked that he spent about four hours reading and writing messages for the conference over a three-week period. Considering that many would spend the same amount of time traveling to a conference location, or court, it is evident that the time saved is money saved.

24 At this point, the lack of any calculated results may be a weakness in this particular supporting argument.

25 Hardy, "Electronic Conferences," page 234.

26 Theoretically, there is an infinite amount of space (room) in cyberspace. However, the number of rooms at any particular Cybercourt location may be limited by the software used. Two considerations become evident: First, too many rooms may slow down the processing time of the computer running the software; Second, there are a limited number of addresses that a particular computer can hold. Beyond mentioning these limitations, a further discussion is left for another article. networks overwhlemed, need new internet addresses

27 U.S. v. Thomas

28 Hardy, "Electronic Conferences," page 231-32.

29 Hardy, "Electronic Conferences," see generally.

30 Each participant read and replied to the contributions of the other members. Hardy's article includes selections from these conributions.

31 The focus of the conference was on e-mail. However, contributors suggested that e-mail is important in the decision making process: "issues are teed up, commented upon and resolved, often without face to face meetings."

32 ibid, page 223.

33 ibid, page 222. It was also suggested that the electronic mail environment could provide a useful method by which mentor programs are fostered. Responses to this suggestion (although few) were positive both by academics and those practicing.

34 Unfortunately, message bases often receive "hazing" where ugly comments and antagonistic mannerisms are put forth. As Hardy suggests, a good mediator can control this.

35 bid, page 227.

36 Also referred to as Multiple User Dungeon, or Multiple User Dialogue. New technology suggests that a more advanced environment may be available through Internet Phone (I-Phone) technology. That is, one is able to both see and hear another individual connected on the same channel. However, this author's experiments suggest that the technology does not yet allow for efficient use of such an environment. Perhaps, an environment based on I-Phone technology may be prudent when the Cybercourt system has perfected its fundamental essentials.

37 This could be the present equivalent of tomorrow's holodeck as featured on Star Trek: The Next Generation.

38 Information used is from MUDs and MUDding FAQ (Frequently Asked Questions) obtained from

39 Some domains may restrict the use of their individual accounts. An educational institution may, for example, have chosen to establish a policy which deters use of MUDs. In the MUDs and MUDding FAQ, readers are warned to determine their systems policies before MUDding.

40 Most of the MUDs hich I have visited do not have any restrictions on those who may or may not enter. One restriction might be age in those MUDs of an adult nature.

41 A more in depth analysis and description of the software is postponed for a future discussion.

42 I utilize domain from herein but refer to either site or domain.

43 The local cyber community is defined here as the conglomerate of those who utilize the domain. For example, in an educational domain, the cyber community consists of students, faculty, administrators, and any others who utilize the system.

44 This would not be difficult. It is a matter of creating a different room or set of rooms within the MUD system.

45 Other aspects of stability will suerely be added as time progresses.

46 While a suggested policy is beyond the scope if this article, two organizations are the Computer Ethics Institute (soon to hold the 4th National Computer Ethics Conference April 27-28, 1995) and the Association for Computing Machinery (ACM). See the ACM's "Code of Ethics and Professional Conduct," found in Forester, Tom and Perry Morrison. Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing. Boston: MIT, 1994. One project which may prove to be extremely useful for this subject and others is Project LEON (Law and Ethics on the "Nets".) This is a number of individuals in the legal community who are working toward promoting "a dialogue that can lead to recommendations for dealing with the many issues" which face the networks and their inhabitants. It is a joint venture between the John Marshall Law School's Center for informatics Law (CIL) and the American Bar Association Section of Science & Technology Committee on Information Practices, Policies, and Privacy (IPPP). See: Trubow, George B. "Law and Ethics on the 'Nets.'" blast. Janury 1995.

47 See below for more information on the national role in local communities. As for the Cybercourt Institution, this article advocates the creation of such an Institute to aid in the implementation and efficient operation of a nationwide system.

48 A discussion of whether all cyber disputes would be addressable in federal court is beyond the scope of this article. Thus, diversity and federal question aspects of cyberspace is not considered here. However, because transmissions cross state lines and there are no real boundaries between users, it is suggested that cyberspace be a federal phenomenon. One other alternative is the recognition by the Federal and State Governments that the Supreme Cybercourt is the final decision in such disputes.

49 This is contrary to the current federal definition of citizenship for diversity purposes. Another issue is to consider citizenship of those living in other countries. Initial suggestions would be to implement the same system outlines in other countries and have a International Supreme Cybercourt to resolve disputes among citizens of different countries. Because the Internet is set up the same (to a degree) throughout the world, and the domain system is identical, there should be no probelms (outside of law) in doing this.

50 Hardy, "Electronic Conferences," at 230.

51 If one accesses the system through non-traditional means by way of hacking or other "illegal" means, the very act which creates access being illegal need not give the intruder notice of other violations. By breaking into a system, one assumes responsibility and is liable for any violations which follow.

52 Dunne, Robert L. "Deterring Unauthorized Access to Computers: Controlling Behavior in Cyberspace Through a Contract Law Paradigm." Jurimetrics, Volume 35, Number 1, Fall 1994. Quote is taken from Hardy, "Electronic Conferences," at 221.

53 I omit sex for the sole reason that in cyberspace you have the choice of choosing your name or handle and oftentimes this handle is indicative of gender. However, more often than one would believe, many men adopt female personas, so you can never be too sure.

54 Hardy, "Electronic Conferences," at 213.

Copyright 1995, 1999 by Charles Lee Mudd, Jr.