IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA - - - AMERICAN CIVIL LIBERTIES : CIVIL ACTION NO. 96-963-M UNION, et al : Plaintiffs : : v. : Philadelphia, Pennsylvania : March 22, 1996 JANET RENO, in her official : capacity as ATTORNEY GENERAL : OF THE UNITED STATES, : Defendant : . . . . . . . . . . . . . . . . HEARING BEFORE: THE HONORABLE DOLORES K. SLOVITER, CHIEF JUDGE, UNITED STATES COURT OF APPEALS FOR THE THIRD CIRCUIT THE HONORABLE RONALD L. BUCKWALTER THE HONORABLE STEWART DALZELL UNITED STATES DISTRICT JUDGES - - - APPEARANCES: For the Plaintiffs: CHRISTOPHER A. HANSEN, ESQUIRE MARJORIE HEINS, ESQUIRE ANN BEESON, ESQUIRE American Civil Liberties Union 132 West 43rd Street New York, NY 10036 -and- STEFAN PRESSER, ESQUIRE American Civil Liberties Union 123 S. 9th Street, Suite 701 Philadelphia, PA 19107 -and- For the ALA BRUCE J. ENNIS, JR., ESQUIRE Plaintiffs: ANN M. KAPPLER, ESQUIRE JOHN B. MORRIS, JR., ESQUIRE Jenner and Block 601 13th Street, N.W. Washington, DC 20005 - - - 2 APPEARANCES: (Continued) For the Defendant: ANTHONY J. COPPOLINO, ESQUIRE PATRICIA RUSSOTTO, ESQUIRE JASON R. BARON, ESQUIRE THEODORE C. HIRT Department of Justice 901 E. Street, N.W. Washington, DC 20530 -and- MARK KMETZ, ESQUIRE U.S. Attorney's Office 615 Chestnut Street, Suite 1250 Philadelphia, PA 19106 - - - Also Present: MICHAEL KUNZ Clerk of the Court for the Eastern District of Pennsylvania - - - Deputy Clerks: Thomas Clewley Matthew J. Higgins Audio Operator: Andrea L. Mack Transcribed by: Geraldine C. Laws Grace Williams Tracey Williams Laws Transcription Service (Proceedings recorded by electronic sound recording; transcript provided by computer-aided transcription service.) 3 1 (Whereupon the following occurred in open court at 2 9:30 o'clock a.m.:) 3 CLERK OF COURT KUNZ: Oyez, oyez, oyez, all manner 4 of persons having any matter to present before the Honorable 5 Dolores K. Sloviter, Chief Judge of the United States Court 6 of Appeals for the Third Circuit, the Honorable Ronald L. 7 Buckwalter and the Honorable Stewart Dalzell, Judges in the 8 United States District Court in and for the Eastern District 9 of Pennsylvania may at present appear and they shall be 10 heard. 11 God save the United States and this Honorable Court. 12 Court is now in session, please be seated. . . . 7 (Court in recess at 12:20 o'clock p.m.) 8 (The following occurred in open court at 1:30 p.m.) 9 COURTROOM DEPUTY: All rise, please. 10 Court is now in session. Please be seated. 11 MR. MORRIS: Good afternoon, your Honors. 12 THE COURT: Good afternoon. 13 (Discussion off the record.) 14 JUDGE DALZELL: Going back to Dr. Bradner? 15 MR. MORRIS: Good afternoon, your Honors. I'm John 16 Morris, again, counsel for ALA plaintiffs -- 17 JUDGE SLOVITER: And still. 18 MR. MORRIS: And still. (Laughter.) 19 JUDGE DALZELL: Dr. Bradner, you're still under 20 oath. Do you understand that? 21 THE WITNESS: Yes. 22 JUDGE DALZELL: Very good. 23 MR. MORRIS: Just to clarify the record, Mr. Bradner 24 is not a Dr. Bradner, although -- 25 JUDGE DALZELL: Okay, Mr. Bradner, all right. 123 1 THE WITNESS: I may sound like one. 2 JUDGE SLOVITER: You fooled us. 3 JUDGE DALZELL: Sure did. 4 SCOTT BRADNER, Previously Sworn, Resumed. 5 REDIRECT EXAMINATION 6 BY MR. MORRIS: 7 Q Mr. Bradner, I really just want to go back over a very 8 few points that you just talked about yesterday. Mr. Baron 9 asked you about the Internet Protocol Version 6. Can you 10 tell me, will the user of the Internet, typical user of the 11 Internet, notice a significant change in how the Internet 12 operates when Version 6, the next generation, is rolled out? 13 A The IP Version 6 itself is just a replacement for the 14 wheels, the bit -- the packet format of the packets that go 15 across the net. The applications do not change in general by 16 changing the underlayment which goes over. There is a 17 possibility in the long term to get some increased 18 functionality to do with the ability to do real time 19 processing, telephone over the Internet kind of things, but 20 this is research work and development work yet to be done. 21 But basically the applications will remain the same 22 applications you're currently using, and you wouldn't see any 23 different -- the user would not see any difference. 24 JUDGE DALZELL: So what is the change in some? 25 THE WITNESS: The change in some is that the 124 1 individual packet can address far more nodes, so therefore -- 2 JUDGE DALZELL: Okay, so it's the 32 to the 128 3 bits. 4 THE WITNESS: Yes. 5 BY MR. MORRIS: 6 Q And, Mr. Bradner, in your declaration submitted as direct 7 testimony here, you describe a number of structural and 8 operational issues raised by the Communications Decency Act. 9 Would those issues still be in play and still be raised under 10 Internet Protocol Version 6? 11 A The issues here referred to are the inability of the 12 speaker or the poster of some information to be able to 13 determine whether the recipients are all qualified non- 14 minors, is that the -- 15 Q Right. 16 A And no, they would not change. 17 Q Okay, let me ask you, the inability of speakers that you 18 described in your direct testimony, would that significantly 19 change at all if you accepted Mr. Baron's proposal of placing 20 a tag in an HTML file or a tag in a URL? Would the speaker's 21 ability to ensure that minors didn't have access to speech 22 significantly change? 23 A I would not think it would make any difference to my 24 level of comfort that my speech was so protected, because in 25 order to agree that it was, I would have to hypothesize that 125 1 all of the possibly affected minors were using web browsers 2 which supported this tagging, and they all had been 3 configured to have that configura -- the exclusion features 4 turned on. And I would think that that would be a bit of a 5 hard push to make the -- for me as a speaker to make that 6 assumption, particularly since the pervasiveness from what I 7 read of the statute which is tedious to read, though I've 8 read it a few times, it doesn't constrain me to insure only 9 within the United States. So I would have -- since all of my 10 speech on news groups and things go worldwide, I would think 11 that I would have to be assured that worldwide that every 12 minor who happened to have -- might potentially have access 13 would have such a browser and have it configured in a way 14 which restricts access. And I think that would be a very 15 difficult thing for me to assume, and I wouldn't want to 16 assume that. 17 JUDGE DALZELL: How about if you limited it to the 18 United States? 19 THE WITNESS: It's still something where the 20 individual user, or the user's parent, if that be the case, 21 would have to insure that each individual minor who has 22 access through whatever means, through school, through 23 libraries or through the home, would have a compliant browser 24 and have that browser configured. And there's no way for me 25 as a speaker to know whether that in fact is the case. And 126 1 that's my -- the substance of my direct deposition was that, 2 that I as a speaker have no mechanism by which I can go out 3 and examine the capabilities and feature sets of what the 4 listeners are using to listen to my speech. So I don't know 5 whether they would have that restriction in. I could not 6 know whether they had that restriction in. 7 JUDGE SLOVITER: While we're on that point, I'd like 8 to ask a question so that we don't have to come back to it. 9 On page 33 of your declaration, you, in discussing tagging, 10 you said it is impossible to imbed such flags or headers in 11 many of the documents made available by anonymous FTP gopher 12 and the Worldwide Web without rendering the files useless. 13 JUDGE DALZELL: Which paragraph was that? 14 JUDGE SLOVITER: Well, it's on page 33. 15 JUDGE DALZELL: Oh, page 33. 16 JUDGE SLOVITER: Yes, page 33. Is that part -- 17 MR. MORRIS: It's paragraph 79. 18 JUDGE SLOVITER: Oh. Is that part of the same 19 matter that you're talking about? 20 THE WITNESS: No. This is a somewhat different 21 matter. The matter I was just speaking of is whether I as 22 the speaker could tell whether a user was operating a browser 23 that would inhibit -- that would watch those tags. What I'm 24 speaking of in the deposition here and I also spoke of 25 yesterday for a minute was that there are certain kinds of 127 1 files, whether there be voice files or picture files or 2 executables programs, computer programs, which you couldn't 3 actually go in and modify by adding some character stream 4 which would be these tags, without making them inoperative 5 just simply because they are a particular format. And they 6 expect to be in that format and if they're not in that format 7 and the format would be destroyed by adding some tags, then 8 they wouldn't work. 9 That doesn't mean that a new format couldn't be 10 derived. But the existing ones would not work. 11 JUDGE SLOVITER: Technologically. 12 THE WITNESS: Technologically, yes. 13 BY MR. MORRIS: 14 Q Yesterday, at least on our side of the table, a little 15 bit of confusion arose in terms of the definition and the 16 explanation of links on the Worldwide Web. Could you just 17 take a moment and explain the relationship between a link, 18 kind of a link -- the linkee and the linker. 19 JUDGE SLOVITER: In simple language. (Laughter.) 20 No, I really think that it is necessary if Judges 21 are supposed to decide matters, then it is necessary for the 22 parties and the witnesses to present it in intelligible form. 23 THE WITNESS: Well, that's a strong challenge, but I 24 will try. 25 JUDGE SLOVITER: Well, but it's a necessary one. 128 1 THE WITNESS: And if I fail, you will let me know, I 2 am sure. 3 JUDGE SLOVITER: Well, yes, and the people for whom 4 you are testifying will know, so I think it's very important. 5 THE WITNESS: Basically the way I would refer to a 6 link in this context is simply a pointer. It is a piece of 7 text, and it's just a character string, it happens to have 8 some format to it, but it's a character string which 9 specifies a particular computer on the Internet, and a 10 particular file within that computer that is being pointed 11 at. 12 It also has some structure at the beginning which 13 says what program do you use to go point at that. So I can 14 say, use the Web or use FTP or use Telnet or use some other 15 application-level program to go look at this file. So the 16 file itself is -- although I used an example of one in my 17 deposition of E2EVF12.IP which is one of the data files 18 that's on my machine that's referring to the performance of 19 some network device. That's a file name. 20 The pointer to that would include the name of my 21 machine, that's at NDTL.HARVARD.EDU and then the path to that 22 file and then that file name itself. So all it is is it's a 23 way to globally say this is the file that I'm interested in. 24 It's not relevant to where the viewer sits. It is an 25 absolute reference to the particular piece of data, and the 129 1 particular piece of data is always a file of some kind, 2 although with a reference of what program to use to do that. 3 Now, I think that the question you're asking is -- 4 or the implication you're coming up with is do I have to 5 know, if I'm the provider of a file, if I have a file on my 6 computer, do I have to be involved with somebody pointing at 7 that file, and the answer is no. I have no way of knowing 8 whether somebody has a URL, one of these pointers, which 9 refers to one of my files or refers to my computer. It can 10 be -- other people do that. I know they do, I don't know 11 who, but I do know that computer manu -- vendors of these 12 devices have given out pointers to their data within my 13 system. But I don't know who did it. I have no way of 14 knowing. There's no involvement on my part. It is simply 15 that somebody has said, if you're interested in finding out 16 about the performance of this product, here is the URL of the 17 file. And so there is no relation, there is no implied 18 relationship between the pointer and the pointee, to use your 19 semi-technical words. 20 Was that clear enough? 21 JUDGE SLOVITER: Yeah, finally. (Laughter.) 22 BY MR. MORRIS: 23 Q Just as I understand it then, someone else, a company can 24 point to your computer and point to a file on your computer. 25 Do they have to point to your home page, or can they point to 130 1 other files on your computer? 2 A As I mentioned yesterday, they can point to the specific 3 file that they're interested in, bypassing any structure that 4 I have, including my home page or any subsidiary pages or any 5 directory structure. They specify the particular file that 6 they want people to look at. It is irrelevant to what 7 sequence I might want them to go through, if I had a home 8 page and subsidiary pages, they would be bypassed entirely if 9 the pointer so chose. If the pointers chose to specify a 10 particular data file, it would bypass all of that. 11 Q And so if you placed some HTML flag or tag in your home 12 page, that would be bypassed by someone linking to one of 13 your lower pages? 14 A That is correct. This page, the home page, would not be 15 loaded, would not be observed, would not be accessed, would 16 no be hit, to use the parlance that was talked about this 17 morning by the person who was accessing the data file. It 18 just wouldn't be seen. 19 Q And say -- in a lower page, say you placed a flag in a 20 lower Web page, and that Web page included a reference to an 21 image on your computer. You didn't place a flag on the image 22 because you had a flag on the page that gave immediate access 23 to the image. Could someone link to that image without 24 linking to the page that you have intended to be the 25 presentation of that image? 131 1 A Yes. You can configure browsers such as Netscape such 2 that when you are selecting an image or something like that, 3 selecting a URL, it will show up in a screen, a little window 4 in the page. So if you type that down, type down, write down 5 that information, you have the literal pointer to a file. 6 And if the file happens to be a picture file which is 7 imbedded in -- which I would normally embed in one of my 8 pages, then you can reference it directly. It is just 9 another point to another file. There is nothing special 10 about it in the context of the way things are organized on 11 the computer, it's just another file that happens to have a 12 pointer to it or more than one pointer to it, however many 13 pointers that people, including me or others, have created. 14 Q Okay, there's been a fair bit of discussion today and 15 yesterday about the concept of a hit. In terms of you as a 16 speaker being able to control access or screen access in some 17 way to who's getting your files, does the -- if someone comes 18 to your Web page and initiates ten hits by getting an HTML 19 file and a graphic image and an audio file, to keep content 20 from that person, would you need to screen just once, or 21 would you need to screen each request for each different 22 file? 23 A Making the assumption which is implied in your question 24 that there is a way that I can identify the originating query 25 by using its IP address, and I want to somehow decide that 132 1 this person or this computer where the query is originating, 2 and that's what I'm using to filter on, then from the 3 server's point of view I would have to make a check for that 4 query every time a query -- a check for that address every 5 time a query came in and a query is a hit. So for every hit, 6 my server would have to verify that address. 7 Q So if a thousand people on a given day visited your site 8 and generated let's say 4,000 hits by looking around your 9 site, then do I understand that you would have to -- one 10 would have to screen 4,000 times or just 1,000 times? 11 A The actual mechanism would require the screening 4,000 12 times. Now, just the software puts things in the temporary 13 storage called cashing, such that the second look-up is 14 quicker than the first one, but it still has to look up each 15 one individually. 16 Q Okay. Let me just run over a few little loose ends on 17 some of the other areas that you were asked about yesterday. 18 With listserves, can you just explain that there's 19 an individual or perhaps a company that decides to create a 20 mail exploding program, like Listserve or Major Domo. and 21 then who actually speaks through that listserve? Is it just 22 the company, just the individual who created the listserve, 23 or who speaks to that? 24 A Most listserves are for discussion. Some listserves are 25 for propogation of information like advertising. In the 133 1 latter case then the organization that creates it, it's just 2 a mailing list for that organization, and in which case just 3 somebody from that organization speaks. But for the vast 4 majority of listserves or mail exploders, it is a 5 communications mechanism between the people on that 6 listserve. Anybody who sends mail to the listserve will -- 7 the mail will be forwarded to all members of the listserve, 8 all addresses which are in the listserve. 9 There are some listserves set up so that only people 10 who have subscribed can send mail to it, and others that are 11 set up so that anybody can send mail to it, but only people 12 who have subscribed will see that mail. But there is in most 13 cases, although than the moderated listserves where the mail 14 will go to a moderator and then be forwarded, anybody who has 15 the address of the listserve can send mail to it and it will 16 be forwarded to all of the folks whose addresses are listed 17 in the list. 18 Q So it's a fairly open means of communication. 19 A Yes. 20 Q Let's briefly discuss news groups, Usenet news groups. 21 There was actually a little uncertainty today, I believe you 22 probably were in the courtroom, about number of moderated 23 news groups. Do you have any information that you could 24 provide the Court, any estimate of moderated news groups 25 versus unmoderated news groups? 134 1 A I can only estimate based on when I ran the news server 2 at Harvard, which I stopped running about two years ago. The 3 number of moderated news group was in the ten percent or 4 maybe a little bit less range. My guess today, and this is 5 mostly a guess, would be that it would be a significantly 6 smaller amount. As I think I've talked yesterday, news 7 groups and the number of people on the news groups are 8 growing quite rapidly, so the requirement of effort of a 9 moderator is also growing. So that to find people who are 10 willing to wade through thousands of messages a day to decide 11 to forward them is getting harder and harder. We don't have 12 that many masochists, I guess. And therefore the number of 13 moderated news groups is dropping. A number of news groups 14 that used to be moderated are no longer moderated because 15 they can't find somebody with the right degree of gumption to 16 moderate it. 17 Q And moderators are usually volunteers? 18 A In most cases where it's not a news group that's set up 19 by a particular organization to talk about their product, 20 they are volunteers, yes. 21 Q Okay. Yesterday there was also -- you were asked about 22 the creation of new news groups. I believe you said the Alt 23 hierarchy was fairly free, people could create things 24 individually. But the other hierarchies, could you explain 25 again who creates that? Is there one entity or organization 135 1 that approves the creation of a new news group within a -- 2 say, for example, the Biz hierarchy? 3 JUDGE SLOVITER: The what? 4 MR. MORRIS: Biz, B-I-Z, as in business. 5 THE WITNESS: One of the hierarchies I mentioned 6 yesterday. Somebody within a news group, taking for example 7 the one that I used yesterday, the REC.AUTO (ph) news group, 8 the traffic got large on the REC.AUTO news group, and a 9 number of people proposed to the news group that the news 10 group be broken up into subcategories for people of different 11 interests. A discussion ensued amongst the people who 12 subscribe to the news group, and a proposal was worked out as 13 a democratic back and forth process and a suggestion was sent 14 off to a particular news group which is called NEWS.NEWS 15 GROUPS or something like that, which is a specific news group 16 set aside to discuss the creation of new news groups, and a 17 discussion occurred on there. Then a call for a vote is 18 given. And then whoever is doing the proposing for this news 19 groups, which is just somebody of interest, somebody who's 20 interested in it, collects up the E-mail votes that they get, 21 and posts a list of all of the votes. It's this many votes 22 in favor of this proposed news group and this many votes 23 opposed, over some duration of time. 24 If the votes are more than a certain amount, and it 25 used to be that you had to have 100 votes in favor and no 136 1 more than 25 against, -- I don't know what the numbers are 2 today, that was what it was three years ago, and I suspect 3 the numbers are much higher today -- then it's declared that 4 that news group is a legitimate news group. And by declared, 5 it's just the yes, it met -- everybody agrees it met the 6 requirements so therefore it's legitimate, and whoever put in 7 the original proposal would then issue the news group 8 creation command and it would go off and create the propagate 9 the creation of news group. 10 Then the one other thing is that, as I mentioned 11 yesterday, there are volunteers who maintain lists of 12 approved, in the sense of this process approved news groups, 13 within different portions of the hierarchy of the news 14 hierarchy, like within the Biz hierarchy, and a volunteer 15 will add it to their list. Then this list is periodically 16 sent out and some news servers are configured to delete any 17 news group in a hierarchy that doesn't appear on the list. 18 So it's a democratic ad hoc process. 19 BY MR. MORRIS: 20 Q Okay. Briefly, could you just explain the process of 21 registering a domain name with the Internet, at least in the 22 United States, as I understand it. Has your domain name been 23 registered with the Internet? The NEWDEV.HARVARD.EDU(ph)? 24 A No. The domain name is divided up in different sections, 25 as was explained this morning about the .EDU and .HARVARD and 137 1 then NEWDEV is my particular machine. The portion of the 2 domain name which is registered is the organization's domain 3 name. So in this case it's HARVARD.EDU is what gets 4 registered. Within HARVARD I have registered NEWDEV, but 5 this doesn't get registered with the Internet, it is entirely 6 within HARVARD. I have a domain name of my own for my little 7 consulting company and I have registered that. But the 8 computers within that I register with myself and I rarely 9 complain so I get them registered quickly. (Laughter.) But 10 that's only within my own domain. 11 The domain in the simple case, it is something like 12 HARVARD.EDU, it would be a little more complicated if we have 13 a domain such as the .USTOPLEVEL domain which was also 14 mentioned this morning, that two-level country codes are one 15 of the types of top-level domains along with EDU and ORG. In 16 the U.S. these are divided geographically. 17 So for example the Web page that I mentioned 18 yesterday of IETF -- WWW.IETF.ORD is actually on a computer 19 that's run by a company in Western Virginia, and the 20 company's name is CNRI, Corporation for National Research 21 Initiatives. And their domain name is CNRI.RESTON.VA.US. 22 And then there's computers within that. So it's 23 IETF.CNRI.RESTON.VA.US. The CNRI.RESTON.VA.US is what was 24 registered as the domain name but the machine within it is 25 not. 138 1 Q Okay, just one last question. Judge Buckwalter earlier 2 asked Dr. Croneberger if he had all the money in the world 3 and a clear definition of the patently offensive and 4 indecent, would it be possible to develop a system. And I'd 5 be interested if you could tell the Court, is that possible? 6 Do you think that's possible? 7 A As a theoretical exercise, I think it probably is 8 possible. But for me as a speaker to be able to be insured 9 that this was being met, the only thing I can think of, and I 10 have thought about this a little bit, is we would have to 11 have a mechanism by which all of the listeners, in every 12 category, listeners to news groups, listeners to listserve, 13 listeners on the Web, all of the listeners, all of the people 14 retrieving information, would have to be able to provide some 15 form of identification. 16 Now, the identification wouldn't have to be more 17 than a "Yes, I'm over 18" kind of identification, but in 18 order to insure that that's reliable, you would have to have 19 a mechanism by which you could create this identification 20 such that it couldn't be easily forged. There is a concept 21 that is being worked on that is called Digital Signatures, 22 and the U.S. Post Office as an organization is looking into 23 doing an identification check at post offices whereby someone 24 would come in and identify themselves and they would get a 25 bit pattern, a digital signature, which they could then use 139 1 to identify themselves in commerce and in correspondence, 2 perhaps even at some point legal correspondence. One could 3 in theory add to that identification some flag in there to 4 indicate whether they were over or under 18. 5 But that would assume the mechanism were actually 6 installed and in place of going -- of people going to the 7 post office and getting these identities, and that you would 8 have to have the identity before you could surf the Web. 9 Without that kind of structure, without making the assumption 10 of something in place so that I could be sure that a 11 listserve could be created that would only accept 12 subscriptions from those over 18, and I could query that 13 listserve to be sure that it was one which was doing that, I 14 think it would be hard. 15 But in theory I could imagine a scenario by which 16 this could be done, but it wouldn't take quite all the money 17 in the world, as in the proposition, but I would have fun if 18 it were a cost plus contract. (Laughter.) 19 MR. MORRIS: We have no further questions. 20 JUDGE SLOVITER: Thank you. Is there recross? 21 MR. BARON: Yes, your Honor. 22 JUDGE SLOVITER: Mr. Baron. 23 MR. BARON: Good afternoon, your Honors. 24 JUDGE SLOVITER: Good afternoon. 25 RECROSS-EXAMINATION 140 1 BY MR. BARON: 2 Q Good afternoon, Mr. Bradner. 3 Mr. Bradner, I'm going to give you a hypothetical. 4 Let's assume you have a simple Worldwide Web Web site on a 5 Web server with a home page. And the home page has a URL 6 associated with it. And for purposes of this example, we'll 7 just name it this generic name. The URL is 8 HTTP://WWW.WEBSITE. Are you with me on that? 9 A So far it's simple. 10 Q Okay. Now, let's assume that the home page also has 11 pointers to ten files on that Web site or Web server. And 12 each of those files has a separate URL which is an extension 13 of the home pages URL. 14 A Yes. 15 Q And let's just for the purposes of this hypothetical say 16 that the URL for each of those ten files is 17 HTTP://WWW.WEBSITE/FILE1 and then iteratively FILE1... 18 through FILE10. Still with me? 19 A Yes. 20 Q Now, you have admitted in your prior testimony that it is 21 a trivial matter for an owner of a Web site to imbed a tag or 22 label in HTML source code in the header of that source code 23 on the home page, correct? 24 A On any particular page, whether it be the home page or 25 not, as long as it's an HTML page that would be easy to 141 1 augment it, yes. 2 Q And as a technical matter, it would also be possible to 3 imbed a unique tag or label in HTML source code for each of 4 the files 1 through 10 with those separate URL extensions in 5 my hypothetical, correct? 6 A I'm a little confused here, because to me you may be 7 mixing two things. One is the files themselves, and I just 8 said that any file you could put -- any HTML file you could 9 put such a tag in. And the URLs which are different things. 10 You could put tags in the URLs also. 11 Q I'm not speaking about the tags in the URL, but the tags 12 in the files. So each of those files with a separate URL 13 address would have HTML source code associated with that file 14 and a tag could be put in for file 1, file 2, iteratively, 15 file 10. 16 A If indeed they were HTML files, yes. 17 Q And the operation of that tag on any one of those files 18 on that site would, assuming that it's a tag that's set up to 19 be coordinated with parental blocking mechanisms, would 20 operate to block that URL extension, that particular file on 21 that Web site, that unique file, 1 through 10. 22 A Assuming that it was A, as you speculate, set up to do 23 so, and B, that the user was using a browser so configured to 24 do that blocking, yes, all files are equivalent in that 25 context. 142 1 Q And any browser set up to look at the URL for a 2 particular file 6 or file 8 or file 10 would be blocked if 3 there was that mechanism for tagging and the browser was set 4 to look? 5 A Well, to be very specific, just to not be confusing here, 6 what would happen is in your scenario that the browser would 7 go off and it would retrieve the file, file 1, file 2, 8 whatever, it would retrieve that file. It would actually go 9 off and start to retrieve the file, perhaps even retrieving 10 the whole file, then look at the HTML if it's an HTML file, 11 then make the decision. So the fact that it has a URL is 12 independent. It just happens that all files that are on Web 13 servers have either real or implied or constructed URLs 14 simply because as I just said, the URL is really just a way 15 to identify a file. So we want to make sure that we're 16 talking about two different cases, because yesterday we were 17 talking about putting tags in URLs and we're talking about 18 putting tags in the files, and I want to be sure that we've 19 got those separated because they're different concepts. 20 Q Okay. And in paragraph 30 -- sorry, paragraph 79 of your 21 supplemental declaration at page 33, you mention the concept 22 executable programs. Could you explain with some concrete 23 examples what executable programs are? 24 A The example I used yesterday was a screen saver, which 25 would draw pretty pictures on your screen instead of burning 143 1 your logo into the screen when the screen's been idle for a 2 while. Many of those exist on the net, and you can retrieve 3 them anonymously FTP or over the Web for free. They are 4 there because the screen saver will come up and advertise 5 some product or it's just because somebody thought that the 6 picture they did was cute, or the function they did was cute. 7 It was an intellectual exercise or a class exercise. So many 8 of these are out. Hundreds of these screen savers exist and 9 you can go retrieve them, but they are binary files. 10 Q Do they usually have a .EXE suffix? 11 A The .EXE is for a particular kind of binary file that's 12 used on PCs. There are other extensions for other kinds of 13 computers, for other types of binaries. 14 Q Now, to the best of your knowledge, are any of the home 15 pages of any of the plaintiffs in this lawsuit, do they 16 comprise executable programs or files? 17 A Since I don't know the list of the plaintiffs by heart or 18 even by remembering having read it, the full list, it seems 19 to be quite an extensive list, I couldn't answer, but it 20 would seem to be unlikely that a home page would be a binary 21 per se, though possible, because it could be a graphical 22 image, but it wouldn't seem to be very likely. 23 Q If one had an executable program in a file, is there 24 anything about that mere fact that it's an executable program 25 that would prevent the owner of the Web site from registering 144 1 or otherwise making known the page where the executable 2 program was to the many tens or hundreds or thousands of 3 directories in cyberspace or to any of the companies that 4 operate browsers or parental control mechanisms. Is there 5 something special about executable programs? 6 A An executable program when viewed by the Web is just 7 another page. It happens that when the browser goes to try 8 and retrieve it, it uses a different retrieval mechanism than 9 it does when it's trying to retrieve text or HTML. But it's 10 just another page, and one can -- and that page has a unique 11 URL, and yes, one could register in theory any URL pointing 12 to any file that was on any server, and there is nothing 13 special in that context about a binary, no. 14 MR. BARON: I have no further questions. 15 JUDGE SLOVITER: Any more from the plaintiffs? 16 MR. MORRIS: No, your Honor. 17 JUDGE SLOVITER: Okay. Judge Dalzell. 18 JUDGE DALZELL: Yes. I wonder in paragraphs 73 19 through 76 you talk a good deal about cashing, and I must say 20 I really don't follow it. Would you just, using the standard 21 that Chief Judge Sloviter put so well, could you just 22 rehearse for us exactly what you mean by cashing? 23 THE WITNESS: That standard was that it should be 24 understandable? 25 JUDGE DALZELL: You'll forgive the expression, yes. 145 1 (Laughter.) 2 THE WITNESS: Well, let's take the example I think I 3 used. But the basic idea is you would like to minimize the 4 number of times that you go off and you retrieve something, 5 that you actually have to go to the actual server to retrieve 6 something. Cashing is not a new concept. It's used in 7 computers between the processor and disk so that if you want 8 to reload the same file off of disk between the processor and 9 memory if you want to reread some portion of memory into the 10 processor, instead of going to the relatively slow memory or 11 the relatively slow disk, it goes and gets it out of the 12 cash. 13 In the case of cashing Web servers, which is what I 14 was speaking of in there, the same concept applies. Many 15 universities, many organizations have as a function built 16 into their firewall or built into a device sitting between 17 their network and the rest of the Internet, they have an 18 ability to watch the HTML requests go by and see what comes 19 back and save a temporary copy of what comes back. 20 JUDGE DALZELL: How temporary? 21 THE WITNESS: That's usually locally configurable 22 and it's frequently done based on how much disk space you 23 have. Once you start getting low on disk space, you throw 24 away the things which haven't been accessed for the longest 25 period of time. And -- 146 1 JUDGE DALZELL: Well, you give in paragraph 73 the 2 hypothetical of cashing when a user in Europe requests access 3 to a Worldwide Web page located in the United States? 4 THE WITNESS: Yes. 5 MR. MORRIS: Your Honor, could I -- 6 JUDGE DALZELL: Yes, sure, sure. 7 THE WITNESS: Yes. 8 JUDGE DALZELL: Now, do I understand correctly that 9 the first time that the European user accesses the American 10 information page, it is put somewhere in cyberspace on the 11 east side of the Atlantic? 12 THE WITNESS: In this particular hypothetical, to 13 use a word that was just being used at me, what would happen 14 is that the people who operated the transatlantic link, and 15 it happens that in the real world of data networking the 16 Europeans have to pay for their links into the U.S. The U.S. 17 doesn't pay for the links because everybody thinks we're more 18 important and so far the Europeans have agreed with that. I 19 think that may change in time, but they want to minimize the 20 utilization of that link. They don't want to have it 21 retrieve the same file again and again and again from some 22 U.S. site. So they would put on their end of the link a 23 cashing Web server. So that when a request came in from 24 Europe, if it wasn't in the cash it would go do the request 25 across the Atlantic, across the relatively small and very 147 1 expensive link, retrieve that file and then store it in the 2 cashing Web server and pass a copy onto the requester. 3 JUDGE DALZELL: But storing it in the Web server in 4 your hypothetical in Europe? 5 THE WITNESS: That's correct. 6 JUDGE DALZELL: Now let's reverse the hypothetical 7 because we're told a significant percentage of the sexually 8 explicit material comes from abroad. I mean I know you're 9 not an expert on that, but that's what we're told. 10 THE WITNESS: I don't know from personal experience, 11 no. 12 JUDGE DALZELL: Right, but that's what we're told. 13 Let's assume that's true, okay. 14 THE WITNESS: Mm-hmm. 15 JUDGE DALZELL: So the American server, the American 16 user types in "sexy European girls," okay. Now, that goes to 17 Europe, pulls it back and it's held for a time in somewhere 18 on this side at the west side of the Atlantic so that it 19 could be accessed again for some finite period of time? 20 THE WITNESS: The European, in this case because the 21 transatlantic link as operated -- as paid for by a European 22 company, if the European company put such a server on this 23 side in order to preserve the band width coming the other 24 direction, which they could easily do, then yes, it would be 25 stored for a time on this side and it would be identified by 148 1 the URL, that's basically -- URL being index into it. 2 JUDGE DALZELL: Same hypothetical except the 3 provider of the sexually explicit material is in Thailand. 4 Any difference in your answer? 5 THE WITNESS: It's probably more likely to have a 6 Web cashing server there because the transpacific links are 7 very, very expensive, million dollars a month for a good- 8 sized link from the U.S. to Japan, for example. 9 JUDGE DALZELL: And who is paying for that link? 10 THE WITNESS: The Japanese Internet service 11 providers. 12 JUDGE DALZELL: Collectively. 13 THE WITNESS: There are a number of different links. 14 I was quoted the million dollars a month quote by somebody 15 involved in the Asian-Pacific Network Information Center a 16 couple of months ago, and I'm not sure if that was from a 17 particular Internet provider in Japan, or whether that was 18 some conglomeration. 19 JUDGE DALZELL: Judge Sloviter wants to ask about 20 cashing. 21 JUDGE SLOVITER: Now, given now that you have 22 explained cashing in terms that maybe we can understand, 23 thanks to Judge Dalzell and to your willingness to do so, 24 what happens, what is the effect? Now that we know the 25 concept, what is its relevance to the issues before us in 149 1 this case? 2 THE WITNESS: The primary relevance, the reason that 3 I brought it up in the statement is that once this is cashed, 4 you know when someone asks to see it, the original server 5 does not see the request. The original server's request -- 6 the user's request is fulfilled by the cashing server and 7 that request is not passed on to the originating server, so 8 the originating server has no way of knowing who or how many 9 or anything else. We were talking about hits earlier. The 10 originating server would have no way of knowing how many 11 times this file was retrieved because it wouldn't get the 12 hits. 13 JUDGE SLOVITER: And the file would be identified 14 though as coming from the original server? 15 THE WITNESS: It would -- remember that in the -- we 16 were talking -- I missed yesterday afternoon, but I was told 17 about your adventures in cyberspace -- 18 JUDGE SLOVITER: And never get it back. 19 THE WITNESS: Everything is just a URL. There is 20 nothing particularly in that URL that tells you really where 21 it came from. There's some names in it which if given some 22 work we could figure out where some particular site exists, 23 but we don't know where SEXYEUROPEANGIRLS.COM might be, the 24 server might be. That actually might be in the U.S., it 25 might be in Europe, could be anywhere. There's just the URL, 150 1 which is, as I explained a minute ago, it's the application 2 followed by a site name followed by a file name. What is 3 saved in the server, in the cashing server, is the URL and 4 the file associated with it. So that's all that's there. We 5 don't have any way of tying anything else together than that. 6 JUDGE SLOVITER: So you don't -- you can't identify 7 either the pointer or the pointee, is that the point? 8 THE WITNESS: It's not so much that, it's that if 9 somebody in Europe were retrieving a data file from my 10 server, let's say one of my newspaper columns, and they 11 retrieved that, I would see a retrieval from the local end of 12 the -- the cashing server in Europe or in the U.S., however 13 it was done, I would see one retrieval from that. There 14 could be many other people who might want to read it -- 15 that's not borne out by what my editor says -- but there 16 might be other people. I would never know whether anybody 17 else read it, retrieved it within the time period of how long 18 the cashing server kept it. 19 JUDGE SLOVITER: And would the cashing server know 20 how many people retrieved it? 21 THE WITNESS: As long as it in turn wasn't behind 22 another cashing server. Because organizations put cashing 23 servers on their boundaries to minimize the link, the 24 utilization of their link to the rest of the Internet because 25 those links are expensive, and if they're keeping, retrieving 151 1 the same files, they're making use of the link that they 2 wouldn't otherwise need to. 3 JUDGE DALZELL: You see, this is why I think this 4 may be important to our consideration. Whoever it is who 5 created the Web page, let's say SEXYEUROPEANGIRLS, let's 6 hypothesize in Luxembourg, does not think or may not be 7 thinking about complying with Title V of the 8 Telecommunications Act of 1996, but the cash server in the 9 United States, as I understand your testimony, effectually 10 domesticates that Luxembourg Web page, does it not? 11 THE WITNESS: If indeed there is such a server 12 there, but again, it could be a server there, it could be a 13 server that's on the boundary of a corporation or a school. 14 There could be many servers up and down the line. Each one 15 of those, if they're within the U.S. could yes, be 16 domesticating it. 17 JUDGE DALZELL: Could Mr. Coppolino and his troops 18 find that domestic cash server to prosecute them? And if so, 19 how would they do it? 20 THE WITNESS: You can -- actually there's nothing in 21 the information that you retrieve when you -- when somebody 22 goes to retrieve it, there's nothing to indicate where that 23 came from. So if indeed for example the servers have been 24 tweaked so that they didn't save copies of files from 25 SEXYEUROPEANGIRLS.COM, then you wouldn't as someone reading 152 1 from this side of the Atlantic, you wouldn't be able to tell 2 that it was or was not cashed anywhere along the line. 3 JUDGE DALZELL: And there would be no way for me to 4 know that and therefore no way for Mr. Coppolino and his 5 troops to know that? 6 THE WITNESS: That's correct. 7 JUDGE DALZELL: Okay. But nonetheless I would see 8 an untagged SEXYEUROPEANGIRLS; correct? 9 THE WITNESS: You could see that. 10 JUDGE DALZELL: Even if all domestic information 11 providers agreed, yes, let's tag all our URLs, the folks in 12 Luxembourg don't give a darn what our law says, but 13 nonetheless their information may come to my son, who's ten. 14 THE WITNESS: That's correct. 15 JUDGE DALZELL: Okay. 16 THE WITNESS: The other worry that I have in that 17 actually is a little bit perhaps even the other way. From 18 what I understand, we went through this process of the CD 19 providers agreeing to tag rap songs with parental guidance. 20 And the experience was that those CD's so tagged sold better 21 than the ones that were not. (Laughter.) I would have some 22 worry that people would actually, SEXYEUROPEANGIRLS.COM would 23 actually be quite happy to put tags on and then make sure 24 that there were browsers readily available that would seek 25 out sites that had such tags. 153 1 JUDGE DALZELL: Okay, that's very helpful. A couple 2 technical questions. FTP and gopher. Are they forms of 3 search engines? 4 THE WITNESS: No, they're just file retrieval 5 devices. 6 JUDGE DALZELL: And how do they differ from a search 7 engine like Alta Vista (ph)? 8 THE WITNESS: Alta Vista builds up a database which 9 when you send a query to it, it looks into its local database 10 to see whether it has entries that match that query, and 11 return to you the pointers, URLs, that correspond to those 12 matches. 13 JUDGE DALZELL: As I understand, FTP and gopher or 14 Alta Vista, if I type in Scott Bradner, they're all going to 15 go looking for anything mentioning you, won't they? 16 THE WITNESS: FTP -- no, FTP is an interactive 17 program with which you can tell it to retrieve a particular 18 file. So if I gave you the name of a file on my machine, 19 there is a process by which you could interactively go 20 through and retrieve that one file. It is not the kind of 21 thing -- FTP is not the kind of thing, nor is gopher the kind 22 of thing which by itself you can say, go find every file 23 which has Scott Bradner in it. All it does is say, here is a 24 file name. Here is a URL. Here is the extended URL. In the 25 case of FTP, you actually give it the machine name separately 154 1 and the file name separately, and you have to do all kinds of 2 -- 3 JUDGE DALZELL: But in Alta Vista I could just 4 search Scott Bradner? 5 THE WITNESS: It has been done. (Laughter.) 6 JUDGE DALZELL: I'm sure of that, maybe by people in 7 this room. (Laughter.) 8 Lastly, you talk in paragraphs 70 and 71 of your 9 declaration about common gateway interface or script, a CGI 10 script? 11 THE WITNESS: Yes. 12 JUDGE DALZELL: And that you say is an option that 13 is at least possible on the Worldwide Web where the -- if you 14 had the resources you could screen out users? 15 THE WITNESS: It's basically -- and we were talking 16 this morning, we were talking about forms type interface 17 where you have little boxes to fill in, one of the things 18 that can happen when you fill in those little boxes is you 19 can fire up, you can start up a program and CGI is one of the 20 ways you can start up a program, which takes as its input 21 information in the boxes. 22 So for example it could take as input somebody's 23 credit card number. 24 JUDGE DALZELL: All right. 25 THE WITNESS: And then if mechanisms existed to 155 1 verify that credit card number purely electronically or over 2 the Net, it could go ahead and do that in theory. 3 JUDGE DALZELL: Okay, that's very good. Thank you 4 very much. 5 JUDGE SLOVITER: I'll ask a question while you're 6 thinking. 7 JUDGE BUCKWALTER: No, you go ahead. 8 JUDGE SLOVITER: When you used the term "trivial" 9 yesterday a number of times, and I'd have to go back and 10 retrieve and I don't have it all here and we don't have daily 11 transcripts so I don't know, do you mean by trivial, trivial 12 to somebody with your expertise, or technologically trivial, 13 or do you mean trivial because it doesn't take a lot of money 14 or because it doesn't -- I didn't quite understand what you 15 meant, and you used it at different times, so you may have 16 used it differently. 17 THE WITNESS: I believe most of the time that I used 18 it it was in response to a direct question from Mr. Baron who 19 used it in -- when we spoke last week. But be that as it 20 may, I did use it and by that I really meant that it was 21 really easy to do, given -- I think in the deposition what I 22 said was -- or in the discussion we had last week, I said 23 something along the line of given a sample home page with a 24 fill in the blank of how you would designate naughty stuff 25 below, anybody could take that sample and modify it for their 156 1 own environment just trivially, because all it is is an 2 editing task. It's just like editing a letter to one's 3 mother. It's just characters. And as long as you have a 4 model to follow and a set of instructions to follow, it's 5 easy to do. 6 So I think in most of the contexts that I was 7 referring to yesterday, in that it's easy to do, not 8 necessarily for somebody with a great deal of expertise but 9 given the right environment, it would be easy for anybody to 10 do. It would be difficult for me to do it today because I 11 don't happen to be an HTML expert. I went out -- after our 12 discussion the other day I went out and bought a book because 13 he asked me some embarrassing questions I should have known 14 the answer to. But it would take me some time and it would 15 be untrivial, both in terms of time and at my normal billing 16 rate expense for me to set up a home page to do this. But if 17 I were given a sample home page with, if you fill in your 18 name here, everything will be fine, it would be truly trivial 19 to do. 20 JUDGE SLOVITER: Thank you. 21 JUDGE BUCKWALTER: I was thinking of carrying Judge 22 Sloviter's example being simple maybe to the ridiculous, I 23 hope not, but maybe my analogy would help me, when I was a 24 young man I wanted to be a user of the local bar when I was 25 in college. But the provider (laughter) was by law forbidden 157 1 to serve me if I were under the age of, I think it was 21 2 back then. Do I understand that it's somewhat analogous that 3 if the provider puts up a sign there that says no one under 4 21 allowed to drink that that's a tag? 5 THE WITNESS: That would be -- that would be an 6 equivalent to a tag, yes. 7 JUDGE BUCKWALTER: That would be equivalent to a 8 tag. And do I further understand that if that sign were in 9 Japanese, I wouldn't be configured to understand that tag or 10 -- is that what we mean by being configured? Make the 11 assumption that I don't understand Japanese language, but -- 12 THE WITNESS: Well, I think that's a common 13 assumption in this room. 14 JUDGE BUCKWALTER: Yes. 15 THE WITNESS: Certainly an assumption that falls 16 with me. Actually what I think I was referring to was a 17 little bit different than that -- 18 JUDGE BUCKWALTER: Okay. 19 THE WITNESS: -- in that it was more along the line 20 of yes, I guess, am I configured to be able to read and 21 understand that sign. 22 JUDGE BUCKWALTER: Me, the user, I'm not configured, 23 so on -- 24 THE WITNESS: Yeah, can you read the sign. 25 JUDGE BUCKWALTER: -- that point, that tab would be 158 1 no good to me. 2 THE WITNESS: That's correct. 3 JUDGE BUCKWALTER: Right now, I'm configured to 4 understand English so the tab would be good. 5 THE WITNESS: Yes. That's what standards are useful 6 for. 7 JUDGE BUCKWALTER: However, it wouldn't be 8 sufficient to guarantee that I wouldn't get in the bar and 9 get a drink, right? 10 THE WITNESS: In the context of the law, I think 11 what we're to extend this simile to probably ridiculous 12 levels, it would appear to me that the provider of liquor to 13 that bar has to insure that the bar doesn't serve underage 14 people. And that's the paradigm. It would seem to follow 15 from the law that it's the provider of the materials that has 16 to insure, -- 17 JUDGE BUCKWALTER: Right. 18 THE WITNESS: And the liquor provider of the bar 19 can't be sure that they're checking IDs at the door and -- 20 JUDGE BUCKWALTER: He can have a gateway though 21 which is the bouncer at the door who checks the ID or the 22 password of the -- 23 THE WITNESS: But would the liquor provider have to 24 have that bouncer, or would the bar's owner have to -- 25 JUDGE BUCKWALTER: Well, under the example I'm 159 1 giving and the way it worked back then, the liquor provider 2 had to have the bouncer. And isn't that what we're talking 3 about here under this law, that the Government is saying the 4 provider has to have the bouncer? 5 THE WITNESS: The liquor, the Jim Beam has to have 6 the bouncer, not the bar has to have the bouncer, and that's 7 the difference -- that's my extension of your scenario to 8 this law. 9 JUDGE BUCKWALTER: Okay. Now, extending my scenario 10 further, are you saying that that's very difficult to -- 11 THE WITNESS: It's very difficult for Jim Beam to 12 know that the bouncer is there and to know the bouncer is 13 following the rules set which will result in underage people 14 not being allowed into the bar. 15 JUDGE BUCKWALTER: Okay. I don't want to go any 16 further with this, because it takes up too much time and 17 might not be particularly helpful, but thank you. 18 JUDGE SLOVITER: I have one more basic question for 19 him. While you were willing to do some explaining, and if 20 we've done this twice, let me know, but I was trying to 21 understand the use of the password system rather than the 22 anonymous system. We haven't gone over that today, have we? 23 THE WITNESS: No, we haven't. 24 JUDGE SLOVITER: In different language -- which you 25 talked about in your declaration. 160 1 THE WITNESS: Yes. 2 JUDGE SLOVITER: And I think you say that use of the 3 password system rather than the anonymous system 4 automatically would give the user access to the entire 5 system. 6 THE WITNESS: I do say that, yes. 7 JUDGE SLOVITER: Yes. And if you would just quickly 8 explain that, if possible, and then tell us why couldn't the 9 access be restricted also? 10 THE WITNESS: What I was explaining there was the 11 existing software. Certainly software can be changed to do 12 anything that you want it to do, given sufficient money and 13 motivation. But the existing software for FTP which is what 14 I was specifically referring to, anonymous FTP when you log 15 in as anonymous, which is if you wanted to retrieve a file 16 from my system and I gave you the name of the file, you could 17 just go in using FTP, log in as anonymous, and then go to the 18 directory the file is in and retrieve it. 19 But when you do that, the FTP server, the demon, the 20 server itself automatically restricts you to a subset of the 21 information that's available on my machine. It's a 22 subportion of the directory tree. So you can only see that, 23 and you cannot change directory out of that. There's just -- 24 the software prevents you from doing that. It's called 25 rehoming. It gives you a new home that's very, very 161 1 restricted. 2 In the currently available software, the FTP demons, 3 that if you go and you log in as a regular user, which is 4 what you do when you're logging in with a user name and a 5 password, a legitimate one, my own user name and my own 6 password, for example, if I were to do that, then it gives me 7 access to the machine as if I had logged into the machine as 8 a terminal. It gives me the same view of the machine. And 9 that view of the machine is all of the files on the machine 10 with whatever protections those files have for every user. 11 So that if a file is publicly readable for all users, then it 12 would be publicly readable for the FTP who was coming in on a 13 log name and password basis. If it's not publicly readable, 14 then it wouldn't be. 15 What I was referring there was that it lays open for 16 potential abuse the entire structure of the server site. In 17 my case -- 18 JUDGE SLOVITER: Of the server. What was -- 19 THE WITNESS: The server computer, the server site. 20 JUDGE SLOVITER: And you concluded from that in 21 terms relevant to this case, because I'm not sure which side 22 that goes for, but what do you conclude from this? 23 THE WITNESS: There were two messages I was trying 24 to convey there. One was that it would be an administrative 25 burden for me to maintain a log name and password file for 162 1 all of the very many people, individual users, who would want 2 to come and look at and retrieve information from my site. 3 So it's just purely an administrative nightmare to do that. 4 And the other is that it would pose to me a security risk to 5 make all of these files open, because I know that in my 6 machine as in almost all machines I have not been perfect in 7 setting the machine up, and I may have made some errors, and 8 some files which should have been protected are not 9 protected, or there is bugs in some of the software. And 10 people could use the visibility they have into my machine to 11 circumvent the security on it. 12 JUDGE SLOVITER: And you're not saying that software 13 couldn't be created that would do that, would take care of 14 this problem, -- 15 THE WITNESS: Absolutely not saying that. 16 JUDGE SLOVITER: -- but it just hasn't been right 17 now. 18 THE WITNESS: It is not -- the current software does 19 not do this. Future software wouldn't change the 20 administrative burden tremendously, but -- 21 JUDGE SLOVITER: Well, unless future it may do that, 22 too. 23 THE WITNESS: The future is unseeable. 24 JUDGE SLOVITER: Okay, thank you. 25 Mr. Baron? 163 1 BY MR. BARON: 2 Q I have just a couple questions. The record may be clear 3 on this point, Mr. Bradner, but we were talking about the 4 trivialness or the ease by which a tag can be put in HTML 5 source code. And do I understand it from your testimony that 6 those individuals who know HTML source code who would be 7 designing Web pages, for that class of individuals it would 8 be an easy, straightforward trivial task to imbed a tag in a 9 header? 10 A Actually I was going further than that and saying that if 11 you gave me a sample of what it's supposed to look like, even 12 if I don't know HTML, it would still be trivial. 13 Q Okay. And this is a very important point that your 14 Honors have raised about conventions and standards for 15 looking at tags and headers. And so my question is that you 16 recall your testimony yesterday about Netscaping 17 approximately 80 percent of the browser market, correct? 18 A As I recall my testimony yesterday was that Netscape 19 claimed to be 80 percent of the market. 20 Q I stand corrected. If -- and we spent a lot of time 21 yesterday at the beginning of your testimony talking about 22 the IETF and the fact that the Internet is a standards-rich 23 environment, do you recall that? 24 A That's a standards development group rich environment. 25 Q Okay, all right. (Laughter.) 164 1 A Which is slightly different. 2 Q There are lots and lots of standards. 3 A Yes, some of them conflicting. 4 Q And draft standards, proposed standards, we covered all 5 that. 6 A Consortium standards, the end of the month club. 7 (Laughter.) 8 Q Now, if a Government agency or alternatively if in a 9 consortium of private parties got together and adopted a 10 convention or a standard for tagging in HTML code, that would 11 essentially operate, like the movie rating system, be an 12 adult tag, that is a technical matter, the browser market as 13 just is a matter of technical feasibility the browser market 14 represented by Netscape and Microsoft and others, could 15 certainly pick up that tag that would be adopted as a 16 standard or a convention, isn't that correct? 17 A Yes, and they could even program the browsers to accept 18 more than one standard for the same sort of information. 19 MR. BARON: I have no further questions. 20 JUDGE SLOVITER: Any further questions? 21 MR. MORRIS: No, your Honor. 22 JUDGE SLOVITER: Okay. 23 JUDGE DALZELL: But I want to follow up on that. 24 You said and Dr. Hoffman said that the Worldwide Web was not 25 created here, it came out of Czern (ph), right? 165 1 THE WITNESS: That's correct. 2 JUDGE DALZELL: And so what Mr. Baron just asked you 3 about hypothesizes that there is a plenary group that sets 4 standards and by setting standards, doesn't that then exclude 5 the possibility of new technologies such as the Worldwide Web 6 which arose spontaneously, not even in these shores? 7 THE WITNESS: That is a very insightful question. 8 (Laughter.) That happens to be one of the subjects of the 9 meeting I was at yesterday and couldn't be here on. 10 The tension between standards bodies is a very 11 serious issue. I made light of it just a second ago, but it 12 is a very serious issue and there are many places in the 13 globe where the development of standards and the control of 14 the standards development process is seen as a strategic 15 necessity on the part of some governments. And so the 16 defining of what standards to use, how to develop them and 17 what -- the level the mandating of those standards is seen as 18 strategic. 19 And it is absolutely true that a too-strong 20 environment saying all standards must come from standards 21 group number two has a serious impact on innovation. The Web 22 rose out of a hole. The whole concept of the Web rose out of 23 a need that we didn't know we had. We didn't know we had 24 this lack of ability to do easy browsing because we didn't 25 have the concept of easy browsing. This was something that 166 1 sprung out of innovations on some parts of some individuals. 2 It was not part of a standards effort. It was people doing 3 something. It caught on because people wanted the -- saw it 4 as useful. 5 There are other holes in the Net. We don't know 6 what they are. There are other needs that we don't know we 7 have. And certainly being too reliant on "we only do those 8 things which are standard" will stifle that innovation and it 9 would be very bad for us. We went through many years of 10 telecom where we did not have, let's say, rapid innovation 11 because of that kind of centralized standards development 12 constraint. 13 So in the context though of what Mr. Baron was 14 asking, if a consortium were to develop a tagging structure, 15 it wouldn't have to be the same consortium that would develop 16 future extensions on HTML. I met with somebody on Tuesday 17 where the IETF is going to actually have a document which is 18 the extensions on HTML and this is being put together with 19 the W3 consortium. It's a nice conglomerate effort. 20 But a group putting together a standard for labeling 21 within HTML or within URLs or within copies of any text that 22 happens to be around wouldn't necessarily have to cooperate 23 with any other standards body in doing so. It could just 24 create it. 25 JUDGE DALZELL: And indeed, isn't the whole point 167 1 that the very exponential growth and utility of the Internet 2 occurred precisely because governments kept their hands out 3 of this and didn't set standards that everybody had to 4 follow? 5 THE WITNESS: Well, it's actually even a little bit 6 more contorted than that because the governments tried to. 7 The U.S. Government and many other governments attempted to 8 mandate a particular kind of protocol to be used on worldwide 9 data networks, and this is the OSI protocol suite. The U.S. 10 Government mandated its use within the U.S. Government and 11 with purchasing material with U.S. funds. This was mandated 12 in many European countries and in Canada and many other 13 places around the world. 14 That particular suite of protocols has failed to 15 achieve market success. What achieved success was the very 16 chaos that the Internet is. The strength of the Internet is 17 that chaos. It's the ability to have the forum to innovate. 18 And certainly a strong standards environment fights hard 19 against innovation. 20 JUDGE DALZELL: Thank you. 21 JUDGE SLOVITER: Thank you. 22 I'm sure counsel would like to continue the 23 dialogue, but are you content to let it be at the moment? 24 MR. MORRIS: We are, your Honor. 25 MR. BARON: Yes, your Honor. 168 1 JUDGE SLOVITER: I guess you are. I'm not 2 (laughter)... 3 We'll close now to resume on the 1st of April -- 4 JUDGE DALZELL: On the 1st at 9:30. 5 JUDGE SLOVITER: Although counsel is I gather going 6 to meet with Judge Dalzell. Do they know that -- 7 JUDGE DALZELL: Could we do that at 3:00 o'clock in 8 the robing room, if that's convenient? 9 JUDGE SLOVITER: Okay? All right. Thank you all 10 very much, and have a good week until then. 11 THE CLERK: All rise. 12 (Proceedings concluded at 2:40 o'clock p.m.)