992 lines
41 KiB
Plaintext
992 lines
41 KiB
Plaintext
![]() |
|
||
|
|
||
|
Computer underground Digest Sun Feb 19, 1995 Volume 7 : Issue 14
|
||
|
ISSN 1004-042X
|
||
|
|
||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
|
Archivist: Brendan Kehoe
|
||
|
Retiring Shadow Archivist: Stanton McCandlish
|
||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
|
Ralph Sims / Jyrki Kuoppala
|
||
|
Ian Dickinson
|
||
|
Copy Ediotr: Ettie-Ann Shrdlu
|
||
|
|
||
|
CONTENTS, #7.14 (Sun, Feb 19, 1995)
|
||
|
|
||
|
File 1--Finnish anonymity compromised by Interpol (fwd)
|
||
|
File 2--Unauthorized Access (Cu Documentary)
|
||
|
File 3--(fwd) PETITION to Congress to Stop Senate Bill S.314
|
||
|
File 4--OREGON HOUSE BILL 2319 -
|
||
|
File 5--CuD's WWW Homepage - http://sun.soci.niu.edu:80/~cudigest
|
||
|
File 6--Cu Digest Header Info (unchanged since 18 Feb, 1995)
|
||
|
|
||
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
||
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
||
|
|
||
|
----------------------------------------------------------------------
|
||
|
|
||
|
Date: Sun, 19 Feb 1995 21:41:12 -0600 (CST)
|
||
|
From: David Smith <bladex@BGA.COM>
|
||
|
Subject: File 1--Finnish anonymity compromised by Interpol (fwd)
|
||
|
|
||
|
---------- Forwarded message ----------
|
||
|
From--an0@anon.penet.fi (The Anonymous Administrator)
|
||
|
Organization--Anonymous contact service
|
||
|
Reply-To--an0@anon.penet.fi
|
||
|
Date--Sat, 18 Feb 1995 12:03:58 UTC
|
||
|
Subject--Anon.penet.fi compromised!
|
||
|
|
||
|
I am pretty shocked! Based on a request from Interpol, the Finnish
|
||
|
police have gotten a search&seizure warrant on my home and the
|
||
|
anon.penet.fi server, and gotten the real mail address of a user that
|
||
|
has allegedly posted material stolen from the Church of Scientology.
|
||
|
Fortunately I managed to prevent them from getting more than this one,
|
||
|
single address.
|
||
|
|
||
|
There is going to be a very high-level public debate on how it is
|
||
|
possible that a country that prides itself on honoring human rights
|
||
|
and privacy very strongly has allowed this to happen. Maybe we can use
|
||
|
the publicity to stop this from happening again.
|
||
|
|
||
|
But in this situation, I find it pretty understandable that some of
|
||
|
you might want all traces of your ID removed. I have now added the
|
||
|
alias "remove@anon.penet.fi" to my server. If you want to be removed,
|
||
|
just send a (possibly empty) message to that address. But I am hoping
|
||
|
it won't be empty. I am hoping that you do outline *why* you have
|
||
|
needed the server, and what you think about the actions of the Finnish
|
||
|
authorities.
|
||
|
|
||
|
The messages will be anonymized using the normal anon.penet.fi
|
||
|
procedure, and used to support the demand for a re-interpretation of
|
||
|
the privacy laws in Finland.
|
||
|
|
||
|
If you *don't* want to be removed, but still want to send a comment,
|
||
|
you can use the addresses anon-support@lists.otol.fi (if you are *for*
|
||
|
keeping the server) and anon-against@lists.otol.fi (if you are
|
||
|
*against* the server). If you want to be anonymous, use
|
||
|
anon-support@anon.penet.fi and anon-against@anon.penet.fi.
|
||
|
|
||
|
Julf (admin@anon.penet.fi)
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Fri, 17 Feb 1995 14:26:27 +0000
|
||
|
From: A. Savage <savage@dfw.net>
|
||
|
Subject: File 2--Unauthorized Access (Cu Documentary)
|
||
|
|
||
|
(MODERATORS' COMMENT: A hearty congrats to "A. Torq.")
|
||
|
|
||
|
UNAUTHORIZED ACCESS
|
||
|
|
||
|
"Unauthorized Access [is] a documentary that tells the story of the
|
||
|
computer underground from our side, it captures the hacker world
|
||
|
from Hamburg to Los Angeles and virtually everywhere in between."
|
||
|
2600 - The Hacker Quarterly
|
||
|
|
||
|
Computers are becoming an integral part of our everyday existence.
|
||
|
They are used to store and send a multitude of information, from
|
||
|
credit reports and bank withdrawals, to personal letters and highly
|
||
|
sensitive military documents. So how secure are our computer
|
||
|
systems?
|
||
|
|
||
|
The computer hacker is an expert at infiltrating secured systems,
|
||
|
such as those at AT&T, TRW, NASA or the DMV. Most computer systems
|
||
|
that have a telephone connection have been under siege at one time
|
||
|
or another, many without their owner's knowledge. The really good
|
||
|
hackers can reroute the telephone systems, obtain highly sensitive
|
||
|
corporate and government documents, download individual's credit
|
||
|
reports, make free phone calls globally, read private electronic
|
||
|
mail and corporate bulletins and get away without ever leaving a
|
||
|
trace.
|
||
|
|
||
|
So who are these hackers? Just exactly WHAT do they do and WHY do
|
||
|
they do it? Are they really a threat? What do they DO with the
|
||
|
information that they obtain? What are the consequences of their
|
||
|
actions? Are hackers simply playing an intellectual game of chess
|
||
|
or are hackers using technology to fight back and take control of
|
||
|
a bureaucratic system that has previously appeared indestructible?
|
||
|
|
||
|
Unauthorized Access is a documentary that demistifies the hype and
|
||
|
propaganda surrounding the computer hacker. Shot in 15 cities and
|
||
|
4 countries, the film hopes to expose the truths of this subculture
|
||
|
focusing on the hackers themselves. Unauthorized Access is
|
||
|
a view from inside the global underground.
|
||
|
|
||
|
For a copy send a money order for 15 UK Pounds (PAL/European
|
||
|
Standard) or 25$ US Dollars (NTSC/American Standard) to:
|
||
|
|
||
|
Savage Productions
|
||
|
Suite One
|
||
|
281 City Road
|
||
|
London EC1V 1LA
|
||
|
England
|
||
|
|
||
|
or contact <savage@dfw.net>
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Sun, 19 Feb 1995 13:51:50 -0600 (CST)
|
||
|
From: David Smith <bladex@BGA.COM>
|
||
|
Subject: File 3--(fwd) PETITION to Congress to Stop Senate Bill S.314
|
||
|
|
||
|
Attached is a net.petition opposing Senate Bill S.314.
|
||
|
|
||
|
Personally, rather than requesting that Congress simply stop all debate
|
||
|
and action on S.314 (as this petition asks), I support the solution
|
||
|
advocated by Lance Rose in the latest issue of Computer Underground
|
||
|
Digest -- which is a tuck, modification, and alteration of the bill to
|
||
|
make it more amenable to online interests. Lance suggests such things as
|
||
|
removing the "and otherwise make available" phrases that has spooked the
|
||
|
Net; defining jurisdiction as the location of the BBS or system; and a
|
||
|
couple of other ideas. I hope that this is the course taken by national
|
||
|
groups like the Center for Democratic Technology, Electronic Private
|
||
|
Iniative Center, and Electronic Frontier Foundation.
|
||
|
|
||
|
---------- Forwarded message ----------
|
||
|
From--noring@netcom.com (Jon Noring)
|
||
|
Subject--PETITION to Congress to Stop Senate Bill S.314
|
||
|
Summary--S. 314 Poses a real danger to freedom of expression on all E-Networks
|
||
|
|
||
|
[Please distribute this Petition far and wide, and upload it everywhere (where
|
||
|
appropriate, of course).]
|
||
|
|
||
|
*** PROTECT THE INTERNET. READ THIS MESSAGE ***
|
||
|
|
||
|
This document is an electronic Petition Statement to the
|
||
|
U.S. Congress regarding pending legislation, the
|
||
|
"Communications Decency Act of 1995" (S. 314) which will
|
||
|
have, if passed, very serious negative ramifications for
|
||
|
freedom of expression on Usenet, the Internet, and all
|
||
|
electronic networks. The proposed legislation would remove
|
||
|
guarantees of privacy and free speech on all electronic
|
||
|
networks, including the Internet, and may even effectively
|
||
|
close them down as a medium to exchange ideas and
|
||
|
information.
|
||
|
|
||
|
For an excellent analysis of this Bill by the Center for
|
||
|
Democracy and Technology (CDT), refer to the Appendix
|
||
|
attached at the end of this document. The text to S. 314
|
||
|
is also included in this Appendix.
|
||
|
|
||
|
This document is somewhat long, but the length is necessary
|
||
|
to give you sufficient information to make an informed
|
||
|
decision. Time is of the essence, we are going to turn
|
||
|
this petition and the signatures in on 3/16/95, so if you
|
||
|
are going to sign this please do so ASAP or at least before
|
||
|
midnight Wednesday, March 15, 1995.
|
||
|
|
||
|
Even if you read this petition after the due date, please
|
||
|
submit your signature anyway as we expect Congress to
|
||
|
continue debating these issues in the foreseeable future
|
||
|
and the more signatures we get, the more influence the
|
||
|
petition will have on discussion. And even if Congress
|
||
|
rejects S. 314 while signatures are being gathered, do
|
||
|
submit your signature anyway for the same reason.
|
||
|
|
||
|
Please do upload this petition statement as soon as
|
||
|
possible to any BBS and on-line service in your area.
|
||
|
If you have access to one of the major national on-line
|
||
|
services such as CompuServe, Prodigy, AOL, etc., do try
|
||
|
to upload it there. We are trying to get at least 5000
|
||
|
signatures. Even more signatures are entirely possible
|
||
|
if we each put in a little effort to inform others, such
|
||
|
as friends and coworkers, about the importance of this
|
||
|
petition to electronic freedom of expression.
|
||
|
|
||
|
Here is a brief table of contents:
|
||
|
|
||
|
(1) Introduction (this section)
|
||
|
(2) The Petition Statement
|
||
|
(3) Instructions for signing this petition
|
||
|
(4) Credits
|
||
|
(Appendix) Analysis and text of S. 314 (LONG but excellent)
|
||
|
|
||
|
|
||
|
******(2) The Petition Statement
|
||
|
|
||
|
In united voice, we sign this petition against passage of S. 314 (the
|
||
|
"Communications Decency Act of 1995") for these reasons:
|
||
|
|
||
|
S. 314 would prohibit not only individual speech that is "obscene, lewd,
|
||
|
lascivious, filthy, or indecent", but would prohibit any provider of
|
||
|
telecommunications service from carrying such traffic, under threat of
|
||
|
stiff penalty. Even aside from the implications for free speech, this
|
||
|
would cause an undue - and unjust - burden upon operators of the various
|
||
|
telecommunications services. In a time when the citizenry and their
|
||
|
lawmakers alike are calling for and passing "no unfunded mandates" laws
|
||
|
to the benefit of the states, it is unfortunate that Congress might seek to
|
||
|
impose unfunded mandates upon businesses that provide the framework for
|
||
|
the information age.
|
||
|
|
||
|
An additional and important consideration is the technical feasibility of
|
||
|
requiring the sort of monitoring this bill would necessitate. The
|
||
|
financial burden in and of itself - in either manpower or technology to
|
||
|
handle such monitoring (if even legal under the Electronic Communications
|
||
|
Privacy Act) - would likely cause many smaller providers to go out of
|
||
|
business, and most larger providers to seriously curtail their services.
|
||
|
|
||
|
The threat of such penalty alone would result in a chilling effect in the
|
||
|
telecommunications service community, not only restricting the types of
|
||
|
speech expressly forbidden by the bill, but creating an environment
|
||
|
contrary to the Constitutional principles of free speech, press, and
|
||
|
assembly - principles which entities such as the Internet embody as
|
||
|
nothing has before.
|
||
|
|
||
|
By comparison, placing the burden for content control upon each individual
|
||
|
user is surprisingly simple in the online and interactive world, and there
|
||
|
is no legitimate reason to shift that burden to providers who carry that
|
||
|
content. Unlike traditional broadcast media, networked media is
|
||
|
comparatively easy to screen on the user end - giving the reader, viewer,
|
||
|
or participant unparalleled control over his or her own information
|
||
|
environment. All without impacting or restricting what any other user
|
||
|
wishes to access. This makes regulation such as that threatened by this
|
||
|
S. 314 simply unnecessary.
|
||
|
|
||
|
In addition, during a period of ever-increasing commercial interest in
|
||
|
arenas such as the Internet, restriction and regulation of content or the
|
||
|
flow of traffic across the various telecommunications services would have
|
||
|
serious negative economic effects. The sort of regulation proposed by this
|
||
|
bill would slow the explosive growth the Internet has seen, giving the
|
||
|
business community reason to doubt the medium's commercial appeal.
|
||
|
|
||
|
We ask that the Senate halt any further progress of this bill. We ask
|
||
|
that the Senate be an example to Congress as a whole, and to the nation
|
||
|
at large - to promote the general welfare as stated in the Preamble to
|
||
|
the Constitution by protecting the free flow of information and ideas
|
||
|
across all of our telecommunications services.
|
||
|
|
||
|
|
||
|
******(3) Instructions for signing the petition
|
||
|
|
||
|
======================================
|
||
|
Instructions for Signing This Petition
|
||
|
======================================
|
||
|
|
||
|
It must first be noted that this is a petition, not a
|
||
|
vote. By "signing" it you agree with *all* the requests
|
||
|
made in the petition. If you do not agree with everything
|
||
|
in this petition, then your only recourse is to not sign
|
||
|
it.
|
||
|
|
||
|
In addition, all e-mail signatures will be submitted to
|
||
|
Congress, the President of the United States, and the
|
||
|
news media.
|
||
|
|
||
|
Including your full name is optional, but *very highly
|
||
|
encouraged* as that would add to the effectiveness of the
|
||
|
petition. Signing via an anonymous remailer is highly
|
||
|
discouraged, but not forbidden, as an attempt will be made
|
||
|
to separately tally signatures from anonymous remailers.
|
||
|
|
||
|
Because this is a Petition to the U.S. Congress, we ask
|
||
|
that you state, as instructed below, whether or not you
|
||
|
are a U.S. citizen. We do encourage non-U.S. citizens to
|
||
|
sign, but their signatures will be tallied separately.
|
||
|
|
||
|
Signing this petition is not hard, but to make sure your
|
||
|
signature is not lost or miscounted, please follow these
|
||
|
directions EXACTLY:
|
||
|
|
||
|
1) Prepare an e-mail message. In the main body (NOT the
|
||
|
Subject line) of your e-mail include the ONE-LINE statement:
|
||
|
|
||
|
SIGNED <Internet e-mail address> <Full name> <US Citizen>
|
||
|
|
||
|
You need not include the "<" and ">" characters. 'SIGNED'
|
||
|
should be capitalized. As stated above, your full name is
|
||
|
optional, but highly recommended. If you do supply your
|
||
|
name, please don't use a pseudonym or nickname, or your
|
||
|
first name -- it's better to just leave it blank if it's
|
||
|
not your full and real name. If you are a U.S. citizen,
|
||
|
please include at the end of the signature line a 'YES',
|
||
|
and if you are not, a 'NO'. All signatures will be
|
||
|
tallied whether or not you are a U.S. Citizen
|
||
|
|
||
|
****************************************************
|
||
|
Example: My e-mail signature would be:
|
||
|
|
||
|
SIGNED dave@kachina.altadena.ca.us Dave C. Hayes YES
|
||
|
****************************************************
|
||
|
|
||
|
2) Please DON'T include a copy of this petition, nor any
|
||
|
other text, in your e-mail message. If you have comments
|
||
|
to make, send e-mail to me personally, and NOT to the
|
||
|
special petition e-mail signature address.
|
||
|
|
||
|
3) Send your e-mail message containing your signature to
|
||
|
the following Internet e-mail address and NOT to me:
|
||
|
|
||
|
===========================
|
||
|
s314-petition@netcom.com
|
||
|
===========================
|
||
|
|
||
|
4) Within a few days of receipt of your signature, an
|
||
|
automated acknowledgment will be e-mailed to you for e-mail
|
||
|
address verification purposes. You do not need to respond or
|
||
|
reply to this acknowledgement when you receive it. We may
|
||
|
also contact you again in the future should we need more
|
||
|
information, such as who your House Representative and
|
||
|
Senators are, which is not asked here as it is unclear
|
||
|
whether such information is needed.
|
||
|
|
||
|
Thank you for signing this petition!
|
||
|
|
||
|
|
||
|
******(4) Credits
|
||
|
|
||
|
The petition statement was written by slowdog
|
||
|
<slowdog@wookie.net>, super.net.freedom.fighter.
|
||
|
|
||
|
The rest of this document mostly collated from the net
|
||
|
by Dave Hayes, net.freedom.fighter.
|
||
|
|
||
|
Much help came from Jon Noring, INFJ and
|
||
|
self.proclaimed.net.activist who made a few
|
||
|
suggestions and will be tallying the signatures.
|
||
|
|
||
|
Thanks to the EFF and CDT for the excellent analysis of
|
||
|
the bill.
|
||
|
|
||
|
(p.s., send your signature to s314-petition@netcom.com)
|
||
|
|
||
|
|
||
|
******(Appendix) Analysis and text of S. 314
|
||
|
|
||
|
[This analysis provided by the Center for Democracy and
|
||
|
Technology, a non-profit public interest organization.
|
||
|
CDT's mission is to develop and advocate public policies
|
||
|
that advance Constitutional civil liberties and democratic
|
||
|
values in new computer and communications technologies.
|
||
|
For more information on CDT, ask Jonah Seiger
|
||
|
<jseiger@cdt.org>.]
|
||
|
|
||
|
CDT POLICY POST 2/9/95
|
||
|
|
||
|
SENATOR EXON INTRODUCES ONLINE INDECENCY LEGISLATION
|
||
|
|
||
|
A. OVERVIEW
|
||
|
|
||
|
Senators Exon (D-NE) and Senator Gorton (R-WA) have
|
||
|
introduced legislation to expand current FCC regulations
|
||
|
on obscene and indecent audiotext to cover *all* content
|
||
|
carried over all forms of electronic communications
|
||
|
networks. If enacted, the "Communications Decency Act of
|
||
|
1995" (S. 314) would place substantial criminal liability
|
||
|
on telecommunications service providers (including
|
||
|
telephone networks, commercial online services, the
|
||
|
Internet, and independent BBS's) if their network is used
|
||
|
in the transmission of any indecent, lewd, threatening or
|
||
|
harassing messages. The legislation is identical to a
|
||
|
proposal offered by Senator Exon last year which failed
|
||
|
along with the Senate Telecommunications reform bill (S.
|
||
|
1822, 103rd Congress, Sections 801 - 804). The text the
|
||
|
proposed statute, with proposed amendment, is appended at
|
||
|
the end of this document.
|
||
|
|
||
|
The bill would compel service providers to chose between
|
||
|
severely restricting the activities of their subscribers
|
||
|
or completely shutting down their email, Internet access,
|
||
|
and conferencing services under the threat of criminal
|
||
|
liability. Moreover, service providers would be forced to
|
||
|
closely monitor every private communication, electronic
|
||
|
mail message, public forum, mailing list, and file archive
|
||
|
carried by or available on their network, a proposition
|
||
|
which poses a substantial threat to the freedom of speech
|
||
|
and privacy rights of all American citizens.
|
||
|
|
||
|
S. 314, if enacted, would represent a tremendous step
|
||
|
backwards on the path to a free and open National
|
||
|
Information Infrastructure. The bill raises fundamental
|
||
|
questions about the ability of government to control
|
||
|
content on communications networks, as well as the locus
|
||
|
of liability for content carried in these new
|
||
|
communications media.
|
||
|
|
||
|
To address this threat to the First Amendment in digital
|
||
|
media, CDT is working to organize a broad coalition of
|
||
|
public interest organizations including the ACLU, People
|
||
|
For the American Way, and Media Access Project, along with
|
||
|
representatives from the telecommunications, online
|
||
|
services, and computer industries to oppose S. 314 and to
|
||
|
explore alternative policy solutions that preserve the
|
||
|
free flow of information and freedom of speech in the
|
||
|
online world. CDT believes that technological
|
||
|
alternatives which allow individual subscribers to control
|
||
|
the content they receive represent a more appropriate
|
||
|
approach to this issue.
|
||
|
|
||
|
|
||
|
B. SUMMARY AND ANALYSIS OF S. 314
|
||
|
|
||
|
S. 314 would expand current law restricting indecency and
|
||
|
harassment on telephone services to all telecommunications
|
||
|
providers and expand criminal liability to *all* content
|
||
|
carried by *all* forms of telecommunications networks.
|
||
|
The bill would amend Section 223 of the Communications Act
|
||
|
(47 U.S.C. 223), which requires carriers to take steps to
|
||
|
prevent minors from gaining access to indecent audiotext
|
||
|
and criminalizes harassment accomplished over interstate
|
||
|
telephone lines. This section, commonly known as the
|
||
|
Helms Amendment (having been championed by Senator Jesse
|
||
|
Helms), has been the subject of extended Constitutional
|
||
|
litigation in recent years.
|
||
|
|
||
|
* CARRIERS LIABLE FOR CONDUCT OF ALL USERS ON THEIR
|
||
|
NETWORKS
|
||
|
|
||
|
S. 314 would make telecommunication carriers (including
|
||
|
telephone companies, commercial online services, the
|
||
|
Internet, and BBS's) liable for every message, file, or
|
||
|
other content carried on its network -- including the
|
||
|
private conversations or messages exchanged between two
|
||
|
consenting individuals.
|
||
|
|
||
|
Under S. 314, anyone who "makes, transmits, or otherwise
|
||
|
makes available any comment, request, suggestion,
|
||
|
proposal, image, or other communication" which is
|
||
|
"obscene, lewd, lascivious, filthy, or indecent" using a
|
||
|
"telecommunications device" would be subject to a fine of
|
||
|
$100,000 or two years in prison (Section (2)(a)).
|
||
|
|
||
|
In order to avoid liability under this provision, carriers
|
||
|
would be forced to pre-screen all messages, files, or
|
||
|
other content before transmitting it to the intended
|
||
|
recipient. Carriers would also be forced to prevent or
|
||
|
severely restrict their subscribers from communicating
|
||
|
with individuals and accessing content available on other
|
||
|
networks.
|
||
|
|
||
|
Electronic communications networks do not contain discrete
|
||
|
boundaries. Instead, users of one service can easily
|
||
|
communicate with and access content available on other
|
||
|
networks. Placing the onus, and criminal liability, on
|
||
|
the carrier as opposed to the originator of the content,
|
||
|
would make the carrier legally responsible not only for
|
||
|
the conduct of its own subscribers, but also for content
|
||
|
generated by subscribers of other services.
|
||
|
|
||
|
This regulatory scheme clearly poses serious threats to
|
||
|
the free flow of information throughout the online world
|
||
|
and the free speech and privacy rights of individual
|
||
|
users. Forcing carriers to pre-screen content would not
|
||
|
only be impossible due to the sheer volume of messages, it
|
||
|
would also violate current legal protections.
|
||
|
|
||
|
* CARRIERS REQUIRED TO ACT AS PRIVATE CENSOR OF ALL
|
||
|
PUBLIC FORUMS AND ARCHIVES
|
||
|
|
||
|
S. 314 would also expand current restrictions on access to
|
||
|
indecent telephone audiotext services by minors under the
|
||
|
age of 18 to cover similar content carried by
|
||
|
telecommunications services (such as America Online and
|
||
|
the Internet). (Sec (a)(4)).
|
||
|
|
||
|
As amended by this provision, anyone who, "by means of
|
||
|
telephone or telecommunications device, makes, transmits,
|
||
|
or otherwise makes available (directly or by recording
|
||
|
device) any indecent communication for commercial purposes
|
||
|
which is available to any person under the age of 18 years
|
||
|
of age or to any other person without that person's
|
||
|
consent, regardless of whether the maker of such
|
||
|
communication placed the call or initiated the
|
||
|
communication" would be subject of a fine of $100,000 or
|
||
|
two years in prison.
|
||
|
|
||
|
This would force carries to act as private censors of all
|
||
|
content available in public forums or file archives on
|
||
|
their networks. Moreover, because there is no clear
|
||
|
definition of indecency, carriers would have to restrict
|
||
|
access to any content that could be possibly construed as
|
||
|
indecent or obscene under the broadest interpretation of
|
||
|
the term. Public forums, discussion lists, file archives,
|
||
|
and content available for commercial purposes would have
|
||
|
to be meticulously screened and censored in order to avoid
|
||
|
potential liability for the carrier.
|
||
|
|
||
|
Such a scenario would severely limit the diversity of
|
||
|
content available on online networks, and limit the
|
||
|
editorial freedom of independent forum operators.
|
||
|
|
||
|
ADDITIONAL NOTABLE PROVISIONS
|
||
|
|
||
|
* AMENDMENT TO ECPA
|
||
|
|
||
|
Section (6) of the bill would amend the Electronic
|
||
|
Communications Privacy Act (18 USC 2511) to prevent the
|
||
|
unauthorized interception and disclosure of "digital
|
||
|
communications" (Sec. 6). However, because the term
|
||
|
"digital communication" is not defined and 18 USC 2511
|
||
|
currently prevents unauthorized interception and
|
||
|
disclosure of "electronic communications" (which includes
|
||
|
electronic mail and other forms of communications in
|
||
|
digital form), the effect of this provision has no clear
|
||
|
importance.
|
||
|
|
||
|
* CABLE OPERATORS MAY REFUSE INDECENT PUBLIC ACCESS
|
||
|
PROGRAMMING
|
||
|
|
||
|
Finally, section (8) would amend sections 611 and 612 of
|
||
|
the Communications Act (47 USC 611 - 612) to allow any
|
||
|
cable operator to refuse to carry any public access or
|
||
|
leased access programming which contains "obscenity,
|
||
|
indecency, or nudity".
|
||
|
|
||
|
C. ALTERNATIVES TO EXON: RECOGNIZE THE UNIQUE USER
|
||
|
CONTROL CAPABILITIES OF INTERACTIVE MEDIA
|
||
|
|
||
|
Government regulation of content in the mass media has
|
||
|
always been considered essential to protect children from
|
||
|
access to sexually-explicit material, and to prevent
|
||
|
unwitting listeners/views from being exposed to material
|
||
|
that might be considered extremely distasteful. The
|
||
|
choice to protect children has historically been made at
|
||
|
the expense of the First Amendment ban on government
|
||
|
censorship. As Congress moves to regulate new interactive
|
||
|
media, it is essential that it understand that interactive
|
||
|
media is different than mass media. The power and
|
||
|
flexibility of interactive media offers a unique
|
||
|
opportunity to enable parents to control what content
|
||
|
their kids have access to, and leave the flow of
|
||
|
information free for those adults who want it. Government
|
||
|
control regulation is simply not needed to achieve the
|
||
|
desired purpose.
|
||
|
|
||
|
Most interactive technology, such as Internet browsers and
|
||
|
the software used to access online services such as
|
||
|
America Online and Compuserve, already has the capability
|
||
|
to limit access to certain types of services and selected
|
||
|
information. Moreover, the electronic program guides
|
||
|
being developed for interactive cable TV networks also
|
||
|
provide users the capability to screen out certain
|
||
|
channels or ever certain types of programming. Moreover,
|
||
|
in the online world, most content (with the exception of
|
||
|
private communications initiated by consenting
|
||
|
individuals) is transmitted by request. In other words,
|
||
|
users must seek out the content they receive, whether it
|
||
|
is by joining a discussion or accessing a file archive.
|
||
|
By its nature, this technology provides ample control at
|
||
|
the user level. Carriers (such as commercial online
|
||
|
services, Internet service providers) in most cases act
|
||
|
only as "carriers" of electronic transmissions initiated
|
||
|
by individual subscribers.
|
||
|
|
||
|
CDT believes that the First Amendment will be better
|
||
|
served by giving parents and other users the tools to
|
||
|
select which information they (and their children) should
|
||
|
have access to. In the case of criminal content the
|
||
|
originator of the content, not the carriers, should be
|
||
|
responsible for their crimes. And, users (especially
|
||
|
parents) should be empowered to determine what information
|
||
|
they and their children have access to. If all carriers
|
||
|
of electronic communications are forced restrict content
|
||
|
in order to avoid criminal liability proposed by S. 314,
|
||
|
the First Amendment would be threatened and the usefulness
|
||
|
of digital media for communications and information
|
||
|
dissemination would be drastically limited.
|
||
|
|
||
|
|
||
|
D. NEXT STEPS
|
||
|
|
||
|
The bill has been introduced and will next move to the
|
||
|
Senate Commerce Committee, although no Committee action
|
||
|
has been scheduled. Last year, a similar proposal by
|
||
|
Senator Exon was approved by the Senate Commerce committee
|
||
|
as an amendment to the Senate Telecommunications Bill (S.
|
||
|
1822, which died at the end of the 103rd Congress). CDT
|
||
|
will be working with a wide range of other interest groups
|
||
|
to assure that Congress does not restrict the free flow of
|
||
|
information in interactive media.
|
||
|
|
||
|
|
||
|
TEXT OF 47 U.S.C. 223 AS AMENDED BY S. 314
|
||
|
|
||
|
**NOTE: [] = deleted
|
||
|
ALL CAPS = additions
|
||
|
|
||
|
47 USC 223 (1992)
|
||
|
|
||
|
Sec. 223. [Obscene or harassing telephone calls in the District
|
||
|
of Columbia or in interstate or foreign communications]
|
||
|
|
||
|
OBSCENE OR HARASSING UTILIZATION OF TELECOMMUNICATIONS
|
||
|
DEVICES AND FACILITIES IN THE DISTRICT OF COLUMBIA OR IN
|
||
|
INTERSTATE OR FOREIGN COMMUNICATIONS"
|
||
|
|
||
|
(a) Whoever--
|
||
|
|
||
|
(1) in the District of Columbia or in interstate or foreign
|
||
|
communication by means of [telephone] TELECOMMUNICATIONS
|
||
|
DEVICE--
|
||
|
|
||
|
(A) [makes any comment, request, suggestion or proposal]
|
||
|
MAKES, TRANSMITS, OR OTHERWISE MAKES AVAILABLE ANY COMMENT,REQUEST,
|
||
|
SUGGESTION, PROPOSAL, IMAGE, OR OTHER COMMUNICATION which is
|
||
|
obscene, lewd, lascivious, filthy, or indecent;
|
||
|
|
||
|
[(B) makes a telephone call, whether or not conversation ensues,
|
||
|
without disclosing his identity and with intent to annoy, abuse,
|
||
|
threaten, or harass any person at the called number;]
|
||
|
|
||
|
|
||
|
"(B) MAKES A TELEPHONE CALL OR UTILIZES A TELECOMMUNICATIONS
|
||
|
DEVICE, WHETHER OR NOT CONVERSATION OR COMMUNICATIONS
|
||
|
ENSUES,WITHOUT DISCLOSING HIS IDENTITY AND WITH INTENT TO ANNOY,
|
||
|
ABUSE, THREATEN, OR HARASS ANY PERSON AT THE CALLED NUMBER OR WHO
|
||
|
RECEIVES THE COMMUNICATION;
|
||
|
|
||
|
|
||
|
(C) makes or causes the telephone of another repeatedly or
|
||
|
continuously to ring, with intent to harass any person at the
|
||
|
called number; or
|
||
|
|
||
|
[(D) makes repeated telephone calls, during which conversation
|
||
|
ensues, solely to harass any person at the called number; or]
|
||
|
|
||
|
(D) MAKES REPEATED TELEPHONE CALLS OR REPEATEDLY INITIATES
|
||
|
COMMUNICATION WITH A TELECOMMUNICATIONS DEVICE, DURING WHICH
|
||
|
CONVERSATION OR COMMUNICATION ENSUES, SOLELY TO HARASS ANY PERSON
|
||
|
AT THE CALLED NUMBER OR WHO RECEIVES THE COMMUNICATION,
|
||
|
|
||
|
(2) knowingly permits any [telephone facility]
|
||
|
TELECOMMUNICATIONS FACILITY under his control to be used
|
||
|
for any purpose prohibited by this section, shall be fined not more
|
||
|
than $[50,000]100,000 or imprisoned not more than [six months] TWO
|
||
|
YEARS, or both.
|
||
|
|
||
|
(b)(1) Whoever knowingly--
|
||
|
|
||
|
(A) within the United States, by means of [telephone]
|
||
|
TELECOMMUNICATIONS DEVICCE, makes (directly or by recording device)
|
||
|
any obscene communication for commercial purposes to any person,
|
||
|
regardless of whether the maker of such communication placed the
|
||
|
call or INITIATED THE COMMUNICATION; or
|
||
|
|
||
|
(B) permits any [telephone facility] TELECOMMUNICATIONS
|
||
|
FACILITY under such person's control to be used for an activity
|
||
|
prohibited by subparagraph (A), shall be fined in accordance with
|
||
|
title 18, United States Code, or imprisoned not more than two
|
||
|
years, or both.
|
||
|
|
||
|
(2) Whoever knowingly--
|
||
|
|
||
|
(A) within the United States, [by means of telephone],
|
||
|
makes BY MEANS OF TELEPHONE OR TELECOMMUNICATIONS DEVICE, MAKES,
|
||
|
TRANSMITS, OR MAKES AVAILABLE(directly or by recording device) any
|
||
|
indecent communication for commercial purposes which is available
|
||
|
to any person under 18 years of age or to any other person without
|
||
|
that person's consent, regardless of whether the maker of such
|
||
|
communication placed the call OR INITIATED THE COMMUNICATION; or
|
||
|
|
||
|
|
||
|
(B) permits any [telephone facility] TELECOMMUNICATIONS
|
||
|
FACILITY under such person's control to be used for an activity
|
||
|
prohibited by subparagraph (A), shall be fined not more than
|
||
|
$[50,000] 100,000 or imprisoned not more than [six months]
|
||
|
TWO YEARS, or both.
|
||
|
|
||
|
|
||
|
(3) It is a defense to prosecution under paragraph (2) of this
|
||
|
subsection that the defendant restrict access to the prohibited
|
||
|
communication to persons 18 years of age or older in accordance
|
||
|
with subsection (c) of this section and with such procedures as the
|
||
|
Commission may prescribe by regulation.
|
||
|
|
||
|
(4) In addition to the penalties under paragraph (1), whoever,
|
||
|
within the United States, intentionally violates paragraph
|
||
|
(1) or (2) shall be subject to a fine of not more than $[50,000]
|
||
|
100,000 for each violation. For purposes of this paragraph, each
|
||
|
day of violation shall constitute a separate violation.
|
||
|
|
||
|
(5)(A) In addition to the penalties under paragraphs (1), (2),
|
||
|
and (5), whoever, within the United States, violates paragraph (1)
|
||
|
or (2) shall be subject to a civil fine of not more than $[50,000]
|
||
|
100,000 for each violation. For purposes of this paragraph, each
|
||
|
day of violation shall constitute a separate violation.
|
||
|
|
||
|
(B) A fine under this paragraph may be assessed either--
|
||
|
|
||
|
(i) by a court, pursuant to civil action by the Commission or
|
||
|
any attorney employed by the Commission who is designated by the
|
||
|
Commission for such purposes, or
|
||
|
|
||
|
(ii) by the Commission after appropriate administrative
|
||
|
proceedings.
|
||
|
|
||
|
(6) The Attorney General may bring a suit in the appropriate
|
||
|
district court of the United States to enjoin any act or practice
|
||
|
which violates paragraph (1) or (2). An injunction may be granted
|
||
|
in accordance with the Federal Rules of Civil Procedure.
|
||
|
|
||
|
(c)(1) A common carrier within the District of Columbia or
|
||
|
within any State, or in interstate or foreign commerce, shall not,
|
||
|
to the extent technically feasible, provide access to a
|
||
|
communication specified in subsection (b) from the
|
||
|
telephone of any subscriber who has not previously requested in
|
||
|
writing the carrier to provide access to such communication if the
|
||
|
carrier collects from subscribers an identifiable charge for such
|
||
|
communication that the carrier remits, in whole or in part, to the
|
||
|
provider of such communication.
|
||
|
|
||
|
(2) Except as provided in paragraph (3), no cause of action may
|
||
|
be brought in any court or administrative agency against any common
|
||
|
carrier, or any of its affiliates, including their officers,
|
||
|
directors, employees, agents, or authorized representatives on
|
||
|
account of--
|
||
|
|
||
|
(A) any action which the carrier demonstrates was taken in good
|
||
|
faith to restrict access pursuant to paragraph (1) of this
|
||
|
subsection; or
|
||
|
|
||
|
(B) any access permitted--
|
||
|
|
||
|
(i) in good faith reliance upon the lack of any representation
|
||
|
by a provider of communications that communications provided by
|
||
|
that provider are communications specified in subsection (b), or
|
||
|
|
||
|
(ii) because a specific representation by the provider did not
|
||
|
allow the carrier, acting in good faith, a sufficient period to
|
||
|
restrict access to communications described in subsection (b).
|
||
|
|
||
|
(3) Notwithstanding paragraph (2) of this subsection, a provider
|
||
|
of communications services to which subscribers are denied access
|
||
|
pursuant to paragraph (1) of this subsection may bring an action
|
||
|
for a declaratory judgment or similar action in a court. Any such
|
||
|
action shall be limited to the question of whether the
|
||
|
communications which the provider seeks to provide fall within
|
||
|
the category of communications to which the carrier will provide
|
||
|
access only to subscribers who have previously requested such
|
||
|
access.
|
||
|
|
||
|
*********************************************
|
||
|
|
||
|
NOTE: This version of the text shows the actual text of current law as
|
||
|
it would be changed. For the bill itself, which consists of unreadable
|
||
|
text such as:
|
||
|
|
||
|
[...]
|
||
|
(1) in subsection (a)(1)--
|
||
|
(A) by striking out `telephone' in the matter above
|
||
|
subparagraph (A) and inserting `telecommunications device';
|
||
|
(B) by striking out `makes any comment, request,
|
||
|
suggestion, or proposal' in subparagraph (A) and inserting
|
||
|
`makes, transmits, or otherwise makes available any
|
||
|
comment, request, suggestion, proposal, image, or other
|
||
|
communication';
|
||
|
(C) by striking out subparagraph (B) and inserting the
|
||
|
following:
|
||
|
`(B) makes a telephone call or utilizes a
|
||
|
[...]
|
||
|
|
||
|
See:
|
||
|
|
||
|
ftp.eff.org, /pub/EFF/Legislation/Bills_new/s314.bill
|
||
|
gopher.eff.org, 1/EFF/Legislation/Bills_new, s314.bill
|
||
|
http://www.eff.org/pub/EFF/Legislation/Bills_new/s314.bill
|
||
|
|
||
|
************** End of Petition Statement ************************
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
From: Terry.Liberty-Parker@libertybbs.ima.infomail.com (Terry Liberty-Parker)
|
||
|
Date: 09 Feb 95 08:26:51
|
||
|
Subject: File 4--OREGON HOUSE BILL 2319 -
|
||
|
|
||
|
Forwarded (from: LIBALERT) by Terry Liberty-Parker using timEd.
|
||
|
Originally from ERIC GRAY (76:48/200.0) to ALL.
|
||
|
Original dated: Feb 05 '95, 03:42
|
||
|
|
||
|
This message was from LES LEMKE to ALL,
|
||
|
and was forwarded to you by ERIC GRAY.
|
||
|
-------------------------
|
||
|
( HB 2319 Page 1 )
|
||
|
|
||
|
|
||
|
|
||
|
68th OREGON LEGISIATIVE ASSEMBLY - 1995 Regular Session
|
||
|
|
||
|
|
||
|
HOUSE BILL 2319
|
||
|
|
||
|
Ordered printed by the Speaker pursuant to House Rule 12.00A (5),
|
||
|
Presession filed (at the request of Representative Kevin Mannix)
|
||
|
|
||
|
|
||
|
SUMMARY
|
||
|
|
||
|
The following summary is not prepared by the sponsors of the measure
|
||
|
and is not a part of the body thereof subject to consideration by the
|
||
|
Legislative Assembly, It is an editor's brief statement of the
|
||
|
essential features of the measure as introduced.
|
||
|
|
||
|
Directs operators of computer networks to keep records of
|
||
|
identity of users of network and of personal information about
|
||
|
individuals that is disclosed to users. Requires disclosure to
|
||
|
individual when information about individual is accessed by user of
|
||
|
network. Sets rules for disclosures. Allows injunction or maximum
|
||
|
civil penalty of $100,000, or both, for violation.
|
||
|
|
||
|
|
||
|
A BILL FOR AN ACT
|
||
|
|
||
|
Relating to computer information systems.
|
||
|
|
||
|
Be It Enacted by the People of the State of Oregon:
|
||
|
|
||
|
SECTION 1. As used in sections 1 to 3 of this Act:
|
||
|
|
||
|
(1) To "access" means to instruct, communicate with, store data in,
|
||
|
retrieve data from or otherwise make use of any resources of a
|
||
|
computer, computer system or computer network.
|
||
|
|
||
|
(2) "Computed' means, but is not limited to, an electronic device
|
||
|
that performs logical, arithmetic or memory functions by the
|
||
|
manipulations of electronic, magnetic or optical signals or
|
||
|
impulses, and includes all input, output, processing, storage,
|
||
|
software or communication facilities that are connected or
|
||
|
related to such a device in a system or network.
|
||
|
|
||
|
(3) "Computer network" means, but is not limited to, the
|
||
|
interconnection of communi cationlines, including microwave or
|
||
|
other means of electronic communication, with a computer through
|
||
|
remote terminals or a complex consisting of two or more
|
||
|
interconnected computers.
|
||
|
|
||
|
(4) "Computer program" means, but is not limited to, a series of
|
||
|
instructions or statements, in a form acceptable to a computer,
|
||
|
that permits the functioning of a computer system in a manner
|
||
|
designed to provide appropriate products from or usage of such
|
||
|
computer system.
|
||
|
|
||
|
(5) "Computer software" means, but is not limited to, computer
|
||
|
programs, procedures and associated documentation concerned with
|
||
|
the operation of a computer system.
|
||
|
|
||
|
(6) "Computer system" means, but is not limited to, a set of related,
|
||
|
connected or un connected, computer equipment, devices and
|
||
|
software.
|
||
|
|
||
|
(7) "Data" means a representation of information, knowledge, facts,
|
||
|
concepts, computer software, computer programs or instructions.
|
||
|
"Data" may be in any form, in storage media, or as stored in the
|
||
|
memory of the computer, or in transit, or presented on a display
|
||
|
device. "Data" includes, but is not limited to, computer or human
|
||
|
readable forms of numbers, text, stored voice, graphics and images.
|
||
|
|
||
|
|
||
|
SECTION 2.
|
||
|
|
||
|
(1) An owner or operator of a computer network or computer system
|
||
|
shall establish procedures requiring each person who accesses the
|
||
|
network or system to disclose
|
||
|
|
||
|
NOTE: Matter in boldfaced type in an amended section is new; matter
|
||
|
[italic and bracketed] is existing law to be omitted. New sections
|
||
|
are in boldfaced type.
|
||
|
|
||
|
LC 984
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
[1]
|
||
|
|
||
|
|
||
|
|
||
|
---
|
||
|
* Origin: Stargate Oregon - North Bend, Oregon USA (1:356/3)
|
||
|
|
||
|
* OLX 2.2 TD * The oldest question known to man: "Where are my keys?!"
|
||
|
|
||
|
___ GOMail v2.0t Beta [94-0145]
|
||
|
- Origin: The Desert Reef * LIB * Tuc.Az * V.34 * 602 624 6386 (76:48/200)
|
||
|
|
||
|
--- timEd 1.00
|
||
|
* Origin: LibertyBBS Austin,Tx [512]462-1776 (1:382/804)
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Sun 19 May 19943 22:51:01 EDT
|
||
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
||
|
Subject: File 5--CuD's WWW Homepage - http://sun.soci.niu.edu:80/~cudigest
|
||
|
|
||
|
CuD now has it's own WWW site.
|
||
|
|
||
|
It currently includes back issues of CuDs, and links to other
|
||
|
related Web sites.
|
||
|
|
||
|
URL: http://sun.soci.niu.edu:80/~cudigest
|
||
|
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Thu, 23 Oct 1994 22:51:01 CDT
|
||
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
||
|
Subject: File 6--Cu Digest Header Info (unchanged since 18 Feb, 1995)
|
||
|
|
||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
|
available at no cost electronically.
|
||
|
|
||
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
||
|
|
||
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
||
|
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
|
||
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
|
60115, USA.
|
||
|
|
||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
|
the PC Telecom forum under "computing newsletters;"
|
||
|
On Delphi in the General Discussion database of the Internet SIG;
|
||
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
||
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
||
|
CuD is also available via Fidonet File Request from
|
||
|
1:11/70; unlisted nodes and points welcome.
|
||
|
|
||
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
||
|
In ITALY: Bits against the Empire BBS: +39-461-980493
|
||
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
||
|
|
||
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
||
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
||
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
||
|
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
|
||
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
||
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
||
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
||
|
|
||
|
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
|
||
|
ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
|
||
|
|
||
|
The most recent issues of CuD can be obtained from the
|
||
|
Cu Digest WWW site at:
|
||
|
URL: http://sun.soci.niu.edu:80/~cudigest
|
||
|
|
||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
|
information among computerists and to the presentation and debate of
|
||
|
diverse views. CuD material may be reprinted for non-profit as long
|
||
|
as the source is cited. Authors hold a presumptive copyright, and
|
||
|
they should be contacted for reprint permission. It is assumed that
|
||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
||
|
specified. Readers are encouraged to submit reasoned articles
|
||
|
relating to computer culture and communication. Articles are
|
||
|
preferred to short responses. Please avoid quoting previous posts
|
||
|
unless absolutely necessary.
|
||
|
|
||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
||
|
the views of the moderators. Digest contributors assume all
|
||
|
responsibility for ensuring that articles submitted do not
|
||
|
violate copyright protections.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
End of Computer Underground Digest #7.14
|
||
|
************************************
|
||
|
|