990 lines
50 KiB
Plaintext
990 lines
50 KiB
Plaintext
|
|
||
|
Computer underground Digest Tue Mar 11, 1997 Volume 9 : Issue 18
|
||
|
ISSN 1004-042X
|
||
|
|
||
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
||
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
||
|
Archivist: Brendan Kehoe
|
||
|
Shadow Master: Stanton McCandlish
|
||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
|
Ralph Sims / Jyrki Kuoppala
|
||
|
Ian Dickinson
|
||
|
Field Agent Extraordinaire: David Smith
|
||
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
||
|
|
||
|
CONTENTS, #9.18 (Tue, Mar 11, 1997)
|
||
|
|
||
|
File 1--Purchase of Blocking Software by Public Libraries Unconstitutional
|
||
|
File 2--Dan Kennedy, COCK HUNGRY TEENS, and cyberlibertarianism
|
||
|
File 3--Joab Jackson on Maryland online "harassment" bill, from BaltCP
|
||
|
File 4--Cu Digest Header Info (unchanged since 13 Dec, 1996)
|
||
|
|
||
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
||
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
||
|
|
||
|
---------------------------------------------------------------------
|
||
|
|
||
|
Date: Mon, 03 Mar 1997 20:15:20 -0800
|
||
|
From: Jonathan Wallace <jw@bway.net>
|
||
|
Subject: File 1--Purchase of Blocking Software by Pub Libraries nconstitutional
|
||
|
|
||
|
Jonathan Wallace
|
||
|
The Ethical Spectacle http://www.spectacle.org
|
||
|
Co-author, Sex, Laws and Cyberspace http://www.spectacle.org/freespch/
|
||
|
|
||
|
"We must be the change we wish to see in the world."--Gandhi
|
||
|
|
||
|
PURCHASE OF BLOCKING SOFTWARE BY PUBLIC LIBRARIES IS UNCONSTITUTIONAL
|
||
|
|
||
|
A Briefing Paper
|
||
|
by
|
||
|
Jonathan D. Wallace, Esq.
|
||
|
jw@bway.net
|
||
|
|
||
|
|
||
|
The following is intended for use by free speech advocates to oppose the
|
||
|
installation of blocking software such as Cyberpatrol, Surfwatch, NetNan
|
||
|
ny or Cybersitter in public libraries. Permitted uses include basing your
|
||
|
own correspondence or documents upon the research presented here, excerp
|
||
|
ting this document, or presenting it in its entirety to the people you ar
|
||
|
e trying to influence. Please redistribute freely.
|
||
|
|
||
|
Jonathan D. Wallace, Esq., is a New York City-based attorney, author and
|
||
|
free speech advocate. He is the co-author, with Mark Mangan, of Sex, Law
|
||
|
s and Cyberspace (Henry Holt 1996), and with Michael Green of two forthco
|
||
|
ming law review articles, "Curing Metaphor Deficiency: The Internet, The
|
||
|
Printing Press and Freedom of Speech" (Seattle University Law Review) and
|
||
|
"Anonymity, Democracy and Cyberspace" (Hofstra Journal of Law and Legisl
|
||
|
ation).
|
||
|
|
||
|
|
||
|
Public libraries in Austin, Boston and elsewhere have decided to instal
|
||
|
l blocking software on computers connected to the Internet. Other librar
|
||
|
ies around the United States are considering purchasing such software. T
|
||
|
he purpose of this paper is to summarize, for readers who are not themsel
|
||
|
ves attorneys, the legal precedents that establish that the installation
|
||
|
of blocking software by public libraries is unconstitutional under the Fi
|
||
|
rst Amendment.
|
||
|
|
||
|
|
||
|
Blocking software is defined as software products published by commercia
|
||
|
l software publishers which do any of the following: block access to Inte
|
||
|
rnet sites listed in an internal database of the product; block access t
|
||
|
o Internet sites listed in a database maintained external to the product
|
||
|
itself; block access to Internet sites which carry certain ratings assig
|
||
|
ned to those sites by a third party, or which are unrated under such a sy
|
||
|
stem; scan the contents of Internet sites which a user seeks to view and
|
||
|
block access based on the occurrence of certain words or phrases on thos
|
||
|
e sites. Blocking software products currently on the market include Safes
|
||
|
urf, Surfwatch, NetNanny, CyberPatrol and Cybersitter.
|
||
|
|
||
|
It has been widely reported recently that these products go far beyond b
|
||
|
locking "pornography". In fact, most block sites containing speech which
|
||
|
is clearly First Amendment protected, such as the National Organization f
|
||
|
or Women site (http://www.now.org), blocked by Cybersitter, and the Elect
|
||
|
ronic Frontier Foundation archive (http://www.eff.org), blocked by CyberP
|
||
|
atrol. More information on political and lifestyle sites blocked by these
|
||
|
products is available on the Peacefire Web pages, (http://www.peacefire.
|
||
|
org), and in The Ethical Spectacle, maintained by the author of this pape
|
||
|
r. (http://www.spectacle.org/peace.html). (Please note that both of these
|
||
|
sites are themselves blocked by Cybersitter for their criticism of the p
|
||
|
roduct.)
|
||
|
|
||
|
Most advocates of the use of blocking software by libraries have forgott
|
||
|
en that the public library is a branch of government, and therefore subje
|
||
|
ct to First Amendment rules. While libraries have discretion in determini
|
||
|
ng what materials to acquire , the First Amendment prevents government fr
|
||
|
om removing materials from library shelves based on official disapproval
|
||
|
of content. Secondly, government rules classifying speech by the accepta
|
||
|
bility of content (in libraries or elsewhere) are inherently suspect, may
|
||
|
not be vague or overbroad, and must conform to existing legal parameters
|
||
|
laid out by the Supreme Court. Third, a library may not delegate to a pr
|
||
|
ivate organization, such as the publisher of blocking software, the discr
|
||
|
etion to determine what library users may see. These points are each dis
|
||
|
cussed at greater length, with citations to significant cases, below.
|
||
|
|
||
|
I. The Installation of blocking software by libraries constitutes an un
|
||
|
constitutional removal of materials from the library.
|
||
|
|
||
|
In the leading case of Island Trees Board of Education v. Pico, 457 U.
|
||
|
S. 853 (1982), the local board ordered removal from the school library of
|
||
|
books including Bernard Malamud's The Fixer and Richard Wright's Black B
|
||
|
oy. The Supreme Court held:
|
||
|
|
||
|
" Our Constitution does not permit the official suppression of ideas. Th
|
||
|
us, whether petitioners' removal of books from their school libraries d
|
||
|
enied respondents their First Amendment rights depends upon the motivatio
|
||
|
n behind petitioners' actions. If petitioners intended by their removal d
|
||
|
ecision to deny respondents access to ideas with which petitioners disagr
|
||
|
eed, and if this intent was the decisive factor in petitioners' decision
|
||
|
, then petitioners have exercised their discretion in violation of the Co
|
||
|
nstitution."
|
||
|
|
||
|
|
||
|
|
||
|
The Court also said:
|
||
|
|
||
|
" As noted earlier, nothing in our decision today affects in any way the
|
||
|
discretion of a local school board to choose books to add to the librari
|
||
|
es of their schools. Because we are concerned in this case with the suppr
|
||
|
ession of ideas, our holding today affects only the discretion to remo
|
||
|
ve books. In brief, we hold that local school boards may not remove book
|
||
|
s from school library shelves simply because they dislike the ideas conta
|
||
|
ined in those books and seek by their removal to 'prescribe what shall
|
||
|
be orthodox in politics, nationalism, religion, or other matters of opini
|
||
|
on.'.... Such purposes stand inescapably condemned by our precedents."
|
||
|
|
||
|
Clearly, the Pico case will govern the use of blocking software in libra
|
||
|
ries if, and only if, the blocking of a site by the product is analogize
|
||
|
d to the removal of a book from a shelf. If, as advocates of the purchase
|
||
|
of these products argue, the blocking of a site is analogous to the dec
|
||
|
ision not to purchase a book, then Pico will not apply.
|
||
|
|
||
|
However, the blocking of a site is analogous to the removal of a book fr
|
||
|
om a shelf.
|
||
|
|
||
|
|
||
|
Libraries certainly are not required by the First Amendment to grant use
|
||
|
rs access to the Internet. A library might, by contrast, decide only to
|
||
|
give access to sites pre-screened by the librarian. This act of screening
|
||
|
sites and then adding them to a list of sites accessible from the librar
|
||
|
y's computers would be analogous to the process followed in deciding wha
|
||
|
t books or periodicals to order, and would be undoubtedly constitutional.
|
||
|
(Significantly, it is impossible to imagine any public librarian in the
|
||
|
United States deciding not to authorize access to the National Organizati
|
||
|
on for Women pages or the Electronic Frontier Foundation archive.)
|
||
|
|
||
|
On the other hand, a library installing computers with full Internet acc
|
||
|
ess has, in effect, acquired the entire contents of the Internet. Blockin
|
||
|
g software which screens out sites based on their inclusion in a database
|
||
|
of impermissible sites, or blocks them based on the occurrence of banned
|
||
|
words or phrases, is effectively removing these resources from the libra
|
||
|
ry. Just as the board of education did in Pico, someone has gone through
|
||
|
a thought process which resulted in the removal of materials based on the
|
||
|
ir disfavored content.
|
||
|
|
||
|
Therefore, the installation of blocking software in a public library di
|
||
|
rectly violates the rules laid down in the Pico case.
|
||
|
|
||
|
|
||
|
II. The Criteria Used By Blocking Product Publishers Are Vague and Over
|
||
|
broad and May Not Legally Be Adopted by Public Libraries
|
||
|
|
||
|
While certain speech, such as obscenity, is considered outside the prote
|
||
|
ction of the First Amendment and can be barred at will, the Constitution
|
||
|
provides significant barriers to rules pertaining to protected speech.
|
||
|
When a library installs blocking software, it is enforcing a set of rules
|
||
|
determining which protected speech its users can access . These rules a
|
||
|
re inherently suspect under First Amendment principles and are likely to
|
||
|
be held unconstitutional. In general, government rules regulating protec
|
||
|
ted speech must be narrowly tailored to serve a compelling government int
|
||
|
erest. Rules that are overbroad or vague, and which attack too much speec
|
||
|
h, will almost inevitably fail.
|
||
|
|
||
|
There is a certain irony in the failure of many commentators to draw the
|
||
|
appropriate parallel between last June's ACLU v. Reno, 929 F. Supp. 824
|
||
|
(E.D. Pa. 1996) decision holding the Communications Decency Act (CDA) unc
|
||
|
onstitutional, and today's library controversy. The CDA banned speech o
|
||
|
n the Internet "depicting or describing" sexual "acts or organs", even if
|
||
|
that speech otherwise had significant social value. A panel of three fe
|
||
|
deral judges held the CDA to be overbroad, in that it would ban much valu
|
||
|
able speech online. The examples given by the court included newsworthy r
|
||
|
eporting of female genital circumcision in Africa, and the dissemination
|
||
|
of safe sex information. Advocates of the use of blocking software by lib
|
||
|
raries have failed to explain why, if the government could not directly b
|
||
|
an the National Organization for Women pages via the CDA, it can do so in
|
||
|
directly through the use of blocking software.
|
||
|
|
||
|
While the court referenced blocking software as a less restrictive alter
|
||
|
native to government censorship, it did not mean use of blocking software
|
||
|
by the government. It meant that a concerned parent could install a bloc
|
||
|
king product on a home computer (a clearly constitutional use, as there i
|
||
|
s no government action involved) obviating the need for laws banning cont
|
||
|
ent on the Internet. The court did not consider the use of blocking softw
|
||
|
are by libraries. It did, however, decline to endorse the government's su
|
||
|
ggestion that an "-L18" rating scheme be mandated for all speech on the N
|
||
|
et. A public library's installation of blocking software in effect circu
|
||
|
mvents the ACLU v. Reno ruling, by creating a customized Communications D
|
||
|
ecency Act applicable to the library's users.
|
||
|
|
||
|
|
||
|
It is a constant of First Amendment cases that speech rules, in order to
|
||
|
be constitutionally acceptable, must be clear enough to communicate to c
|
||
|
itizens which speech is legal and which is not. There is no consistent s
|
||
|
et of standards followed by blocking products, and almost all of the publ
|
||
|
ishers refuse to disclose their database of blocked sites. Several have p
|
||
|
ublished the rules they follow in determining which sites to block; here
|
||
|
is one example:
|
||
|
|
||
|
"CYBERsitter Site Blocking Policies
|
||
|
|
||
|
The CYBERsitter filter may block web sites and/or news groups that contai
|
||
|
n information that meets any of the following criteria not deemed suitabl
|
||
|
e for pre-teen aged children by a general consensus of reports and commen
|
||
|
ts received from our registered user
|
||
|
|
||
|
|
||
|
- Adult and Mature subject matter of a sexual nature.
|
||
|
|
||
|
- Pornography or adult oriented graphics.
|
||
|
|
||
|
- Drugs or alcohol.
|
||
|
|
||
|
- Illegal activities.
|
||
|
|
||
|
- Gross depictions or mayhem.
|
||
|
|
||
|
- Violence or anarchy.
|
||
|
|
||
|
- Hate groups.
|
||
|
|
||
|
- Racist groups.
|
||
|
|
||
|
- Anti-semitic groups.
|
||
|
|
||
|
- Advocating of intolerance.
|
||
|
|
||
|
- Computer hacking.
|
||
|
|
||
|
- Advocating violation of copyright laws.
|
||
|
|
||
|
- Any site that publishes information interfering with the legal rights a
|
||
|
nd obligations of a parent or our customers.
|
||
|
|
||
|
- Any site maintaining links to other sites containing any of the above c
|
||
|
ontent.
|
||
|
|
||
|
- Any domain hosting more than one site containing any of the above conte
|
||
|
nt.
|
||
|
|
||
|
|
||
|
The above criteria is subject to change without notice."
|
||
|
|
||
|
These criteria, if adopted by government to determine which speech to ba
|
||
|
n, would be struck down as unconstitutional just as quickly as a civil li
|
||
|
berties organization could race into court and get a decision. These crit
|
||
|
eria as written ban speech about the listed items, in most cases even if
|
||
|
the speech opposes the subject matter. For example, the ban on informati
|
||
|
on about "drugs or alcohol" is so broadly written as to include sites ma
|
||
|
intained by anti-drug organizations or by Alcoholics Anonymous. Note that
|
||
|
almost all of the criteria pertain to speech that, though disfavored by
|
||
|
most people, is clearly constitutionally protected, and may legitimately
|
||
|
be the subject of a child's research project: hate speech, speech about
|
||
|
intolerance, and speech about illegal activities are three examples. Non
|
||
|
e of the criteria make any exception for materials with social value. Thu
|
||
|
s the criteria would not permit a teenager to research a report about the
|
||
|
Holocaust, which might fall under the ban on "gross depictions or mayhem
|
||
|
", antisemitism or hate speech. If this seems unlikely, it isn't; CyberPa
|
||
|
trol at one point blocked Nizkor (http://www.nizkor.org), an important Ho
|
||
|
locaust archive, because it contained "hate speech." In fact, the criteri
|
||
|
a made available by every publisher of blocking software are equivalently
|
||
|
vague. As the Supreme Court said in a leading case involving a Dallas m
|
||
|
ovie rating scheme, " the restrictions imposed cannot be so vague as to
|
||
|
set 'the censor....adrift upon a boundless sea...' In short, as Justice F
|
||
|
rankfurter said, 'Legislation must not be so vague, the language so loose
|
||
|
, as to leave to those who have to apply it too wide a discretion.'" Inte
|
||
|
rstate Circuit v. Dallas, 390 U.S. 676 (1968).
|
||
|
|
||
|
In summary, the criteria followed by every existing blocking product are
|
||
|
far too vague and broad to meet the exacting standards of ACLU v. Reno a
|
||
|
nd decades of Supreme Court precedents, even if the library had adopted
|
||
|
these criteria itself. As we will see in the next section, the delegation
|
||
|
by the library of its decision-making to private parties--the publishers
|
||
|
of blocking software--is also unconstitutional.
|
||
|
|
||
|
|
||
|
III. A Library Cannot Relegate to Private Parties The Authority to Dete
|
||
|
rmine What Its Users Can See
|
||
|
|
||
|
Although the installation of blocking software by a library may be a pol
|
||
|
itically expedient solution, it involves an illegal delegation of the lib
|
||
|
rary's authority to third parties. Since the library itself, as we estab
|
||
|
lished in the section above, could not validly enforce vague rules, it do
|
||
|
es not avoid the exacting requirements of the First Amendment by abdicati
|
||
|
ng responsibility to the blocking software publisher.
|
||
|
|
||
|
For example, federal courts have established that government cannot enac
|
||
|
t laws granting legal enforcement to the private ratings of the Motion Pi
|
||
|
cture Association of America (MPAA). In MPAA v. Spector,315 F.Supp. 824
|
||
|
(ED Pa. 1970), the court dealt with a Pennsylvania law making it a crim
|
||
|
e to permit a child to see a movie rated "R" or "X" under the MPAA schem
|
||
|
e. The court held the law unconstitutional:
|
||
|
|
||
|
"The evidence clearly established that the Code and Rating Administration
|
||
|
of the Association has itself no defined standards or criteria against w
|
||
|
hich to measure its ratings. ...[I]t is manifest from a reading of Act No
|
||
|
2E 100 that, however well-intended, it is so patently vague and lacking
|
||
|
in any ascertainable standards and so infringes upon the plaintiffs' righ
|
||
|
ts to freedom of expression, as protected by the First and Fourteenth Am
|
||
|
endments to the Federal Constitution, as to render it unconstitutional..
|
||
|
2E.[T]the attempted recourse to Association ratings is of no avail."
|
||
|
|
||
|
|
||
|
|
||
|
Other federal courts have agreed that " it is well-established that the
|
||
|
Motion Picture ratings may not be used as a standard for a determinatio
|
||
|
n of constitutional status", Swope v. Lubbers, 560 F.Supp. 1328 (W.D. M
|
||
|
ich. 1983). As one judge tartly observed in Engdahl v. Kenosha 317 F.S
|
||
|
upp. 1133 (E.D. Wis. 1970):
|
||
|
|
||
|
This determination as to what is proper for minors in Kenosha is made b
|
||
|
y a private agency, the Motion Picture Association of America. It was con
|
||
|
ceded at the hearing upon the present motion that if the Motion Picture A
|
||
|
ssociation utilized any standards whatsoever in reaching its judgments as
|
||
|
to what is an 'adult' movie, the defendants are not aware of what these
|
||
|
standards are.
|
||
|
|
||
|
|
||
|
Similarly, most public libraries buying blocking software will do so wit
|
||
|
h only a vague awareness, at best, of the standards (if any) followed by
|
||
|
the software publisher.
|
||
|
|
||
|
|
||
|
Under these clear legal precedents, a library cannot block its users fro
|
||
|
m accessing Internet sites based upon a vague or undisclosed set of stand
|
||
|
ards implemented by the publisher of the blocking software.
|
||
|
|
||
|
Conclusion
|
||
|
|
||
|
The installation of blocking software by a public library is clearly unc
|
||
|
onstititutional under relevant First Amendment case law.
|
||
|
|
||
|
|
||
|
Please contact Jonathan Wallace at jw@bway.net with any comments or quest
|
||
|
ions. For more information and for updated copies of this document, check
|
||
|
the Net Freedoms page, http://www.spectacle.org/cda/cdamn.html.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Thu, 6 Mar 1997 21:01:50 -0800 (PST)
|
||
|
From: Declan McCullagh <declan@well.com>
|
||
|
Subject: File 2--Dan Kennedy, COCK HUNGRY TEENS, and cyberlibertarianism
|
||
|
|
||
|
You'll find a porn-ucopia of online smuttiness -- from "COCK HUNGRY TEENS"
|
||
|
to "women administering fellatio to dogs" -- in Dan Kennedy's column in
|
||
|
the most recent issue of the _Boston Phoenix_, where he decries
|
||
|
cyberlibertarians, damns Net-sex, and extols the virtues of censorware.
|
||
|
|
||
|
I haven't read so much turgid prose since Marty Rimm.
|
||
|
|
||
|
His factual errors are worth noting. Kennedy says CyberPatrol blocked the
|
||
|
National Organization for Women and then unblocked it, when in truth
|
||
|
CyberPatrol never blocked NOW. Kennedy incorrectly says that GLAAD was not
|
||
|
on the CyberNOT oversight committee last summer, when in truth they were.
|
||
|
Kennedy says a Federal appeals court struck down the CDA; it was a
|
||
|
district court. Kennedy says the Supreme Court will hear arguments on the
|
||
|
CDA next month; in reality, they'll hear arguments this month. Kennedy
|
||
|
incorrectly labels Rimm a graduate student; he was an undergraduate.
|
||
|
Kennedy talks of the "cyberlibertarian grassroots" when discussing a
|
||
|
member of the Boston Coalition for Freedom of Expression, even though that
|
||
|
person is a leftist, not a libertarian. Kennedy incorrectly says Brock
|
||
|
wrote the "much-cited" expose' of censorware, when in fact we coauthored
|
||
|
it.
|
||
|
|
||
|
But forget accuracy. Instead, let's rant about THE DANGERS OF PORN ONLINE!
|
||
|
It's not like it hasn't been done before:
|
||
|
|
||
|
For instance, it's not
|
||
|
at all difficult to find photo-animations of a young woman
|
||
|
performing fellatio above the inscription COCK HUNGRY TEENS, and of
|
||
|
two men having anal sex; both are just one click from Yahoo, the
|
||
|
big Internet search engine, which maintains an extensive guide to
|
||
|
online sex...
|
||
|
|
||
|
It's difficult to exaggerate the offensiveness of some of this
|
||
|
stuff, the likes of which few people ever laid their eyes on before
|
||
|
technology made it possible. You can find photos of women tied up,
|
||
|
gagged, and being tortured with heavy lead weights suspended from
|
||
|
their pierced nipples and genitals. Photos of women administering
|
||
|
fellatio to dogs. Photos of women literally eating feces (if you
|
||
|
see a pattern here, it's no accident: men rarely star in these
|
||
|
twisted plots), and photos of lifeless victims of horrible
|
||
|
|
||
|
And it gets worse...
|
||
|
|
||
|
So does Kennedy's column. Keep reading.
|
||
|
|
||
|
-Declan
|
||
|
|
||
|
|
||
|
---------- Forwarded message ----------
|
||
|
|
||
|
http://www.bostonphoenix.com/archive/news/quote.html
|
||
|
|
||
|
By Dan Kennedy
|
||
|
March 6 - 13, 1 9 9 7
|
||
|
|
||
|
Porn patrol
|
||
|
|
||
|
The digerati are screaming `censorship' over Mayor Menino's Internet sex
|
||
|
ban at the Boston Public Library. But cybersmut is more disgusting -- and
|
||
|
Menino's proposal more reasonable -- than his critics are willing to
|
||
|
admit.
|
||
|
|
||
|
In cyberspace, everyone can hear you scream. And at those outposts
|
||
|
favored by the technosavvy elite, they've been screaming bloody
|
||
|
murder ever since Mayor Tom Menino issued a decree banning Internet
|
||
|
porn from the Boston Public Library.
|
||
|
|
||
|
In most quarters, including the editorial pages of the _Boston
|
||
|
Globe_ and the _Boston Herald_, Menino's action has been seen as
|
||
|
measured and sensible -- especially if, as now seems likely, he
|
||
|
backs away from a misguided attempt to extend the ban to adults as
|
||
|
well as children.
|
||
|
|
||
|
But to the digerati, given to hyperlibertarian politics and a
|
||
|
utopian, messianic belief in the ability of the Internet to
|
||
|
transport humanity to a higher level of consciousness, Menino is an
|
||
|
ignorant, jackbooted thug, and those who support him are
|
||
|
technological illiterates trying to escape a culture they neither
|
||
|
like nor understand.
|
||
|
|
||
|
Parts of Usenet, a portion of the Internet comprising interactive
|
||
|
discussion groups, have been filled with angry posts from
|
||
|
cyberlibertarians, most of them in a thread titled "The Demise of
|
||
|
Mayor Menino." For the most part, postings have consisted of
|
||
|
vitriolic assertions that children have the same right to
|
||
|
uncensored Internet access as adults, and of dire warnings of the
|
||
|
political and even personal consequences Menino will suffer if he
|
||
|
doesn't back down.
|
||
|
|
||
|
Among the most incensed is Jim D'Entremont, of the Boston Coalition
|
||
|
for Freedom of Expression. D'Entremont has been especially angry
|
||
|
with the _Globe_ for failing to disclose that its publisher,
|
||
|
William Taylor, is president of the BPL's board of trustees. In a
|
||
|
letter to _Globe_ ombudsman Mark Jurkowitz that was also posted on
|
||
|
the Net, D'Entremont accused Taylor of living "in an ethical
|
||
|
vacuum," and added with more portentousness than logic: "It's very
|
||
|
clear to us now, at least in general terms, just what has been
|
||
|
going on." For good measure, D'Entremont, in a brief interview with
|
||
|
the _Phoenix_, accused _Globe_ technology writer Hiawatha Bray --
|
||
|
who wrote a generally accurate if pollyannaish piece on the
|
||
|
porn-blocking software that may be installed on library computers
|
||
|
-- of being "a former Christian-right activist in the Midwest." (A
|
||
|
bemused Bray concedes that he was a member of the Chicago-based
|
||
|
Pro-Life Action League before coming to Boston.)
|
||
|
|
||
|
D'Entremont's outburst is far from an isolated phenomenon. Indeed,
|
||
|
his passion is an article of faith among the digerati, a faith that
|
||
|
has best been expressed by _Wired_ editor/publisher/founder Louis
|
||
|
Rossetto. In a 1995 anti-censorship manifesto titled "Fuck, Piss,
|
||
|
Shit, etc.," Rossetto called government officials "power-hungry
|
||
|
sociopaths . . . wiping their asses with our Constitution." The
|
||
|
intellectual framework for this rage has been laid out by the media
|
||
|
critic Jon Katz, who, in an essay for _Wired_ titled "The Rights of
|
||
|
Kids in the Digital Age," blasted V-chips, movie and TV ratings,
|
||
|
Internet censorship, and other attempts to protect kids from the
|
||
|
media as evidence of "anxiety and arrogance," imposed by "brute
|
||
|
authority."
|
||
|
|
||
|
It's an appealing, powerful argument, invoking as it does an
|
||
|
eminently justified anger against mindless government authority, an
|
||
|
ode to individual responsibility, and a gauzy, optimistic vision of
|
||
|
the future. But it's an argument without nuance, leaving its
|
||
|
adherents unable to draw the kinds of important moral distinctions
|
||
|
most of us make all the time.
|
||
|
|
||
|
We don't let kids buy alcohol or tobacco or lottery tickets -- or,
|
||
|
more to the point, _Playboy_ or _Penthouse_. Yet the digerati argue
|
||
|
that we should do nothing to prevent kids from viewing violent,
|
||
|
degrading, hardcore pornography. Such fare, as the
|
||
|
cyberlibertarians never tire of arguing, makes up just a tiny part
|
||
|
of what's available on the Internet. But it is nevertheless
|
||
|
voluminous in its own right and remarkably easy to find.
|
||
|
|
||
|
Free-speech absolutists would have us believe that there is no
|
||
|
moral distinction between a library that removes _The Catcher in
|
||
|
the Rye_ or _The Adventures of Huckleberry Finn_ from its shelves
|
||
|
and one that installs software on computers in the children's room
|
||
|
to block out pictures of bestiality or sexual torture. It's a
|
||
|
slippery slope, they say, noting that such software can block out
|
||
|
sites devoted to the politics of homosexuality, or to denying the
|
||
|
truth of the Holocaust. That's a valid criticism, but to invoke it
|
||
|
as a reason to do nothing is to deny our ability to reason and to
|
||
|
choose.
|
||
|
|
||
|
______________________________________________________________
|
||
|
|
||
|
A close reading of Rossetto and Katz reveals some important nuances
|
||
|
that D'Entremont and company gloss over.
|
||
|
|
||
|
Rossetto's anger was aimed not at those who would keep hardcore
|
||
|
porn from kids, but at the Communications Decency Act, a
|
||
|
heavy-handed attempt to ban "indecent" speech from the Net.
|
||
|
Congress passed the CDA in 1995 in the wake of an infamous _Time_
|
||
|
cover story on cyberporn, which hyped a phony study by an ambitious
|
||
|
graduate student named Martin Rimm. A federal appeals court put the
|
||
|
CDA on ice, citing the very software that Menino wants to install
|
||
|
as evidence that the free market could solve the problem of Net
|
||
|
porn. (The Supreme Court will hear arguments on the CDA next
|
||
|
month.)
|
||
|
|
||
|
Katz's bill of rights is aimed not at young children, but at
|
||
|
teenagers -- "socially responsible" teenagers, to be exact. And
|
||
|
Katz takes the non-absolutist position that "Blocking, censoring,
|
||
|
and banning should be the last resort in dealing with children, not
|
||
|
the first."
|
||
|
|
||
|
At the institutional level, Menino's ban is opposed by the American
|
||
|
Civil Liberties Union and the American Library Association. Their
|
||
|
rhetoric, though, has been distinctly lacking in bite. The ALA
|
||
|
opposes in principle the use of any kind of blocking software, but
|
||
|
does not require its members to go along with that position. As for
|
||
|
the ACLU, John Roberts, executive director of the Massachusetts
|
||
|
chapter, says, "We sort of take the position that it's a risky
|
||
|
business making it [pornography] available, but it's better to pay
|
||
|
that price."
|
||
|
|
||
|
At the cyberlibertarian grassroots, though, passions are white-hot,
|
||
|
and are often expressed in the kind of extremist terms favored by
|
||
|
Jim D'Entremont. It's an extremism that is entirely blind to the
|
||
|
true nature of cyberporn.
|
||
|
|
||
|
Indeed, to listen to those seeking a piece of Tom Menino's flesh,
|
||
|
you'd think that what was at stake was the right of kids to view,
|
||
|
say, an online version of the women's-health book _Our Bodies,
|
||
|
Ourselves_, or to snicker over _[4]Playboy.com_. Yes, you can find
|
||
|
such benign fare on the Net. But that's hardly the extent of it.
|
||
|
|
||
|
These days, when most people speak of the Internet, they mean the
|
||
|
World-Wide Web, a graphics-rich, interconnected series of millions
|
||
|
of "pages" ranging from those offered by huge companies such as
|
||
|
Time Warner to the scrawlings of small self-publishers. You'll find
|
||
|
porn on the Web, some of it pretty hardcore. For instance, it's not
|
||
|
at all difficult to find photo-animations of a young woman
|
||
|
performing fellatio above the inscription COCK HUNGRY TEENS, and of
|
||
|
two men having anal sex; both are just one click from Yahoo, the
|
||
|
big Internet search engine, which maintains an extensive guide to
|
||
|
online sex.
|
||
|
|
||
|
But despite the explicit nature of such photos, Web porn has its
|
||
|
limits. During the past year, most porn sites have started
|
||
|
requiring users to verify that they are at least 18 years old. Some
|
||
|
of these are on the honor system; others, though, require elaborate
|
||
|
procedures (including credit card verification) that are almost
|
||
|
guaranteed to keep out prying young eyes. Then, too, the operators
|
||
|
of websites easily can be located by authorities. A site with
|
||
|
anything prosecutable would likely get shut down in a hurry.
|
||
|
|
||
|
The opposite, however, is true of Usenet, an older part of the
|
||
|
Internet consisting of thousands of so-called newsgroups. The vast
|
||
|
majority of these groups are interactive discussion boards, such as
|
||
|
_[5]ne.general_ (reserved for New England topics) and
|
||
|
_[6]alt.journalism_, where much of the debate over the BPL has
|
||
|
taken place. But it's also possible to post pictures to a Usenet
|
||
|
group, and several hundred groups are devoted to pornographic and
|
||
|
violent images.
|
||
|
|
||
|
It's difficult to exaggerate the offensiveness of some of this
|
||
|
stuff, the likes of which few people ever laid their eyes on before
|
||
|
technology made it possible. You can find photos of women tied up,
|
||
|
gagged, and being tortured with heavy lead weights suspended from
|
||
|
their pierced nipples and genitals. Photos of women administering
|
||
|
fellatio to dogs. Photos of women literally eating feces (if you
|
||
|
see a pattern here, it's no accident: men rarely star in these
|
||
|
twisted plots), and photos of lifeless victims of horrible
|
||
|
accidents.
|
||
|
|
||
|
And it gets worse. Child pornography is not ordinarily found out in
|
||
|
the open, because law-enforcement officials regularly surf the Net
|
||
|
looking for pedophiles; witness last week's bust of an Internet
|
||
|
provider in Texas. Yet some foreign Usenet servers, easily accessed
|
||
|
from the US, routinely include groups devoted to such disturbing
|
||
|
fare as a photo of a very young girl, perhaps seven or eight years
|
||
|
old, being orally raped, her face covered with semen.
|
||
|
|
||
|
Usenet contains so much more depravity than the Web for a simple
|
||
|
reason: no one is in charge. Newsgroups, once created, exist almost
|
||
|
in perpetuity, propagating across the world onto the servers of
|
||
|
Internet service providers (ISPs) both large and small. An
|
||
|
individual ISP may refuse to carry some of these groups, especially
|
||
|
if they contain material that might be considered legally obscene,
|
||
|
which could make the provider liable. But it's no big deal to
|
||
|
access a server somewhere else, in a place where the laws and/or
|
||
|
enforcement are lax. As for tracing individuals who post this
|
||
|
stuff, forget it: the ease of editing "headers," and the ability to
|
||
|
upload porn through "anonymous remailers" that strip out
|
||
|
identifying information, make it difficult (though not necessarily
|
||
|
impossible) to find pedophiles. For instance, the photo of the
|
||
|
young girl was posted by a _Biteme@freeway.net_.
|
||
|
|
||
|
Now, you could argue (and some have) that Usenet is irrelevant to
|
||
|
the Boston Public Library, since its computers offer access only to
|
||
|
the Web. Yet Yahoo lists a number of free, public Usenet servers
|
||
|
that can actually be accessed _through_ the Web. How simple is it?
|
||
|
Last week I sat at an Internet work station in the BPL children's
|
||
|
room (for ages eight to 13), a bright, cheerful environment with
|
||
|
toys and rows of kids' books. A mother sat quietly reading to her
|
||
|
toddler. Older kids worked on school projects. And within five
|
||
|
minutes I was looking at the descriptions of photos in a
|
||
|
hardcore-bondage group. One more click, and the photos would have
|
||
|
appeared on screen. If it was that easy for me, how difficult would
|
||
|
it be for a technically adept, hormonally challenged 12-year-old?
|
||
|
Not very.
|
||
|
|
||
|
And there's not much doubt that kids go looking for porn. June
|
||
|
Eiselstein, the BPL's assistant to the director for community
|
||
|
library services, says the low number of complaints (about five in
|
||
|
18 months) shows the pornography issue is "much ado about nothing."
|
||
|
But BPL staffers say that kids regularly log on to pornographic
|
||
|
sites, often sharing hot Net addresses with their friends.
|
||
|
|
||
|
Over the past couple of years, there's been a rush to develop
|
||
|
software that allows parents, teachers, librarians, and others to
|
||
|
block out offensive locations on the Internet. If anything, such
|
||
|
software has been promoted more by free-speech liberals than by
|
||
|
anti-porn conservatives, who have made it clear through such odious
|
||
|
measures as the Communications Decency Act that their ultimate goal
|
||
|
is to transform the entire Net into a G- and PG-rated parallel
|
||
|
universe.
|
||
|
|
||
|
In Boston, Menino's staff has proposed that Cyber Patrol, the
|
||
|
industry's leading program (about 85 percent of the market) for
|
||
|
blocking out sites, be installed on every public
|
||
|
Internet-accessible computer at the BPL and its branches, and at
|
||
|
the city's community centers.
|
||
|
|
||
|
Cyber Patrol, manufactured by Microsystems, of Framingham, prevents
|
||
|
users from accessing websites and Usenet groups in any one of 12
|
||
|
categories, ranging from partial nudity, full nudity, and sexual
|
||
|
acts to illegal activities (example: how to hack into and damage a
|
||
|
company's computers), gross depictions, and hate groups. A
|
||
|
librarian (or parent, or teacher) can choose to block out sites in
|
||
|
any or all of the 12 categories, and can exclude additional sites
|
||
|
-- or make available sites that Cyber Patrol normally blocks.
|
||
|
|
||
|
Trouble is, Cyber Patrol (like its competitors) is a flawed
|
||
|
solution. For one thing, Microsystems has been caught on several
|
||
|
occasions blocking out sites merely because they were
|
||
|
controversial, such as those of gay and lesbian organizations. For
|
||
|
another, the identity of excluded sites (the "CyberNOT" list) is
|
||
|
semi-secret: though a user is informed when she or he hits a site
|
||
|
that's been blocked, Microsystems does not publish a full list, for
|
||
|
the obvious reason that kids would use it as a guide to forbidden
|
||
|
locations. Although Microsystems has put in place an appeals
|
||
|
process for those who operate sites that have been blocked, the
|
||
|
pseudo-secrecy makes it difficult (or at least inconvenient) for an
|
||
|
operator to find out whether her site is on the list.
|
||
|
|
||
|
Still, attempts by digital guerrillas such as _CyberWire
|
||
|
Dispatch_'s Brock Meeks to depict Microsystems as the Darth Vader
|
||
|
of censorship ("a tale of broken codes, betrayal of a social
|
||
|
contract, and morality run amuck," Meeks wrote last year in a
|
||
|
much-cited exposi of Cyber Patrol and its competitors) don't square
|
||
|
with what seems like a genuine attempt on the company's part to
|
||
|
respect free speech and show some social responsibility. For
|
||
|
instance, representatives of political organizations whose websites
|
||
|
were originally blocked -- among them, the National Organization
|
||
|
for Women, the National Rifle Association, and the Gay and Lesbian
|
||
|
Alliance Against Defamation -- now sit on a Cyber Patrol advisory
|
||
|
committee that helps set policy.
|
||
|
|
||
|
Besides, even some of the outrages cited by Meeks and others are
|
||
|
more ambiguous than they might first appear. The digerati often
|
||
|
point to Cyber Patrol's blocking of an animal-rights group's photo
|
||
|
of slaughtered greyhounds. But even though a 12-year-old doing a
|
||
|
school report clearly ought to have access to such information,
|
||
|
should a six-year-old?
|
||
|
|
||
|
Menino, to his credit, has not behaved precipitately. Though he's
|
||
|
reportedly miffed that his order wasn't obeyed instantly, he's done
|
||
|
nothing to undermine incoming BPL president Bernard Margolis, who's
|
||
|
put off taking final action until he can study the best way of
|
||
|
keeping cyberporn away from kids while protecting the free-speech
|
||
|
rights of adults.
|
||
|
|
||
|
A reasonable solution would appear to exist: Cyber Patrol or
|
||
|
something like it could be installed on computers in the children's
|
||
|
room and perhaps also in the young adults' room, where an
|
||
|
appropriately lighter touch could be applied to what's blocked out.
|
||
|
The computers in the general library could be restricted to adults
|
||
|
-- and left wide open. (Although Menino originally indicated he
|
||
|
wanted porn blocked on computers used by adults as well as
|
||
|
children, his spokesperson, Jacque Goddard, now suggests that he's
|
||
|
willing to be flexible. For instance, she says librarians may be
|
||
|
allowed to "unlock" a computer with a password so that an adult
|
||
|
patron can obtain unimpeded access.)
|
||
|
|
||
|
______________________________________________________________
|
||
|
|
||
|
At the cyberlibertarian extreme, children are to be viewed as
|
||
|
miniature adults possessing a fully formed set of values and
|
||
|
capable of judging what they should and shouldn't be exposed to.
|
||
|
Mike Godwin, the staff counsel for the Electronic Freedom
|
||
|
Foundation and a respected combatant in the war against Internet
|
||
|
censorship, is an articulate spokesman for this view.
|
||
|
|
||
|
"The role of public libraries is to facilitate access to
|
||
|
information. It's perverse for government officials to force them
|
||
|
to do the opposite," he says. "If you're worried about your child's
|
||
|
choosing to see content you disapprove of, there is only one
|
||
|
solution that works reliably, in my view, and that is to teach your
|
||
|
child to disapprove of the same things you do."
|
||
|
|
||
|
But Godwin is missing the point, or part of it, anyway. Parents
|
||
|
can't watch their kids every minute. And even when parents are
|
||
|
successful in teaching their children values, kids' natural
|
||
|
curiosity is going to lead them to the forbidden. A generation ago,
|
||
|
a child might surreptitiously flip through the photos of
|
||
|
bare-breasted women in _National Geographic_, and eventually
|
||
|
graduate to _Playboy_ and _Penthouse_. Today, that natural
|
||
|
curiosity is going to lead to photos of screaming women, suspended
|
||
|
from a ceiling with leather straps, being whipped, beaten, and
|
||
|
mutilated. You don't have to subscribe to the anti-pornography
|
||
|
theories of Catharine MacKinnon and Andrea Dworkin to wonder
|
||
|
whether that might be harmful to impressionable minds.
|
||
|
|
||
|
The cyberlibertarians perform a crucial role. They push us,
|
||
|
challenging the mainstream to defend and explain itself. If it
|
||
|
weren't for people like Louis Rossetto and Jon Katz and Brock Meeks
|
||
|
and Mike Godwin, the Communications Decency Act would be the law of
|
||
|
the land, and Punch Sulzberger's lawyers would break into a cold
|
||
|
sweat every time the _New York Times_ published the words "damn" or
|
||
|
"breast" on its website.
|
||
|
|
||
|
And we should remain on guard against any attempts at real
|
||
|
censorship. Menino's instincts aren't necessarily to be trusted.
|
||
|
Last week, for instance, he vowed to crack down on racy soft-drink
|
||
|
labels -- hardly the response of a person who values free speech.
|
||
|
Vigilance will be needed to make sure Menino doesn't, say, quietly
|
||
|
order the BPL to block out sex-education sites aimed at teenagers.
|
||
|
|
||
|
But just as we don't want Internet content to be dictated by the
|
||
|
likes of Pat Robertson or Ralph Reed, neither would we be well
|
||
|
served by a mediascape shaped by the utopian visions of the
|
||
|
digerati.
|
||
|
|
||
|
The humorist and writer Barry Crimmins, a children's-rights
|
||
|
activist who's incurred the wrath of some free-speech absolutists
|
||
|
for his crusade against online child porn, says the issue isn't so
|
||
|
much about blocking out pornography as it is about deciding what's
|
||
|
appropriate for different age groups.
|
||
|
|
||
|
"Let's deal with reality," he says. "If anyone is going so far as
|
||
|
to say 10-year-olds have a right to see this stuff, then they've
|
||
|
identified themselves as fringe and ridiculous. Ten-year-olds are
|
||
|
not prepared to see depictions of rape and violence. Let them have
|
||
|
some innocence."
|
||
|
|
||
|
|
||
|
_Dan Kennedy's work can also be accessed from his Web site:
|
||
|
[8]http://www1.shore.net/~dkennedy/_
|
||
|
|
||
|
_________________________________________________________________
|
||
|
|
||
|
Dan Kennedy can be reached at [9]dkennedy@phx.com
|
||
|
|
||
|
|
||
|
References
|
||
|
|
||
|
1. http://www.bostonphoenix.com/cgi-bin/imagemap/alt1/map/sidebar.conf
|
||
|
2. http://www.bostonphoenix.com/archive/news/quoteindex.html
|
||
|
3. mailto:dkennedy@phx.com
|
||
|
4. http://www.playboy.com/
|
||
|
5. news:ne.general
|
||
|
6. news:alt.journalism
|
||
|
7. http://www.bostonphoenix.com/archive/news/quoteindex.html
|
||
|
8. http://www.shore.net/~dkennedy/
|
||
|
9. mailto:dkennedy@phx.com
|
||
|
10. http://www.bostonphoenix.com/alt1/issues/current/new.html
|
||
|
11. http://www.bostonphoenix.com/alt1/standard/info.html
|
||
|
12. http://www.bostonphoenix.com/alt1/index.html
|
||
|
13. http://www.bostonphoenix.com/alt1/standard/search.html
|
||
|
14. http://www.bostonphoenix.com/alt1/standard/feedback.html
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Sat, 22 Feb 1997 22:11:52 -0800 (PST)
|
||
|
From: Declan McCullagh <declan@well.com>
|
||
|
Subject: File 3--Joab Jackson on Maryland online "harassment" bill, from BaltCP
|
||
|
|
||
|
Source - fight-censorship@vorlon.mit.edu
|
||
|
|
||
|
---------- Forwarded message ----------
|
||
|
Date--Sat, 22 Feb 1997 20:11:11 -0500
|
||
|
From--Joab Jackson <joabj@charm.net>
|
||
|
|
||
|
Declan,
|
||
|
Hello! I just wanted to send this column I wrote on Maryland HB 778,
|
||
|
which starts out as a
|
||
|
harrassment law and seems to be ending up as a censorship law. Thought
|
||
|
you'd be interested.
|
||
|
Resdistribute at will. . . .
|
||
|
|
||
|
|
||
|
Calling Delegate Roseneberg's Hand
|
||
|
|
||
|
|
||
|
If everyone agrees that having a state law against on-line harassment is
|
||
|
such a good idea, then why does almost everyone have problems with the one
|
||
|
now proposed?
|
||
|
|
||
|
On January 31 state Delegate Samuel "Sandy" Rosenberg (D-42nd District)
|
||
|
introduced House Bill 778, which would expand the current state law
|
||
|
prohibiting the use of the telephone to "annoy, abuse, torment, harass, or
|
||
|
embarrass" people to include "electronic mail or similar electronic
|
||
|
communication."
|
||
|
|
||
|
On the face of it, a law against on-line harassment seems overdue. Take the
|
||
|
case of Jayne Hitchcock. Late last year her E-mail account was mail-bombed,
|
||
|
and her phone number was spammed across Usenet, touted as some sort of free
|
||
|
sex-chat line. When she approached Anne Arundel County police, they didn't
|
||
|
know how to handle the case, she says. Only by suing her alleged harasser
|
||
|
could she find relief.
|
||
|
|
||
|
"If today someone were to go through the same thing I did, there is
|
||
|
literally nothing they can do about it," Hitchcock tells me by phone from
|
||
|
her Crofton home. Corporal Michael Donhauser of the Maryland State Police
|
||
|
Computer Crimes Unit agrees: "Presently there are no laws on computer
|
||
|
harassment."
|
||
|
|
||
|
Nonetheless Rosenberg's bill has drawn criticism from the Electronic
|
||
|
Frontier Foundation (EFF), the noted cyber-rights advocacy group. EFF
|
||
|
Director Stanton McCandlish calls it "half-cocked" and "ridiculously
|
||
|
unconstitutional."
|
||
|
|
||
|
McCandlish, whose group is known for its civil-libertarian stance, agrees
|
||
|
that on-line harassment is a serious-and growing-problem, but he says HB 778
|
||
|
isn't the solution. "The wording is vague and overbroad. No one was ever
|
||
|
guaranteed the right not to be annoyed or embarrassed," he tells me by
|
||
|
phone, mocking the bill's language.
|
||
|
|
||
|
Another person who finds the bill's wording too vague is-surprise-Jayne
|
||
|
Hitchcock. Although she supports HB 778, she says she is uncomfortable about
|
||
|
incorporating terms such as "annoy" and "embarrass." After all, being
|
||
|
annoyed or embarrassed are common dangers on the Net.
|
||
|
|
||
|
Hitchcock and McCandlish aren't the only critics. Rosenberg says he has
|
||
|
received numerous complaints via E-mail which raise questions about the
|
||
|
bill's free-speech implications, so he asked Maryland Assistant Attorney
|
||
|
General Kathryn Rowe to study the existing law's constitutionality as it
|
||
|
applies to telephone use. Rowe replied in a February 7th letter that the
|
||
|
courts have determined that the existing proscriptions are constitutional as
|
||
|
long as they are applied only to calls made "with the specific intent to
|
||
|
harass, threaten, or abuse the recipient." Criminal statutes, Rowe explained
|
||
|
to me in an interview, tend to be interpreted very narrowly by the courts.
|
||
|
|
||
|
That's good enough for Rosenberg. He insisted during an interview that the
|
||
|
law will not interfere with "protected political speech" but will merely
|
||
|
extend laws that already apply to the telephone. As he wrote in a response
|
||
|
to the E-mail complaints, "If conduct can be constitutionally restricted in
|
||
|
another medium, it can be limited on the Internet."
|
||
|
|
||
|
It's Rosenberg's use of the word "Internet" here that irks McCandlish-it's
|
||
|
another vague term. "We need to draw more careful distinctions," he argues.
|
||
|
Unlike the telephone, which is used largely for one-to-one conversation, the
|
||
|
"Internet" is everything from encrypted messages only the recipients can
|
||
|
read to Usenet posts accessible to millions. "This law is taking a medium
|
||
|
that is more like newspapers and putting restrictions on speech," McCandlish
|
||
|
told C-Net, an on-line news service.
|
||
|
|
||
|
Rowe seems to be in agreement with both Rosenberg and McCandlish. Her
|
||
|
February 7th letter to the legislator suggests narrowing the bill to just
|
||
|
"electronic mail," leaving out "similar electronic communications." When I
|
||
|
spoke with her she said it "might be advisable" to make even further
|
||
|
distinctions-between private E-mail and mailing lists, for example.
|
||
|
|
||
|
But Rosenberg is adamant about not substantively changing the wording of the
|
||
|
bill before its March 5th hearing. As it stands, HB 778 is as vague as last
|
||
|
year's ill-fated federal Communications Decency Act.
|
||
|
|
||
|
Maryland is not alone in trying to deal with on-line harassment. Other
|
||
|
states have recently passed or are considering legislation on the issue. The
|
||
|
trouble is, according to McCandlish, that elected officials are more anxious
|
||
|
to appear cyber-savvy to their constituents than they are to find out how
|
||
|
cyberspace actually works. Hence these laws are either redundant-proscribing
|
||
|
behavior already barred by existing laws-or so vague as to be blatantly
|
||
|
unconstitutional.
|
||
|
|
||
|
No doubt Rosenberg is angling to appear cyber-savvy. He is one of only a
|
||
|
handful of members of the Maryland House of Delegates to have a privately
|
||
|
run Web page (Sandy Rosenberg). In the past he's introduced
|
||
|
legislation dealing with the thorny topic of computer privacy.
|
||
|
Well, this is his-and the Maryland legislature's-big chance. They
|
||
|
can either draft a sensible, Net-knowledgeable harassment law
|
||
|
that the rest of the country can use as an example, or they can
|
||
|
just push through another dumb censorship law that, if passed,
|
||
|
will end up being struck down in court. The choice is theirs-and
|
||
|
yours.
|
||
|
|
||
|
A hearing on HB 778 is scheduled for 1 P.M. March 5 in the House
|
||
|
Office Building, room 120, in Annapolis. Anyone wishing to
|
||
|
testify must sign the witness register before the hearing begins.
|
||
|
Call 841-3488 for more information.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Thu, 15 Dec 1996 22:51:01 CST
|
||
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
||
|
Subject: File 4--Cu Digest Header Info (unchanged since 13 Dec, 1996)
|
||
|
|
||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
|
available at no cost electronically.
|
||
|
|
||
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
||
|
|
||
|
Or, to subscribe, send post with this in the "Subject:: line:
|
||
|
|
||
|
SUBSCRIBE CU-DIGEST
|
||
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
||
|
|
||
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
||
|
|
||
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
|
60115, USA.
|
||
|
|
||
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
||
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
||
|
(NOTE: The address you unsub must correspond to your From: line)
|
||
|
|
||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
|
the PC Telecom forum under "computing newsletters;"
|
||
|
On Delphi in the General Discussion database of the Internet SIG;
|
||
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
||
|
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
|
||
|
CuD is also available via Fidonet File Request from
|
||
|
1:11/70; unlisted nodes and points welcome.
|
||
|
|
||
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
||
|
In ITALY: ZERO! BBS: +39-11-6507540
|
||
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
||
|
|
||
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
|
||
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
||
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
||
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
||
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
||
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
||
|
|
||
|
|
||
|
The most recent issues of CuD can be obtained from the
|
||
|
Cu Digest WWW site at:
|
||
|
URL: http://www.soci.niu.edu/~cudigest/
|
||
|
|
||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
|
information among computerists and to the presentation and debate of
|
||
|
diverse views. CuD material may be reprinted for non-profit as long
|
||
|
as the source is cited. Authors hold a presumptive copyright, and
|
||
|
they should be contacted for reprint permission. It is assumed that
|
||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
||
|
specified. Readers are encouraged to submit reasoned articles
|
||
|
relating to computer culture and communication. Articles are
|
||
|
preferred to short responses. Please avoid quoting previous posts
|
||
|
unless absolutely necessary.
|
||
|
|
||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
||
|
the views of the moderators. Digest contributors assume all
|
||
|
responsibility for ensuring that articles submitted do not
|
||
|
violate copyright protections.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
End of Computer Underground Digest #9.18
|
||
|
************************************
|
||
|
|