1041 lines
52 KiB
Plaintext
1041 lines
52 KiB
Plaintext
|
||
Computer underground Digest Wed Jun 12, 1996 Volume 8 : Issue 44
|
||
ISSN 1004-042X
|
||
|
||
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
||
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
||
Archivist: Brendan Kehoe
|
||
Shadow Master: Stanton McCandlish
|
||
Field Agent Extraordinaire: David Smith
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Ian Dickinson
|
||
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
||
|
||
CONTENTS, #8.44 (Wed, Jun 12, 1996)
|
||
|
||
File 1--Fed Court Rules Communications Decency Act Unconstitutional
|
||
File 2--Excerpts from the CDA Decision (re 96-963)
|
||
File 3--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
||
|
||
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
|
||
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
||
|
||
---------------------------------------------------------------------
|
||
|
||
Date: Wed, 12 Jun 1996 08:55:37 -0700
|
||
From: editor@eff.org
|
||
Subject: File 1--Fed Court Rules Communications Decency Act Unconstitutional
|
||
|
||
EFFector Online Volume 09 No. 08 June 12 1996 editors@eff.org
|
||
A Publication of the Electronic Frontier Foundation ISSN 1062-9424
|
||
|
||
------------------------------------------------
|
||
|
||
Groups challenging the law prepare for government appeal to the Supreme Court
|
||
|
||
|
||
Electronic Frontier Foundation
|
||
PRESS RELEASE
|
||
|
||
Contacts: Stanton McCandlish, Online Activist, +1 415 436 9333
|
||
Mike Godwin, Staff Counsel, +1 510 548 3290
|
||
Shari Steele, Staff Counsel, +1 301 375 8856
|
||
|
||
Philadelphia -- "Just as the strength of the Internet is chaos, so the
|
||
strength of our liberty depends upon the chaos and cacophony of the
|
||
unfettered speech the First Amendment protects."
|
||
|
||
With these ringing words, a Philadelphia federal court has struck down a law
|
||
today that would have criminalized constitutionally protected speech on the
|
||
Internet and other online forums.
|
||
|
||
In what civil libertarians are hailing as a victory for everyone who uses
|
||
computer communications, a three-judge panel in Philadelphia's federal
|
||
court ruled in a unanimous decision that the controversial
|
||
"Communications Decency Act" (CDA) violates the U.S. constitutional
|
||
guarantees of freedom of speech and of the press.
|
||
|
||
"First of all, are pleased to see the court vindicate our vision of the Net
|
||
as a medium protected by the First Amendment," said Lori Fena, executive
|
||
director of the Electronic Frontier Foundation (EFF), watchdog group
|
||
established to protect civil liberties, and promote responsibility, in
|
||
computer communications. "Secondly, we are delighted that the court has gone
|
||
beyond striking down the law, and has stated positively what constitutional
|
||
principles must govern any attempt to regulate the most democratic mass
|
||
medium the world has ever seen."
|
||
|
||
Said EFF Chairman Esther Dyson: "This is a day for individual citizens, for
|
||
families, and for public and private organizations online to celebrate."
|
||
|
||
"The judges recognized that CDA was a wholly inappropriate exercise of
|
||
governmental power under the Constitution," said Mike Godwin, EFF staff
|
||
counsel. "The law would have abridged one of the freedoms that Americans
|
||
treasure most, and a freedom that is central to any democratic society," he
|
||
said.
|
||
|
||
Godwin applauded the members of the coalition that challenged the law in
|
||
federal court. "We and the other plaintiffs persuaded them that the
|
||
government cannot constitutionally impose this sort of overreaching, and
|
||
duplicative regulation of content in the online world," Godwin said.
|
||
|
||
Dyson stated that the decision stands for one of EFF's principal positions
|
||
regarding free speech online: "We believe in free speech at the source -- and
|
||
in the empowerment of any audience for that speech to control what they see.
|
||
|
||
"This decision takes the responsibility for controlling and accessing speech
|
||
on the Net out of the hands of government and puts it back in the hands of
|
||
parents and other individuals where it belongs," she said. "Individuals
|
||
already have the technical means to make their own choices about what they
|
||
and their children read and see," Dyson said.
|
||
|
||
Godwin noted that existing anti-obscenity laws, together with low-cost
|
||
technological solutions, offer a more efficient, less intrusive answer to
|
||
questions about protecting children in the online world.
|
||
|
||
"The government kept saying that this was a crisis that required harsher
|
||
censorship in the online world than in any other communications medium,"
|
||
Godwin said. "In fact, we showed that it's possible to promote both freedom
|
||
of speech and family values -- that the two goals don't oppose each other."
|
||
|
||
While the plaintiffs are pleased with the victory, Fena said, "it's no time
|
||
to be complacent." A collection of poorly drafted state laws has followed in
|
||
the wake of the passage of the CDA, and the issues these statutes raise must
|
||
be addressed as well, she said.
|
||
|
||
"What's as compelling as the language of this decision," Godwin said, "is the
|
||
breadth of the opposition to this legislation," He noted that two large
|
||
groups of plaintiffs, including EFF, the American Civil Liberties Union, the
|
||
Electronic Privacy Information Center, People for the American Way, the
|
||
American Library Association, Microsoft, and Apple Computer, had challenged
|
||
the recently passed law in Philadelphia's federal court. Even Administration
|
||
officials have privately and publicly voiced their concerns. The plaintiffs
|
||
must now prepare for the government's planned appeal to the United States
|
||
Supreme Court, Godwin said, citing a provision of the Telecommunications
|
||
Reform Act of 1996, which prescribes such a direct appeal when a provision of
|
||
the telecom act is found unconstitutional in a lower court..
|
||
|
||
Godwin also commented that "this may be the most rapidly distributed federal
|
||
court opinion in American history." Sites all over the over the Net would be
|
||
carrying the full text of the opinion almost as soon as the judges hand it
|
||
down, he said, noting that the court is providing copies of the opinion on
|
||
computer diskettes as well as through more traditional means.
|
||
|
||
The constitutional challenge to the Communications Decency Act has been
|
||
grounded in four basic arguments -- that the law is unconstitutionally
|
||
overbroad (criminalizing protected speech), that it is unconstitutionally
|
||
vague (making it difficult for individuals and organizations to comply),
|
||
that it fails what the judiciary calls the "least restrictive means" test for
|
||
speech regulation, and that there is no basic constitutional authority under
|
||
the First Amendment to engage in this type of content regulation in any
|
||
nonbroadcast medium.
|
||
|
||
"We are confident the Supreme Court will uphold the Philadelphia court's
|
||
decision," Godwin said.
|
||
|
||
|
||
To reach EFF board chairman Esther Dyson or executive director Lori Fena,
|
||
please contact EFF's main office at +1 415 436 9333.
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 12 Jun 1996 16:23:28 -0500
|
||
From: cudigest@SUN.SOCI.NIU.EDU(Computer underground Digest)
|
||
Subject: File 2--Excerpts from the CDA Decision (re 96-963)
|
||
|
||
((MODERATORS' NOTE: The following are a few excerpts from the CDA
|
||
decision. The complete text is about a quarter of a meg and over
|
||
4,400 lines. It was provided by the Center for Democracy and
|
||
Technology. For complete information on the Congressional Decency
|
||
Act (CDA) (including the full decision text) contact the CDT homepage at:
|
||
http://www.cdt.org
|
||
|
||
The full text can also be found on CuD's homepage at:
|
||
http://www.soci.niu.edu/~cudigest/cda/cdadec1))
|
||
|
||
=========================================
|
||
|
||
IN THE UNITED STATES DISTRICT COURT
|
||
FOR THE EASTERN DISTRICT OF PENNSYLVANIA
|
||
|
||
|
||
AMERICAN CIVIL LIBERTIES UNION, : CIVIL ACTION
|
||
et al., :
|
||
:
|
||
v. :
|
||
:
|
||
JANET RENO, Attorney General of :
|
||
the United States : No. 96-963
|
||
|
||
_____________________________________________________________
|
||
|
||
AMERICAN LIBRARY ASSOCIATION, : CIVIL ACTION
|
||
INC., et al., :
|
||
:
|
||
v. :
|
||
:
|
||
UNITED STATES DEP'T OF JUSTICE, :
|
||
et al. : No. 96-1458
|
||
|
||
|
||
|
||
Before: Sloviter, Chief Judge, United States Court of Appeals
|
||
for the Third Circuit; Buckwalter and Dalzell, Judges,
|
||
United States District Court for the Eastern District
|
||
of Pennsylvania
|
||
|
||
|
||
June 11, 1996
|
||
|
||
|
||
ADJUDICATION ON MOTIONS FOR PRELIMINARY INJUNCTION
|
||
|
||
|
||
<snip>
|
||
|
||
The parties were afforded expedited discovery in
|
||
connection with the motions for preliminary injunction, and they
|
||
cooperated with Judge Dalzell, who had been assigned the case
|
||
management aspects of the litigation. While the discovery was
|
||
proceeding, and with the agreement of the parties, the court
|
||
began receiving evidence at the consolidated hearings which were
|
||
conducted on March 21 and 22, and April 1, 12 and 15, 1996. In
|
||
order to expedite the proceedings, the parties worked closely
|
||
with Judge Dalzell and arranged to stipulate to many of the
|
||
underlying facts and to place much of their cases in chief before
|
||
the court by sworn declarations, so that the hearings were
|
||
largely devoted to cross-examination of certain of the witnesses
|
||
whose declarations had been filed. The parties submitted
|
||
proposed findings of fact and post-hearing memoranda on April 29,
|
||
and the court heard extensive oral argument on May 10, 1996.[4]
|
||
|
||
..................
|
||
|
||
II.
|
||
FINDINGS OF FACT
|
||
All parties agree that in order to apprehend the legal
|
||
questions at issue in these cases, it is necessary to have a
|
||
clear understanding of the exponentially growing, worldwide
|
||
medium that is the Internet, which presents unique issues
|
||
relating to the application of First Amendment jurisprudence and
|
||
due process requirements to this new and evolving method of
|
||
communication. For this reason all parties insisted on having
|
||
extensive evidentiary hearings before the three-judge court.
|
||
The court's Findings of fact are made pursuant to Fed. R. Civ. P.
|
||
52(a). The history and basic technology of this medium are not
|
||
in dispute, and the first forty-eight paragraphs of the following
|
||
Findings of fact are derived from the like-numbered paragraphs of
|
||
a stipulation[8] the parties filed with the court.[9]
|
||
The Nature of Cyberspace
|
||
The Creation of the Internet and the Development of Cyberspace
|
||
1. The Internet is not a physical or tangible entity,
|
||
but rather a giant network which interconnects innumerable
|
||
smaller groups of linked computer networks. It is thus a network
|
||
of networks. This is best understood if one considers what a
|
||
linked group of computers -- referred to here as a "network" --
|
||
is, and what it does. Small networks are now ubiquitous (and are
|
||
often called "local area networks"). For example, in many United
|
||
States Courthouses, computers are linked to each other for the
|
||
purpose of exchanging files and messages (and to share equipment
|
||
such as printers). These are networks.
|
||
2. Some networks are "closed" networks, not linked to
|
||
other computers or networks. Many networks, however, are
|
||
connected to other networks, which are in turn connected to other
|
||
networks in a manner which permits each computer in any network
|
||
to communicate with computers on any other network in the system.
|
||
This global Web of linked networks and computers is referred to
|
||
as the Internet.
|
||
3. The nature of the Internet is such that it is very
|
||
difficult, if not impossible, to determine its size at a given
|
||
moment. It is indisputable, however, that the Internet has
|
||
experienced extraordinary growth in recent years. In 1981, fewer
|
||
than 300 computers were linked to the Internet, and by 1989, the
|
||
number stood at fewer than 90,000 computers. By 1993, over
|
||
1,000,000 computers were linked. Today, over 9,400,000 host
|
||
computers worldwide, of which approximately 60 percent located
|
||
within the United States, are estimated to be linked to the
|
||
Internet. This count does not include the personal computers
|
||
people use to access the Internet using modems. In all,
|
||
reasonable estimates are that as many as 40 million people around
|
||
the world can and do access the enormously flexible communication
|
||
Internet medium. That figure is expected to grow to 200 million
|
||
Internet users by the year 1999.
|
||
4. Some of the computers and computer networks that
|
||
make up the Internet are owned by governmental and public
|
||
institutions, some are owned by non-profit organizations, and
|
||
some are privately owned. The resulting whole is a
|
||
decentralized, global medium of communications -- or "cyberspace"
|
||
-- that links people, institutions, corporations, and governments
|
||
around the world. The Internet is an international system. This
|
||
communications medium allows any of the literally tens of
|
||
millions of people with access to the Internet to exchange
|
||
information. These communications can occur almost
|
||
instantaneously, and can be directed either to specific
|
||
individuals, to a broader group of people interested in a
|
||
particular subject, or to the world as a whole.
|
||
5. The Internet had its origins in 1969 as an
|
||
experimental project of the Advanced Research Project Agency
|
||
("ARPA"), and was called ARPANET. This network linked computers
|
||
and computer networks owned by the military, defense contractors,
|
||
and university laboratories conducting defense-related research.
|
||
The network later allowed researchers across the country to
|
||
access directly and to use extremely powerful supercomputers
|
||
located at a few key universities and laboratories. As it
|
||
evolved far beyond its research origins in the United States to
|
||
encompass universities, corporations, and people around the
|
||
world, the ARPANET came to be called the "DARPA Internet," and
|
||
finally just the "Internet."
|
||
6. From its inception, the network was designed to be
|
||
a decentralized, self-maintaining series of redundant links
|
||
between computers and computer networks, capable of rapidly
|
||
transmitting communications without direct human involvement or
|
||
control, and with the automatic ability to re-route
|
||
communications if one or more individual links were damaged or
|
||
otherwise unavailable. Among other goals, this redundant system
|
||
of linked computers was designed to allow vital research and
|
||
communications to continue even if portions of the network were
|
||
damaged, say, in a war.
|
||
7. To achieve this resilient nationwide (and
|
||
ultimately global) communications medium, the ARPANET encouraged
|
||
the creation of multiple links to and from each computer (or
|
||
computer network) on the network. Thus, a computer located in
|
||
Washington, D.C., might be linked (usually using dedicated
|
||
telephone lines) to other computers in neighboring states or on
|
||
the Eastern seaboard. Each of those computers could in turn be
|
||
linked to other computers, which themselves would be linked to
|
||
other computers.
|
||
8. A communication sent over this redundant series of
|
||
linked computers could travel any of a number of routes to its
|
||
destination. Thus, a message sent from a computer in Washington,
|
||
D.C., to a computer in Palo Alto, California, might first be sent
|
||
to a computer in Philadelphia, and then be forwarded to a
|
||
computer in Pittsburgh, and then to Chicago, Denver, and Salt
|
||
Lake City, before finally reaching Palo Alto. If the message
|
||
could not travel along that path (because of military attack,
|
||
simple technical malfunction, or other reason), the message would
|
||
automatically (without human intervention or even knowledge) be
|
||
re-routed, perhaps, from Washington, D.C. to Richmond, and then
|
||
to Atlanta, New Orleans, Dallas, Albuquerque, Los Angeles, and
|
||
finally to Palo Alto. This type of transmission, and re-routing,
|
||
would likely occur in a matter of seconds.
|
||
9. Messages between computers on the Internet do not
|
||
necessarily travel entirely along the same path. The Internet
|
||
uses "packet switching" communication protocols that allow
|
||
individual messages to be subdivided into smaller "packets" that
|
||
are then sent independently to the destination, and are then
|
||
automatically reassembled by the receiving computer. While all
|
||
packets of a given message often travel along the same path to
|
||
the destination, if computers along the route become overloaded,
|
||
then packets can be re-routed to less loaded computers.
|
||
10. At the same time that ARPANET was maturing (it
|
||
subsequently ceased to exist), similar networks developed to link
|
||
universities, research facilities, businesses, and individuals
|
||
around the world. These other formal or loose networks included
|
||
BITNET, CSNET, FIDONET, and USENET. Eventually, each of these
|
||
networks (many of which overlapped) were themselves linked
|
||
together, allowing users of any computers linked to any one of
|
||
the networks to transmit communications to users of computers on
|
||
other networks. It is this series of linked networks (themselves
|
||
linking computers and computer networks) that is today commonly
|
||
known as the Internet.
|
||
11. No single entity -- academic, corporate,
|
||
governmental, or non-profit -- administers the Internet. It
|
||
exists and functions as a result of the fact that hundreds of
|
||
thousands of separate operators of computers and computer
|
||
networks independently decided to use common data transfer
|
||
protocols to exchange communications and information with other
|
||
computers (which in turn exchange communications and information
|
||
with still other computers). There is no centralized storage
|
||
location, control point, or communications channel for the
|
||
Internet, and it would not be technically feasible for a single
|
||
entity to control all of the information conveyed on the
|
||
Internet.
|
||
|
||
<snip>
|
||
|
||
Restricting Access to Unwanted On-Line Material[12]
|
||
|
||
PICS
|
||
49. With the rapid growth of the Internet, the
|
||
increasing popularity of the Web, and the existence of material
|
||
online that some parents may consider inappropriate for their
|
||
children, various entities have begun to build systems intended
|
||
to enable parents to control the material which comes into their
|
||
homes and may be accessible to their children. The World Wide
|
||
Web Consortium launched the PICS ("Platform for Internet Content
|
||
Selection") program in order to develop technical standards that
|
||
would support parents' ability to filter and screen material that
|
||
their children see on the Web.
|
||
50. The Consortium intends that PICS will provide the
|
||
ability for third parties, as well as individual content
|
||
providers, to rate content on the Internet in a variety of ways.
|
||
When fully implemented, PICS-compatible World Wide Web browsers,
|
||
Usenet News Group readers, and other Internet applications, will
|
||
provide parents the ability to choose from a variety of rating
|
||
services, or a combination of services.
|
||
51. PICS working group [PICS-WG] participants include
|
||
many of the major online services providers, commercial internet
|
||
access providers, hardware and software companies, major internet
|
||
content providers, and consumer organizations. Among active
|
||
participants in the PICS effort are:
|
||
|
||
Adobe Systems, Inc.
|
||
Apple Computer
|
||
America Online
|
||
AT&T
|
||
Center for Democracy and Technology
|
||
CompuServe
|
||
Delphi Internet Services
|
||
Digital Equipment Corporation
|
||
IBM
|
||
First floor
|
||
First Virtual Holdings Incorporated
|
||
France Telecom
|
||
FTP Software
|
||
Industrial Technology Research Institute of Taiwan
|
||
Information Technology Association of America
|
||
Institut National de Recherche en Informatique et
|
||
en Automatique (INRIA)
|
||
Interactive Services Association
|
||
MCI
|
||
Microsoft
|
||
MIT/LCS/World Wide Web Consortium
|
||
NCD
|
||
NEC
|
||
Netscape Communications Corporation
|
||
NewView
|
||
O'Reilly and Associates
|
||
Open Market
|
||
Prodigy Services Company
|
||
Progressive Networks
|
||
Providence Systems/Parental Guidance
|
||
Recreational Software Advisory Council
|
||
SafeSurf
|
||
SoftQuad, Inc.
|
||
Songline Studios
|
||
Spyglass
|
||
SurfWatch Software
|
||
Telequip Corp.
|
||
Time Warner Pathfinder
|
||
Viacom Nickelodeon[13]
|
||
|
||
|
||
52. Membership in the PICS-WG includes a broad cross-
|
||
section of companies from the computer, communications, and
|
||
content industries, as well as trade associations and public
|
||
interest groups. PICS technical specifications have been agreed
|
||
to, allowing the Internet community to begin to deploy products
|
||
and services based on the PICS-standards.
|
||
53. Until a majority of sites on the Internet have
|
||
been rated by a PICS rating service, PICS will initially function
|
||
as a "positive" ratings system in which only those sites that
|
||
have been rated will be displayed using PICS compatible software.
|
||
In other words, PICS will initially function as a site inclusion
|
||
list rather than a site exclusion list. The default
|
||
configuration for a PICS compatible Internet application will be
|
||
to block access to all sites which have not been rated by a PICS
|
||
rating service, while allowing access to sites which have a PICS
|
||
rating for appropriate content.[14]
|
||
|
||
Software
|
||
54. For over a year, various companies have marketed
|
||
stand alone software that is intended to enable parents and other
|
||
adults to limit the Internet access of children. Examples of
|
||
such software include: Cyber Patrol, CYBERsitter, The Internet
|
||
Filter, Net Nanny, Parental Guidance, SurfWatch, Netscape Proxy
|
||
Server, and WebTrack. The market for this type of software is
|
||
growing, and there is increasing competition among software
|
||
providers to provide products.
|
||
|
||
Cyber Patrol
|
||
55. As more people, particularly children, began to
|
||
use the Internet, Microsystems Software, Inc. decided to develop
|
||
and market Internet software intended to empower parents to
|
||
exercise individual choice over what material their children
|
||
could access. Microsystems' stated intent is to develop a
|
||
product which would give parents comfort that their children can
|
||
reap the benefits of the Internet while shielding them from
|
||
objectionable or otherwise inappropriate materials based on the
|
||
parents' own particular tastes and values. Microsystems'
|
||
product, Cyber Patrol, was developed to address this need.
|
||
56. Cyber Patrol was first introduced in August 1995,
|
||
and is currently available in Windows and Macintosh versions.
|
||
Cyber Patrol works with both direct Internet Access providers
|
||
(ISPs, e.g., Netcom, PSI, UUnet), and Commercial Online Service
|
||
Providers (e.g., America Online, Compuserv, Prodigy, Microsoft).
|
||
Cyber Patrol is also compatible with all major World Wide Web
|
||
browsers on the market (e.g., Netscape, Navigator, Mosaic,
|
||
Prodigy's Legacy and Skimmer browsers, America Online, Netcom's
|
||
NetCruiser, etc.). Cyber Patrol was the first parental
|
||
empowerment application to be compatible with the PICS standard.
|
||
In February of 1996, Microsystems put the first PICS ratings
|
||
server on the Internet.
|
||
57. The CyberNOT list contains approximately 7000
|
||
sites in twelve categories. The software is designed to enable
|
||
parents to selectively block access to any or all of the twelve
|
||
CyberNOT categories simply by checking boxes in the Cyber Patrol
|
||
Headquarters (the Cyber Patrol program manager). These
|
||
categories are:
|
||
Violence/Profanity: Extreme cruelty, physical or
|
||
emotional acts against any animal or person which are
|
||
primarily intended to hurt or inflict pain. Obscene
|
||
words, phrases, and profanity defined as text that uses
|
||
George Carlin's seven censored words more often than
|
||
once every fifty messages or pages.
|
||
|
||
Partial Nudity: Full or partial exposure of the human
|
||
anatomy except when exposing genitalia.
|
||
|
||
Nudity: Any exposure of the human genitalia.
|
||
|
||
Sexual Acts (graphic or text): Pictures or text
|
||
exposing anyone or anything involved in explicit sexual
|
||
acts and lewd and lascivious behavior, including
|
||
masturbation, copulation, pedophilia, intimacy and
|
||
involving nude or partially nude people in
|
||
heterosexual, bisexual, lesbian or homosexual
|
||
encounters. Also includes phone sex ads, dating
|
||
services, adult personals, CD-ROM and videos.
|
||
|
||
Gross Depictions (graphic or text): Pictures or
|
||
descriptive text of anyone or anything which are
|
||
crudely vulgar, deficient in civility or behavior, or
|
||
showing scatological impropriety. Includes such
|
||
depictions as maiming, bloody figures, indecent
|
||
depiction of bodily functions.
|
||
|
||
Racism/Ethnic Impropriety: Prejudice or discrimination
|
||
against any race or ethnic culture. Ethnic or racist
|
||
jokes and slurs. Any text that elevates one race over
|
||
another.
|
||
|
||
Satanic/Cult: Worship of the devil; affinity for evil,
|
||
wickedness. Sects or groups that potentially coerce
|
||
individuals to grow, and keep, membership.
|
||
|
||
Drugs/Drug Culture: Topics dealing with the use of
|
||
illegal drugs for entertainment. This would exclude
|
||
current illegal drugs used for medicinal purposes
|
||
(e.g., drugs used to treat victims of AIDS). Includes
|
||
substances used for other than their primary purpose to
|
||
alter the individual's state of mind such as glue
|
||
sniffing.
|
||
|
||
Militant/Extremist: Extremely aggressive and combative
|
||
behaviors, radicalism, advocacy of extreme political
|
||
measures. Topics include extreme political groups that
|
||
advocate violence as a means to achieve their goal.
|
||
|
||
Gambling: Of or relating to lotteries, casinos,
|
||
betting, numbers games, on-line sports or financial
|
||
betting including non-monetary dares.
|
||
|
||
Questionable/Illegal: Material or activities of a
|
||
dubious nature which may be illegal in any or all
|
||
jurisdictions, such as illegal business schemes, chain
|
||
letters, software piracy, and copyright infringement.
|
||
|
||
Alcohol, Beer & Wine: Material pertaining to the sale
|
||
or consumption of alcoholic beverages. Also includes
|
||
sites and information relating to tobacco products.
|
||
|
||
|
||
58. Microsystems employs people to search the Internet
|
||
for sites containing material in these categories. Since new
|
||
sites are constantly coming online, Microsystems updates the
|
||
CyberNOT list on a weekly basis. Once installed on the home PC,
|
||
the copy of Cyber Patrol receives automatic updates to the
|
||
CyberNOT list over the Internet every seven days.
|
||
59. In February of 1996, Microsystems signed a
|
||
licensing arrangement with CompuServe, one of the leading
|
||
commercial online services with over 4.3 million subscribers.
|
||
CompuServe provides Cyber Patrol free of charge to its
|
||
subscribers. Microsystems the same month signed a licensing
|
||
arrangement with Prodigy, another leading commercial online
|
||
service with over 1.4 million subscribers. Prodigy will provide
|
||
Cyber Patrol free of charge of its subscribers.
|
||
60. Cyber Patrol is also available directly from
|
||
Microsystems for $49.95, which includes a six month subscription
|
||
to the CyberNOT blocked sites list (updated automatically once
|
||
every seven days). After six months, parents can receive six
|
||
months of additional updates for $19.95, or twelve months for
|
||
$29.95. Cyber Patrol Home Edition, a limited version of Cyber
|
||
Patrol, is available free of charge on the Internet. To obtain
|
||
either version, parents download a seven day demonstration
|
||
version of the full Cyber Patrol product from the Microsystems
|
||
Internet World Wide Web Server. At the end of the seven day
|
||
trial period, users are offered the opportunity to purchase the
|
||
complete version of Cyber Patrol or provide Microsystems some
|
||
basic demographic information in exchange for unlimited use of
|
||
the Home Edition. The demographic information is used for
|
||
marketing and research purposes. Since January of 1996, over
|
||
10,000 demonstration copies of Cyber Patrol have been downloaded
|
||
from Microsystems' Web site.
|
||
61. Cyber Patrol is also available from Retail outlets
|
||
as NetBlocker Plus. NetBlocker Plus sells for $19.95, which
|
||
includes five weeks of updates to the CyberNOT list.
|
||
62. Microsystems also sells Cyber Patrol into a
|
||
growing market in schools. As more classrooms become connected
|
||
to the Internet, many teachers want to ensure that their students
|
||
can receive the benefit of the Internet without encountering
|
||
material they deem educationally inappropriate.
|
||
63. Microsystems is working with the Recreational
|
||
Software Advisory Council (RSAC), a non-profit corporation which
|
||
developed rating systems for video games, to implement the RSAC
|
||
rating system for the Internet.
|
||
64. The next release of Cyber Patrol, expected in
|
||
second quarter of this year, will give parents the ability to use
|
||
any PICS rating service, including the RSAC rating service, in
|
||
addition to the Microsystems CyberNOT list.
|
||
65. In order to speed the implementation of PICS and
|
||
encourage the development of PICS-compatible Internet
|
||
applications, Microsystems maintains a server on the Internet
|
||
which contains its CyberNOT list. The server provides software
|
||
developers with access to a PICS rating service, and allows
|
||
software developers to test their products' ability to interpret
|
||
standard PICS labels. Microsystems is also offering its PICS
|
||
client test program for Windows free of charge. The client
|
||
program can be used by developers of PICS rating services to test
|
||
their services and products.
|
||
|
||
SurfWatch
|
||
66. Another software product, SurfWatch, is also
|
||
designed to allow parents and other concerned users to filter
|
||
unwanted material on the Internet. SurfWatch is available for
|
||
both Apple Macintosh, Microsoft Windows, and Microsoft Windows 95
|
||
Operating Systems, and works with direct Internet Access
|
||
Providers (e.g., Netcom, PSI, UUnet, AT&T, and more than 1000
|
||
other Internet Service Providers).
|
||
67. The suggested retail price of SurfWatch Software
|
||
is $49.95, with a street price of between $20.00 and $25.00. The
|
||
product is also available as part of CompuServe/Spry Inc.'s
|
||
Internet in a Box for Kids, which includes access to Spry's Kids
|
||
only Internet service and a copy of SurfWatch. Internet in a Box
|
||
for Kids retails for approximately $30.00. The subscription
|
||
service, which updates the SurfWatch blocked site list
|
||
automatically with new sites each month, is available for $5.95
|
||
per month or $60.00 per year. The subscription is included as
|
||
part of the Internet in a Box for Kids program, and is also
|
||
provided as a low-cost option from Internet Service Providers.
|
||
68. SurfWatch is available at over 12,000 retail
|
||
locations, including National stores such as Comp USA, Egghead
|
||
Software, Computer City, and several national mail order outlets.
|
||
SurfWatch can also be ordered directly from its own site on the
|
||
World Wide Web, and through the Internet Shopping Network.
|
||
69. Plaintiffs America Online (AOL), Microsoft
|
||
Network, and Prodigy all offer parental control options free of
|
||
charge to their members. AOL has established an online area
|
||
designed specifically for children. The "Kids Only" parental
|
||
control feature allows parents to establish an AOL account for
|
||
their children that accesses only the Kids Only channel on
|
||
America Online.[15]
|
||
70. AOL plans to incorporate PICS-compatible
|
||
capability into its standard Web browser software, and to make
|
||
available to subscribers other PICS-compatible Web browsers, such
|
||
as the Netscape software.
|
||
71. Plaintiffs CompuServe and Prodigy give their
|
||
subscribers the option of blocking all access to the Internet, or
|
||
to particular media within their proprietary online content, such
|
||
as bulletin boards and chat rooms.
|
||
72. Although parental control software currently can
|
||
screen for certain suggestive words or for known sexually
|
||
explicit sites, it cannot now screen for sexually explicit images
|
||
unaccompanied by suggestive text unless those who configure the
|
||
software are aware of the particular site.
|
||
73. Despite its limitations, currently available user-
|
||
based software suggests that a reasonably effective method by
|
||
which parents can prevent their children from accessing sexually
|
||
explicit and other material which parents may believe is
|
||
inappropriate for their children will soon be widely available.
|
||
|
||
<snip>
|
||
|
||
III.
|
||
CONCLUSIONS OF LAW
|
||
Plaintiffs have established a reasonable probability of
|
||
eventual success in the litigation by demonstrating that
|
||
223(a)(1)(B) and 223(a)(2) of the CDA are unconstitutional on
|
||
their face to the extent that they reach indecency. Sections
|
||
223(d)(1) and 223(d)(2) of the CDA are unconstitutional on their
|
||
face. Accordingly, plaintiffs have shown irreparable injury, no
|
||
party has any interest in the enforcement of an unconstitutional
|
||
law, and therefore the public interest will be served by granting
|
||
the preliminary injunction. Elrod v. Burns, 427 U.S. 347, 373-74
|
||
(1976); Hohe v. Casey, 868 F.2d 69, 72 (3d Cir.), cert. denied,
|
||
493 U.S. 848 (1989); Acierno v. New Castle County, 40 F.3d 645,
|
||
653 (3d Cir. 1994). The motions for preliminary injunction will
|
||
therefore be granted.
|
||
The views of the members of the Court in support of
|
||
these conclusions follow.
|
||
|
||
|
||
SLOVITER, Chief Judge, Court of Appeals for the Third Circuit:
|
||
|
||
A.
|
||
Statutory Provisions
|
||
|
||
As noted in Part I, Introduction, the plaintiffs'
|
||
motion for a preliminary injunction is confined to portions of
|
||
two provisions of the Communications Decency Act of 1996,
|
||
223(a) and 223(d), which they contend violate their First
|
||
Amendment free speech and Fifth Amendment due process rights. To
|
||
facilitate reference, I set forth those provisions in full.
|
||
Section 223(a), the "indecency" provision, subjects to criminal
|
||
penalties of imprisonment of no more than two years or a fine or
|
||
both anyone who:
|
||
1) in interstate or foreign communications . . .
|
||
(B) by means of a telecommunications device
|
||
knowingly --
|
||
|
||
(i) makes, creates, or solicits, and
|
||
|
||
(ii) initiates the transmission of,
|
||
any comment, request, suggestion, proposal, image,
|
||
or other communication which is obscene or
|
||
indecent, knowing that the recipient of the
|
||
communication is under 18 years of age, regardless
|
||
of whether the maker of such communication placed
|
||
the call or initiated the communication; . . .
|
||
|
||
(2) knowingly permits any telecommunications facility
|
||
under his control to be used for any activity
|
||
prohibited by paragraph (1) with the intent that it be
|
||
used for such activity.
|
||
|
||
(emphasis added).
|
||
The term "telecommunications device" is specifically
|
||
defined not to include "the use of an interactive computer
|
||
service," as that is covered by section 223(d)(1).
|
||
Section 223(d), the "patently offensive" provision,
|
||
subjects to criminal penalties anyone who:
|
||
(1) in interstate or foreign communications knowingly--
|
||
|
||
(A) uses an interactive computer service to send to a
|
||
specific person or persons under 18 years of age, or
|
||
|
||
(B) uses any interactive computer service to display in
|
||
a manner available to a person under 18 years of age,
|
||
any comment, request, suggestion, proposal, image or
|
||
other communication that, in context, depicts or
|
||
describes, in terms patently offensive as measured by
|
||
contemporary community standards, sexual or excretory
|
||
activities or organs, regardless of whether the use of
|
||
such service placed the call or initiated the
|
||
communication; or
|
||
|
||
(2) knowingly permits any telecommunications facility
|
||
under such person's control to be used for an activity
|
||
prohibited by paragraph (1) with the intent that it be
|
||
used for such activity.
|
||
|
||
|
||
(emphasis added).
|
||
Two aspects of these provisions stand out. First, we
|
||
are dealing with criminal provisions, subjecting violators to
|
||
substantial penalties. Second, the provisions on indecent and
|
||
patently offensive communications are not parallel.
|
||
The government uses the term "indecent" interchangeably
|
||
with "patently offensive" and advises that it so construes the
|
||
statute in light of the legislative history and the Supreme
|
||
Court's analysis of the word "indecent" in FCC v. Pacifica
|
||
Foundation, 438 U.S. 726 (1978). However, the CDA does not
|
||
define "indecent." Notwithstanding Congress' familiarity with
|
||
Pacifica, it enacted 223(a), covering "indecent"
|
||
communications, without any language confining "indecent" to
|
||
descriptions or depictions of "sexual or excretory activities or
|
||
organs," language it included in the reference to "patently
|
||
offensive" in 223(d)(1)(B). Nor does 223(a) contain the
|
||
phrase "in context," which the government believes is relevant.
|
||
The failure to define "indecent" in 223(a) is thus
|
||
arguably a negative pregnant and subject to "the rule of
|
||
construction that an express statutory requirement here,
|
||
contrasted with statutory silence there, shows an intent to
|
||
confine the requirement to the specified instance." Field v.
|
||
Mans, 116 S.Ct. 437, 442 (1995). See also Gozlon-Peretz v.
|
||
United States, 498 U.S. 395, 404 (1991) ("'[W]here Congress
|
||
includes particular language in one section of a statute but
|
||
omits it in another section of the same Act, it is generally
|
||
presumed that Congress acts intentionally and purposely in the
|
||
disparate inclusion or exclusion'") (quoting Russello v. United
|
||
States, 464 U.S. 16, 23 (1983)).
|
||
Plaintiffs note the difference but do not press this as
|
||
a basis for distinguishing between the two sections in their
|
||
preliminary injunction arguments and therefore I will also use
|
||
the words interchangeably for this purpose, leaving open the
|
||
issue for consideration at the final judgment stage if it becomes
|
||
relevant.
|
||
B.
|
||
Preliminary Injunction Standard
|
||
To obtain a preliminary injunction, plaintiffs must
|
||
establish that they are likely to prevail on the merits and that
|
||
they will suffer irreparable harm if injunctive relief is not
|
||
granted. We also must consider whether the potential harm to the
|
||
defendant from issuance of a temporary restraining order
|
||
outweighs possible harm to the plaintiffs if such relief is
|
||
denied, and whether the granting of injunctive relief is in the
|
||
public interest. See Campbell Soup Co. v. ConAgra, Inc., 977
|
||
F.2d 86, 90-91 (3d Cir. 1992); Bradley v. Pittsburgh Bd. of
|
||
Educ., 910 F.2d 1172, 1175 (3d Cir. 1990).
|
||
In a case in which the injury alleged is a threat to
|
||
First Amendment interests, the finding of irreparable injury is
|
||
often tied to the likelihood of success on the merits. In Elrod
|
||
v. Burns, 427 U.S. 347 (1976), the Supreme Court emphasized that
|
||
"the loss of First Amendment freedoms, for even minimal periods
|
||
of time, unquestionably constitutes irreparable injury." Id. at
|
||
373 (citing New York Times Co. v. United States, 403 U.S. 713
|
||
(1971)).
|
||
Subjecting speakers to criminal penalties for speech
|
||
that is constitutionally protected in itself raises the spectre
|
||
of irreparable harm. Even if a court were unwilling to draw that
|
||
conclusion from the language of the statute itself, plaintiffs
|
||
have introduced ample evidence that the challenged provisions, if
|
||
not enjoined, will have a chilling effect on their free
|
||
expression. Thus, this is not a case in which we are dealing
|
||
with a mere incidental inhibition on speech, see Hohe v. Casey,
|
||
868 F.2d 69, 73 (3d Cir.), cert. denied, 493 U.S. 848 (1989), but
|
||
with a regulation that directly penalizes speech.
|
||
Nor could there be any dispute about the public
|
||
interest factor which must be taken into account before a court
|
||
grants a preliminary injunction. No long string of citations is
|
||
necessary to find that the public interest weighs in favor of
|
||
having access to a free flow of constitutionally protected
|
||
speech. See, e.g., Turner Broadcasting System, Inc. v. FCC, 114
|
||
S. Ct. 2445, 2458 (1994); Virginia Bd. of Pharmacy v. Virginia
|
||
Citizens Consumer Council, 425 U.S. 748, 763-65 (1976).
|
||
Thus, if plaintiffs have shown a likelihood of success
|
||
on the merits, they will have shown the irreparable injury needed
|
||
to entitle them to a preliminary injunction.
|
||
|
||
C.
|
||
Applicable Standard of Review
|
||
The CDA is patently a government-imposed content-based
|
||
restriction on speech, and the speech at issue, whether
|
||
denominated "indecent" or "patently offensive," is entitled to
|
||
constitutional protection. See Sable Communications of
|
||
California, Inc. v. FCC, 492 U.S. 115, 126 (1989). As such, the
|
||
regulation is subject to strict scrutiny, and will only be upheld
|
||
if it is justified by a compelling government interest and if it
|
||
is narrowly tailored to effectuate that interest. Sable, 492
|
||
U.S. at 126; see also Turner Broadcasting, 114 S. Ct. at 2459
|
||
(1994). "[T]he benefit gained [by a content-based restriction]
|
||
must outweigh the loss of constitutionally protected rights."
|
||
Elrod v. Burns, 427 U.S. at 363.
|
||
The government's position on the applicable standard
|
||
has been less than pellucid but, despite some references to a
|
||
somewhat lesser burden employed in broadcasting cases, it now
|
||
appears to have conceded that it has the burden of proof to show
|
||
both a compelling interest and that the statute regulates least
|
||
restrictively. Tr. of Preliminary Injunction Hearing at 121 (May
|
||
10, 1996). In any event, the evidence and our Findings of Fact
|
||
based thereon show that Internet communication, while unique, is
|
||
more akin to telephone communication, at issue in Sable, than to
|
||
broadcasting, at issue in Pacifica, because, as with the
|
||
telephone, an Internet user must act affirmatively and
|
||
deliberately to retrieve specific information online. Even if a
|
||
broad search will, on occasion, retrieve unwanted materials, the
|
||
user virtually always receives some warning of its content,
|
||
significantly reducing the element of surprise or "assault"
|
||
involved in broadcasting. Therefore, it is highly unlikely that
|
||
a very young child will be randomly "surfing" the Web and come
|
||
across "indecent" or "patently offensive" material.
|
||
|
||
The Reach of the Statute
|
||
|
||
Whatever the strength of the interest the government
|
||
has demonstrated in preventing minors from accessing "indecent"
|
||
and "patently offensive" material online, if the means it has
|
||
chosen sweeps more broadly than necessary and thereby chills the
|
||
expression of adults, it has overstepped onto rights protected by
|
||
the First Amendment. Sable, 492 U.S. at 131.
|
||
The plaintiffs argue that the CDA violates the First
|
||
Amendment because it effectively bans a substantial category of
|
||
protected speech from most parts of the Internet. The
|
||
government responds that the Act does not on its face or in
|
||
effect ban indecent material that is constitutionally protected
|
||
for adults. Thus one of the factual issues before us was the
|
||
likely effect of the CDA on the free availability of
|
||
constitutionally protected material. A wealth of persuasive
|
||
evidence, referred to in detail in the Findings of Fact, proved
|
||
that it is either technologically impossible or economically
|
||
prohibitive for many of the plaintiffs to comply with the CDA
|
||
without seriously impeding their posting of online material which
|
||
adults have a constitutional right to access.
|
||
With the possible exception of an e-mail to a known
|
||
recipient, most content providers cannot determine the identity
|
||
and age of every user accessing their material. Considering
|
||
separately content providers that fall roughly into two
|
||
categories, we have found that no technology exists which allows
|
||
those posting on the category of newsgroups, mail exploders or
|
||
chat rooms to screen for age. Speakers using those forms of
|
||
communication cannot control who receives the communication, and
|
||
in most instances are not aware of the identity of the
|
||
recipients. If it is not feasible for speakers who communicate
|
||
via these forms of communication to conduct age screening, they
|
||
would have to reduce the level of communication to that which is
|
||
appropriate for children in order to be protected under the
|
||
statute. This would effect a complete ban even for adults of
|
||
some expression, albeit "indecent," to which they are
|
||
constitutionally entitled, and thus would be unconstitutional
|
||
under the holding in Sable, 492 U.S. at 131.
|
||
Even as to content providers in the other broad
|
||
category, such as the World Wide Web, where efforts at age
|
||
verification are technically feasible through the use of Common
|
||
Gateway Interface (cgi) scripts (which enable creation of a
|
||
document that can process information provided by a Web visitor),
|
||
the Findings of Fact show that as a practical matter, non-
|
||
commercial organizations and even many commercial organizations
|
||
using the Web would find it prohibitively expensive and
|
||
burdensome to engage in the methods of age verification proposed
|
||
by the government, and that even if they could attempt to age
|
||
verify, there is little assurance that they could successfully
|
||
filter out minors.
|
||
The government attempts to circumvent this problem by
|
||
seeking to limit the scope of the statute to those content
|
||
providers who are commercial pornographers, and urges that we do
|
||
likewise in our obligation to save a congressional enactment from
|
||
facial unconstitutionality wherever possible. But in light of
|
||
its plain language and its legislative history, the CDA cannot
|
||
reasonably be read as limited to commercial pornographers. A
|
||
court may not impose a narrowing construction on a statute unless
|
||
it is "readily susceptible" to such a construction. Virginia v.
|
||
American Booksellers Ass'n, 484 U.S. 383, 397 (1988). The court
|
||
may not "rewrite a . . . law to conform it to constitutional
|
||
requirements." Id. Although we may prefer an interpretation of
|
||
a statute that will preserve the constitutionality of the
|
||
statutory scheme, United State v. Clark, 445 U.S. 23, 27 (1980),
|
||
we do not have license to rewrite a statute to "create
|
||
distinctions where none were intended." American Tobacco Co. v.
|
||
Patterson, 456 U.S. 63, 72 n.6 (1982); see also Consumer Party v.
|
||
Davis, 778 F.2d 140, 147 (3d Cir. 1985). The Court has often
|
||
stated that "absent a clearly expressed legislative intention to
|
||
the contrary, [statutory] language must ordinarily be regarded as
|
||
conclusive." Escondido Mut. Water Co. v. La Jolla Band of
|
||
Mission Indians, 466 U.S. 765, 772 (1984)(quoting North Dakota v.
|
||
United States, 460 U.S. 300, 312 (1983)).
|
||
It is clear from the face of the CDA and from its
|
||
legislative history that Congress did not intend to limit its
|
||
application to commercial purveyors of pornography. Congress
|
||
unquestionably knew how to limit the statute to such entities if
|
||
that was its intent, and in fact it did so in provisions relating
|
||
to dial-a-porn services. See 47 U.S.C. 223(b)(2)(A)
|
||
(criminalizing making any indecent telephone communication "for
|
||
commercial purposes"). It placed no similar limitation in the
|
||
CDA. Moreover, the Conference Report makes clear that Congress
|
||
did not intend to limit the application of the statute to content
|
||
providers such as those which make available the commercial
|
||
material contained in the government's exhibits, and confirms
|
||
that Congress intended "content regulation of both commercial and
|
||
non-commercial providers." Conf. Rep. at 191. See also, 141
|
||
Cong. Rec. S8089 (daily ed. June 9, 1995) (Statement of Senator
|
||
Exon).
|
||
The scope of the CDA is not confined to material that
|
||
has a prurient interest or appeal, one of the hallmarks of
|
||
obscenity, because Congress sought to reach farther. Nor did
|
||
Congress include language that would define "patently offensive"
|
||
or "indecent" to exclude material of serious value. It follows
|
||
that to narrow the statute in the manner the government urges
|
||
would be an impermissible exercise of our limited judicial
|
||
function, which is to review the statute as written for its
|
||
compliance with constitutional mandates.
|
||
I conclude inexorably from the foregoing that the CDA
|
||
reaches speech subject to the full protection of the First
|
||
Amendment, at least for adults.[1] In questions of the witnesses
|
||
and in colloquy with the government attorneys, it became evident
|
||
that even if "indecent" is read as parallel to "patently
|
||
offensive," the terms would cover a broad range of material from
|
||
contemporary films, plays and books showing or describing sexual
|
||
activities (e.g., Leaving Las Vegas) to controversial
|
||
contemporary art and photographs showing sexual organs in
|
||
positions that the government conceded would be patently
|
||
offensive in some communities (e.g., a Robert Mapplethorpe
|
||
photograph depicting a man with an erect penis).
|
||
|
||
<snip>
|
||
|
||
3. The Effect of the CDA and the Novel Characteristics
|
||
of Internet Communication
|
||
Over the course of five days of hearings and many
|
||
hundreds of pages of declarations, deposition transcripts, and
|
||
exhibits, we have learned about the special attributes of
|
||
Internet communication. Our Findings of fact -- many of them
|
||
undisputed -- express our understanding of the Internet. These
|
||
Findings lead to the conclusion that Congress may not regulate
|
||
indecency on the Internet at all.
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 21 Mar 1996 22:51:01 CST
|
||
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
||
Subject: File 3--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost electronically.
|
||
|
||
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
||
|
||
Or, to subscribe, send post with this in the "Subject:: line:
|
||
|
||
SUBSCRIBE CU-DIGEST
|
||
Send the message to: cu-digest-request@weber.ucsd.edu
|
||
|
||
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
||
|
||
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
60115, USA.
|
||
|
||
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
||
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
||
(NOTE: The address you unsub must correspond to your From: line)
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
the PC Telecom forum under "computing newsletters;"
|
||
On Delphi in the General Discussion database of the Internet SIG;
|
||
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
||
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
|
||
CuD is also available via Fidonet File Request from
|
||
1:11/70; unlisted nodes and points welcome.
|
||
|
||
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
||
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
||
In ITALY: ZERO! BBS: +39-11-6507540
|
||
In LUXEMBOURG: ComNet BBS: +352-466893
|
||
|
||
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
|
||
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
||
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
||
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
||
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
||
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
||
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
||
|
||
|
||
The most recent issues of CuD can be obtained from the
|
||
Cu Digest WWW site at:
|
||
URL: http://www.soci.niu.edu/~cudigest/
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Authors hold a presumptive copyright, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #8.44
|
||
************************************
|
||
|