925 lines
42 KiB
Plaintext
925 lines
42 KiB
Plaintext
|
|
Computer underground Digest Thu Jun 22, 1995 Volume 7 : Issue 52
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
la Triviata: Which wine goes best with Unix?
|
|
|
|
CONTENTS, #7.52 (Thu, Jun 22, 1995)
|
|
|
|
File 1--COMMUNICATIONS DECENCY AMENDMENT -- FULL TEXT
|
|
File 2--EFF Analysis of Communications Decency Act as Passed by Senate
|
|
File 3--Dole and Exon Bills
|
|
File 4--(fwd) Cinci computer connection confiscated (fwd)
|
|
File 5--Baker "Rape Story" Case thrown out by Judge (excerpt)
|
|
File 6--Zine Net...The Place for Zines
|
|
File 7--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: 17 Jun 1995 00:06:28 -0400
|
|
From: editor@eff.org
|
|
Subject: File 1--COMMUNICATIONS DECENCY AMENDMENT -- FULL TEXT
|
|
|
|
THE U.S. SENATE ON JUNE 14, 1995
|
|
|
|
The text of the Communications Decency Amendment, sponsored by Sen. Jim
|
|
Exon (D-Nebraska).
|
|
|
|
This language was passed by the US Senate on June 14th.
|
|
|
|
-------------------------------------------------------
|
|
|
|
This strikes all of Title IV of S. 652 and replaces it with the following:
|
|
|
|
Sec.___ OBSCENE OR HARASSING USE OF TELECOMMUNICATIONS FACILITIES UNDER
|
|
THE COMMUNICATIONS ACT OF 1934
|
|
|
|
Section 223 (47 U.S.C. 223) is amended --
|
|
|
|
(1) by striking subsection (a) and inserting in lieu thereof:
|
|
|
|
``(a) Whoever--
|
|
``(1) in the District of Columbia or in interstate or foreign
|
|
communications
|
|
|
|
``(A) by means of telecommunications device knowingly--
|
|
|
|
``(i) makes, creates, or solicits, and
|
|
``(ii) initiates the transmission of,
|
|
|
|
any comment, request, suggestion, proposal, image, or other
|
|
communication which is obscene, lewd, lascivious, filthy, or indecent,
|
|
with intent to annoy, abuse, threaten, or harass another person;
|
|
|
|
``(B) makes a telephone call or utilizes a telecommunications
|
|
device, whether or not conversation or communication ensues, without
|
|
disclosing his identity and with intent to annoy, abuse, threaten, or
|
|
harass any person at the called number or who receives the
|
|
communication;
|
|
|
|
``(C) makes or causes the telephone of another repeatedly or
|
|
continuously to ring, with intent to harass any person at the called
|
|
number; or
|
|
|
|
``(D) makes repeated telephone calls or repeatedly initiates
|
|
communication with a telecommunications device, during which conversation
|
|
or communication ensues, solely to harass any person at the called number
|
|
or who receives the communication; or
|
|
|
|
``(2) knowingly permits any telecommunications facility under his
|
|
control to be used for any activity prohibited by paragraph (1) with the
|
|
intent that it be used for such activity,
|
|
|
|
shall be fined not more than $100,000 or imprisoned not more than two
|
|
years, or both.''; and
|
|
|
|
(2) by adding at the end the following new subsections:
|
|
|
|
``(d) Whoever--
|
|
|
|
``(1) knowingly within the United States or in foreign
|
|
communications with the United States by means of telecommunications
|
|
device makes or makes available any obscene communication in any form
|
|
including any comment, request, suggestion, proposal, image,
|
|
regardless of whether the maker of such communication placed the call
|
|
or initiated the communications; or
|
|
|
|
``(2) knowingly permits any telecommunications facility under such
|
|
person's control to be used for an activity prohibited by subsection
|
|
(d)(1) with the intent that it be used for such activity;
|
|
|
|
shall be fined not more than $100,000 or imprisoned not more than two
|
|
years or both.
|
|
|
|
``(e) Whoever--
|
|
|
|
``(1) knowingly within the United States or in foreign
|
|
communications with the United States by means of telecommunications
|
|
device makes or makes available any indecent comment, request,
|
|
suggestion, proposal, image to any person under 18 years of age
|
|
regardless of whether the maker of such communication placed the call
|
|
or initiated the communication; or
|
|
|
|
``(2) knowingly permits any telecommunications facility under such
|
|
person's control to be used for an activity prohibited by paragraph (1)
|
|
with the intent that it be used for such activity,
|
|
|
|
shall be fined not more than $100,000 or imprisoned not more than two
|
|
years or both.
|
|
|
|
``(f) Defenses to the subsections (a), (d), and (e),
|
|
restrictions on access, judicial remedies respecting restrictions for
|
|
persons providing information services and access to information
|
|
services--
|
|
|
|
(1) No person shall be held to have violated subsections (a), (d),
|
|
or (e) solely for providing access or connection to or from a facility,
|
|
system, or network over which that person has no control, including
|
|
related capabilities which are incidental to providing access or
|
|
connection. This subsection shall not be applicatable to an individual
|
|
controlled by, or a conspirator with, an entity actively involved in the
|
|
creation, editing or knowing distribution of communications which violate
|
|
this section.
|
|
|
|
(2) No employer shall be held liable under this section for the
|
|
actions of an employee or agent unless the employee's or agent's conduct
|
|
is within the scope of his employment or agency and the employer has
|
|
knowledge of, authorizes, or ratifies the employee's or agent's conduct.
|
|
|
|
(3) It is a defense to prosecution under subsection (a), (d)(2),
|
|
or (e) that a person has taken reasonable, effective and appropriate
|
|
actions in good faith to restrict or prevent the transmission of or access
|
|
to a communication specified in such subsections, or complied with
|
|
procedures as the Commission may prescribe in furtherance of this section.
|
|
Until such regulations become effective, it is a defense to prosecution
|
|
that the person has complied with the procedures prescribed by regulation
|
|
pursuant to subsection (b)(3). Nothing in this subsection shall be
|
|
construed to treat enhanced information services as common carriage.
|
|
|
|
(4) No cause of action may be brought in any court or any
|
|
administrative agency against any person on account of any action which in
|
|
not in violation of any law punishable by criminal penalty, which activity
|
|
the person has taken in good faith to implement a defense authorized under
|
|
this section or otherwise to restrict or prevent the transmission of, or
|
|
access to, a communication specified in this section.
|
|
|
|
(g) no state or local government may impose any liability for
|
|
commercial activities or actions by commercial entities in connection with
|
|
an activity or action which constitutes a violation described in
|
|
subsection (a)(2), (d)(2), or (e)(2) that is inconsistent with the
|
|
treatment of those activities or actions under this section provided,
|
|
however, that nothin herein shall preclude any State or local government
|
|
from enacting and enforcing complementary oversight, liability, and
|
|
regulatory systems, procedures, and requirements so long as such
|
|
systems, procedures, and requirements govern only intrastate services and
|
|
do not result in the imposition of inconsistent rights, duties or
|
|
obligations on the provision of interstate services. Nothing in this
|
|
subsection shall preclude any State or local government from governing
|
|
conduct not covered by this section.
|
|
|
|
(h) Nothing in subsection (a), (d), (e), or (f) or in the
|
|
defenses to prosecution under (a), (d), or (e) shall be construed to
|
|
affect or limit the application or enforcement of any other Federal law.
|
|
|
|
(i) The use of the term 'telecommunications device' in this
|
|
section shall not impose new obligations on (one-way) broadcast radio or
|
|
(one-way) broadcast television operators licensed by the Commission or
|
|
(one-way) cable services registered with the Federal Communications
|
|
Commission and covered by obscenity and indecency provisions elsewhere in
|
|
this Act.
|
|
|
|
(j) Within two years from the date of enactment and every two
|
|
years thereafter, the Commission shall report on the effectiveness of this
|
|
section.
|
|
|
|
Sec. ____ OBSCENE PROGRAMMING ON CABLE TELEVISION.
|
|
|
|
Section 639 (47 U.S.C> 559) is amended by striking "10,000" and
|
|
inserting "$100,000"
|
|
|
|
Sec. ___ BROADCASTING OBSCENE LANGUAGE ON THE RADIO.
|
|
|
|
Section 1466 of Title 18, United States Code, is amended by
|
|
striking out "$10,00" and inserting "$100,000".
|
|
|
|
Sec. ___ SEPARABILITY
|
|
|
|
"(a) If any provision of this Title, including amendments to this
|
|
Title or the application thereof to any person or circumstance is held
|
|
invalid, the remainder of this Title and the application of such provision
|
|
to other persons or circumstances shall not be affected thereby."
|
|
|
|
------------------------------
|
|
|
|
Date: 17 Jun 1995 00:06:28 -0400
|
|
From: editor@eff.org
|
|
Subject: File 2--EFF Analysis of Communications Decency Act as Passed by Senate
|
|
|
|
|
|
CONSTITUTIONAL PROBLEMS WITH THE COMMUNICATIONS DECENCY AMENDMENT:
|
|
A LEGISLATIVE ANALYSIS BY THE ELECTRONIC FRONTIER FOUNDATION
|
|
|
|
|
|
INTRODUCTION
|
|
|
|
On June 14, 1995, the United States Senate approved by a vote of 84-16
|
|
an amendment to the Senate's omnibus telecommunications-deregulation
|
|
bill that raises grave Constitutional questions and poses great risks
|
|
for the future of freedom of speech on the nation's
|
|
computer-communications forums.
|
|
|
|
Sponsored by Sen. Jim Exon (D-Nebraska), the amendment originated as
|
|
an independent bill titled Communications Decency Act of 1995 (CDA),
|
|
and is intended, according to its sponsor, both to prohibit "the
|
|
[computer] equivalent of obscene telephone calls" and to prohibit the
|
|
distribution to children of materials with sexual content.
|
|
|
|
As drafted, however, the legislation not only fails to solve the
|
|
problems it is intended to address, but it also imposes content
|
|
restrictions on computer communications that would chill
|
|
First-Amendment-protected speech and, in effect, restrict adults in
|
|
the public forums of computer networks to writing and reading only
|
|
such content as is suitable for children.
|
|
|
|
|
|
SPECIFIC PROVISIONS OF THE CDA
|
|
|
|
The Communications Decency Act would change the language of Title 47,
|
|
United States Code, Section 223, a section that primarily does two
|
|
things:
|
|
|
|
1) it prohibits "obscene or harassing" phone calls and other, similar,
|
|
abusive uses of the telephone, and
|
|
|
|
2) it imposes regulation (promulgated and administered by the Federal
|
|
Communications Commission) on telephone services that provide
|
|
so-called "indecent" content and prohibits those services from
|
|
providing legally obscene content.
|
|
|
|
The amending language drafted by Sen. Exon and passed by the Senate
|
|
substantially restructures and alters the provisions of this section
|
|
in an effort to bring computer communications under the statute. If
|
|
the Senate-approved language becomes law, provisions in the amended
|
|
statute will:
|
|
|
|
(a) Expand the scope of the statute from telephones to
|
|
"telecommunications devices" (such as computers, modems, and the data
|
|
servers and conferencing systems used by Internet sites and by
|
|
commercial providers like America Online and CompuServe);
|
|
|
|
(b) Define as a criminal offense any communication that is legally
|
|
obscene or indecent if that communication is sent over a
|
|
telecommunications device "with intent to annoy, abuse, threaten, or
|
|
harass another person";
|
|
|
|
(c) Penalize any person or entity who, by use of a telecommunication
|
|
device, "knowingly ... makes or makes available" any content or
|
|
material that is legally obscene; and
|
|
|
|
(d) Penalize any person or entity who "knowingly ... makes or makes
|
|
available" to a person under the age of 18 any content or material
|
|
that is "indecent."
|
|
|
|
The CDA outlines affirmative defenses for persons or entities who
|
|
might otherwise be liable under the statute's criminal provisions.
|
|
|
|
In spite of the efforts of Sen. Exon to address in this revision of
|
|
his legislation those criticisms and constitutional issues raised by
|
|
earlier drafts of it, the language of the CDA as passed by the Senate
|
|
is riddled with flaws that threaten the First Amendment rights both of
|
|
online service providers and of individual citizens.
|
|
|
|
THE CDA WOULD CRIMINALIZE CONSTITUTIONALLY PROTECTED SPEECH.
|
|
|
|
None of the CDA's prohibitions of "obscene" communications raise any
|
|
constitutional issues; it is well-settled law that obscene content is
|
|
not protected under the Constitution. In contrast, CDA's restrictions
|
|
on "indecent" speech are deeply problematic.
|
|
|
|
What is "indecent" speech and what is its significance? In general,
|
|
"indecent" speech is nonobscene material that deals explicitly with
|
|
sex or that uses profane language. The Supreme Court has repeatedly
|
|
stated that such "indecency" is Constitutionally protected. Further,
|
|
the Court has stated that indecent speech cannot be banned altogether
|
|
-- not even in broadcasting, the single communications medium in which
|
|
the federal government traditionally has held broad powers of content
|
|
control.
|
|
|
|
The section of the CDA dealing with "obscene or harassing"
|
|
communications penalizes not only the sending of "obscene"
|
|
communications, but also those that are "indecent." This prohibition
|
|
of indecent content, even though limited somewhat in application by
|
|
the section's intent requirement, is unconstitutional on its face.
|
|
|
|
In Sable Communications v. FCC (1989), a case involving dial-in
|
|
phone-sex services, the U.S. Supreme Court held that, even though a
|
|
ban on *obscenity* in "dial-a-porn" services is constitutional, a ban
|
|
on *indecency* is not. Citing earlier holdings, the Court said that
|
|
"[t]he government may not reduce the adult population to only what is
|
|
fit for children."
|
|
|
|
What are some examples of "indecent" content? The most famous example
|
|
probably is the George Carlin comedy monologue that was the basis of
|
|
the Supreme Court case F.C.C. v. Pacifica Foundation (1978). In that
|
|
monologue, Carlin discusses the "Seven Dirty Words" that cannot be
|
|
uttered in broadcast media. Other examples of "indecency" could
|
|
include passages from John Updike or Erica Jong novels, certain rock
|
|
lyrics, and Dr. Ruth Westheimer's sexual-advice column. Under the CDA,
|
|
it would be criminal to "knowingly" publish such material on the
|
|
Internet unless children were affirmatively denied access to it. It's
|
|
as if the manager of a Barnes & Noble outlet could be sent to jail
|
|
simply because children could wander the bookstore's aisles and search
|
|
for the racy passages in a Judith Krantz or Harold Robbins novel.
|
|
|
|
The Supreme Court has consistently held, both before and after its
|
|
landmark obscenity decision in Miller v. California (1973), that while
|
|
sexual material and profane language can be regulated in some
|
|
specifically defined contexts (e.g., the FCC can require that
|
|
"indecent" content in broadcasting be limited to certain hours of the
|
|
broadcasting schedule when children are less likely to be exposed), in
|
|
general indecency is fully protected by the First Amendment. The Court
|
|
has even recognized that profane language may be essential to
|
|
political speech, since the emotional power of particular words may be
|
|
as important as their intellectual content. As Justice Harlan
|
|
commented in Cohen v. California (1971), "One man's vulgarity is
|
|
another's lyric."
|
|
|
|
It's important to note that not every application of this part of the
|
|
CDA would be unconstitutional. If the "obscene or harassing" offense
|
|
language been limited to instances in which the speaker intends to
|
|
"threaten," it would have raised no constitutional problems. (A threat
|
|
of blackmail or physical violence, for example, is not protected
|
|
speech.) But the CDA goes beyond threats -- it criminalizes the use
|
|
of "indecent" language even when the speaker merely intends for his
|
|
content to be "annoying," and this prohibition treads squarely on
|
|
speakers' First Amendment rights. After all, the First Amendment was
|
|
drafted to protect offensive, annoying, and disturbing speech -- there
|
|
is little need for protection of pleasant and uncontroversial speech,
|
|
since few people feel impelled to ban it. As Justice Douglas observed
|
|
in Terminiello v. Chicago (1949), free speech "may best serve its high
|
|
purpose when it induces a condition of unrest, creates dissatisfaction
|
|
with conditions as they are, or even stirs people to anger." For
|
|
example, a citizen offended by the passage of the CDA who shouts an
|
|
indecent comment at his U.S. Senator may very well intend to annoy the
|
|
Senator -- nevertheless, such expression is protected under the First
|
|
Amendment. It is constitutionally absurd that speech that would be
|
|
protected if shouted on the street would turn the speaker into a felon
|
|
if sent by e-mail.
|
|
|
|
|
|
BY GRANTING THE FCC REGULATORY CONTROL OVER THE CONTENT AND
|
|
AVAILABILITY OF COMPUTER COMMUNICATIONS, THE CDA VIOLATES THE FIRST
|
|
AMENDMENT.
|
|
|
|
Is it constitutional for Congress to declare that computer
|
|
communications are a medium like broadcasting, where it is allowable
|
|
for the FCC to impose content-related regulations? Clearly not. Prior
|
|
to Sen. Exon's proposed changes to Section 223, the FCC has had
|
|
content control over only two specific types of communications media:
|
|
|
|
(1) broadcasting media like TV and radio (and broadcasting-related
|
|
technologies, such as cable TV), and
|
|
|
|
(2) the narrow class of telephone-based commercial services that
|
|
requires the assistance and support of government-regulated common
|
|
carriers.
|
|
|
|
In no other communications medium does the government have the
|
|
constitutional authority to impose broad regulation of indecent
|
|
content.
|
|
|
|
The justification for the federal government's special role in
|
|
regulation of broadcasting is twofold. The first rationale for such a
|
|
broad regulatory role was the "scarcity of frequencies" argument,
|
|
which appears the Supreme Court's decision in Red Lion Broadcasting
|
|
Co. v. FCC (1969). In that case, the Court held that there is a finite
|
|
number of workable broadcasting frequencies, and that the scarcity of
|
|
this important public resource entails that the airwaves be allocated
|
|
and supervised by the federal government in order to best serve the
|
|
public interest. The second rationale for a special government role in
|
|
broadcasting appears in FCC v. Pacifica Foundation (the "Seven Dirty
|
|
Words" case discussed above). In this case the Court argued that
|
|
broadcasting is an especially "pervasive" medium that intrudes into
|
|
the privacy of the home, creating a constant risk that adults will be
|
|
exposed to offensive material, and children to indecent material,
|
|
without warning.
|
|
|
|
The justification for regulation of the telephone-based services is
|
|
grounded in the government's special role in supervising common
|
|
carriers. Since the telephone systems of this country, many of which
|
|
amount to monopolies, are common carriers, they are appropriately
|
|
under the jurisdiction of the FCC. It makes sense for phone-sex
|
|
services, which rely on the cooperation of common carriers, to fall
|
|
under FCC jurisdiction as well.
|
|
|
|
*Neither the broadcasting rationales nor the common-carrier rationale
|
|
support government content control over computer communications.*
|
|
|
|
First of all, the new medium of computer-based communications -- which
|
|
may take place over everything from large-scale Internet access
|
|
providers and commercial conferencing systems to the PC-based
|
|
bulletin-board system running in a hobbyist's basement -- isn't
|
|
afflicted with "scarcity." Computing hardware itself is increasingly
|
|
inexpensive, for example, and one of the basic facts of modern
|
|
computer communication is that whenever you add a computer to the
|
|
Internet, you *increase* the Internet's size and capabilities.
|
|
|
|
Secondly, computer-based communications aren't "pervasive" as that
|
|
term is used in the Pacifica case. In the world of broadcasting,
|
|
content is "pushed" at audiences by TV and radio stations and
|
|
broadcasting networks -- audiences are primarily passive recipients of
|
|
programming. In computer communications, in contrast, content is
|
|
*pulled* by users from various locations and resources around the
|
|
globe through the Internet or from the huge data servers maintained by
|
|
services like Prodigy and American Online. Exposure to content is
|
|
primary *driven by user choice*. For users with even minimal
|
|
experience, there is little risk of unwitting exposure to offensive or
|
|
indecent material.
|
|
|
|
Finally, online service providers aren't common carriers and don't
|
|
want to be -- it is the nature of this kind of service that providers
|
|
must reserve the right to make certain basic choices about content. In
|
|
contrast, a common carrier like AT&T or BellSouth has to "take all
|
|
comers." (If online service providers were treated as common carriers,
|
|
we might imagine a day when the FCC requires that an NAACP-sponsored
|
|
BBS carry hateful messages from members of the Ku Klux Klan.)
|
|
|
|
In sum, the narrow constitutional justifications for content
|
|
regulation of two specific types of media do not extend to the
|
|
traditional print media, films or oral conversations. Clearly, there
|
|
is no Constitutional rationale for extending intrusive
|
|
content-regulatory control to online communications. This means that
|
|
the CDA's "shoehorning" of online communications into the jurisdiction
|
|
of the FCC is itself unconstitutional.
|
|
|
|
It is clear that Congress could not constitutionally grant the FCC the
|
|
power to tell The New Yorker not to print profane language -- even
|
|
though *children* might come across a copy of The New Yorker. Surely
|
|
it is equally clear that Congress cannot grant the FCC the authority
|
|
to dictate how providers like Netcom and CompuServe handle content
|
|
that contains such language.
|
|
|
|
|
|
COMPUTER COMMUNICATIONS POSE DIFFERENT PROBLEMS AND REQUIRE DIFFERENT
|
|
SOLUTIONS FROM THOSE OF OTHER MEDIA.
|
|
|
|
Even if the federal government had the constitutional authority to
|
|
regulate indecency in computer communications, it would be required by
|
|
the First Amendment to employ only the "least restrictive means" in
|
|
doing so. In the Sable case, Court noted that there are less
|
|
restrictive means than a total ban for protecting children from
|
|
indecent content on phone-sex services. These include such measures as
|
|
requiring various procedures to verify customers' ages and to deny
|
|
services to minors.
|
|
|
|
The Exon language creates an affirmative defense for online service
|
|
providers who implement the same types of procedures that the FCC now
|
|
requires of phone-sex services. But what works for phone-sex services
|
|
clearly would not work for computer-communications services. In this
|
|
fundamentally different medium, those FCC-enforced procedures are not
|
|
a "least restrictive means" -- in fact, they are potentially among the
|
|
most restrictive.
|
|
|
|
The language that penalizes anyone who "makes or makes available"
|
|
indecent content to a minor would require an access provider like
|
|
Netcom to cease carrying the entire alt.sex.* hierarchy, the great
|
|
majority of which is First-Amendment-protected speech. Suppose Netcom
|
|
tried to avail itself of legal immunity for transmitting indecency by,
|
|
say, limiting subscriber access to the "indecent" Usenet newsgroups to
|
|
Netcom subscribers age 18 or over. Since Netcom, like all Internet
|
|
access providers, is also a Usenet distribution node, *the company
|
|
would still be liable*, since, by passing "indecent" Usenet traffic
|
|
through, it would "make available" that indecent content to minors
|
|
elsewhere on the Net who aren't Netcom customers.
|
|
|
|
Note: this analysis is not meant to imply that *no* government
|
|
regulation of computer communications would meet the "least
|
|
restrictive means." As a practical matter, this medium is *uniquely
|
|
suited* to measures that simultaneously protect sensitive users and
|
|
children from offensive content and allow the full range of
|
|
constitutionally protected speech on the Net. Since both the computers
|
|
that users employ to read the Net and those that providers use to
|
|
administer the Net are highly intelligent and programmable devices, it
|
|
is relatively easy to design tools that individuals can use to filter
|
|
offensive content and that parents can use to screen content for their
|
|
children. The government's promotion of the development and
|
|
implementation of such tools, if done in a way consistent with First
|
|
Amendment guarantees, would likely qualify as a "least restrictive
|
|
means."
|
|
|
|
Furthermore, there are constitutional reasons for favoring policies
|
|
that empower individuals and families to make their own content
|
|
choices. In Wisconsin v. Yoder (1972), the Supreme Court acknowledged
|
|
that the right of parents to determine what is appropriate for their
|
|
children is constitutionally protected. Filtering tools could be the
|
|
fundamental means of preserving family values while exploring global
|
|
computer networks.
|
|
|
|
|
|
ADULTS SHOULD NOT BE LIMITED TO ONLY WHAT IS APPROPRIATE FOR CHILDREN.
|
|
|
|
The effect of the CDA's provisions regarding indecent content and
|
|
minors would be both dramatic and disastrous. If enacted, the CDA
|
|
would effectively turn all the public areas of the Net -- and all of
|
|
the distributed global conferencing system known as Usenet -- into the
|
|
equivalent of the Children's Room at the public library.
|
|
Traditionally, every large public library has a Children's Room -- a
|
|
confined area of the library with content deemed safe for children.
|
|
Outside of the Children's Room, the rest of the library is geared
|
|
toward, and available to, adults.
|
|
|
|
The Exon language would turn the Net as a whole into the *inverse* of
|
|
the public library -- the public spaces, including Usenet, would be
|
|
regulated as safe for children, while adults would have to talk about
|
|
adult content (detailed discussions of sexual content in the work of
|
|
James Joyce, explanations of Shakespeare's bawdy puns, or descriptions
|
|
of proper techniques for safe sex, to name some examples) in confined,
|
|
nonpublic (and probably non-global) subforums or "rooms." There would
|
|
be no more wide-ranging debates with the full set of potential
|
|
international participants about the merits of THE SATANIC VERSES --
|
|
after all, that book has indecent content. We'd have to be content
|
|
with the narrower range of participants we could lure to an "adult"
|
|
room on CompuServe or AOL -- a small group of paying subscribers
|
|
rather than a large population of discussants from commercial and
|
|
noncommercial systems alike. The CDA would diminish and perhaps
|
|
destroy the intellectual diversity and vibrancy of the Net.
|
|
|
|
|
|
CONCLUSION
|
|
|
|
The CDA represents the kind of "top-down," government-centered attempt
|
|
to regulate the content that demonstrates a lack of understanding of
|
|
the nature of this new medium. Legislation like the CDA -- particular
|
|
when based on regulatory approaches for wholly different media -- are
|
|
certain to create more practical and constitutional problems than they
|
|
solve. It is especially ironic that the Exon amendment, which would
|
|
chill the development of online services and communities and "dumb
|
|
down" the content of the Net's public spaces to a grade-school level,
|
|
has been attached to a bill deregulating communications
|
|
infrastructure. This deregulation has been presented as a boost to the
|
|
pace of development of the very technology to support these services
|
|
and communities.
|
|
|
|
EFF believes that parents, not Congress or the FCC, have the primary
|
|
right and responsibility to determine what is appropriate for their
|
|
children to see. Furthermore, it is clearly wrong for Congress to
|
|
attempt to make outlaws out of adults for engaging in public speech
|
|
that may not be suitable for minors. As Supreme Court Justice Felix
|
|
Frankfurter ruled in Butler v. Michigan (1957):
|
|
|
|
"The State insists that, by thus quarantining the general reading
|
|
public against books not too rugged for grown men and women in order
|
|
to shield juvenile innocence, it is exercising its power to promote
|
|
the general welfare. Surely this is to burn the house to roast the
|
|
pig. The incidence of this enactment is to reduce the adult population
|
|
of Michigan to reading only what is fit for children."
|
|
|
|
And a legislative approach that was bad for the adult population of
|
|
Michigan nearly 40 years ago is surely just as bad for the adult
|
|
population of the Net today.
|
|
|
|
|
|
|
|
For More Information Contact:
|
|
|
|
Electronic Frontier Foundation
|
|
|
|
Mike Godwin Shari Steele (voice) +1.202.861.7700
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 20 Jun 95 10:38 EST
|
|
From: "AMERICAN EAGLE PUBLICATION INC." <0005847161@MCIMAIL.COM>
|
|
Subject: File 3--Dole and Exon Bills
|
|
|
|
I've been reading CuD about the Dole/Grassey bill and the Exon bill to
|
|
limit pornography on the net, and for the most part I just haven't
|
|
cared too much about it. I don't mess with that stuff at all,
|
|
personally, so I really don't give a lick about whether its there or
|
|
not. I am not real hot to outlaw it simply because my view of the
|
|
first amendment is fairly generous. On the other hand, I have no use
|
|
for it, and if every computer that had it on were fried tomorrow, it
|
|
wouldn;t bother me one bit. So when I've seen these pleas to "contact
|
|
your representatives" I've just yawned and gone on with life.
|
|
|
|
This morning, however, I woke up and something clicked. I remembered
|
|
that the NSA had a three-step plan to outlaw cryptography. Clipper was
|
|
step one. Could THIS be step two? At first it sounds crazy, but maybe
|
|
not. If I were a strategist for the NSA I'd guess it wouldn't be too
|
|
hard to ram such a bill through congress, given a little bit of the
|
|
right press and publicity (which just seems to be happening at the
|
|
right time). I'd also realize that such laws would be totally
|
|
unenforceable as long as good crypto was available to the general
|
|
public. So by passing an electronic porno law, I'd be able to
|
|
precipitate a law-enforcement crisis which would necessitate an anti-
|
|
crypto law. And it would be one that a multitude of Americans would
|
|
support out of fear for their children's safety.
|
|
|
|
Could it be? Whether it is or not, though, I hope my point is clear:
|
|
here in America, we're flushing our freedoms down the toilet as fast
|
|
as we can grab for security and safety. That's foolish beyond measure!
|
|
Like myself, you may not care anything for pornography, but realize
|
|
that one thing leads to another. Today, pornography, tommorow,
|
|
cryptography, and the day after that your front door gets slammed in
|
|
at 2 a.m. by jack-booted police. Until we're willing to defend even
|
|
what is distateful to us IN THE NAME OF FREEDOM--because we love
|
|
freedom and value it more than our own personal peace--then we'll be
|
|
divided and conquored.
|
|
|
|
I went to Argentina last fall for a conference on computer hacking and
|
|
I saw a lot of people who really did love freedom more than we do
|
|
here. Hackers, virus writers and computer security professionals sat
|
|
in the same room and talked. Not because they agreed--they argued--but
|
|
there was a good spirit to it. Here in America, most of the security
|
|
types seem to want to shut the hackers and virus writers up, and pass
|
|
laws. The argentines have had dictators enough to value their freedom
|
|
to the point that they'll even put up with something distatesful.
|
|
They'll sit and listen to Zarathustra, a virus writer who says he's
|
|
out to destroy your data, and seek a solution with technology,
|
|
believing they can beat him, rather than trying to put him behind
|
|
bars.
|
|
|
|
We need to learn from that. These bills are a good place to start.
|
|
Please fight them because you love freedom, even if you'd rather not
|
|
see porn on the net. And if you have children (as I do) and you're
|
|
concerned for them growing up in a wild and crazy world (as I am)
|
|
consider this: If you merely seek to outlaw everything that is bad or
|
|
distasteful, then you're teaching them that the law is the sum of all
|
|
morality. Whatever is illegal is bad and whatever is legal is ok.
|
|
However, if you put your ideals first, and defend them while
|
|
recognizing that you have a responsibility to govern yourself and
|
|
choose what is good and shun what is bad, then you'll teach your
|
|
children to live by their ideals regardless of what other men do,
|
|
instead of being undisciplined idiots who must be hemmed in by a
|
|
multitude of laws. Your actions speak a thousand times louder than
|
|
your words.
|
|
|
|
--Mark Ludwig
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 21 Jun 1995 08:56:49 -0500 (CDT)
|
|
From: David Smith <bladex@BGA.COM>
|
|
Subject: File 4--(fwd) Cinci computer connection confiscated (fwd)
|
|
|
|
From--cdossman@one.net (chris dossman)
|
|
|
|
The Hamilton County Sheriffs office has confiscated $100,000.00 worth
|
|
of computer equiptment from the Cincinnati Computer Connection, a BBS
|
|
whose focus is on E-Mail and computer files.
|
|
|
|
Simon Leis, Hamilton County Sheriff, who has made a polical career
|
|
from driving pornography out of the cinti. limits organized a
|
|
"Computer Task Force" whose primary purpose was to limit fraud via
|
|
electronic communications. Simon Leis has decided that there are no
|
|
community standards.
|
|
|
|
The media depicts the situation as a case of child pornography, as
|
|
with the Exon bill with the Internet. Of 80,000 files on CCC's drives,
|
|
40 contained nudity.(no child pornography.)
|
|
|
|
We in Cincinnati need support to stop this attrocity. We have
|
|
organized a group of 5000 on a local level, but feel that this
|
|
situation needs national attention. The problem as we see it is that
|
|
the media is attempting to bring public attention to the fact that
|
|
this is a matter of pornography and anyone who opposes the Exon bill
|
|
must advocate child pornography. While Im sure the majority does not
|
|
advocate child pornography, we all must advocate the first ammendment.
|
|
Please help any way you can.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 22 June, 1995 21:23:45 CDT
|
|
From: CuD Moderators <cudigest@mindvox.phantom.com>
|
|
Subject: File 5--Baker "Rape Story" Case thrown out by Judge (excerpt)
|
|
|
|
COMPUTER `RAPE' CASE THROWN OUT BY JUDGE
|
|
|
|
A judge threw out charges Wednesday against a University of Michigan
|
|
student who wrote fantasies on the Internet about raping and killing a
|
|
classmate.
|
|
|
|
U.S. District Judge Avern Cohn said Jake Baker expressed no intent
|
|
of actually carrying out such acts. He said the tale was "only a
|
|
rather savage and tasteless piece of fiction."
|
|
|
|
((The story summarizes the case, in which Jake Baker wrote a
|
|
snuff-rape fantasy posted to alt.sex.stories))
|
|
|
|
"The government's enthusiastic beginning petered out to a salvage
|
|
effort once it recognized that the communication which so much alarmed
|
|
the University of Michigan officials was only a rather savage and
|
|
tasteless piece of fiction," Cohn wrote.
|
|
|
|
Cohn said Baker's story about a fellow student would have been
|
|
better handled as a disciplinary matter by the university.
|
|
|
|
((The story indicated that the prosecution might appeal)).
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 19 Jun 1995 20:46:50 -0701
|
|
tlg4@PO.CWRU.EDU, tline@IGLOU.COM, trevor@FREENET.SCRI.FSU.EDU
|
|
From: roy@ZINE.NET(Zine Net)
|
|
Subject: File 6--Zine Net...The Place for Zines
|
|
|
|
Zine.Net - Your guide to the chaotic world of self-publishing
|
|
|
|
I am proud to announce ZINE.NET, the new and exciting way for
|
|
zine publishers to get the most out of the World Wide Web.
|
|
You can find us at http://www.zine.net
|
|
|
|
What is Zine.Net?
|
|
|
|
Zine.Net is THE resource on the Internet for information on the
|
|
vast assortment of independent, self-published zines. It serves
|
|
as a centralized starting point for both zines created on our
|
|
server as well as pointers to existing zine sites. Our goal is
|
|
unique in that we want to generate sales for printed (hard copy)
|
|
zines. We sincerely believe the most effective method for doing
|
|
this is by allowing a reader to SAMPLE BEFORE THEY BUY. This will
|
|
be in the form of choosing a couple of selections from a zine,
|
|
converting them to HTML, and then making them available for
|
|
reading from our web site, www.zine.net.
|
|
|
|
Additionally, our research has indicated the following...
|
|
|
|
#1. Potential zine buyers are MUCH more likely to read Web based
|
|
articles than plain text, since the Web version can include
|
|
formatted text and graphics (making it considerably more
|
|
attractive).
|
|
|
|
#2. Most zine publishers don't have the time and/or resources
|
|
to produce Web versions of their printed zines.
|
|
|
|
#3. Zine publishers cannot afford an overpriced computer consultant
|
|
to design their Web site.
|
|
|
|
That's where Zine.Net comes in. We will produce a web sampler
|
|
version of your zine for the low price of $20.00. This will include
|
|
the following...
|
|
|
|
- A Scan of your zine's cover
|
|
- ASCII to HTML conversion of any two articles (you choose the
|
|
ones you want to feature)
|
|
- Scanning of artwork to accompany your articles, up to 6 images
|
|
total
|
|
- First month's inclusion on our server and in the Zine.Net
|
|
directory
|
|
|
|
How can we offer this at such a low price? Simply put, we are only
|
|
trying to break even with limited revenue from participating zine
|
|
publishers. We plan to solicit advertisers to sponsor or co-sponsor
|
|
different areas of the site for a nominal fee. As we grow, so will
|
|
the exposure for potential advertisers AND the individual zine.
|
|
|
|
From the users perspective, Zine.Net will provide an easy and well-
|
|
organized way to search and read from the current wave of
|
|
published zines. By reading sample articles, instead of relying
|
|
solely on reviews, they will be able to make up their own mind
|
|
about the quality of each. Supplemental information on how to
|
|
purchase the printed version will be linked directly from the
|
|
articles.
|
|
|
|
We will include links to existing sites for free, plus offer
|
|
reasonable storage fees for zine publishers with existing Web
|
|
versions of their publications. Our goal is to offer exposure for
|
|
printed zines--by creating original web sites--as well as to aid
|
|
existing zine sites in expanding their readership.
|
|
|
|
Pricing is as follows....
|
|
----------------------------
|
|
|
|
$20.00 - Initial setup, includes HTML/Graphic conversion of two
|
|
articles from your zine (with up to 6 graphics total),
|
|
scan of the cover plus the first month on the Zine.Net
|
|
server.
|
|
|
|
$20.00 - Additional 6 months of your zine available on our site
|
|
(extension of above) after your initial month.
|
|
|
|
$30.00 - Both of the above - You save $10.00 and get both your
|
|
zines initial setup plus 7 months on our site.
|
|
|
|
|
|
Within the first 3 months we expect to sign up a minimum of 20
|
|
original zines and have links to over 200 zine related sites. We
|
|
will also be actively advertising Zine Net, both on the web and
|
|
in national publications, to ensure a steady influx of new visitors.
|
|
This means a greater audience for our site and your zine.
|
|
|
|
To get your zine on Zine Net, we require the following....
|
|
|
|
* Plain ASCII text versions of the two articles you would like
|
|
to feature. These can be FTP'd to ftp.zine.net and put in the
|
|
/incoming directory.
|
|
|
|
If you can't FTP files, you can send us a diskette in either Mac
|
|
or PC format. Once again, be sure the files are in plain text
|
|
format.
|
|
|
|
* Hard copy of your printed zine mailed to us. This will allow us
|
|
to scan the graphics and cover. Also, it will help us to make the
|
|
Web version resemble your printed copy as closely as possible.
|
|
|
|
* Short synopsis of your zines' theme, index of articles in the
|
|
issue, pricing/ordering information plus your email address.
|
|
|
|
* Check for either $20 for one month or $30 for 7 months. Includes
|
|
all setup fees. Checks should be made payable to "Zine Net".
|
|
Credit card orders can be processed by special arrangement.
|
|
|
|
That's all there is to it. You get the benefit of having your zine
|
|
showcased on a site that SPECIALIZES in web samplers of printed
|
|
zines. We solicit outside advertisers to help us attain our
|
|
financial goals. As traffic to Zine Net increases, we both win!
|
|
|
|
Please visit our site and feel free to drop me a note if you have
|
|
any additional questions.
|
|
|
|
|
|
Roy Batchelor (roy@zine.net)
|
|
|
|
Zine Net
|
|
Suite 108
|
|
1211 Park Avenue
|
|
San Jose, CA. 95126-2900
|
|
|
|
http://www.zine.net
|
|
|
|
|
|
Roy Batchelor (roy@zine.net)
|
|
|
|
Zine Net
|
|
Suite 108
|
|
1211 Park Avenue
|
|
San Jose, CA. 95126-2900
|
|
|
|
http://www.zine.net
|
|
|
|
|
|
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 19 Apr 1995 22:51:01 CDT
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 7--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CUDIGEST
|
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|
In ITALY: Bits against the Empire BBS: +39-464-435189
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu:80/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #7.52
|
|
************************************
|
|
|