878 lines
39 KiB
Plaintext
878 lines
39 KiB
Plaintext
|
|
Computer underground Digest Sun Jan 19, 1997 Volume 9 : Issue 04
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #9.04 (Sun, Jan 19, 1997)
|
|
|
|
File 1--Solid Oak Blocking Software & Ethical Spectacle
|
|
File 2--IP: going to InfoWar (fwd)
|
|
File 3--If Operating Systems Were Airlines (fwd)
|
|
File 4--Sidgmore/PC Week (on Growth of UUNET Backbone) (fwd)
|
|
File 5--Internet Forum In Italy Subjected To Censorship
|
|
File 6--GovAcc97.002: 7th Conference on Computers, Freedom & Privacy
|
|
File 7--ALA/ACLU file lawsuit challenging New York "CDA" law
|
|
File 8--Enough is Never Enough -- pro-CDA alliances, from TNNN
|
|
File 9--SUPREMES: Court Date Set, DoJ Brief Filed
|
|
File 10--Cu Digest Header Info (unchanged since 13 Dec, 1996)
|
|
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Sun, 19 Jan 1997 14:36:55 -0800
|
|
From: Jonathan Wallace <jw@bway.net>
|
|
Subject: 1--Solid Oak Blocking Software & Ethical Spectacle
|
|
|
|
FOR IMMEDIATE RELEASE
|
|
|
|
Contact: Jonathan Wallace
|
|
jw@bway.net
|
|
|
|
NEW YORK CITY, January 19, 1997--In an apparent act of
|
|
retaliation against a critic of the company, Solid Oak Sofware
|
|
has added The Ethical Spectacle (http://www.spectacle.org) to
|
|
the list of Web sites blocked by its Cybersitter software.
|
|
|
|
The Ethical Spectacle is a monthly Webzine examining
|
|
the intersection of ethics, law and politics
|
|
in our society, which recently urged its readers not to
|
|
buy Cybersitter because of Solid Oak's unethical behavior.
|
|
The Ethical Spectacle is edited by Jonathan Wallace, a New York-
|
|
based software executive and attorney who is the co-author,
|
|
with Mark Mangan, of Sex, Laws and Cyberspace (Henry Holt, 1996),
|
|
a book on Internet censorship.
|
|
|
|
"In the book," Wallace said, "we took the position--
|
|
naively, I now think--that use of blocking software by parents
|
|
was a less restrictive alternative to government censorship.
|
|
We never expected that publishers of blocking software would
|
|
block sites for their political content alone, as Solid Oak
|
|
has done."
|
|
|
|
Solid Oak describes its product as blocking sites
|
|
which contain obscene and indecent material, hate speech,
|
|
and advocacy of violence and illegal behavior. In late 1996,
|
|
computer journalists Declan McCullagh (declan@well.com)
|
|
and Brock Meeks (brock@well.com) broke the story that
|
|
Cybersitter blocked the National Organization for
|
|
Women site (http://www.now.org)
|
|
along with other political and feminist organizations.
|
|
In addition, the product blocked entire domains such as
|
|
well.com, maintained by the venerable Well online service.
|
|
|
|
McCullagh and Meeks implied that they had received an inner
|
|
look at the Cybersitter database of blocked sites from someone
|
|
who had reverse engineered the software. Shortly afterwards,
|
|
Solid Oak asked the FBI to begin a criminal investigation of
|
|
the two journalists and accused college student Bennett Haselton
|
|
(bennett@peacefire.org) of being their source.
|
|
Though McCullagh, Meeks and Haselton all
|
|
denied he was the source (or that anything illegal
|
|
had occurred), Solid Oak president Brian Milburn called
|
|
Haselton an "aspiring felon" and threatened to add
|
|
his Internet service provider to the blocked list if it did
|
|
not muzzle Haselton.
|
|
|
|
Haselton came to Milburn's attention by founding Peacefire,
|
|
a student organization opposing censorship. On his Web pages
|
|
(http://www.peacefire.org), Haselton posted an essay called
|
|
"Where Do We Not Want You to Go Today?" criticizing
|
|
Solid Oak. The company promptly added Peacefire to its
|
|
blocked list, claiming that Haselton had reverse
|
|
engineered its software, an allegation for which the
|
|
company has never produced any evidence.
|
|
|
|
"At that point," Wallace said, "I felt Milburn was
|
|
acting like the proverbial 800-pound gorilla. I added a
|
|
link to the Spectacle top page called 'Don't Buy Cybersitter'
|
|
(http://www.spectacle.org/alert/peace.html).
|
|
Anyone clicking on the link would see a copy of Bennett's
|
|
'Where Do We Not Want You to Go' page with some added
|
|
material, including my thoughts on the inappropriateness
|
|
of Solid Oak's behavior. I wrote the company, informing
|
|
them of my actions and telling them that they
|
|
misrepresent their product when they claim it blocks only
|
|
indecent material, hate speech and the like."
|
|
|
|
Solid Oak has now responded by blocking The
|
|
Ethical Spectacle. "I wrote to Milburn and to
|
|
Solid Oak technical support demanding an explanation,"
|
|
Wallace said. "I pointed out that The Spectacle does not fit
|
|
any of their published criteria for blocking a site.
|
|
I received mail in return demanding that I cease writing
|
|
to them and calling my mail 'harassment'--with a copy
|
|
to the postmaster at my ISP."
|
|
|
|
Wallace continued: "With other critics such as Declan,
|
|
Brock and Bennett, Solid Oak has claimed reverse
|
|
engineering of its software, in supposed violation
|
|
of its shrink-wrapped license. I have never downloaded,
|
|
purchased or used Cybersitter, nor had any access to
|
|
its database. I believe that Solid Oak's sole reason
|
|
for blocking my site is the 'Don't Buy Cybersitter'
|
|
page, criticizing the company's bullying behavior."
|
|
|
|
|
|
The Ethical Spectacle includes the internationally
|
|
respected An Auschwitz Alphabet
|
|
(http://www.spectacle.org/695/ausch.html), a compilation
|
|
of resources pertaining to the Holocaust. "Sixty
|
|
percent of the Spectacle's traffic consists of visitors to the
|
|
Holocaust materials," Wallace said. "Schoolteachers have
|
|
used it in their curricula, it was the subject of a lecture at
|
|
a museum in Poland some weeks ago, and every month, I get
|
|
letters from schoolchildren thanking me for placing it
|
|
online. Now, due to Solid Oak's actions, Cybersitter's
|
|
claimed 900,000 users will no longer have access to it."
|
|
|
|
Solid Oak can be contacted at blocking.problems@solidoak.com,
|
|
or care of its president, Brian Milburn (bmilburn@solidoak.com.)
|
|
|
|
-----------------------------------------------
|
|
Jonathan Wallace
|
|
The Ethical Spectacle http://www.spectacle.org
|
|
Co-author, Sex, Laws and Cyberspace http://www.spectacle.org/freespch/
|
|
|
|
"We must be the change we wish to see in the world."--Gandhi
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 8 Jan 1997 13:06:00 -0800 (PST)
|
|
From: Stanton McCandlish <mech@EFF.ORG>
|
|
Subject: 2--IP: going to InfoWar (fwd)
|
|
|
|
These excerpts from Edupage, aside from warning of increasing US
|
|
executive branch policymaking involving the Internet, likely to
|
|
have some kind of negative fallout whatever good it may do, also
|
|
demonstrates an increasingly frequent rhetorical device and logic flaw:
|
|
The Administration's intelligence people say that the Net is the fastest
|
|
growing method of economic espionage, as if this were a meaningful
|
|
statement out of the context of the facts surrounding it. The Net is also
|
|
the fastest growing way to make new friends, to ask and answer questions
|
|
among colleagues, to play games, to get in arguments, to organize events,
|
|
to... I'm strongly reminded of the contorted reasoning of many
|
|
well-meaning organizations who are in a panic over online neo-nazis and
|
|
pornographers. *Of course* racists, porn merchants, and spies use the Net.
|
|
The also use telephones and microwave ovens just like anyone else. Why
|
|
the press even bothers to listen to claims like this, much less report them
|
|
as "news" is beyond me. It should be immediately apparent to any writer
|
|
following such a story that the Net, like any technology, will be used by
|
|
everyone with access to it, whether they be moms, rabbis, students or
|
|
scam artists.
|
|
|
|
It think it is sensible that NACIC is warning businesses of Net-related
|
|
security risks - there are many genuine ones. It even bolsters our
|
|
own position that such risks combined with the National Security Agency's
|
|
anti-encryption public policy stance is ironically harming the very national
|
|
security interests NSA is charged with protecting.
|
|
|
|
But it cannot be sensible for NACIC to make alarmist statements like
|
|
"All requests for information received via the Internet should be viewed
|
|
with suspicion". Are corporate webmasters supposed to call the CIA next
|
|
time someone asks them "what is your URL?" or "Where do I find more
|
|
information on your products or services?" Had Edupage simply been
|
|
summarizing I would not have worried much, but that "all requests" line
|
|
appears to be a direct quote from NACIC's report, the full text of which
|
|
I'll certainly be looking for.
|
|
|
|
|
|
Dave Farber typed:
|
|
> Date--Wed, 08 Jan 1997 11:17:48 -0500
|
|
> From--Dave Farber <farber@cis.upenn.edu>
|
|
> Subject--IP--going to InfoWar
|
|
>
|
|
> >From Edunews:
|
|
>
|
|
> INTERNET IS NO.1 CHOICE FOR FOREIGN SNOOPERS
|
|
> A report released by the National Counterintelligence Center (NACIC)
|
|
> indicates that the Internet is the fastest growing method used by foreign
|
|
> entities to gather intelligence about U.S. companies. "All requests for
|
|
> information received via the Internet should be viewed with suspicion," says
|
|
> the report, which urges caution in replying to requests coming from foreign
|
|
> countries or foreign governments, particularly with regard to questions
|
|
> about defense-related technology. NACIC works in close coordination with
|
|
> the CIA, but is an autonomous agency reporting the National Security
|
|
> Council. (BNA Daily Report for Executives 6 Jan 97 A15)
|
|
>
|
|
> DOD URGES "INFORMATION CZAR" APPOINTMENT
|
|
> The U.S. Department of Defense has recommended establishing a new
|
|
> "information-warfare" czar in the Defense Department and an
|
|
> "information-warfare" center within U.S. intelligence agencies. A report
|
|
> released by a task force appointed by the Defense Science Board calls for
|
|
> spending $580 million in R&D over the coming years, mainly in the private
|
|
> sector, to develop new software and hardware to provide security, such as a
|
|
> system for automatically tracing cracker attacks back to their source. The
|
|
> task force also recommends changing the laws so that the Pentagon can
|
|
> legally pursue and repel those who attempt to hack into DoD computer
|
|
> systems, injecting their computers with "a polymorphic virus that wipes out
|
|
> the system, takes it down for weeks." A Defense Department spokesman notes
|
|
> that the Advanced Research Projects Agency is working on an "electronic
|
|
> immune system" that could detect invaders and mobilize against them. (Wall
|
|
> Street Journal 6 Jan 97 B2)
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 18 Dec 1996 21:49:53 -0600
|
|
From: Avi Bass <te0azb1@corn.cso.niu.edu>
|
|
Subject: 3--If Operating Systems Were Airlines (fwd)
|
|
|
|
((MODERATORS' NOTE: Fowarded from another list; Original author unknown))
|
|
|
|
If Operating Systems Were Airlines
|
|
|
|
DOS Air:
|
|
Passengers walk out onto the runway, grab hold of the plane, push t
|
|
until it gets in the air, hop on, then jump off when it hits the
|
|
ground. They grab the plane again, push it back into the air, hop
|
|
on, jump off....
|
|
|
|
Mac Airways:
|
|
The cashiers, flight attendants, and pilots all look the same, talk
|
|
the same, and act the same. When you ask them questions about the
|
|
flight,they reply that you don't want to know, don't need to know,
|
|
and would you please return to your seat and watch the movie.
|
|
|
|
Windows Airlines:
|
|
The terminal is net and clean, the attendants courteous, the pilots
|
|
capable The fleet of Lear jets the carrier operates takes off
|
|
without a hitch, pushes above the clouds and, at 20,000 feet,
|
|
explodes without warning.
|
|
|
|
OS/2 Skyways:
|
|
The terminal is almost empty - only a few prospective passengers
|
|
mill about. The announcer says that a flight has departed, although
|
|
no planes appear to be on the runway. Airline personnel apologize
|
|
profusely to customers in hushed voices pointing from time to time
|
|
to the sleek, powerful jets outside.
|
|
They tell each passenger how great the flight will be on these new
|
|
jets and how much safer it will be than Windows Airlines, but they
|
|
will have to wait a little longer for the technicians to finish the
|
|
flight systems.
|
|
Maybe until mid-1995. Maybe longer.
|
|
|
|
Fly Windows NT:
|
|
Passengers carry their seats out onto the tarmac and place them in
|
|
the outline of a plane. They sit down, flap their arms, and make
|
|
jet swooshing sounds as if they are flying.
|
|
|
|
Unix Express:
|
|
Passengers bring a piece of the airplane and a box of tools with
|
|
them to the airport. They gather on the tarmac, arguing about what
|
|
kind of plane they want to build. The passengers split into groups
|
|
and build several different aircraft but give them all the same
|
|
name. Only some passengers reach their destinations, but all of
|
|
them believe thay arrived.
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 16 Dec 1996 18:35:41 -0500 (EST)
|
|
From: "noah@enabled.com" <noah@enabled.com>
|
|
Subject: 4--Sidgmore/PC Week (on Growth of UUNET Backbone) (fwd)
|
|
|
|
Source -Noah
|
|
|
|
---------- Forwarded message ----------
|
|
Date--Mon, 16 Dec 1996 16:26:23 -0500 (EST)
|
|
From--"Scott A. Davis" <sdavis@UU.NET>
|
|
To--dfoxlist@banzai-institute.org
|
|
|
|
You guys want to read some frightening statistics? UUNET's backbone in
|
|
three years, according to our CEO, will be 1000 times the size of today's
|
|
existing internet...
|
|
|
|
-------------------------------------------------------------
|
|
Great article in this weeks edition of PC Week from Johns keynote speech
|
|
last Thursday at Mecklermedia's Internet World Conference in New York. It
|
|
quotes most of the key elements from his speech and be found at
|
|
|
|
http://www.pcweek.com/news/1209/12muu.html
|
|
|
|
or is cut and pasted below.
|
|
|
|
__________________________________________________
|
|
|
|
December 12, 1996 12:00 PM ET
|
|
|
|
UUNet chief sees telecom/ISP mergers as
|
|
the wave of the future
|
|
By Margaret Kane
|
|
|
|
|
|
NEW YORK -- In a speech that was part pitch and part prognostication,
|
|
UUNet with communications services provider MFS Communications Co. Inc.
|
|
was the right move and where he thinks the telecommunications industry
|
|
will end up.
|
|
|
|
In the past six months, UUNet has not only merged with MFS but also has
|
|
announced a proposed merger with long-distance carrier WorldCom Inc. The
|
|
joining of two telecommunications companies with an Internet company is
|
|
the wave of the future, Sidgmore told an Internet World audience here this
|
|
morning in a keynote address.
|
|
|
|
ISPs (Internet service providers) that do not control their facilities
|
|
will not survive, he predicted.
|
|
|
|
Sidgmore based his pronouncement on the exploding demand for bandwidth,
|
|
which brings with it exploding costs for ISPs.
|
|
|
|
"UUNet alone will have an Internet [backbone] in three years that is 1,000
|
|
times the size of the whole Internet network today," he said. Because
|
|
bandwidth accounts for roughly 54 percent of an ISP's total cost, the only
|
|
companies that will survive will be those that are part of a core telco.
|
|
|
|
"We don't see how to escape from the arithmetic here," he said.
|
|
|
|
Sidgmore agreed with analysts' predictions that the number of ISPs will
|
|
drop sharply in the near future, predicting that companies would split
|
|
into two markets: ISPs that own their own networks, like UUNet, and ISPs
|
|
that provide value-added reselling of those network services.
|
|
|
|
But UUNet will not get out of the service business. Indeed, Sidgmore took
|
|
time to announce the introduction of a pair of "extranet" services that
|
|
will allow businesses to employ Internet protocols to share information
|
|
with associates and partners. ExtraLink is a VPN (virtual private network)
|
|
with full Internet connectivity based on UUNet's backbone and MFS' local
|
|
access. ExtraLink Remote will allow users with a VPN to permit secure,
|
|
remote dial-up access to mobile users or affinity groups. The services are
|
|
slated to be available commercially in February.
|
|
|
|
The demand for bandwidth will not just affect ISPs, Sidgmore continued.
|
|
Telcos also will be changed by the Internet, mainly because of how cheap
|
|
it is to send faxes over the Internet.
|
|
|
|
Sidgmore said faxes make up 50 percent of international telecommunications
|
|
traffic. That puts telcos in a vulnerable position, he said, citing the
|
|
cost of a 42-page fax sent from New York to Los Angeles. By fax, it's
|
|
about $10. By Internet, it's about 10 cents.
|
|
|
|
"The Internet is not about being 10 percent better or 10 percent cheaper,"
|
|
he said. "It's about being 10 times better and 10 times cheaper."
|
|
|
|
"Think about the vulnerability of the core telecom companies. What's at
|
|
stake is not the $20 billion voice market, it's the $900 billion market
|
|
worldwide," he said. "That's why all the telecom companies worldwide have
|
|
scrambled to derive Internet strategies."
|
|
|
|
Not surprisingly, Sidgmore said the one thing that could hurt the growth
|
|
of the Internet is the government.
|
|
|
|
"How can we screw it up? One way is to get them involved," he said, to
|
|
applause from the crowd. "You could argue that they had the chance. The
|
|
government had control of the Internet for 25 years, and nothing happened.
|
|
We think the government should declare success, and move on to health
|
|
care."
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 2 Dec 1996 12:08:20 -0500 (EST)
|
|
From: Noah Robischon <noah@pathfinder.com>
|
|
Subject: 5--Internet Forum In Italy Subjected To Censorship
|
|
|
|
From: http://netday.iworld.com/business/NATW.html
|
|
|
|
In what is widely thought to be the first instance of Net
|
|
censorship in Italy, an e-mail forum called Lisa has been removed
|
|
from the computers of Bologna University. At issue were
|
|
defamatory messages that were circulated among members of the
|
|
list. The messages did not concern the themes of the list, but
|
|
were insults directed at the members of another online group
|
|
called Citt=E1 Invisible (Invisible City). "They were very
|
|
serious affirmations. In another context they would have led to
|
|
legal action," said Lucio Picci, president of Citt=E1 Invisible
|
|
and the object of many of the insulting messages. Laura Caponi,
|
|
the forum moderator, says she was not consulted before the
|
|
decision was taken, adding that "pressure" was exerted on the
|
|
university to close the list. The university stated that its
|
|
network belongs to the ministry of education and that it is
|
|
obliged to exercise some control over users' activities. (The
|
|
Guardian, Britain; November 28, 1996)
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 17 Jan 1997 17:19:02 -0800
|
|
From: jwarren@WELL.COM(Jim Warren)
|
|
Subject: 6--GovAcc97.002: 7th Conference on Computers, Freedom & Privacy
|
|
|
|
The Consitution "guarantee" NOTHING. It merely proposes. Diligent citizen
|
|
vigilence and personal activism provides the *only* guarantee -- and it's
|
|
only good for as long as *we* continuously invest *our* time, energy and
|
|
resources.
|
|
--preacher-jim
|
|
|
|
|
|
&&&&&&&&&&&&&&&&&&&&
|
|
|
|
|
|
The Seventh Conference on Computers, Freedom, and Privacy
|
|
March 11-14, 1997
|
|
San Francisco Airport Hyatt Regency; Burlingame, California
|
|
|
|
Date: Wed, 8 Jan 1997 18:11:09 -0800 (PST)
|
|
From: Bruce R Koball <bkoball@well.com>
|
|
|
|
CFP'97 : Commerce & Community
|
|
|
|
CFP'97 will assemble experts, advocates, and interested people
|
|
from a broad spectrum of disciplines and backgrounds in a balanced
|
|
public forum to address the impact of new technologies on society.
|
|
This year's theme addresses two of the main drivers of social and
|
|
technological transformation. How is private enterprise changing
|
|
cyberspace? How are traditional and virtual communities reacting?
|
|
Topics in the wide-ranging main track program will include:
|
|
|
|
PERSPECTIVES ON CONTROVERSIAL SPEECH
|
|
THE COMMERCIAL DEVELOPMENT OF THE NET
|
|
GOVERNMENTAL & SOCIAL IMPLICATIONS OF DIGITAL MONEY
|
|
INTERNATIONAL PERSPECTIVES ON CRYPTOGRAPHY
|
|
CYPHERPUNKS & CYBERCOPS
|
|
REGULATION OF ISPs
|
|
SPAMMING
|
|
INFOWAR
|
|
INTELLECTUAL PROPERTY AND INFO-PROPERTY
|
|
THE 1996 ELECTIONS: CREATING A NEW DEMOCRACY
|
|
THE COMING COLLAPSE OF THE NET
|
|
|
|
CFP'97 will feature parallel-track lunchtime workshops during the
|
|
main conference on topics including:
|
|
|
|
THE CASE AGAINST PRIVACY HOW A SKIPTRACER OPERATES
|
|
CYBERBANKING HOW THE ARCHITECTURE REGULATES
|
|
RIGHTS IN AVATAR CYBERSPACE NATIONAL I.D. CARDS
|
|
PUBLIC KEY INFRASTRUCTURES EUROPEAN IP LAW
|
|
SEXUAL HARASSMENT IN CYBERSPACE VIRTUAL COMMUNITIES
|
|
DOMAIN NAMES ARCHIVES, INDEXES & PRIVACY
|
|
GOVERNMENT REGULATION OF ECASH CRYPTO AND THE 1st AMENDMENT
|
|
|
|
The conference will also offer a number of in-depth tutorials on
|
|
subjects including:
|
|
|
|
* The Economics of the Internet
|
|
* Regulation of Internet Service Providers
|
|
* The Latest in Cryptography
|
|
* The Constitution in Cyberspace
|
|
* Info War: The Day After
|
|
* Personal Information and Advertising on the Net
|
|
* Transborder Data Flows and the Coming European Union
|
|
* Intellectual Property Rights on the Net: A Primer
|
|
|
|
|
|
INFORMATION
|
|
|
|
A complete conference brochure and registration information are
|
|
available on our web site at: http://www.cfp.org
|
|
|
|
For an ASCII version of the conference brochure and registration
|
|
information, send email to: cfpinfo@cfp.org
|
|
|
|
For additional information or questions, call: 415-548-2424
|
|
|
|
|
|
&&&&&&&&&&&&&&&&&&&&
|
|
|
|
|
|
An old languange teachers' joke:
|
|
They call people who can speak three languages, "tri-lingual."
|
|
They call people who can speak two languages, "bi-lingual."
|
|
But the call people who can speak only one language, "American."
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 14 Jan 1997 08:43:52 -0800 (PST)
|
|
From: Declan McCullagh <declan@well.com>
|
|
Subject: 7--ALA/ACLU file lawsuit challenging New York "CDA" law
|
|
|
|
From - fight-censorship@vorlon.mit.edu
|
|
|
|
[Visit netlynews.com for the rest of the story. Another reason to follow
|
|
the New York case is that a successful challenge to its "harmful to
|
|
minors" ban could create a useful precedent in fighting a CDA 2.0, which
|
|
likely will have such language. --Declan]
|
|
|
|
***********
|
|
|
|
The Netly News Network
|
|
http://netlynews.com
|
|
|
|
A Civil (Libertarian) War
|
|
by Declan McCullagh (declan@well.com)
|
|
January 14, 1997
|
|
|
|
On a frosty winter morning last February, Shabbir Safdar and a
|
|
gaggle of VTW loyalists trekked to Albany, New York, to protest a
|
|
state bill that would muzzle the Net. "This was our first time doing
|
|
any state-level lobbying," Safdar says. "We managed to convince them
|
|
to take some stuff out of the law." But his efforts didn't stop the
|
|
measure from wending its way through the legislature: In September,
|
|
Governor George Pataki signed it into law.
|
|
|
|
Today the ACLU sued New York State in federal court, charging that
|
|
the law is unconstitutional. New York now takes its place among two
|
|
dozen states battling similar local legislation that would criminalize
|
|
certain forms of Net speech. In Georgia, for instance, merely having
|
|
an anonymous user name could be illegal. Virginia restricts state
|
|
employees' rights to view sexually explicit material -- college
|
|
professors who might want to use the Net in, say, an English lit class
|
|
have to exercise extreme caution. Forget the Communications Decency
|
|
Act: A kind of civil war is being waged across half the U.S.
|
|
|
|
The ALA v. Pataki lawsuit, filed in the Southern District of New
|
|
York, involves 14 plaintiffs including the American Library
|
|
Association, the American Booksellers Association Foundation for Free
|
|
Expression, Panix, Echo and the ACLU. The coalition, which is asking
|
|
for a permanent injunction, maintains that the law unconstitutionally
|
|
stifles online speech and unduly interferes with interstate commerce.
|
|
The law amends the penal code by making it a criminal offense
|
|
punishable by seven years in prison to distribute pictures or text
|
|
"which (are) harmful to minors."
|
|
|
|
We here at The Netly News are ardent advocates of free speech, of
|
|
course -- we held a joint teach-in on the New York law in the fall. So
|
|
I spoke to Ann Beeson, a staff attorney at the ACLU, who's spent the
|
|
last year attacking other state laws and the CDA in court. Why should
|
|
netizens care about this law if they don't live in New York? I asked
|
|
her.
|
|
|
|
"Because New York can extradite you," she replied.
|
|
|
|
But what if it's not a crime where I live?
|
|
|
|
"It doesn't make a difference," Beeson said. "There's no question
|
|
that New York could try to extradite you if you put up a web site that
|
|
has material harmful to minors on it."
|
|
|
|
[...]
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 17 Jan 1997 18:04:35 -0800 (PST)
|
|
From: Declan McCullagh <declan@well.com>
|
|
Subject: 8--Enough is Never Enough -- pro-CDA alliances, from TNNN
|
|
|
|
From - fight-censorship@vorlon.mit.edu
|
|
|
|
[Attached are two excerpts from the article. For the rest, check out:
|
|
http://cgi.pathfinder.com/netly/textonly/1,1035,549,00.html --Declan]
|
|
|
|
********
|
|
|
|
The Netly News Network
|
|
http://netlynews.com/
|
|
|
|
Enough Is Never Enough
|
|
By Declan McCullagh (declan@well.com)
|
|
January 17, 1997
|
|
|
|
A broad coalition of conservative and anti-pornography groups and
|
|
individuals will file legal briefs next Tuesday in the Supreme Court
|
|
supporting the government's defense of the Communications Decency Act,
|
|
The Netly News has learned.
|
|
|
|
The alliance includes longtime supporters of the act, such as
|
|
Enough is Enough, Focus on the Family, and the National Association of
|
|
Evangelicals. Members of Congress will join a separate brief that the
|
|
National Law Center for Children and Families is preparing.
|
|
|
|
But a letter from the attorney representing the coalition asked
|
|
the ACLU for permission to file a brief "on behalf of" 59 plaintiffs,
|
|
including such unlikely participants as the National Association for
|
|
the Advancement of Colored People, PBS, SafeSurf... and Netscape.
|
|
|
|
Netscape? The company that lobbied against the CDA? A firm with a
|
|
reputation of putting their balls on the chopping block when fighting
|
|
for Net-issues on Capitol Hill? Netscape was as shocked as I was to
|
|
learn about their participation. "It wasn't authorized by me or my
|
|
office. This is flabbergasting," Peter Harter, public policy counsel
|
|
for Netscape, said. "I'd be crucified if this happened."
|
|
|
|
[...]
|
|
|
|
In their brief, which argues sociological rather than legal
|
|
points, the groups hope to highlight the "dangers" of pornography
|
|
online. They plan to supply the court with "legislative facts" to
|
|
support the position Congress took when crafting the bill. The
|
|
document also will include statistics discussing the effects of the
|
|
Internet on children and the availability of material covered by the
|
|
law. (Marty Rimm, where are you now?)
|
|
|
|
Donna Rice-Hughes from Enough is Enough says: "It discusses three
|
|
primary areas of our concern: letting the court know the problems on
|
|
the Internet. Adult pornography, indecency, and child porn as well. A
|
|
section on the harms of pornography. And a section dealing with the
|
|
compliance issues: Is it feasible technically to comply with the CDA?"
|
|
|
|
[...]
|
|
|
|
Chris Stamper and Noah Robischon contributed to this report.
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 22 Jan 1997 13:44:14 -0700
|
|
From: --Todd Lappin-- <telstar@wired.com>
|
|
Subject: 9--SUPREMES: Court Date Set, DoJ Brief Filed
|
|
|
|
THE CDA DISASTER NETWORK
|
|
January 22, 1997
|
|
|
|
|
|
Quietly and without much fanfare, the run-up to the Supreme Court's review
|
|
of the Communications Decency Act has now gotten underway.
|
|
|
|
I have two major pieces of news to report:
|
|
|
|
First, we now know when we'll have our day in the nation's highest court.
|
|
|
|
It's official -- on Wednesday March 19, 1997 at 10 AM, the nine justices of
|
|
the US Supreme Court will hear oral arguments in the case of Janet Reno,
|
|
Attorney General of the United States v. American Civil Liberties Union et
|
|
al. Mark your calendars and datebooks, because March 19 will be a watershed
|
|
moment in the history of free speech on the Internet.
|
|
|
|
In another piece of important news, on Tuesday, January 21, 1997 the US
|
|
Department of Justice filed their first brief in support of the CDA before
|
|
the Supreme Court.
|
|
|
|
(A full text version of the DoJ brief is available at:
|
|
http://www.cdt.org/ciec/SC_appeal/970121_DOJ_brief.html )
|
|
|
|
I received a copy of the DoJ brief last night, and after spending a few
|
|
hours pouring through its 14,000 words, I can promise you that this
|
|
document won't win any literary prizes for 1997.
|
|
|
|
In truth, the thing reads with all the passion of a coroner's report. But
|
|
the cold detachment does nothing to diminish the thinness of the
|
|
Government's argument that the CDA is fully constitutional and that "there
|
|
are no alternatives that would be equally effective in advancing the
|
|
Government's interests" in shielding minors from inappropriate material.
|
|
|
|
Elsewhere, Janet Reno's footsoldiers claim, "Because the CDA's restrictions
|
|
are all facially constitutional, and because any infirmity in those
|
|
provisions could not justify the [Philadelphia] district court's sweeping
|
|
injunction, the district court's judgment should be reversed."
|
|
|
|
How does the Government reach this stunning conclusion?
|
|
|
|
It begins with a bizarre argument that censoring the Internet is an
|
|
effective way to defend the ideals of the First Amendment. The DoJ brief
|
|
says:
|
|
|
|
"Parents and their children have a First Amendment right to receive
|
|
information and acquire knowledge ... and the Internet has unmatched
|
|
potential to facilitate that interest. Much of the Internet's potential as
|
|
an educational and informational resource will be wasted, however, if
|
|
people are unwilling to avail themselves of its benefits because they do
|
|
not want their children harmed by exposure to patently offensive sexually
|
|
explicit material. The government therefore not only has an especially
|
|
strong interest in protecting children from patently offensive material on
|
|
the Internet, it has an equally compelling interest in furthering the First
|
|
Amendment interest of all Americans to use what has become an unparalleled
|
|
educational resource."
|
|
|
|
In other words, the Government's defense of Internet censorship boils down
|
|
to a paternalistic, "tough love" argument that "this hurts me more than it
|
|
hurts you."
|
|
|
|
The DoJ then moves on to cite a 1968 case as justification for the
|
|
provisions of the CDA which prohibit the sending of indecent material to
|
|
children with knowledge that the recipient is under 18:
|
|
|
|
"Those provisions are essentially no different from the prohibition on the
|
|
sale of indecent material to minors upheld in Ginsberg v. New York. Like
|
|
that prohibition, the transmission and specific child provisions [of the
|
|
CDA] directly prevent the dissemination of indecent material to children
|
|
without prohibiting adult access to that material."
|
|
|
|
The problem here is that no viable systems currently exist that allow
|
|
noncommercial Internet publishers to verify the age of individuals
|
|
receiving potentially "indecent" online material. (Consider, for example,
|
|
that as the publisher of this mailing list, it is impossible for me to
|
|
verify how old you are as you read this message.) The DoJ glosses over this
|
|
issue of age verification with a dreamy glance toward the technological
|
|
future, saying:
|
|
|
|
"Those who post indecent material on Web sites for commercial purposes can
|
|
ensure that only adults have access to their material by requiring a credit
|
|
card number or an adult ID. Similarly, operators of noncommercial Web sites
|
|
can use adult verification services for that purpose. There are also ways
|
|
to communicate through other Internet applications that would not expose
|
|
children to indecency. And, as technology evolves, the opportunities for
|
|
adult-to-adult communication of indecent material will expand even further"
|
|
|
|
What will these "opportunities for adult-to-adult communication" look like?
|
|
The DoJ seems to have two scenarios in mind -- both of which seem absurd
|
|
when applied to the Internet.
|
|
|
|
The first assumes that the Internet can be regulated much like broadcast
|
|
television. Citing the 1978 Supreme Court case of FCC v. Pacifica, the
|
|
brief argues:
|
|
|
|
"Just as it was constitutional for the FCC to channel indecent broadcasts
|
|
to times of the day when children most likely would not be exposed to them,
|
|
so Congress could channel indecent communications to places on the Internet
|
|
where children are unlikely to obtain them. Indeed, there is a stronger
|
|
justification for the display provision than there was for the restriction
|
|
approved in Pacifica. The indecency problem on the Internet is much more
|
|
pronounced than it is on broadcast stations."
|
|
|
|
So what is to be done? Here the DoJ moves on to make it's second
|
|
assumption -- that censorship will consign all "indecent" online material
|
|
to an Internet "red light district" that minors cannot enter. Again
|
|
relying on earlier precedents, the DoJ puts forth the idea that:
|
|
|
|
"City of Renton v. Playtime Theatres, Inc. (1986) and Young v. American
|
|
Mini Theatres, Inc. (1976) also support the constitutionality of the [CDA's
|
|
provisions which ban the display of "indecent" material in areas where they
|
|
can be seen by minors]. In effect, the display provision operates as an
|
|
adult "cyberzoning" restriction, very much like the adult theater zoning
|
|
ordinances upheld in Renton and Young. Just as the cities of Detroit and
|
|
Renton could direct adult theaters away from residential neighborhoods, so
|
|
Congress could direct purveyors of indecent material away from areas of
|
|
cyberspace that are easily accessible to children."
|
|
|
|
Of course, the only feasible way to create such a system of "cyberzoning"
|
|
would be to deploy a less restrictive system that uses filtering software
|
|
to facilitate parental control and shield minors from inappropriate online
|
|
material. However, citing the ostensible "wisdom" of Congress, the DoJ
|
|
explicitly rejects this approach:
|
|
|
|
"Congress reasonably determined that commercial software that attempts to
|
|
screen out indecent information only partially addresses the problem. Such
|
|
software cannot identify all existing sexually explicit sites; it cannot
|
|
keep pace with the rapid emergence of numerous new sexually explicit sites;
|
|
it places the entire burden on parents; and it is owned by only a small
|
|
fraction of Americans."
|
|
|
|
Finally, the DoJ challenges the Philadelphia court's decision that the
|
|
CDA's speech restrictions are unconstitutionally vague. (The CDA, you will
|
|
recall, uses criminal penalties to restrict the dissemination of material
|
|
that, "in context, depicts or describes, in terms patently offensive as
|
|
measured by contemporary community standards, sexual or excretory
|
|
activities or organs.")
|
|
|
|
Does that mean that the CDA's "indecency" provisions effectively ban the
|
|
use of George Carlin's so-called "Seven Dirty Words" in cyberspace?
|
|
Classic works of literature that contain sexual content? AIDS education
|
|
information?
|
|
|
|
Sure seems that way. Yet the DoJ wants the Supreme Court to pretend
|
|
otherwise. They argue:
|
|
|
|
"The historical meaning of the CDA's indecency definition and the CDA's
|
|
legislative history indicate that the kind of graphic pictures that appear
|
|
in soft-porn and hard-core porn magazines almost always would be covered,
|
|
while material having scientific, educational, or news value almost always
|
|
would not be covered. There may be borderline cases in which it is
|
|
difficult to determine on which side of the line particular material falls.
|
|
But that does not show that the CDA's definition of indecency is
|
|
unconstitutionally vague."
|
|
|
|
We'll see what the Supremes have to say about all this come March.
|
|
|
|
And in the meantime...
|
|
|
|
Work the network!
|
|
|
|
--Todd Lappin-->
|
|
Section Editor
|
|
WIRED Magazine
|
|
|
|
|
|
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
|
This transmission was brought to you by....
|
|
|
|
THE CDA DISASTER NETWORK
|
|
|
|
The CDA Disaster Network is a moderated distribution list providing
|
|
up-to-the-minute bulletins and background on efforts to overturn the
|
|
Communications Decency Act. To subscribe, send email to
|
|
<majordomo@wired.com> with "subscribe cda-bulletin" in the message body. To
|
|
unsubscribe, send email to <info-rama@wired.com> with "unsubscribe
|
|
cda-bulletin" in the message body.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 15 Dec 1996 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: 10--Cu Digest Header Info (unchanged since 13 Dec, 1996)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #9.04
|
|
************************************
|
|
|