home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Wed Feb 18, 1998 Volume 10 : Issue 12
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Field Agent Extraordinaire: David Smith
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #10.12 (Wed, Feb 18, 1998)
-
- File 1--Cops 'lured' into Net sex and caught
- File 2--ACLU Enters VA Library Internet Lawsuit
- File 3--Ethical Spectacle Joins ACLU Censorware Case
- File 4--Re: CuD 10:11--Comment on ever-continuing CyberSitter thread
- File 5--Re: Cu Digest, #10.11, More on CyberSitter
- File 6--CYBERPATROL BLOCKS DEJA NEWS
- File 7--Call for Contributors to EFF Book on "Cyberlife"
- File 8--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Tue, 17 Feb 1998 19:06:36 -0500
- From: Paul Kneisel <tallpaul@nyct.net>
- Subject: File 1--Cops 'lured' into Net sex and caught
-
- Tuesday February 17 12:32 PM EST
-
- Cops 'lured' into Net sex and caught
-
- SAN FRANCISCO (Wired) - Police in four states say they're the
- victims of what amounts to a cybersex sting in reverse, the
- latest in a string of Internet pornography cases getting
- headlines around the United States.
-
- The News & Observer of Raleigh, North Carolina, reports that the
- officers encountered a 17-year-old Illinois girl in chat rooms -
- and that their email relationships quickly became sexually
- explicit. The girl then told her mother about the contacts with
- deputies in Virginia, North Carolina, Georgia, and Texas, and her
- mother informed authorities in those states. Discipline
- followed.
-
- The chain of events - which included one North Carolina deputy
- sending the girl a photograph of his genitals - led an attorney
- for one of the officers to decry what he suggests was a setup.
-
- "This young woman has gone around the country, as best we can
- determine, and made contact with a very vulnerable element of our
- society - police officers - and then drawn them in and alleged
- some type of sexual misconduct," said Troy Spencer, the attorney
- for one suspended Virginia officer. "She's a cyberspider."
-
- Among other high-profile Net porn cases in the past two weeks:
-
- Voters in Snow Hill, Maryland, recalled their mayor - who is also
- a sheriff's deputy - for allowing his squad car to be used in a
- porno photo shoot. Mayor Craig Johnson was turned in by
- Websurfing local teens who recognized the car.
-
- A 42-year-old San Diego man was arrested February 7 after the FBI
- was tipped off to newsgroup picture files that showed him having
- sex with his 10-year-old daugher. A Jacksonville, Florida, man
- was arrested after technicians working to upgrade his computer
- happened upon pictures of children engaged in sex.
-
- ------------------------------
-
- Date: Fri, 13 Feb 1998 18:19:02 -0500 (EST)
- From: owner-cyber-liberties@aclu.org
- Subject: File 2--ACLU Enters VA Library Internet Lawsuit
-
- Source - ACLU Cyber-Liberties Update
- February 16, 1998
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- ACLU Enters VA Library Internet Lawsuit On Behalf of Online Speakers
-
- In a cyber-law first, the American Civil Liberties Union last week asked
- a federal court in Virginia to rule that the government cannot prevent
- Internet speakers from communicating with interested library patrons.
- Acting on behalf of a diverse group of eight plaintiffs, the national
- ACLU and the ACLU of Virginia are seeking to intervene in a lawsuit over
- the use of Internet filters in Loudoun County libraries.
-
- "This case presents important questions about whether the government can
- prevent Internet speakers from communicating constitutionally protected
- information online to people whose only access to the Internet may be
- their local public library," said Ann Beeson, ACLU National Staff
- Attorney.
-
- The library's Internet policy purports to block access to materials that
- are "pornographic" or "harmful to juveniles." But the ACLU's complaint
- charges that by using blocking software to implement the policy, the
- library board is in fact "removing books from the shelves" of the
- Internet with value to both adults and minors in violation of the
- Constitution.
-
- The eight plaintiffs are:
-
- The Safer Sex Page, created by John Troyer.
- Banned Books Online, created by John Ockerbloom.
- American Association of University Women Maryland (AAUW Maryland).
- Rob Morse, an award-winning columnist for the San Francisco Examiner.
- Books for Gay and Lesbian Teens Youth Page, created by 18-year-old
- Jeremy Myers.
- Sergio Arau, the popular Mexican artist and rock singer known as "El
- Padrino."
- Renaissance Transgender Association, a group serving the transgendered
- community.
- The Ethical Spectacle, created by Jonathan Wallace.
-
- Ultimately, the library controversy may lead back to a landmark Supreme
- Court ruling in Reno v. ACLU, striking down a federal Internet
- censorship law that sought to restrict access to online speech. In its
- sweeping decision, issued in June 1997, the Court confirmed that the
- Internet is analogous to books, not broadcast, and is deserving of the
- highest First Amendment protection. The ACLU was a lead plaintiff and
- litigator in the suit.
-
- The ACLU also won a victory in a recent library blocking software
- controversy that was resolved without litigation. On January 27,
- officials in Kern County, California agreed to allow all library patrons
- to decide for themselves whether to use blocking software, after the
- ACLU warned that mandatory blocking was unconstitutional.
-
- In objecting to the block on their clients' speech, the ACLU's complaint
- noted that websites offering opposing views are not blocked. "For
- example, Defendants do not block sites opposing homosexuality and
- transgender behavior, opposing employment by women outside the home,
- favoring Internet censorship, and promoting abstinence rather than safer
- sex practices."
-
- In related news, Senator John McCain (R-AZ) this week held a hearing on
- .Internet indecency. and introduced new legislation that requires
- libraries and schools that apply for discount funding for Internet
- access to certify that they will provide blocking or filtering features
- for minors. (See discussion below)
-
- Complete information on the ACLU filing in Loudoun County, links to
- plaintiffs' web pages, and related cyber-law cases, can be found on the
- ACLU Freedom Network at <http://www.aclu.org/issues/cyber/hmcl.html>.
- Information about the ACLU victory in Kern County can be found at:
- <http://www.aclu.org/news/no12898d.html>
-
- ===========
-
- About Cyber-Liberties Update:
-
- ACLU Cyber-Liberties Update Editor:
- A. Cassidy Sehgal (csehgal@aclu.org)
- American Civil Liberties Union
- National Office 125 Broad Street,
- New York, New York 10004
-
- The Update is a bi-weekly e-zine on cyber-liberties cases and
- controversies at the state and federal level. Questions or comments
- about the Update should be sent to Cassidy Sehgal at csehgal@aclu.org.
- Past issues are archived at
- <http://www.aclu.org/issues/cyber/updates.html>
-
- To subscribe to the ACLU Cyber-Liberties Update, send a message to
- majordomo@aclu.org with "subscribe Cyber-Liberties" in the body of your
- message. To terminate your subscription, send a message to
- majordomo@aclu.org with "unsubscribe Cyber-Liberties" in the body.
-
- ------------------------------
-
- Date: Thu, 15 Jan 1998 15:25:55 -0800 (PST)
- From: "T.L. Kelly" <room101@TELEPORT.COM>
-
- Looks like this coming session of the US Congress may set the direction
- for intellectual property/freedom of expression, so now's the time for
- those of us in the US to convey our views to our representatives,
- especially while they are in their home districts during the break.
-
- The National Council of Teachers of English and the Conference on
- College Composition and Communication belong to the Digital Future
- Coalition, and the DFC is strongly supporting two bills:
-
- 1. Senator John Ashcroft's "Digital Copyright Clarification and Technology
- Act" (S. 1146) and
-
- 2. Representatives Rick Boucher (D-VA) and Tom Campbell (R-CA) "Digital
- Era Copyright Enhancement Act" (H.R. 3048).
-
- These two bills will protect the future of access to information, to an
- open exchange of knowledge, to the Internet, and to teaching and research
- as we know it. These bills balance and correct much more restrictive and
- punitive legislation that is now being considered in Congress.
-
- Without these bills, we may face a future in which *fair use is abolished*
- in the digital era and in which only teachers and students who can afford
- to "pay-per-browse" can access, quote from, and analyze electronic
- information.
-
- The DFC is urging all its members to contact their House Representatives,
- requesting *co-sponsorship* of H.R. 3048 and their Senators, requesting
- support for S. 1146. Handwritten letters and personal visits are most
- effective.
-
- Please consider visiting your representative's local office while Congress
- is in recess (until Jan 26). And please alert your colleagues and students
- about this important legislation.
-
- A brief summary of H.R. 3048 appears below; more details are available at
- the Digital Future Coalition's website (http://www.dfc.org).
-
- To find out who represents you in Congress, visit
- http://lcweb.loc.gov/global/legislative/email.html
-
- More details on H.R. 3048 follow:
-
- The Boucher-Campbell Bill, H.R. 3048
-
- What Does It Do? Why Does DFC Support It?
-
- Representatives Rick Boucher (D-VA) and Tom Campbell (R-CA) have
- introduced the only comprehensive bill in the U.S. House of
- Representatives that will maintain balance in the Copyright Act by
- preserving for consumers, educators, librarians, researchers, and other
- Netizens fundamental rights in the digital era. Like a similar bill
- introduced by Senator John Ashcroft (S. 1146), this comprehensive,
- balanced bill has the strong support of the DFC. If you agree with us that
- the House of Representatives should adopt the Boucher-Campbell bill
- instead of the legislation proposed by the Clinton Administration (H.R.
- 2281), we encourage you to send an e-mail to your elected Representative
- in the House. (To contact your Representative, click here to connect to a
- Library of Congress compilation of e-mail directories--the site also
- includes a helpful "Who represents me in Congress" section and regular
- mail addresses.)
-
-
- Section 1. The bill is known as the "Digital Era Copyright Enhancement
- Act."
-
- Fair Use. Section 2 would amend section 107 of the Copyright Act to
- reaffirm that a finding of "fair use" may be made without regard to the
- means by which a work has been performed,
- displayed, or distributed. Thus, just as teachers, librarians, and others
- may make "fair use" copies of portions of copyrighted works today in the
- analog world, they may do so tomorrow in the digital world.
-
- Library Preservation. Section 3 would amend section 108 of the Copyright
- Act to allow libraries and archives to use new forms of technology to make
- three copies of endangered materials for archival purposes.
-
- First Sale. Section 4 would amend section 109 of the Copyright Act to
- establish the digital equivalent of the "first sale" doctrine. Under
- current law, a person who has legally obtained a book or video cassette
- may physically transfer it to another person without permission of the
- copyright owner. Section 4 would permit electronic transmission of a
- lawfully acquired digital copy of a work as long as the person making the
- transfer eliminates erases or that copy of the work from his or her system
- at substantially the same time as he or she makes the transfer.
-
- Distance Learning. Section 5 would amend sections 110(2) and 112(b) of the
- Copyright Act to ensure that educators can use personal computers and new
- technology in a broad range of educational settings in the same way they
- now use televisions to foster distance learning. In addition, Section 5
- would broaden the range of works that may be performed, displayed, or
- distributed to include the various kinds of works that might be included
- in a multimedia lesson.
-
- Ephemeral Copies. Section 6 would amend section 117 of the Copyright Act
- to make explicit that electronic copies of material incidentally or
- temporarily made in the process of using a computer or a computer network
- may not serve as the sole basis for copyright infringement liability, such
- as when a work is viewed on the World Wide Web.
-
- Unfair Licenses. Section 7 would effectively preclude copyright owners
- from using non-negotiable license terms to abrogate or narrow rights and
- use privileges that consumers otherwise would enjoy under the Copyright
- Act, such as their fair use privilege, by preempting state common and
- statutory law, such as the proposed changes to the Uniform Commercial
- Code.
-
- Black Boxes. Section 8 would implement the anti-circumvention and
- copyright management information provisions of the WIPO Copyright Treaty
- and the WIPO Performances and Phonograms Treaty. The treaties do not
- require the broad prohibition of software and devices that might be used
- by infringers as proposed in the legislation drafted by the Clinton
- Administration. Consistent with the treaties, section 8 would create
- liability only for a person who, for purposes of infringement, knowingly
- circumvents the operation of an effective technological measure used by a
- copyright owner to limit reproduction of a work in a digital format. The
- bill also would create liability for a person who knowingly provides false
- copyright management information or removes or alters copyright management
- information without the authority of the copyright owner, and with the
- intent to mislead or induce or facilitate infringement.
-
- ------------------------------
-
- Date: Fri, 6 Feb 1998 23:02:57 -0500 (EST)
- From: jw@bway.net
- Subject: File 3--Ethical Spectacle Joins ACLU Censorware Case
-
- HE ETHICAL SPECTACLE JOINS ACLU LAWSUIT AGAINST
- CENSORWARE IN VA. LIBRARY
-
- For immediate release
-
- Contact: Jonathan Wallace
- jw@bway.net
-
- New York, New York, February 6, 1998--The Ethical
- Spectacle, a monthly webzine focusing on the collision between
- ethics, law and politics in our society, is a plaintiff
- in an ACLU litigation filed today against the library
- system of Loudoun County, Virginia. (Spectacle URL:
- http://www.spectacle.org).
-
- "I welcome the opportunity to work with the ACLU
- again," said Jonathan Wallace, a New York-based software
- executive and attorney who is the Spectacle's publisher.
- Wallace was also a plaintiff in two
- other ACLU actions, ACLU v. Reno (which invalidated
- the Communications Decency Act) and ACLU v. Miller
- (overthrowing the Georgia anti-anonymity law.)
-
- Last fall, the Loudoun County board of library
- trustees passed the nation's most restrictive Internet
- policy, mandating the use of censorware on terminals
- used by adults as well as children. Attorney
- Robert Corn-Revere of Hogan and Hartson in Washington D.C.
- filed suit on behalf of nonprofits People for the American
- Way and Mainstream Loudoun, and a group of local parents and
- educators. Today's ACLU action, termed an "intervention"
- in the existing Loudoun litigation, is on behalf of the Spectacle and
- a group of other websites blocked by X-Stop, the software
- from Log On Data Corporation installed by the Loudoun libraries.
- The two actions argue that the use of blocking software
- by public libraries violates the First Amendment.
-
- "I have no idea why Log On blocks my site," Wallace
- said. "It does not meet their criteria of blocking only
- material that is obscene under federal law." Last October,
- Wallace, who writes frequently on censorware issues,
- published "The X-Stop Files"
- (http://www.spectacle.org/cs/xstop.html), an article revealing
- that X-Stop also blocked the Quaker website, the American
- Association of University Women, the AIDS Quilt, and
- numerous other socially valuable sites.
-
- The Ethical Spectacle has also been blocked
- in whole or part by four other censorware products.
- Wallace commented, "This proves that censorware companies,
- and the people who scan the web for sites to add to the
- blacklist, are incapable of distinguishing between
- illegal speech such as obscenity, and protected speech
- about censorship, pornography, safe sex and other
- controversial topics."
-
-
- Wallace is co-author with Mark Mangan of
- Sex, Laws and Cyberspace (New York: Henry Holt, 1996),
- a book about Internet censorship.
- (http://www.spectacle.org/freespch/) He is also a
- member of the Censorware Project, an activist group
- which recently published its first report,
- "From Ada to Yoyo: Blacklisted by CyberPatrol".
- (http://www.spectacle.org/cwp/)
-
- ------------------------------
-
- Date: Tue, 17 Feb 1998 09:42:18 -0800
- From: Joe Clark <jclark@SUPERNET.NET>
- Subject: File 4--Re: CuD 10:11--Comment on ever-continuing CyberSitter thread
-
- Well, <deleted> didn't want to leave his/her name, so I respond to the
- list:
-
- > What I mean is, no one is forcing anyone to actually use Solid Oak's
- > software. If Solid Oak wants to sell an inferior product, let them (we all
- > know another very large company that's been doing this since 1981). Just
- > like the consumer has a right to choose what he buys or not, so should the
- > merchant have the right to sell crap if he so chooses.
-
- Solid Oak has as much right to sell censorware as you and I have to
- defend or decry it. My problem is when -- through clever marketing,
- media hysteria, reactionary protectionism, and witless bandwagoning --
- an information filtering product, using bogus filtering methods and with
- a thinly-disguised political agenda, becomes widely used as a means of
- "protection". There is more danger here than regular system crashes.
- From what I've been able to read, Solid Oak is riding the wave of
- net-porn hysteria to peddle its own conservative agenda. Really useful
- filtering software would be adaptable to the filtering agendas of *any*
- user -- even Wiccans :-) -- instead of reinforcing popular ostrich-ism.
-
- Like, imagine if Windoze was none-too-subtly monarchist, as well as
- bloated.
-
- [And as an aside, has Solid Oak been getting PR ideas with the Co$?]
-
- > While I'm on the subject, I would also like to add that I really don't
- > understand this problem you Americans seem to have concerning the protection
- > of your children against material deemed unfit for their eyes. I mean, it's
-
- Well, it's long been noted that we're excessively and unrealistically
- puritanical about sex, but we *do* love violence, so give us a break.
- :-) "Protect our children" has become an even more strident battle cry
- in recent years because it's one of those unassailable concepts like
- "family values" and "public safety" that can be used as a reactionary's
- lever against the increasingly rapid and chaotic nature of societal
- change. Once you accept the pre-eminence of the concept, any means to
- that end can be justified. From the standpoint of a political
- manipulator, this is valuable; instead of looking like someone who wants
- to restrict freedom of information for long-term political capital, for
- example, one can appear to be a champion of the defenseless.
-
- Understand that, while it probably doesn't live up to the Netopian view,
- the net is dangerous to certain groups in ways wholly different than
- pornography. In the past, centralized publishing/broadcasting (required
- by expensive equipment) resulted in centralized information control.
- That puppy's out the window now -- even dogs have web pages. Also,
- political manipulators, marketeers, and PR craftspersons know the value
- of a slick presence in tweaking the public will -- but
- slickness-of-presence doesn't always require the big clams it used to.
- Groups used to influencing through the media now find their messages
- lost in the herd -- and these groups don't lie down easily, nor do they
- wish to "play along". Remember the days before .com?
-
- > not as if a child will 'accidently' stumble upon some hardcore pornography
- > while just browsing the web; if you find your 10-year old downloading
- > material from sites containing sexually explicit material, you can be sure
- > he/she's doing so by his/her own will, or would you argue that those "press
- > here if you are 18 or older"-buttons got pressed all by themselves ? The
- > same applies to IRC, the child still has to make the decision to actually
- > join a channel where such material is being spread.
-
- I am in general agreement with this, but if you use search engines you
- can get some pretty mixed results. Example: my ten-year-old daughter is
- into the "American Girl" line of dolls. The other day I was looking for
- their website. Try a search for "american girl" on infoseek and tell me
- what most of the hits are! I'm not sure a ten-year-old conducting the
- same search would be able to tell that some of those could lead to
- preview photos that would live long in their memories. Not every
- anatomical macro closeup is buried behind a VISA-card gateway or an 18+
- sign.
-
- In fact, this provides an excellent example of why simplistic
- exclude/include rules, based on keywords, are untrustworthy -- whether
- online, in politics, or inside our own noggins. We naturally tend
- towards simplistic generalizations (else we'd be mighty confused all the
- time) -- but we also naturally tend to fart. It's a question of when
- it's more appropriate not to.
-
- > Basically, I feel that if you cannot trust your child to not actively go out
- > and seek such material, then you should not be letting your child wander
- > about the net unattended. (the same applies to any other medium imo)
-
- True enough. If you don't trust your child not to actively go try to
- buy a Playboy at the convenience store, you should not allow them access
- to print materials. Have I got that right? ;->
-
- --
- Joseph S. Clark http://mailer.fsu.edu/~jsclark
- Systems usability, visual design, documentation, & training
- Administrative Information Systems
- The Florida State University
-
- ------------------------------
-
- Date: Tue, 17 Feb 98 15:04 EST
- From: Michael Gersten <michael@STB.INFO.COM>
- Subject: File 5--Re: Cu Digest, #10.11, More on CyberSitter
-
- This is a reply to "Deleted", who was asking about cybersitter and
- similar products.
-
- Although some companies do make inferior products, those products
- can be reviewed, and checked out -- the product is it's own statement.
-
- Programs like cybersitter, however, do not work that way. You cannot
- tell ahead of time what they will block; often there is no way to
- tell that your site is blocked. Although they claim to do it to
- protect children from "unsuitable" material, that definition is
- arbitrary, and often includes web pages that oppose such software,
- or in some cases, any page hosted on the same site as one "unsuitable"
- page.
-
- And then there's the question of "What makes it unsuitable?". None
- of these programs, and their filtering staff, to my knowlege, makes
- any attempt to describe in any details exactly what they do and do
- not block. There's a good reason, actually -- if they did, and it
- turns out that they were blocking a site that did not meet the
- criteria, then there would be a lawsuit. So, these companies make
- themselves suit-proof, by not making any claims that can be judged
- in court. Nor do they give you any indication of what they actually
- do, and the claims that they do make are vague enough that they
- can get away with almost anything.
-
- The bottom line? An inferior computer can be examined, and rejected
- based on merit. Blocking software cannot be examined, and can only
- be rejected based on ads, and hope. Yet no one is regulating them
- by their ads (I believe this falls under the FTC's jurisdiction,
- yet it seems to be ducking the issue completely).
-
- ------------------------------
-
- Date: Wed, 18 Feb 1998 23:10:52 -0500
- From: Jonathan Wallace <jw@bway.net>
- Subject: File 6--CYBERPATROL BLOCKS DEJA NEWS
-
- NEW CENSORWARE PROJECT REPORT: CYBERPATROL BLOCKS DEJA NEWS,
- A MAJOR RESEARCH TOOL
-
- For Immediate Release
-
- Contact: Jamie McCarthy
- jamie@mccarthy.org
-
-
- February 17, 1998: The Censorware Project, an Internet activist
- group opposing the use of blocking software on First Amendment
- grounds, today released its new report, "CYBERPATROL AND DEJA
- NEWS: Censorware Product Blocks an Important Research Resource",
- available at http://www.spectacle.org/cwp/. In the report, the
- group examines blocking of the Deja News Usenet archive
- (http://www.dejanews.com) by CyberPatrol from Microsystems Corp.
- (http://www.microsys.com).
-
- Susan Getgood, the company's director of marketing for
- CyberPatrol, recently announced that the product would continue to
- blacklist Deja News due to the occurrence of sexual speech on
- Usenet. (Deja News does not permit the downloading of Usenet
- graphics.) In the report, The Censorware Project presents the
- comments of numerous Deja News users--lawyers, authors, law
- professors, public relations consultants, editors and
- programmers--who use the service to research disparate topics such
- as email scams, software bugs, censorship and competitive business
- information.
-
- "Deja News is a quick way to get information on many important
- topics," said Jamie McCarthy, a Michigan software developer who is
- the spokesperson for The Censorware Project. "For example, we
- found that developers use Deja News to get fixes for bugs and
- solutions to programming problems. Many of them told us that Deja
- News is a better place to find information than the software
- vendors' own support pages."
-
- McCarthy noted that CyberPatrol is installed in a number of public
- libraries, including those in Austin, Texas and Boston,
- Massachusetts. "Libraries are in the business of distributing the
- kind of business, technical and current affairs information people
- use Deja News for, not withholding it from their patrons,"
- McCarthy said. "In blocking Deja News, CyberPatrol is again
- throwing out the baby with the bathwater, just as it did when it
- blocked 1.4 million user pages at members.tripod.com because of a
- few explicit pages." The Censorware Project covered the blocking
- of Tripod in its earlier report, "From Ada to Yoyo: Blacklisted by
- CyberPatrol," also at http://www.spectacle.org/cwp/.
-
- "CyberPatrol does not belong in public libraries," McCarthy
- concluded.
-
- -END-
-
- --
- --------------------------------------
- Jonathan Wallace jw@bway.net
- Publisher, The Ethical Spectacle, http://www.spectacle.org
- Co-author, Sex Laws and Cyberspace (Henry Holt, 1996)
- http://www.spectacle.org/freespch
-
- "We must be the change we wish to see in the world."--Gandhi
-
- ------------------------------
-
- Date: Mon, 16 Feb 1998 20:19:37 -0800 (PST)
- From: Mike Godwin <mnemonic@well.com>
- Subject: File 7--Call for Contributors to EFF Book on "Cyberlife"
- Call for Contributors to EFF Book on "Cyberlife"
-
- CALL FOR AUTHORS TO CONTRIBUTE TO EFF BOOK ABOUT "CYBERLIFE"
-
- (Please feel free to reproduce this call in any online forum and on any
- mailing list.)
-
- The Electronic Frontier Foundation and the Freedom Forum Media Studies
- Center are soliciting your contribution to a book project titled CYBERLIFE:
- THE TRANSFORMATIVE POWER OF ONLINE SOCIETY. This book will consist primarily
- of first-person accounts from people like you -- stories about the
- experiences people commonly have when encountering online forums, virtual
- communities, the World Wide Web, and the immense scope of freedom of speech
- in cyberspace. The book will be edited by Mike Godwin, staff counsel of EFF
- and fellow at the Media Studies Center (a project funded by the Freedom
- Forum), and should be completed by fall of 1998.
-
- -->Why assemble a book like this?
-
- There are two reasons that we have chosen to take this approach. First, the
- strength of the Net is its ability to give voice to individuals without
- having those voices translated or transmuted by editors or by traditional
- media institutions. While this book has an editor, his role will be
- primarily to choose contributions and help those contributors in preparing
- their texts. WeUre trying to combine the best aspects of the book-publishing
- world (permanence, reach into mainstream audiences) with those of the Net
- (diversity, disintermediated points of view).
-
- Second, other books about the Net tend to be written from a single
- viewpoint, and, as such, have been inadequate in countering the mainstream
- media's tendency to paint the Net as primarily a haven for pedophiles,
- hackers, terrorists, and other threatening people.
-
- For a more detailed discussion of the focus of this book, see "True Stories
- of Free Speech in Cyberspace," the prospectus for CYBERLIFE, appended to the
- end of this call for authors.
-
- -->Why should I want to contribute?
-
- One reason to contribute is to tell your story about your own experiences in
- cyberspace -- a story that may not have been told in previous books, or in
- accounts in other media. If you feel that TV, newspapers, and magazines have
- distorted the picture of cyberspace -- especially in the eyes of those who
- have not yet logged on -- this your change to help correct the record.
-
- Another reason is that you may have wanted to contribute to the Electronic
- Frontier Foundation and its work, but may not have had the money to do so.
- Since this book will be owned by EFF, its earnings will contribute to EFF's
- operation -- to the extent that you can help make this book better, you can
- help EFF remain in the black and do good work for freedom and privacy in
- cyberspace.
-
- Whether or not your contribution is included in the final volume, any
- contribution of a thousand words or more will earn you a one-year membership
- in EFF. And if your contribution is included, you'll get a membership no
- matter how long your contribution is.
-
-
- -->What kinds of things should I talk about?
-
- We'd like to hear how the Internet has had an impact on your life, and what
- different directions you might have taken because of this powerful medium.
- What would you change about it if you could? What do you think about
- government attitudes about cyberspace, and how do you feel about media
- treatment? What do you think about social attitudes in general toward the
- internet?
-
- WeUre also interested in what kinds of things you want people to know about
- your experiences of the online world, and about cyberspace in general.
-
- -->What about my copyright? Will EFF own my words? Will I be able to
-
- republish my story elsewhere?
-
- EFF will hold only a nonexclusive license to print your story in the book
- CYBERLIFE and to use it in subsequent Web-based or TV projects. You will
- retain the primary rights to your story, and you will not be restricted in
- how you use them. (You could sell the story to a magazine, for example.) Our
- interest is not in possessing your words but in enabling you both to
- contribute to EFF and to improve general understanding about cyberspace.
-
- -->How long should my story be? If EFF chooses to use it, will be it edited
-
- or changed?
-
- Your contribution can be as long as you like. Take as much space as you need
- to tell your story (or stories). Our editor, Mike Godwin, may in fact ask
- you to elaborate on parts of your contribution. Our experience has been that
- most people who spend a lot of time in the online world are articulate
- writers and have a pretty good idea about how to tell their stories. MikeUs
- role as editor, other than to make help each writer tell his or her story in
- the clearest possible way, will be a supervisory one. We expect a certain
- amount of give-and-take concerning editorial suggestions, but the spirit of
- this project is to allow individuals, as much as possible, to tell their
- stories in their own voices, expressing their own concerns.
-
- -->Who is this Mike Godwin guy?
-
- For more information on Mike, see http://www.eff.org/~mnemonic .
-
- -->Is there any information about myself that I have to include?
-
- You can choose to be totally anonymous if you like, although of course this
- would mean we can't give you an EFF membership (we wouldn't know where to
- send the card). Or you can choose to tell us who you are, but ask that your
- name not be included in the book. We'd prefer to know who you are, of
- course, and we definitely want to know something about your background --
- things like how old you are, what you do for a living, your feelings about
- work, life, and cyberspace, and any other biographical information you want
- to share with us, or that you think might shed light on your story.
-
- -->Where do I send my story?
-
- You can send questions or stories to Mike Godwin at either mnemonic@eff.org
- or mgodwin@mediastudies.org. Please include your location and phone number
- so that Mike can contact you quickly about whether and how your contribution
- may be used. Please also include address information for your EFF
- membership.
-
- You may also post your contribution in a one of the CYBERLIFE topics on the
- WELL or on ECHO and share it with users at one or both of these systems. But
- please e-mail Mike if you do so he knows to go there to retrieve your
- contribution.
-
-
- -->How will I know whether my contribution will be used?
-
- You will be notified of the receipt of your manuscript as soon as we can do
- so. Mike Godwin or his assistant will contact you within 30 days of receipt
- of your contribution to tell you whether it will be included in CYBERLIFE.
-
- -->What is EFF anyway? And what is the Freedom Forum Media Studies Center?
-
- The Electronic Frontier Foundation is a non-profit civil liberties
- organization working in the public interest to protect privacy, free
- expression, and access to public resources and information online, as well
- as to promote responsibility in new media. You can find out more about our
- work by looking at our Web site, http://www.eff.org.
-
- The Freedom Forum is a nonpartisan, international foundation dedicated to
- free press, free speech and free spirit for all people. Its mission is to
- help the public and the news media understand one another better. For more
- information about the Media Studies Center, a project operated by the
- Freedom Forum, see http://www.mediastudies.org.
-
-
-
- -----------------------------------------------
-
- CYBERLIFE: TRUE STORIES OF LIFE AND FREE SPEECH IN CYBERSPACE
- A prospectus by Mike Godwin
-
- I. There is a story about the Internet that is not being told. It is a
- story that has not appeared much in the tradtional news or entertainment
- media, both of which have oscillated in only the last four or five years
- from a utopian vision of the Net to a reflexively anxious and scapegoating
- one. Yet it is a story that urgently needs to be told very soon -- we need
- to tell it to each other as much as we need to tell it to our leaders and
- policymakers -- because we are currently creating the consensus that will
- govern whether and how our society will come to terms with a medium that
- gives ordinary people the power to routinely communicate with mass
- audiences.
-
- II. The Two Internets We Know
- A. Computer-based communications were (fore)seen in the 1970s and 1980s
- to be a catalyst for widespread social change.
- 1. The potentially huge social impact of the Internet -- the
- first mass medium in the history of the planet to be accessible on a
- widespread basis to ordinary citizens -- was foreseen at least one or two
- decades ago, depending on where you count from. It was arguably foreseen by
- sociologists Starr Roxanne Hiltz and Murray Turoff in their 1976 book
- NETWORK NATION, the first scholarly account of online social evolution,
- although their work precedes the appearance of the Internet as we know it
- today.
- 2. The revolutionary character of the Internet rests primarily
- on the fact each citizen, at least potentially, will have the power to reach
- audiences of a size that used to be reachable only by capital-intensive
- media institutions -- most notably, newspapers, mass-market magazines, and
- television.
- 3. A secondary, but nevertheless important, consequence of the
- Internet is that it becomes possible for individuals to access
- disintermediated content from anyone else on the Net.
- B. The first wave of stories about the Net to appear in mainstream mass
- media were essentially positive -- "the information highway" was seen as a
- boon similar to that of the interstate highway system, or perhaps even the
- printing press. (Sen. Gore _fils_ , writing about the "national information
- infrastructure" in SCIENTIFIC AMERICAN and elsewhere, liked to evoke the
- highway system, a project sponsored by Sen. Gore _pere_ decades before.) The
- push was on to connect every school, library, hospital, and home to the Net.
- 1. This wave of enthusiasm was accelerated by the development
- of the World Wide Web. The Web represented only one way a content
- producer/publisher could use the Internet. But perhaps because of its
- conceptual and functional similarity to traditional one-to-many publishing
- (newspapers, books, TV stations), the Web caught on rather more quickly than
- distributed conferencing systems -- which provided truly interactive "many-
- to-many communications" -- such as Usenet and Compuserve had done. So the
- Web soon displaced the other uses of the Internet, except perhaps for e-
- mail, in the public mind, even as it supercharged a new flood of people and
- capital to the Net.
- 2. Result: in the course of a two or three years, our society
- went from (typically) not knowing what a URL is to routinely placing URLs on
- billboards, in magazine advertisements, and even on the sides of city buses.
- C. The second wave of stories about the Net underscored how volatile
- the initial social enthusiasm had been. Like the tulip craze in Holland, the
- sudden Internet boom in the collective American awareness was headed for an
- equally sudden bust. As with many other new technologies, the blessings of
- computer communications were not unmixed. And the gap between a) the early
- utopian predictions about the Net as an unqualified social good and b) the
- Net as it really is, led to a backlash, both in the mainstream media and in
- the public mind generally. The Net, which had been lavishly praised for its
- potential to put the full measure of the First Amendment's speech and press
- freedoms into any individual American's hands, began to be seen as a threat
- -- precisely for the same reason!
- D. Traditional journalism and journalists did not function as a
- corrective to either of these oscillating social perceptions of the Net. In
- fact, they typically reflected and reinforced them. The Net is now often
- seen as a functioning primarily as a conduit for pornography, a zone of
- predation for pedophiles and stalkers, a resource for bomb-planting
- terrorists, a hideout for conspiring criminals, a threat to the ability of
- authors and publishers to be paid for their work, a source of knockoff,
- worthless pseudojournalism, a free-fire zone in which no one's morality, no
- one's children, no one's intellectual property, no one's privacy, no one's
- knowledge about the larger world can reasonably be thought to be relatively
- safe, even for a moment. Examples of news media's reinforcement of this
- view:
- 1. TIME's cover story endorsing a "cyberporn" study that later
- turned out to be a hoax.
- 2. The overwhelming passage of the Communications Decency
- Amendment, recently overturned by the Supreme Court for being, among other
- things, unconstitutionally overbroad.
- 3. The routine assumption in several press institutions that
- there is a link between the bomb attack at the Olympics in Atlanta last
- summer and the Internet, and the law-enforcement community's unsubstantiated
- statements that reinforce that perceived link.
- 4. The singling out of any computer-communications element to a
- news story -- no matter how ancillary it is to the essence of the story --
- in order to make it more sensational. See, e.g., the New York Post's
- creation of the "Internet rapist" story last summer, based on upon the
- perpetrator's having met his victim first in an America Online chat room,
- and the national media's abortive attempt to characterize the "Heaven's
- Gate" suicides as being somehow linked to, or facilitated by, the cult's use
- of a Web site. (TIME's cover copy: "The Web of Death.")
-
- III. The Internet We Don't Know
- A. It can fairly be said that we know the Net is not the catalyst for
- utopia that it was once touted as being -- the very fact that people were so
- quickly able to find aspects of the Internet to complain about proves this
- point handily.
- B. But the picture of the Net as it is characterized in the current
- backlash is also a misrepresentation, and perhaps even more so. For one
- thing, the Net as a source of new terrors cannot be the same Net that
- continues to inspire millions of new users to log on for the first time
- every year, often for reasons they themselves can barely articulate.
- C. My thesis is that the Net has, for most of its participants, played
- a transformative role -- providing individuals with new opportunities, new
- connections with other people, new interests, and even new communities.
- These individuals' accounts of their experiences vary in their particulars,
- but they tend to have in common the fact that their use of the Net has
- changed their lives in some fundamental ways ... and that the changes have
- mostly been positive.
- D. If the current myth of the Net is that it is a place where, within
- minutes of logging on, one is confronted with offers of pornography or with
- rude propositions or with invasions of one's privacy, then it is long past
- time to generate the "counter-myths of the Net" -- the near-archetypal (yet
- true) stories that so many "netizens" have in common with each other. These
- stories have to become as much a part of our collective perception of the
- Net as the horror stories already have done, if only because the social
- consensus necessary for preserving freedom of expression on the Net depends
- upon a majority of us recognizing and being able to articulate what it is
- that we value in it.
-
- ------------------------------
-
- Date: Thu, 7 May 1997 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 8--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- In ITALY: ZERO! BBS: +39-11-6507540
-
- UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
- Web-accessible from: http://www.etext.org/CuD/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #10.12
- ************************************
-
-
-