home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 45.5 KB | 1,002 lines |
-
- Computer underground Digest Sun Mar 19, 1995 Volume 7 : Issue 22
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Semi-retiring Shadow Archivist: Stanton McCandlish
- Correspondent Extra-ordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Monster Editor: Loch Nesshrdlu
-
- CONTENTS, #7.22 (Sun, Mar 19, 1995)
-
- File 1--CuD Listserv at UIUC having some problems
- File 2--Cliff Stoll can't say that: "Silicon Snake Oil" reviewed
- File 3--RE: File 4--S. 314, Realism, Unanswered Questions (fwd)
- File 4--J. Baker/U of Mich Speech Case -- Chic Trib Excerpt)
- File 5--Campaign to Defeat Comm. Decency Act (Mar 17 Update)
- File 6--Reprint of Textof SB 314
- File 7--Cu Digest Header Info (unchanged since 19 Mar, 1995)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Fri, 18 Mar 1995 15:24:43 (CST)
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 1--CuD Listserv at UIUC having some problems
-
- The UIUC Listserv continues having some problems. People subscribing to
- CuD with standard internet addresses should be relatively
- unaffected. Those with BITNET addresses will likely not
- receive CuD this (or next) issue.
-
- This means that folks unsubbing, whether through us or through the
- listserv, may not get unsubbed for a few more days. Those adding
- directly through the listserv should wait a few days, and then
- re-submit the request.
-
- Jim
-
- Sorry for the inconvenience.......
-
-
-
- Jim and Gordon
-
- ------------------------------
-
- Date: 19 Mar 95 14:42:00 EST
- From: George C. Smith <70743.1711@compuserve.com>
- Subject: File 2--Cliff Stoll can't say that: "Silicon Snake Oil" reviewed
-
- "CLIFF STOLL CAN'T SAY THAT, CAN HE?" or NOTHIN' BUT GOOD TIMES
- AHEAD IN "SILICON SNAKE OIL"
-
- I don't know if Cliff Stoll ever met historian Christopher Lasch, but
- if he did they certainly would have had a lot to talk about. Just
- before his death, Lasch closed his last book, "The Revolt of the
- Elites" with a biting assessment of the current mania with technology:
-
- "Those wonderful machines that science has enabled us to construct
- have not eliminated drudgery, as . . . other false prophets so
- confidently predicted, but they have made it possible to imagine
- ourselves as masters of our fate. In an age that fancies itself as
- disillusioned, this is the one illusion - the illusion of mastery that
- remains as tenacious as ever."
-
- Stoll's "Silicon Snake Oil: Second Thoughts on the Information
- Highway" (Doubleday) is steel-plated with the same underlying idea,
- that much of what is said blindly exTOLLing <heh-heh, couldn't resist>
- networks, interconnectivity and computing is illusory - at best
- exaggerated, at worst, completely fabricated. Of course, there have
- been other books which hoe the same row. Lauren Ruth Wiener's
- "Digital Woes" and Theodore Roszak's The Cult of Information," both
- excellent, come to mind. But neither deliver the same engaging
- personal style Stoll effortlessly inserts into "SSO" which is a
- greater read for it.
-
- The book deals directly with the mysterious mental disease that is now
- infecting large numbers of seemingly rational and very vocal people:
- That computers are the new philosopher stones of American society,
- capable of transforming the lead of inequality, crumbling public
- education; unresponsive, corrupt political processes; stagnant career
- opportunity; or the moribund sex life into different varieties of
- revitalized techno-alchemical gold. And it means for the greater part
- of the making of "Silicon Snake Oil," Stoll must have been sleeping
- with his bullshit detector plugged in. However, he's more gracious,
- calling it his "bogometer."
-
- To wit:
-
- "In physics, you measure the brightness of light with a photometer and
- voltages with a voltmeter. Bogosity -- the degree to which something
- is bogus - is measured with a bogometer," Stoll writes.
-
- "Alan November, a consultant for the Glenbrook high schools in
- Illinois, believes that today's students are in the test preparation
- business. In the May/June 1994 issue of _Electronic Learning_, he
- says that pupils will soon build information products that can be used
- by clients around the world. Teachers, in turn, will become brokers
- 'connecting our students to others across the nets who will help them
- create and add to their knowledge.' That one pegged my bogometer."
-
- Mine too.
-
- Passages like these are a delight to the closet curmudgeon. A mere
- thirty pages earlier, Stoll notes "I've also noticed that the computer
- cognoscenti hang on to their jobs by creating systems where they are
- at the chokepoints of the organizations. Workers who don't know
- computers get trampled, discounted or pushed to the side."
-
- As for information being free? Bah, Stoll indicates. "I hear this
- from those who duplicate software or break into computers. It's
- techno-Marxism -- abolish private property and we'll all be happy."
- The Free Software Foundation, writes Stoll, claims "that copyrights
- harm society by preventing the free flow of information." You can
- tell he doesn't believe much of it. Slogans and cyber-aphorisms of
- this nature are conveniences in 1995, usually used to rationalize the
- process of someone else, but never the individual spouting said
- cliches, being ripped off.
-
- I would suspect little, if any, of this will endear Stoll to the
- disciples of the church of Toffler now encamped within the gilded
- walls of the mainstream media. That's good. He also has doubtless
- alienated the cypherpunks movement by essentially stating that while
- their technical accomplishments are neat, the problem they're trying
- to solve - the preservation of information privacy through the employ
- of cumbersome, almost unusable anonymous remailers and cumbersome,
- almost unusable encryption technology - looms trivial in the global
- picture. In fact, "Silicon Snake Oil" gores so many sacred cows in
- cyberspace it's guaranteed the author will be regarded like a
- dysenteric hog loose in the streets of Mecca on some parts of the net.
-
- That would be a shame because "Silicon Snake Oil" has genuine heart.
- There's not a mean bone in it; neither will you find the sour breath
- of the corrosive cynic. Paradoxically, Stoll confounds the reader's
- expectations by appearing to be a hopeless romantic in everyday life,
- and, by contrast, the nets, where he is up to his neck in connections
- and still very obviously in love with the pulse of the cursor. In the
- end, "Silicon Snake Oil" is saying the future could be a pretty dim,
- brutish place if we trade the critical and analytical capacity, stuff
- that ain't broke, a real voice on the end of the telephone line or the
- tough teacher for the newest software, indigestible floods of
- valueless, curiosity-numbing information or glib futurology that is
- simply faster and louder than real life. That's a great message from
- a killer of a book.
-
- [George Smith is the author of "The Virus Creation Labs"
- (American Eagle).]
-
- ------------------------------
-
- Date: Sat, 18 Mar 1995 00:35:45 -0600 (CST)
- From: Computer Underground Digest <cudigest@SUN.SOCI.NIU.EDU>
- Subject: File 3--RE: File 4--S. 314, Realism, Unanswered Questions (fwd)
-
- Bruce Johnson <JOHNSON@tonic.pharm.arizona.edu> wrote:
-
- Tim King 'sez
-
- >>Brad Hicks wrote:
-
- >> If you want it to be legal for people to use [the Internet for
- >>
- >> would be illegal over a phone line under the existing law]...
- >> well, then say so!
-
- >>To which Rhys Weatherley replied:
-
- >> Very few free speech supporters, myself included, want that
- >> kind of crap distributed on the Internet or anywhere...
-
- >Um... Er... This does seem to be the point. The question is not
- >whether anyone _wants_ it to happen. I'm sure that no one _wants_ it
- >to happen. The question is whether or not "you want it to be legal."
-
- This is classic sensitive waffling on free speech...everyone is in
- favor of it, but they'd really rather that it be restricted to speech
- they're comfortable with. If no one_wants_it to happen, then why are
- the alt.binaries and alt.sex groups consistently in the highest
- traffic and usage groups on the net? The whole point of the
- exepmtion of common carriers from obscenity laws to date is to allow
- them to operate, period; as any efforts at censorship will run them
- afoul of the various Electronic Privacy acts, such as the Wiretap
- Act. S.314 requires operators of BBS's and Net services to
- excersise just suchcensorship, to protect themselves from liability.
- Yet they are, in all senses of the word, common carriers...you do not
- have to be a giant monopolistic corporate entity to be one. They are
- providing a connection service, not a content service; there is no
- legal reason on earth that they should have to be responsible for the
- content of what they are conveying, any more that the phone company
- is. Drug deals, insider trading, and even murder conspiracies are
- conducted by phone every day, yet the phone company is not held as a
- co-conspirator, nor are they held on liability charges for the
- millions of sex-line calls made using their networks each day.
- However, this is precisely what this proposed law is setting out to
- do for computer networks. This bill is a chilling attack on out
- first amendment rights using a convenient scapegoat (remember no one
- really _wants_ people to be passing around pornography) in a new, and
- largely legally uncharted communications medium. Were I to go in for
- conspiracy theory, I'd almost suspect that the large telcos were
- behind this bill...it removes a heck of a lot of competition, and
- when they finally bring networking to the unwashed masses, they'll
- have their historical protections as common carriers and phalanxes of
- lawyers, congress-critters and pr flacks to throw against it.
-
- ------------------------------
-
- Date: Thu, 16 Mar 1995 18:28:56 -0600
- From: cud@SUN.SOCI.NIU.EDU(CuD Moderators)
- Subject: File 4--J. Baker/U of Mich Speech Case -- Chic Trib Excerpt)
-
- Source: The Chicago Tribune, 12 March, 1995 (Perspective Section, p. 1)
- By: Joan H. Lowenstein
-
- HOW FREE IS SPEECH IN CYBERSPACE?
-
- While other University of Michigan students worked on their tans
- over spring break, one sophomore sat in a federal prison cell
- typically occupied by extortionists and drug dealers.
-
- The U.S. attorney in Detroit argued that 20-year-old Jake Baker was
- a time bomb-so likely to commit a serious crime like rape or murder
- that he shouldn't be allowed out of jail.
-
- Baker, who was finally released on bail Friday, says he's a
- political prisoner, a 1st Amendment hero who is being punished for
- testing the limits of free speech in cyberspace. His lawyers say he
- spent a month in jail for a crime that may consist of nothing more
- than exceptionally bad manners.
-
- They may be right.
-
- ((The story summarizes the case -- see CuD # for details))
-
- Sex on the information superhighway is no different from sex on the
- old information dirt roads like books and magazines. But the risk of
- the unknown can be scary, and people typically react to new
- communication technologies by trying to rein them in.
-
- The advent of the printing press so stunned the medieval Catholic
- Church that it had to create an imprimatur to control the output of
- all texts. When radio became popular, Congress passed laws that made
- sure the government could control the airwaves in case of war. And
- more recently, the proliferation of cable television has sparked
- legislation-so far unsuccessful-that attempts to regulate sex and
- violence.
-
- ((The reporter provides an accurate summary of SB 314 - the "Decency"
- Bill))
-
- Ironically, had the University of Michigan acted quietly to
- determine whether anyone was really in danger, alt.sex.stories readers
- might never have known that the victim in Baker's story was a real
- person. But instead, university President James Duderstadt summarily
- suspended Baker from school, bringing on considerable media attention
- and revealing the woman.
-
- ((The story provides additional information on the background -- see
- CuD #)).
-
- A Detroit federal grand jury has since indicted Baker for violating
- Section 875(c) of the U.S. Criminal Code: "Whoever transmits in
- interstate or foreign commerce any communication containing any threat
- to kidnap any person or any threat to injure the person of another
- shall be fined not more than $1,000 or imprisoned not more than 5
- years, or both."
-
- Citing his "gut feeling" that he wouldn't want his daughter out on
- the streets if Baker were set free, a federal magistrate in Detroit at
- first denied bond.
-
- The case has attracted attention because it's the first time the
- federal government has made an Internet posting the subject of the
- anti-threat law. But the medium is not as important as the message in
- determining the merit of Baker's primary defense-that he was
- exercising his 1st Amendment right to freedom of expression.
-
- ((The story summarizes and excerpts parts of the story from the
- indictment))
-
- It's not the first time a person charged under the threat statute
- has claimed exaggerated or offensive language shouldn't be punished.
- In November 1974, when PLO Chairman Yasser Arafat was scheduled to
- address the United Nations in New York, Jewish Defense League member
- Russell Kelner called a news conference and, in response to a question
- from a television reporter, said, "We are planning to assassinate Mr.
- Arafat, just the way any other murderer is treated."
-
- ((The story summarizes the case, noting that the US Supreme Court drew
- on a 1969 decision upholding a statute prohibiting threatening the
- President of the US)).
-
- Jake Baker's conduct doesn't begin to reach the severity of true
- threats punished under this rarely used statute.
-
- In one case prosecuted under the law, the threatening language was,
- "I am going to blow your brains out." In another, a woman's
- ex-boyfriend left a message on her answering machine that said, "Your
- husband's health will take a turn for the worse and you will be
- widowed."
-
- Although the woman he named in the fictional story could bring a
- civil suit against him for invasion of privacy or infliction of
- emotional distress, it seems unlikely that prosecutors will be able to
- show that Jake Baker made the kind of unequivocal and immediate threat
- the courts have required for conviction on the criminal charge.
-
- ((A brief discussion of internet participation deleted)
-
- Baker's case has been assigned to Detroit Federal Judge Avern Cohn,
- a jurist who has often shown his sensitivity to the 1st Amendment.
-
- Five years ago, Cohn severely chastised the University of Michigan
- for enacting a speech code that violated the free speech rights of its
- students.
-
- Although it can foist some of the blame on the FBI, the university
- soon may have to extend its wrist before the judge once again.
-
- ------------------------------
-
- Date: Sun, 19 Mar 1995 14:08:03 -0600
- From: Stephen Smith <libertas@COMP.UARK.EDU>
- Subject: File 5--Campaign to Defeat Comm. Decency Act (Mar 17 Update)
-
- CAMPAIGN TO STOP THE US COMMUNICATIONS DECENCY ACT (S. 314/H.R. 1004)
- (Note this is not the electronic "defeat S314" petition)
-
- Update: - Telecomm Reform bill scheduled for markup Thu 3/23/95
- - Sen. Leahy (D-VT) expresses "serious concerns", seeks
- alternatives that protect free speech
- - Coalition Internet campaign has an impact
-
- PLEASE WIDELY REDISTRIBUTE THIS DOCUMENT WITH THIS BANNER INTACT
- DO NOT REDISTRIBUTE AFTER MAY 1, 1995
- DO NOT REPRODUCE THIS ALERT IN NON-POLITICAL FORUMS
- Mar. 17, 1995
-
- Distributed by the Voters Telecommunications Watch (vtw@vtw.org)
- ---------------------------------------------------------------------
-
- [3/17/95:
- Yet even more organizations have joined us. Welcome aboard!
-
- Next week (Mar 23, 1995) the telecomm reform bill will be marked up in
- the Commerce committee. If the Communications Decency Act is added to
- the reform bill as an amendment, it will be *very difficult to stop*.
- The result of this bill becoming a law will be to change the nature of
- the Internet as we know it. The volume of information we take for
- granted will slow to a trickle.
-
- Win this battle, and we've won the fight for this year and stopped the
- bill. Lose it and we'll be on the ropes in the Senate for the rest
- of the session.
-
- Only you can make the difference, and it will only take two minutes.
-
- -Shabbir]
-
- ---------------------------------------------------------
-
- In order to use the net more effectively, the following organizations
- have joined forces on a single Congressional net campaign to stop the
- Communications Decency Act, S. 314 (in alphabetical order):
-
- the American Civil Liberties Union (ACLU),
- the American Communication Association (ACA),
- the Center for Democracy and Technology (CDT),
- the Center for Public Representation (CPR),
- the Computer Communicators Association (CCA),
- the Computing Professionals for Social Responsibility (CPSR),
- the CyberQueer Lounge, an online resource for the gay community,
- the Electronic Frontier Foundation (EFF),
- (Note the above DC-based EFF has no local chapters)
- the Electronic Frontier Foundation-Austin (EFF-Austin),
- the Electronic Frontiers Australia, (EFA)
- the Electronic Frontiers Houston, (EFH)
- the Electronic Privacy Information Center (EPIC),
- the Florida Coalition Against Censorship (FCAC),
- the Hands Off! the Net petition drive,
- the National Coalition Against Censorship, (NCAC)
- the National Libertarian Party, (NLP),
- the National Public Telecomputing Network (NPTN),
- the National Writers Union (UAW Local 1981 AFL-CIO), (NWU)
- the People for the American Way (PFAW),
- the Society for Electronic Access (SEA), and
- the Voters Telecommunications Watch (VTW)
-
- These organizations are using the Voters Telecommunications Watch (VTW)
- as a conduit for legislative feedback. When you contact Congress about the
- Communications Decency Act and send your feedback to vtw@vtw.org, that
- information is being fed back to all participating organizations.
-
- If your organization would like to sign on to this campaign and receive
- legislative feedback, contact vtw@vtw.org. (Note the Fidonet and FTN
- mailing directions below)
-
- -------------------------------------------------------------
-
- CONTENTS
- What you can do
- Introduction
- Background
- Current status of S. 314/H.R. 1004
- Where can I learn more about the bill? (URL & Fidonet/FTN included)
- Where will I learn about updates to this alert?
- Current list of participating organizations
-
- ---------------------------------------------------------------------
- WHAT YOU CAN DO (IN ONLY TWO MINUTES)
-
- 1. Contact Sen. Larry Pressler (R-SD, Commerce Committee Chairman),
- Sen. J.J. Exon (D-NE, sponsor of the bill), and Sen. Bob Packwood (ROR,
- Chairman, Communications Subcommittee).
-
- Note: although contacting your own Senators is important, these
- members hold the keys at this point in time. If you want to contact
- your own Senators, that's great, but between now and Thursday Pressler,
- Exon and Packwood are the ones to focus on.
-
- Time is of the essence: *Phone calls* are best, faxes only partially
- effective, email has the least impact.
-
- P ST Name and Address Phone Fax
- = == ======================== ============== ==============
- R SD Pressler, Larry 1-202-224-5842 1-202-224-1259*
- 243 RSOB larry_pressler@pressler.senate.gov
- Washington, D.C. 20510
- *Note this is the Senate Commercommittee's fax machine
-
- D NE Exon, J. J. 1-202-224-4224 1-202-224-5213
- 528 HSOB
- Washington, D.C. 20510
-
- R OR Packwood, Robert 1-202-224-5244 1-202-228-3576
- 259 RSOB
- Washington, D.C. 20510
-
- Urge them to keep S.314 from being incorporated into
- telecommunications reform legislation and to support Senator Leahy's
- efforts to explore alternatives to the Exon bill. Follow the communique
- at the bottom if you need to.
-
-
- 2. Feel free to use the following communique:
-
- SAMPLE COMMUNIQUE
-
- I'm a resident of _______. Please support Senator Leahy's
- efforts to explore alternatives to S. 314. Please keep S. 314
- out of the telecommunications reform bill, and remove S. 314
- from the fast track.
-
- Thanks.
-
-
-
- See below for a brief description of Leahy's initiative. His letter
- to CDT is in the VTW gopher.
-
- Concern over S.314 is not limited to the U.S. Among many international
- expressions of support, two have stood out in the first two weeks.
- EF-Australia is a member of the growing coalition, and IndiaNet has
- circulated our alert widely. If you are not a citizen of the United States
- you can still express your concern. A sample message to Senator Pressler
- follows:
-
- Dear Senator Pressler:
-
- The Exon bill will cripple the U.S. portion of the Internet
- and thereby devastate the growing global information community.
- Internation commerce and social and political cooperation will
- suffer greatly. I urge you to refrain from incorporating S.314
- into any telecommunications reform legislation and to support
- Senator's Leahy initiatives to explore alternatives to S314.
-
- Both US citizens and non-US citizens should remember to be polite
- when speaking to legislators, even their own.
-
- 3. DON'T FORGET TO DROP A NOTE TO VTW@VTW.ORG to tell us who you contacted.
- (See below for FTN -> Internet emailing instructions.)
- We'll tally the results and feed them back to all participating
- organizations. It's crucial we have this feedback, even if you just
- got a form letter, or a "thank you" to your phone call.
-
- Please, when you report back, tell us what state you are in! This
- will help us track constituent calls, which are the most effective.
-
- 4. Feel good about yourself. You've just participated in democracy
- without leaving your seat.
-
- 5. (Extra bonus activism) Pass this alert to your friends, especially if
- they're in South Dakota, Nebraska, or Oregon. These states need to
- have as much constituent contact with their Senators as possible.
-
- Also, you might send a thank-you note to Sen. Patrick Leahy (D-VT) for
- his continuing efforts on behalf of free speech and the free flow of
- information in cyberspace. He can be reached at:
-
- P ST Name and Address Phone Fax
- = == ======================== ============== ==============
- D VT Leahy, Patrick J. 1-202-224-4242 1-202-224-3595
- 433 RSOB senator_leahy@leahy.senate.gov
- Washington, D.C. 20510
-
- Don't forget to Cc: vtw@vtw.org on your mail to him, so we can tally
- the response.
-
- ---------------------------------------------------------------------
- INTRODUCTION
-
- Dear Net Citizens:
-
- Legislation has been introduced before the Senate which would severely
- restrict your freedom of speech, halt the free flow of information on
- the net, and require all telecommunications carriers to censor your
- public and private communications.
-
- The "Communications Decency Act of 1995" (S. 314), introduced in early
- February by Senators Exon (D-NE) and Gorton (R-WA), would place
- substantial criminal liability on telecommunications carriers (including
- traditional telephone networks, Internet service providers, commercial
- online services such as America Online and Compuserve, and independent
- BBS's) whenever their networks are used to transmit any material
- which is deemed indecent or harassing. In order to avoid these penalties,
- carriers would be forced to restrict the activities of their subscribers
- and censor all public and private communications.
-
- We must act quickly to stop the progress of S. 314. The bill may soon
- be incorporated into Senate telecommunications reform legislation, which
- is currently being drafted by the Senate Commerce Committee. The
- telecommunications reform bill may be introduced as early as mid March,
- and is expected to be considered on a fast track. If S. 314 is included
- in this bill, it will be extremely difficult to change or remove and
- could pass quickly.
-
- We are asking you to join us in urging key members of the Senate to
- prevent S. 314 from being included in Senate telecommunications reform
- measures and to hold open, public hearings on the issue.
-
- ---------------------------------------------------------------------
- CURRENT STATUS OF S. 314/H.R. 1004
-
- The bill was introduced on February 1, 1995 by Senators Exon (D-NE) and
- Gorton (R-WA). It is currently pending before the Senate Commerce
- Committee (chaired by Senator Pressler (R-SD)).
-
- No committee action has been scheduled as of March 9, 1995.
-
- The telecommunications reform bill is scheduled for hearing starting
- March 21, 1995. It is possible that S. 314 will be folded into the
- bill during markup next week.
-
- H.R. 1004 (worded the same as S. 314) was introduced on February 21,
- 1995 in the House by Representative Johnson (SD) and has been referred
- to the House Commerce and Judiciary committees.
-
- No committee actions in the House have been scheduled as of March 17, 1995.
-
- ---------------------------------------------------------------------
- BACKGROUND
-
- S. 314 would expand current law restricting indecency and harassment on
- telephone services to all telecommunications providers and expand
- criminal liability to all content carried by all forms of
- telecommunications networks. The bill would amend Section 223 of the
- Communications Act (47 U.S.C. 223), which requires carriers to take
- steps to prevent minors from gaining access to indecent audiotext and
- criminalizes harassment accomplished over interstate telephone lines.
-
- If enacted, S. 314 would compel service providers to severely restrict
- your online activities. Your access to email, discussion lists, usenet,
- the world wide web, gopher, and ftp archives would be substantially
- reduced or cut off entirely. The bill would also force providers to
- closely monitor and pre-screen your electronic mail, and refuse to
- transmit any message or other content which may be considered to be
- indecent.
-
- This bill poses a significant threat to freedom of speech and the free
- flow of information in cyberspace. The bill also raises fundamental
- questions about the right of government to control content on
- communications networks, as well as the locus of liability for content
- carried in these new communications media.
-
- Recently, Sen. Patrick Leahy (D-VT) has requested the Center for
- Democracy and Technology's Public Interest/Industry working group IWG
- (Interactive Working Group) to explore other solutions to the problems
- that S. 314 attempts to solve. The working group must be allowed to
- examine current legislation and explore technical alternatives that are
- consistent with the First Amendment and the free flow of information.
-
- We've received over 400 messages in two weeks, with our log showing
- over 700 letters, faxes, phone calls, and email messages (many people
- contacted more than one Senator. At least two respondents wrote all 19
- members of the committee!) Of course many more people have probably
- contacted Congress without sending that note to VTW.
-
- Almost 200 messages went to Pressler, who may be getting the point.
- His staff told one caller, "Why are you calling us? It's Exon's bill!"
- (This is why phone calls to Pressler are so important.)
-
- One citizen wrote to Senator Gorton, a co-sponsor:
- "I, frankly, am amazed at the audacity of your proposed
- bill. We are not children sir, nor do we need your
- misplaced guidance in raising our children!"
-
- Along the same lines, another wrote to his own Senator:
- "While I am pleased, being an enthusiastic supporter of
- anti-harassment legislation, with many of the provisions of
- this bill, I am frankly astounded and appalled with others."
-
- Someone came up with metaphor that frankly we aren't clever enough to
- have thought of:
- "A few years ago, a tanker laden with a crude, noxious substance
- ran aground in the virginal territories of the Alaskan coastline.
- It poisoned the land and sea for many miles around.... We are now
- faced with another 'Exon Valdez'... a vehicle filled with crude
- legislation, currently at risk of running ashore on our pristine
- rights."
-
- Finally, someone writing to Pressler spoke for all of us to all of us:
- "At a time when communications between ordinary citizens has
- been all but drowned out by the barrage of mass media, online
- communication has become the last bastion of real citizen
- deliberation and has become the "public square" so to speak,
- of the nation. This bill would destroy this great experiment
- in the rejuvenation of grassroots democracy. Please do all
- you can to prevent its passage."
-
- We are encouraged by the success so far of the campaign, and hope that
- you take the time to participate at this crucial time.
-
- ---------------------------------------------------------------------
- WHERE CAN I LEARN MORE ABOUT THE BILL? (URL INCLUDED)
-
- The Voters Telecommunications Watch has set up a gopher page where
- you can get a copy of the bill (including analyses by the American
- Civil Liberties Union, the Center for Democracy and Technology, the
- Electronic Messaging Association, and others). Here's the URL:
-
- WWW URL: gopher://gopher.panix.com/11/vtw/exon
- Gopher command : gopher -p 1/vtw/exon gopher.panix.com
-
- If you have difficulty getting to this gopher page, or if you don't
- have access to Mosaic/gopher, drop a note to:
-
- vtw@vtw.org
-
- BBS Network Users:
-
- You can FREQ the files from the EFF BBS, 1:109/1108, 1-202-861-1224.
- The "magicword" for a list of relevant files is S314. You do NOT have to be
- nodelisted to get the files, or in any particular network. Just create a
- dummy nodelist entry with our phone number if you need to do so.
- Those in QWK nets or otherwise not able to File REQuest can download the
- files manually from the BBS, in the ALERTS file area. Feel free to login
- as ANONYMOUS, password GUEST to bypass newuser questionnaires.
-
- To send mail to vtw@vtw.org from FidoNet or other FTN systems, create a
- netmail message to your local UUCP host. Search the nodelist for the
- GUUCP flag, and use the address of that system:
-
- To: UUCP, [GUUCP system's address here. "To:" name MUST be set to UUCP]
- From: [you]
- Subject--S.314
- ---------------------------------------------------------------
- To: vtw@vtw.org
-
- [Message starts here on 3rd line. The second "To:" line with the internet
- email address MUST be the first line of the message body, and the blank
- line following that is REQUIRED. Mail will not be delivered by the gateways
- without it.]
-
- To email one of the Senators in the list above, just put the Senator's email
- address in place of "vtw@vtw.org" in the above example.
-
- If you are unsure whether your FTN has an Internet gateway, or suspect it
- may use something other than a GUUCP nodelist flag, ask your network
- coordinators.
-
- -----------------------------------------------------------------
-
- ---------------------------------------------------------------------
- WHERE WILL I LEARN ABOUT UPDATES TO THIS ALERT?
-
- We will post updates to this alert in three places:
-
- -On the account vtw@panix.com (finger vtw@panix.com)
- -On Usenet (comp.org.eff.talk, comp.org.cpsr.talk, and alt.privacy)
- -Through our announcements mailing list, vtw-announce@vtw.org.
-
- To subscribe, simply send a message to listproc@vtw.org with the
- following in the message body:
-
- subscribe vtw-announce Firstname Lastname
-
- ---------------------------------------------------------------------
- CURRENT LIST OF PARTICIPATING ORGANIZATIONS
-
- At this time, the following organizations have signed onto this
- campaign and are receiving the legislative feedback that VTW is compiling:
-
- American Civil Liberties Union (ACLU), infoaclu@aclu.org
- American Communication Association (ACA), comminfo@cavern.uark.edu
- Center for Democracy and Technology (CDT), ask@cdt.org
- Center for Public Representation (CPR), mgpritch@facstaff.wisc.edu
- Computer Communicators Association (CCA), community@pigpen.demon.co.uk
- Computing Professionals for Social Responsibility (CPSR), cpsr@cpsr.org
- CyberQueer Lounge, tomh@cyberzine.org
- (Note that the DC-based EFF has no local chapters)
- Electronic Frontier Foundation (EFF), ask@eff.org
- Electronic Frontier Foundation-Austin (EFF-Austin), eff-austin@tic.com
- Electronic Frontiers Australia (EFA), efa-info@efa.org.au
- Electronic Frontiers Houston (EFH), efh@efh.org
- Electronic Privacy Information Center (EPIC), info@epic.org
- Florida Coalition Against Censorship (FCAC), PIPKING@mail.firn.edu
- Hands Off! the Net petition drive, slowdog@wookie.net
- National Coalition Against Censorship (NCAC), ncac@netcom.com
- National Libertarian Party (NLP), lphq@access.digex.net
- National Public Telecomputing Network (NPTN), info@nptn.org
- National Writers Union (UAW Local 1981 AFL-CIO), kip@world.std.com
- People for the American Way (PFAW), jlessern@reach.com
- Society for Electronic Access (SEA), sea@sea.org
- Voters Telecommunications Watch (VTW), vtw@vtw.org
-
- Note that the Voters Telecommunications Watch does not speak for these
- organizations. Any opinions contained herein are those of the author,
- and not necessarily endorsed by participating organizations.
-
- ------------------------------
-
- Date: Sun 19 Mar 1995 19:19:22 CST
- From: CuD Moderators <cudigest@mindvox.phantom.com>
- Subject: File 6--Reprint of Textof SB 314
-
- ((MODERATORS' NOTE: Here, from ftp.eff.org's site, is the text of
- the original statute and the changes that are proposed.
-
- For more information, also check out slowdog's homepage at:
- http://www.phantom.com/~slowdog
-
- ==============
-
- 47 USC 223 (1992)
-
- Sec. 223. [Obscene or harassing telephone calls in the District
- of Columbia or in interstate or foreign communications]
-
- OBSCENE OR HARASSING UTILIZATION OF TELECOMMUNICATIONS
- DEVICES AND FACILITIES IN THE DISTRICT OF COLUMBIA OR IN
- INTERSTATE OR FOREIGN COMMUNICATIONS"
-
- (a) Whoever--
-
- (1) in the District of Columbia or in interstate or foreign
- communication by means of [telephone] TELECOMMUNICATIONS
- DEVICE--
-
- (A) [makes any comment, request, suggestion or proposal]
- MAKES, TRANSMITS, OR OTHERWISE MAKES AVAILABLE ANY COMMENT,REQUEST,
- SUGGESTION, PROPOSAL, IMAGE, OR OTHER COMMUNICATION which is
- obscene, lewd, lascivious, filthy, or indecent;
-
- [(B) makes a telephone call, whether or not conversation ensues,
- without disclosing his identity and with intent to annoy, abuse,
- threaten, or harass any person at the called number;]
-
-
- "(B) MAKES A TELEPHONE CALL OR UTILIZES A TELECOMMUNICATIONS
- DEVICE, WHETHER OR NOT CONVERSATION OR COMMUNICATIONS
- ENSUES,WITHOUT DISCLOSING HIS IDENTITY AND WITH INTENT TO ANNOY,
- ABUSE, THREATEN, OR HARASS ANY PERSON AT THE CALLED NUMBER OR WHO
- RECEIVES THE COMMUNICATION;
-
-
- (C) makes or causes the telephone of another repeatedly or
- continuously to ring, with intent to harass any person at the
- called number; or
-
- [(D) makes repeated telephone calls, during which conversation
- ensues, solely to harass any person at the called number; or]
-
- (D) MAKES REPEATED TELEPHONE CALLS OR REPEATEDLY INITIATES
- COMMUNICATION WITH A TELECOMMUNICATIONS DEVICE, DURING WHICH
- CONVERSATION OR COMMUNICATION ENSUES, SOLELY TO HARASS ANY PERSON
- AT THE CALLED NUMBER OR WHO RECEIVES THE COMMUNICATION,
-
- (2) knowingly permits any [telephone facility]
- TELECOMMUNICATIONS FACILITY under his control to be used
- for any purpose prohibited by this section, shall be fined not more
- than $[50,000]100,000 or imprisoned not more than [six months] TWO
- YEARS, or both.
-
- (b)(1) Whoever knowingly--
-
- (A) within the United States, by means of [telephone]
- TELECOMMUNICATIONS DEVICCE, makes (directly or by recording device)
- any obscene communication for commercial purposes to any person,
- regardless of whether the maker of such communication placed the
- call or INITIATED THE COMMUNICATION; or
-
- (B) permits any [telephone facility] TELECOMMUNICATIONS
- FACILITY under such person's control to be used for an activity
- prohibited by subparagraph (A), shall be fined in accordance with
- title 18, United States Code, or imprisoned not more than two
- years, or both.
-
- (2) Whoever knowingly--
-
- (A) within the United States, [by means of telephone],
- makes BY MEANS OF TELEPHONE OR TELECOMMUNICATIONS DEVICE, MAKES,
- TRANSMITS, OR MAKES AVAILABLE(directly or by recording device) any
- indecent communication for commercial purposes which is available
- to any person under 18 years of age or to any other person without
- that person's consent, regardless of whether the maker of such
- communication placed the call OR INITIATED THE COMMUNICATION; or
-
-
- (B) permits any [telephone facility] TELECOMMUNICATIONS
- FACILITY under such person's control to be used for an activity
- prohibited by subparagraph (A), shall be fined not more than
- $[50,000] 100,000 or imprisoned not more than [six months]
- TWO YEARS, or both.
-
-
- (3) It is a defense to prosecution under paragraph (2) of this
- subsection that the defendant restrict access to the prohibited
- communication to persons 18 years of age or older in accordance
- with subsection (c) of this section and with such procedures as the
- Commission may prescribe by regulation.
-
- (4) In addition to the penalties under paragraph (1), whoever,
- within the United States, intentionally violates paragraph
- (1) or (2) shall be subject to a fine of not more than $[50,000]
- 100,000 for each violation. For purposes of this paragraph, each
- day of violation shall constitute a separate violation.
-
- (5)(A) In addition to the penalties under paragraphs (1), (2),
- and (5), whoever, within the United States, violates paragraph (1)
- or (2) shall be subject to a civil fine of not more than $[50,000]
- 100,000 for each violation. For purposes of this paragraph, each
- day of violation shall constitute a separate violation.
-
- (B) A fine under this paragraph may be assessed either--
-
- (i) by a court, pursuant to civil action by the Commission or
- any attorney employed by the Commission who is designated by the
- Commission for such purposes, or
-
- (ii) by the Commission after appropriate administrative
- proceedings.
-
- (6) The Attorney General may bring a suit in the appropriate
- district court of the United States to enjoin any act or practice
- which violates paragraph (1) or (2). An injunction may be granted
- in accordance with the Federal Rules of Civil Procedure.
-
- (c)(1) A common carrier within the District of Columbia or
- within any State, or in interstate or foreign commerce, shall not,
- to the extent technically feasible, provide access to a
- communication specified in subsection (b) from the
- telephone of any subscriber who has not previously requested in
- writing the carrier to provide access to such communication if the
- carrier collects from subscribers an identifiable charge for such
- communication that the carrier remits, in whole or in part, to the
- provider of such communication.
-
- (2) Except as provided in paragraph (3), no cause of action may
- be brought in any court or administrative agency against any common
- carrier, or any of its affiliates, including their officers,
- directors, employees, agents, or authorized representatives on
- account of--
-
- (A) any action which the carrier demonstrates was taken in good
- faith to restrict access pursuant to paragraph (1) of this
- subsection; or
-
- (B) any access permitted--
-
- (i) in good faith reliance upon the lack of any representation
- by a provider of communications that communications provided by
- that provider are communications specified in subsection (b), or
-
- (ii) because a specific representation by the provider did not
- allow the carrier, acting in good faith, a sufficient period to
- restrict access to communications described in subsection (b).
-
- (3) Notwithstanding paragraph (2) of this subsection, a provider
- of communications services to which subscribers are denied access
- pursuant to paragraph (1) of this subsection may bring an action
- for a declaratory judgment or similar action in a court. Any such
- action shall be limited to the question of whether the
- communications which the provider seeks to provide fall within
- the category of communications to which the carrier will provide
- access only to subscribers who have previously requested such
- access.
-
- *********************************************
-
- NOTE: This version of the text shows the actual text of current law as
- it would be changed. For the bill itself, which consists of unreadable
- text such as:
-
- [...]
- (1) in subsection (a)(1)--
- (A) by striking out `telephone' in the matter above
- subparagraph (A) and inserting `telecommunications device';
- (B) by striking out `makes any comment, request,
- suggestion, or proposal' in subparagraph (A) and inserting
- `makes, transmits, or otherwise makes available any
- comment, request, suggestion, proposal, image, or other
- communication';
- (C) by striking out subparagraph (B) and inserting the
- following:
- `(B) makes a telephone call or utilizes a
- [...]
-
- See:
-
- ftp.eff.org, /pub/EFF/Legislation/Bills_new/s314.bill
- gopher.eff.org, 1/EFF/Legislation/Bills_new, s314.bill
- http://www.eff.org/pub/EFF/Legislation/Bills_new/s314.bill
-
- ------------------------------
-
- Date: Sun, 19 Mar 1995 22:51:01 CDT
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 7--Cu Digest Header Info (unchanged since 19 Mar, 1995)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB <your name>
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- In ITALY: Bits against the Empire BBS: +39-464-435189
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
- ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu:80/~cudigest
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #7.22
- ************************************
-
-