home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Tue Jun 6, 1995 Volume 7 : Issue 45
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Tibia Editor: Who built the Seven Towers of Thebes?
- (Answer still pending)
-
- CONTENTS, #7.45 (Tue, Jun 6, 1995)
-
- File 1--A Seduction In Cyberspace?
- File 2--Re: Protecting kids from porn on Web -- html enhancement
- File 3--Illinois Legislater "Discovers" Net Porn (news excerpt)
- File 4--Canadian Police Chiefs Ponder Crime on the Infobahn (fwd)
- File 5--GovAccess.120: Christian Coalition urges net censorship (fwd)
- File 6--Voice System Up-Date
- File 7--Cu Digest Header Info (unchanged since 19 Apr, 1995)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: 03 Jun 95 04:03:33 EDT
- From: Walter Scott <74276.3616@compuserve.com>
- Subject: File 1--A Seduction In Cyberspace?
-
- On May 18th, Daniel Montgomery left Seattle for an as yet unknown
- location. His departure has caused, in its wake, a frenzy of media
- coverage. And that magic word -- "INTERNET" -- is attached to this
- story.
-
- Daniel Montgomery is 15 years-old and potentially gay. Until May
- of this year, he was what Tahoma High School Assistant Principal Rob
- Morrow would call a "nice young man." More than being a "nice young
- man," Daniel Montgomery was a teenager exploring cyberspace via
- America Online. Through a chat room on America Online, Daniel met
- someone calling himself "Damien Starr." Eventually, Starr may have
- enticed Daniel to leave his Maple Valley home.
-
- According to a published report in the 6-2-95 edition of the
- Seattle Post Intelligencer, Starr's user profile on America Online
- indicates Starr is 18 years-old, gay, and resides somewhere on Nob
- Hill in San Fransisco. Starr and Daniel Montgomery apparently
- communicated, for a period of time, on America Online and by way of a
- password-protected 1-800 phone number. According to the Seattle Post
- Intelligencer and Bill Montgomery -- Daniel's father -- Starr had
- suggested that, if Daniel was discovering he is gay, and revealed such
- to his parents, they probably would kick him out of his home. Bill
- Montgomery believes this may have played a role in why Daniel
- Montgomery left -- ostensibly because Daniel had not discussed his
- sexual orientation with his parents, and Daniel's mother had stated
- negative feelings about gays in the past. Thus, Bill Montgomery
- asserts Daniel may have been particularly open to another suggestion --
- that Daniel come join Starr.
-
- When Daniel left, he apparently did so after receiving a bus
- ticket in the mail from Starr. Since then, Daniel has sent 2 E-Mail
- messages to his father stating that he's doing OK while making more
- money than his parents, according to reports from several broadcast
- news organizations here in Seattle. Bill Montgomery doesn't KNOW if
- this is true but states that, if what Daniel had claimed is true, at
- least part of it is temporary. Soundbites aired on TV news (KOMO-TV
- and KING-TV - 6-2-95) illustrate Bill Montgomery suspects his son is
- being groomed for sex. According to the Seattle Post Intelligencer,
- that assessment may, in part, be drawn from Daniel's sister. She lives
- in Southern California and has informed Bill Montgomery of reports
- she's seen on TV about groups that seduce young gay males by offering
- protection from parents who might not be supportive of a homosexual
- orientation in their children. The Seattle Post Intelligencer
- summarizes Montgomery's description of the "group's" method of
- operation as enticement to run away followed by provision of food and
- money for a short time, and then culminating in requests for sexual
- favors in return. The Seattle Post Intelligencer, and broadcast news
- organizations in Seattle, are not, however, reporting confirmation of
- this notion.
-
- Starr has contacted the Montgomery family four times, again,
- according to the Seattle Post Intelligencer, to assure them Daniel is
- not in any danger. As stated previously, Montgomery doesn't doubt this
- for the time being. But, Montgomery also told the Seattle Post
- Intelligencer that Starr is probably a recruiter who might have been
- recruited into the "group" not so long ago.
-
- Bill Montgomery is not saying whether he will ask America
- Online to provide Starr's real name and/or other information on Starr
- retained by America Online. The Seattle Post Intelligencer, though,
- reports that the FBI won't deny they are interested in asking America
- Online to reveal information on Starr. And "sources" are stated by the
- Seattle Post Intelligencer as indicating that the FBI continues to
- investigate the case.
-
- There are several interesting factors in this turn of events.
- Some of those factors can be appreciated more easily by people who
- live in Washington state and in the Puget Sound in particular.
-
- 1. Washington state's Legislature just finished a regular
- session and special session -- back-to-back. Those sessions
- provided high political drama -- even for the online
- community. Until late last month, we were faced with a
- "harmful to minors" bill addressing, among other things,
- availability of sexual material to minors via online
- services. The bill easily passed the Legislature but was
- vetoed by Governor Lowry. A veto-override attempt did not
- fall so short that people here -- who were and are opposed
- to the legislation -- can breathe a sigh of relief; the
- issue WILL come back another day -- possibly quite soon.
-
- 2. The Legislature also passed legislation which would
- change Washington state's laws dealing with run-aways.
- This legislation was partially vetoed. The result is a
- firestorm of resentment among a significant number of
- parents. They feel as though long-awaited relief has been
- stolen by a Governor who doesn't appreciate parenting
- issues in this state. For example: Laws existing through
- this Spring required that a child at the age of 13 could
- legally run away from home. Parents were powerless to do
- anything about such behavior unless the child was acting
- under the coercion of others in very strict
- circumstances. The new law is only slightly more
- restrictive on whether minors can run away -- certainly NOT
- restrictive enough to make Daniel Montgomery's act of
- running away an illegal act. Such laws, as those existing
- prior to the most recent regular session of the Washington
- state Legislature, have been in place for several years
- to provide abused children with the means to escape parental
- abuse if running away would accomplish that goal.
-
- 3. A local TV station (KIRO) recently ran a series of
- reports called "Net Sex." Those reports were
- sensationally promoted with language that implied
- children can and do access sexually explicit sections of
- the INTERNET -- something which might be a threat to
- children if unsuspecting parents aren't watching what
- their kids are doing online. The actual reports, however,
- were reasonably balanced. But, the reports left Seattle
- sensitized to the existence of sexually explicit materials
- on the INTERNET.
-
- 4. We have the copious and invalid use of the word
- "INTERNET" in broadcast reporting of the Montgomery
- run-away. We also have a case in which a 15-year-old
- ran away to circumstances the father of that 15-year-old
- asserts are probably sexual in nature. All four of the
- factors listed here may eventually come together as a
- dangerous brew is or will be created.
-
- In the current social and political climate, the Montgomery
- run-away; the Baker case; the incidents where children download
- instructions on how to make pipe bombs and then construct them; an
- incident where a young girl seduces an adult male into a sexual
- encounter after online meetings; incidents where online pedophiles do
- there thing, and so much more seem to draw us headlong toward events
- we may regret some years from now. I wonder if there is no other way
- to see what is out there to be seen.
-
- Politicians revel in such events as those referred to above. I
- believe it is no strange coincidence that Senator Exon's legislation
- (Communications Decency Act) moved into the fast lane of Congressional
- action at around the same time as news broke on the Baker case. It is
- not novel for politicians to orchestrate their policies and agendas
- around politically favorable current events. I expect more instances
- of perceived or actual online abuse, and for politicians to take
- advantage in the ways only politicians can.
-
- Whether it's Washington state, New York state, Alabama or
- Washington, DC, I'm finding it more and more difficult to believe
- there is any room left to assume reason will necessarily prevail over
- emotion built to a fever-pitch. I see emotion more places than I
- don't, and rancorous emotion at that. I also see associated and
- ever-growing polarization. It actually frightens me because I think I
- know what all that HIGH emotion will promulgate.
-
- =========== UPDATE ==================
-
- On Sunday [6-4-95] Seattle area teenager Daniel Montgomery -- who
- had run away from home in mid-May at the possible coaxing of an AOL
- subscriber -- met with his parents at a San Francisco airport.
- According to various Seattle news media reports, Montgomery told his
- parents, at that time, he was doing ok and had not been harmed.
- Subsequently, reports from local media have exhibited an amazing
- cacophony of inaccurate or incomplete information. For example: Even
- on the day that Daniel Montgomery met with his parents, the Seattle
- Post Intelligencer reported that Montgomery had been seen by a Seattle
- Metro bus driver. According the the Seattle Post Intelligencer,
- Montgomery had told the bus driver he was on his way out of town, and
- Montgomery had shown the bus driver what the bus driver thought to be
- a bus ticket to Florida.
-
- Once it was clear that Montgomery had met with his parents in
- San Francisco, local news media issued conflicting stories as to
- whether Montgomery would stay with his parents or grandparents. More
- than one news organization implied a strained relationship between
- Montgomery and his parents
-
- In the past two days, some news media organizations have stated
- AOL was under some pressure to reveal information on a subscriber
- using the alias "Damien Starr." However, other news media
- organizations were stating that AOL was resolute in its policy not to
- reveal information about subscribers. Even so, today, [6-6-95] several
- broadcast organizations (KING-TV, KIRO-TV, KIRO radio, and KOMO radio)
- now report that AOL has terminated the person who used the Damien
- Starr alias. KOMO radio broadcast the following in a news program this
- morning.
-
- America Online says it's complying with a subpoena
- and giving investigators information about the
- account of Damien Starr. That's the name used by a
- man suspected of luring a teenaged boy to San Francisco.
- The computer service has also terminated the man's
- account. The boy's now back with his family in
- Maple Valley. [Maple Valley is a small community
- in the Seattle area]
-
- KING-TV takes us a step further with a report that Damien Starr
- is under investigation by the FBI for a possible violation of the Man
- Act. KIRO-TV states that AOL terminated Damien Starr because Starr
- allegedly solicited a minor in violation of AOL's policies.
-
- It's rather difficult to know what is truth, what is perception,
- and what is true at one moment and not in the next moment, hour, or day in
- this case. What seems certain, though, is that events pertaining to
- the running away and/or seduction of Daniel Montgomery are not
- finished.
-
- ------------------------------
-
- Date: Mon, 22 May 1995 15:53:32 GMT
- From: subhas@CS.WM.EDU
- Subject: File 2--Re: Protecting kids from porn on Web -- html enhancement
-
- Source: comp-academic-freedom-talk@EFF.ORG
-
- Can the parents prevent their children from viewing
- --------------------------------------------------
- unwanted Web pages?
- -------------------
-
- Yes. There is a simple solution.
-
- The senate's Communication Decency Bill is ultimately harmful and
- moreover it won't work because Internet does not know any country
- boundaries. Nevertheless, the politicians are making impassioned
- arguments that the children must be protected from the pornographic
- materials and other unwanted materials (like how to make a bomb). Do
- they have a valid point? Well, let me rephrase the question :
-
- If you have a simple way to prevent your kids from viewing some adult
- materials or other unwanted stuff available on the Web, would you use
- it to control their access? Particularly if that objective can be
- accomplished without any censorship laws or any inconvenience? Also
- free of cost too? I suppose most parents probably would.
-
- Below the proposed solution is introduced in a question answer form.
-
-
- Q1. Why is this fuss? I don't see any problem. Therefore no solution
- is necessary.
-
- A. Actually, there is a problem. Do you want your 10-year old kid to
- read Hustler magazine? There are actually lots of adult materials on
- the Web (and there are going to be more in the future) which are even
- more unsuitable for young children. Concerned parents want to protect
- their kids from viewing such materials available on the Web. Also,
- adult page authors don't want any kids to view their stuff. Its apparent
- that the Internet is going to be so useful that kids should be
- encouraged to surf the Net. Currently there is no good solution to
- this dilemma.
-
- If something is not done by the net-citizens themselves, the
- politicians can generate enough public support to curtail freedom of
- expression on the Net. Despite all the hype, only a small percentage
- of the general population are on the Net and thus netters are powerless
- to the law-makers majority of whom are not friends of the Net.
-
-
- Q2. Can anything be done? How?
-
- A. Yes. Concerned parents and educators can control access on Web. All
- it needs is a little cooperation from the Web browser designers (like
- people at Netscape and NCSA Mosaic) and also from the adult Web page
- authors.
-
- In the next version of the Web navigators, just introduce a new HTML
- tag <adult_only>. If a WWW browser encounters this tag enclosed inside
- the <head> </head> part of a HTML document, then the browser will
- simply refuse to load or render the document. The author of a Web page
- should put that tag in all of his pages containing materials that he
- does not want to be seen by young children.
-
- At the time of installing the browser, a password will be asked from
- the person (who is assumed to be an adult) installing the
- program. This password is for identification of the installer. As a
- default, the <adult_only> checking is enabled. To allow a parent (the
- adult installer) the freedom to view adult-only stuff, the browser can
- have a command line option "-unrestricted". If that option is used,
- the program will ask for a password for identification (only at the
- beginning of the session).
-
- This way, a parent protects the kids from unwanted stuff on the
- Net. Also, the adult page authors are protected from unwanted
- attention from kids. It involves no cost, no laws or hassles.
-
-
- Q3. What about gopher and FTP sites?
-
- A. This solution works for any HTML page which many come via HTTP,
- gopher or FTP protocols. Besides, now the Web is the most popular
- part of the Net. However, external gif/jpeg files cannot be prevented
- because they are not in HTML. So, by this tag trick, all the unwanted stuff
- that is not in HTML cannot be barred.
-
-
- Q4. Why would the purveyors of net pornography comply to use the
- <adult_only> HTML tag in their pages?
-
- A. It seems that the people who are posting adult materials on their
- Web pages would like to prevent the young children from accessing the
- pages. That's why they build such lame "adult access shield" which
- asks "don't click here if you are under eighteen". So, we can hope
- that an author of a Web page containing adult stuff will be glad to
- put this HTML tag at the beginning of the all Web pages containing
- adult materials. One can send an e-mail to remind the author in case such
- a page is not properly tagged.
-
-
- Q5. Why should Netscape people or Mosaic people support the tag?
-
- A. Because implementing the tag is very easy and all protective
- parents and educators would be glad to have the support for such a
- tag. Such a tag should become a part of the standard HTML.
-
-
- Q6. But browsers are freely available and a kid can download his own
- copy of a browser himself. Also, a smart kid can hack something to get
- around the efforts of access control. What about that?
-
- A. Yes, this could be a problem. But automated software techniques
- (using some operating system support) can be used to ensure that
- no secretly installed browser exists in the system.
-
- A determined smart kid cannot not prevented from accessing anything he
- wants. He can possibly write his own browser and other tools. Heck, he
- can buy his own PC, have his own Internet connection and set up a
- Web server with his own home page containing adult materials! So, let
- us be concerned about the no-so-determined kids.
-
-
- Q7. Can't we use SurfWatch software or other such tools?
-
- A. SurfWatch (http://www.surfwatch.com) is a newly announced tool that
- seem to allow the concerned parents to prepare a list of offending
- sites. Any site in the list will be denied access to the browsers
- used by the children of the customer of SurfWatch.
-
- However there are serious problems.
-
- - Nobody can maintain an up-to-date and exhaustive list of
- sites. There are many obscure sites all over the world. New Web pages
- are appearing and disappearing dynamically everyday. You may block the
- Penthouse site, but your kid may possibly be viewing far more unwanted
- stuff from some obscure site in Netherlands if that site is not
- included in your list.
-
- - SurfWatch will maintain a list of unwanted sites for you (if you
- pay extra monthly fee). Then you will need to trust SurfWatch to
- decide what is good or bad for your kids.
-
- - You will have to pay for the blocking software as well as a
- optional list of sites maintained by SurfWatch company.
-
- - The browser will need to check a list of possibly thousand sites
- for every single Web access just to make sure it is not one of
- those. Won't it be slow?
-
- - A WWW site can host thousands of separate Web pages only a few of
- which probably contain adult materials and the rest are possibly
- harmless or useful. So blocking access to a site is not a good
- idea. If SurfWatch starts maintaining a list of offending Web pages,
- the list will be in very very long indeed. It is a hopeless idea to
- maintain a list of unwanted sites or unwanted URLs.
-
-
- Q8. The tag seems to be a good idea. Can it be used for other
- purposes?
-
- A. This tag idea can be generalized to classify Web documents in
- variety of ways and it will greatly facilitate cataloging the Web
- documents. Web desperately needs such categorization so that your
- browser can select and reject Web materials of all sorts based on your
- priorities. This will cut down noise as well as litigation.
-
- ------------------------------
-
- Date: Tue, 6 Jun 1995 16:11:13 -0500
- From: jthomas@SUN.SOCI.NIU.EDU(Jim Thomas)
- Subject: File 3--Illinois Legislater "Discovers" Net Porn (news excerpt)
-
- Source: Chicago Tribune, May, 1995
-
- Legislator cruises the internet and can't believe his eyes By Christi
- Parsons
-
- SPRINGFIELD--Sen. Walter Dudycz ((Ill. state legislator) has seen some
- of the weirdest, kinkiest stuff of his life in the few short weeks he
- has had access to the worldwide computer network known as the
- Internet.
-
- Child pornography. Sex talk. Serious come-ons and propositions. "You
- wouldn't believe some of this stuff," said Dudycz (R-Chicago). "Every
- time I sit down at the computer I've got some pornographic picture
- waiting for me."
-
- In only a few weeks, Dudycz has seen how ugly things can get on the
- Internet. So this spring, is sponsoring a bill in the General
- Assembly to forbid adults from soliciting minors for sex on the
- Internet. The Senate already has approved the measure, and it awaits
- consideration in the House.
-
- Dudycz says it's the first of many bills to come, as he continues to
- prowl the Internet and discover the societal perils he's sure it
- harbors.
-
- ((Observation that child pornography is already illegal and that
- the Internet's newness leaves some grey areas. The article notes
- that Georgia and Florida have passed laws targetting the
- Internet, and Illinois and California are considering similar
- laws)).
-
- ((The article notes that policing the Internet and policing the
- corner store are similar in that anybody can file a complaint. It
- summarizes how on-line services can find people who are
- responsible for supplying "obscene" material. It notes that
- civil libertarians argue against restrictive legislation such as
- the Exon Bill pending on Congress)).
-
- "This has everything to do with the novelty of the Internet to the
- bill writers," Godwin said.
-
- "We're in a generation between people who never had this technology
- and people who grew up with it," Godwin said. "In this transition
- period, they're not comfortable. So their impulse is to regulate."
-
- ((The article notes that Dudycz is new on the nets, and--as a
- detective in the Chicago Police Department, he decided to go
- "undercover" to see "how intimate" people wanted to get)).
-
- He filled out his computer profile to say he is a 15-year-old girl
- from Chicago and set up a screen name. Dudcyz doesn't want to
- disclose the name he uses, but it is similar to "Bashful."
-
- Dudcyz said "Bashful" is routinely propositioned as "she" moves from
- chat room to chat room and talks with other users via e-mail and
- instant messaging systems. Dudcyz gets a lot of pornography, and one
- person has invited "Bashful" to pose nude for him.
-
- One recent night, as other senators were heading home from a week of
- session, Dudycz stayed after hours in the empty Senate offices and
- became "Bashful."
-
- When he signed on, there already were three pornographic photographs
- sent to him by other users. Two were garden-variety porn, and he
- tossed them out. The third was an amateurish photograph of an
- obviously underage girl in a state of semi-dress. Dudycz stored the
- screen name of its user to follow up on it later.
-
- ((The article describe a "chat room" encounter with a 39 year old
- engineer who, believing Dudycz was a 15 year old female,
- suggested a sexual liason)).
-
- So far, Dudycz hasn't busted anybody for solicitation. But he has
- compiled a list of screen names and is corresponding with several in
- anticipation of a sting operation by Chicago police.
-
- As for his bill, Dudycz said, he hopes it will at least alert parents
- to what's going on on the Internet.
-
- ((The article concludes with a warning by Dudycz to parents
- suggesting that when they think their kids are doing homework on
- the computer, maybe they're not)).
-
- ------------------------------
-
- Date: Mon, 5 Jun 95 17:29:21 EDT
- From: Mitchell A. Pravatiner <Mitch.Pravatiner@LAMBADA.OIT.UNC.EDU
- Subject: File 4--Canadian Police Chiefs Ponder Crime on the Infobahn (fwd)
-
- From--"Ian S. Murray" <artsxnet@intacc.web.net
- Date--Sat, 03 Jun 1995 19:08:53 DST
- Subject--Canadian Police Chiefs Ponder Crime on the Infobahn
-
- Recommendations of the
- Prevention of Crime in Industry Committee
- of the Canadian Association of Chiefs of Police
-
- October 20, 1994
- Ottawa, Ontario
- - - - - - - - -
-
- On October 20, 1994, the CACP Prevention of Crime in Industry Committee
- met with members of the private sector, governmental agencies, and
- various police agencies from across Canada. The purpose of the meeting
- was to discuss technological crime issues and their impact on crime
- prevention, law enforcement, and community based policing initiatives.
- The following recommendations were adopted at the meeting and are to be
- forwarded to the board of the Canadian Association of Chiefs of Police.
-
-
- Recommendation 1:
-
- Given the inter-provincial and international nature of computer and
- telecommunications crime, the Federal Government, in consultation with
- the provinces and other interested parties, should enact a federal
- statute to legislate against these crimes. Current provisions in the
- Criminal Code relating to technological crime, should remain intact
- and can be used for locally based computer and telecommunications crimes.
-
-
- Recommendation 2:
-
- The Federal Government should ensure that information highway services
- provide security and privacy features both for base service and to
- protect sensitive communications. Future legislative initiatives and
- policy statements should *not* provide the general public with the false
- expectation that basic services of the information highway will provide
- high degrees of privacy. In fact, the government should educate the
- public as to the "open" nature of many forms of communications technologies.
- The Prevention of Crime in industry Committee should encourage and
- participate ion the education of corporate management on the risks/
- vulnerabilities of computer environments and remedial options available.
-
-
- Recommendation 3:
-
- The Criminal Code should be amended to include the following provisions:
-
- a) the unauthorized possession, use, sale, publication, or
- distribution of access codes, computer hacking programs/tools,
- and telecommunications access codes should be an offense.
-
- b) Sections 342.1 Criminal Code (Unauthorized computer access),
- 430(1.1) Criminal Code (Mischief to data), and Section 326
- Criminal Code (Theft of telecommunications) should be listed
- in Section 183 of the Criminal Code as offenses where wiretap
- authorization may be obtained.
-
- c) Use of computer networks and the national telecommunications
- system in the furtherance of criminal activities such as the
- distribution of pornography, distribution of hate literature,
- or harassment of individuals should be an offense in itself,
- either in the Criminal Code or a Federal Statute.
-
-
- Recommendation 4:
-
- The Federal Government should closely examine the problem of computer
- data encryption as it relates to investigative duties of law enforcement
- and enact legislation to facilitate decryption of this data by compelling
- involved persons or corporations to assist police. This legislation
- should also prevent the disclosure of sensitive investigative techniques
- used by police or sensitive proprietary information of a private corporation
- that was compelled to assist police.
-
-
- Recommendation 5:
-
- The Federal Government, in conjunction with the provinces, should
- support educational initiatives to encourage sound computer ethics
- and computer responsibility in the youth of Canada. Computer crime
- prevention initiatives should be supported as part of a community
- based policing approach.
-
-
- Recommendation 6:
-
- The Federal Government in conjunction with the RCMP should explore the
- possibility of constructing a core competency group consisting of law
- enforcement and technical industry personnel to act:
-
- a) as a lead resource in problem identification and resolution, and
-
- b) as a lead investigative unit for complex computer and
- telecommunications crime investigations.
-
-
- Recommendation 7:
-
- The Federal Government should undertake discussions with the United States
- Government to make the searching of computer banks in the United States
- by Canadian officials in Canada legally possible though an international
- protocol or convention. Agreements of this nature with other countries
- can be explored at a later date.
-
-
- Ottawa
- October 20, 1994
-
-
-
-
-
-
- #-intacc.web.net--------------------------------------------*
- |This message was sent from MATRIX ARTS NETWORK |
- |tel:(416)-364-1421 |
- |The views expressed in this posting are those of the |
- |individual author only. |
- #-----------------------------------------------------------*
-
- ------------------------------
-
- Date: Thu, 18 May 1995 16:07:12 +0800
- From: jwarren@WELL.COM(Jim Warren)
- Subject: File 5--GovAccess.120: Christian Coalition urges net censorship (fwd)
-
- Date--Thu, 18 May 1995 13:35:24 -0400
- From--Jonah Seiger <jseiger@cdt.org>
- Subject--Christian Coalition Pledges to Restrict Access to Porno on the Net
-
- On Thursday 5/17, the Christian Coalition unveiled their "Contract with the
- American Family" yesterday (5/17). A number of prominant republicans --
- including Newt Gingrich & Phil Gramm, have pledged to work to pass the CC's
- contract. And don't forget either that the repub presidential candidates
- are very interested in appealing to the CC.
-
- One of the items in the "Contract" seeks to restrict childrens access to
- pornography on the Internet.
-
- All this spells more bad news for us -- and gives one more reason why we
- need to get behind Leahy.
-
- --
-
- >From the Contract with the American Family (pages 27 & 28)
-
-
- Restricting Pornography
-
- Protecting children from exposure to pornography on the Internet and cable
- television, and from the sexual exploitation of child pornographers.
-
- 1. Enactment of legislation to protect children from being exposed to
- pornography on the Internet
-
- PORNOGRAPHY, BOTH SOFT CORE and hard core, is freely available on the
- Internet to virtually anyone with a home computer. Several magazines post
- pornographic images that can be viewed by anyone, including children, for
- free. There are also numerous sites on the Internet where hard core
- pornography depicting a variety of explicit acts, even rape scenes and
- bestiality, are available free and can be accessed with a few clicks of a
- computer button.
-
- Christian Coalition urges Congress to enact legislation to protect children
- from being exposed to pornography on the Internet. Criminal law should be
- amended to prohibit distribution of, or making available, any pornography,,
- soft core or hard, to children, and to prohibit distribution of obscene
- hard core pornography to adults.
-
- 2. Enactment of legislation to require cable television companies to completely
- block the video and audio on pornography channels to non-subscribers.
-
- Many children throughout the country are exposed to pornography, often hard
- core, on cable television because of incomplete scrambling of the signal on
- pornography channels. Cable companies have asserted that it is the parents'
- responsibility to guard their children. Christian Coalition believes that
- the responsibility should be on the cable companies to help parents keep
- pornography out of their homes. Cable companies should not be allowed to
- transmit pornography to non-subscribers. We urge Congress to require cable
- television companies to completely block the video and audio on pornography
- channels to non-subscribers.
-
- 3. Amending the federal child pornography law to make illegal the possession of
- any child pornography
-
- Sexual exploitation of children though child pornography continues to be a
- major problem in society. Possession of child pornography should be a
- crime. President Reagan proposed such a law in 1988, hoping that those with
- collections of child pornography would destroy them for fear of federal
- prosecution. In an 11th hour compromise on the bill, however, a conference
- committee of House and Senate members changed the Reagan bill to
- criminalize only the possession of "three or more" items of child
- pornography, videos, magazines, etc. Thus, federal low sanctions the
- possession of some child pornography -- less than three pieces. A person
- with two hour-long videotapes depicting the rape of a child cannot be
- charged with a federal crime, yet a person with three photos depicting a
- child in a lascivious pose can. Christian Coalition urges that the federal
- child pornography law should be amended to make illegal possession of any
- child pornography.
-
- ------
-
- For the other side of the story, check out CDT's archives:
-
- http://www.cdt.org/cda.html
- ftp://ftp.cdt.org/pub/cdt/policy
-
- Information on the Communications Decency Act issue is also available
- through auto-reply email.
-
- General info about the CDA issue cda-info@cdt.org
- Status of the legislation cda-stat@cdt.org
-
- --
- Jonah Seiger, Policy Analyst Center For Democracy and Technology
- <jseiger@cdt.org> 1001 G Street NW, Suite 700 East
- Washington, DC 20001
- PGP key via finger (v) +1.202.637.9800
-
- For more info on CDT: email <info@cdt.org> or visit http://www.cdt.org/
-
- ------------------------------
-
- Date: Mon, 05 Jun 95 18:35:31 +0800
- From: defcon@IBM.NET
- Subject: File 6--Voice System Up-Date
-
- [> The DEF CON Voice System is now up at (801) 855-3326 <]
-
- Voice Bridge / Voice BBS / Voice Mailboxes / Private Chat
-
- The Voice system has beed changed all around to now support a fast
- Voice BBS, VMBs and multiple 8 port conferences. Anyone can create
- their own VMB, etc.
-
- This voice bridge has been set up for people of like interestes
- to meet and discuss computers or whatever they want. Running on
- borrowed equiptment the systems is still under construction, but
- working fully.
-
- This is the same bridge that will be used for DEF CON III, a
- computer conference in Las Vegas this August. People who can not
- attend can call in and listen to the speakers during the day, or talk
- with other people at the convention. Oh, some people wondered about
- the cost.. it's whatever you pay to call this number, normal long
- distance.
-
- [> 24 hours at (801) 855-3326, all are welcome to call <]
-
-
- PGP Key (2.3a & 2.6) Available on key servers. Voice (AT&T) 0-700-TANGENT
- DEF CON FTP: ftp.fc.net /pub/defcon http://www.defcon.org
- FAX: 206-453-9567
-
- ------------------------------
-
- Date: Sun, 19 Apr 1995 22:51:01 CDT
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 7--Cu Digest Header Info (unchanged since 19 Apr, 1995)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CUDIGEST <your name>
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: Bits against the Empire BBS: +39-464-435189
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
- ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu:80/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #7.46
- ************************************
-
-