home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Sun Aug 6, 1995 Volume 7 : Issue 65
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
-
- CONTENTS, #7.65 (Sun, Aug 6, 1995)
-
-
- File 1--FWD>House Telecommunications Bill Passes with Amendments (fwd)
- File 2--CDT Testimony for Today's Sen. Hearing (fwd)
- File 3--VTW BillWatch #12
- File 4--Re: Intellectual property
- File 5--Cu Digest Header Info (unchanged since 19 Apr, 1995)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Fri, 4 Aug 1995 22:18:58 -0500 (CDT)
- From: David Smith <bladex@BGA.COM>
- Subject: File 1--FWD>House Telecommunications Bill Passes with Amendments (fwd)
-
- ----------------------------Original message----------------------------
- ++++++++++++++++++++++++++++++++++++++++++
- From--Vigdor Schreibman - FINS <fins@access.digex.net>
- Subject--HOUSE TELECOM PASSES WITH AMENDMENTS (fwd)
-
-
- HOUSE TELECOM PASSES WITH AMENDMENTS
- Broadcast Limitation & Parental Choice Approved
-
- Washington, DC--The House of Representatives, this afternoon, passed the
- "Communications Act of 1995" [HR 1555], in a final vote of 305 yeas to 117
- nays. An amendment (2-5) offered by Rep. Edward J. Markey (D-MA), was
- agreed to earlier by a vote of 228 yeas to 195 nays to limit the
- ownership by any person of television stations which have an aggregate
- national audience reach exceeding 35 percent.
-
- Another amendment (2-6) offered by Reps. Markey, Dan Burton (D-IN), John
- M. Spratt, Jr (D-SC), and James P. Moran (D-VA), was agreed to by a vote
- of 224 yeas to 199 nays, would establish a plan to facilitate parental
- choice in television programming. The amendment would establish a
- voluntary television rating system, and require that televisions be
- equipped with program-blocking technology known as the "V-chip or "choice
- chip."
-
- The "V-chip" agreement was a surprise outcome. A vote of the House
- first approved a substitute amendment (2-7) offered by Rep. Tom A. Coburn
- (R-OK) that was agreed to by a vote of 222 yeas to 201 nays. The Coburn
- amendment would have replaced parental control with a Federally mandated
- industry study. However, on a motion to recommit offered by Rep. Markey
- with instruction to insert the language of the Markey amendment (2-6), the
- House approved the motion by a vote of 224 yeas to 199 nays and, thereby,
- mandated the provisions of both amendments. Rep. Burton was evidently so
- thrilled by the result, which he had passionately supported, that he was
- seen weeping in joy after the final outcome was announced.
-
- Vigdor Schreibman - FINS <fins@access.digex.net>
-
- ------------------------------
-
- Date: Fri, 4 Aug 1995 22:23:53 -0500 (CDT)
- From: David Smith <bladex@BGA.COM>
- Subject: File 2--CDT Testimony for Today's Sen. Hearing (fwd)
-
- ---------- Forwarded message ----------
- Date--Mon, 24 Jul 1995 13:24:25 -0400
- From--Jonah Seiger <jseiger@cdt.org>
-
- Below is CDT Executive Director Jerry Berman's testimony for today's
- hearing on the Dole/Grassley bill.
-
- We will post a review of the hearing later tonight and will make the
- testimony of other witnesses available as soon as we get it.
-
- Jonah
-
- --
-
- Testimony of
-
- Jerry Berman, Executive Director
- Center for Democracy and Technology
-
- Regarding
-
- The "Protection of Children from Computer Pornography Act of 1995" (S. 892)
-
- before
-
- the Senate Judiciary Committee
-
-
- July 24, 1995
-
- Mr. Chairman and Member of the Subcommittee:
-
- My name is Jerry Berman, Executive Director of the Center for Democracy and
- Technology. The Center is pleased to have opportunity to address the
- subcommittee on one of the critical civil liberties issues of our day: the
- question of the most effective and constitutional means of protecting
- children from inappropriate material on the Internet. We are pleased,
- therefore, the have the opportunity to offer our views on the proposed
- "Protection of Children from Computer Pornography Act of 1995." (S. 892) =
-
-
- The Center for Democracy and Technology (CDT) is an independent, non-profit
- public interest policy organization in Washington, DC. The Center's
- mission is to develop and implement public policies to protect and advance
- individual liberty and democratic values in new digital media. The Center
- achieves its goals through policy development, public education, and
- coalition building.
-
- The Center is also the coordinator of the Interactive Working Group (IWG),
- an ad hoc working group of over 85 organizations from the computer and
- communications industries, and the public interest community. Since
- January 1995, the IWG has been working to address the question of how to
- protect children from inappropriate material online in a manner which is
- consistent with Constitutional values and continued innovation in
- interactive media.
-
- I. Broad reach and sweeping impact of the "Protection of Children from
- Computer Pornography Act of 1995."
-
- The "Protection of Children from Computer Pornography Act of 1995" (S.892)
- has been presented as a narrowly drawn statute, designed to target the "bad
- actors." Unfortunately, based on CDT's analysis, the proposed statute is
- in fact strickingly broad. In some senses, it is even more sweeping than
- the Communications Decency Act.
-
- A. The Grassley bill creates broad criminal liability for online servi=
- ces
- providers, video dialtone network operators, full service network
- providers, schools, libraries, private businesses, and many content
- providers
-
- Notwithstanding the intent of the drafters, the Grassley bill sweeps a
- number of commercial and noncommercial entities into its ambit. Covered
- entities include:
-
- * commercial online service providers,
- * schools,
- * libraries,
- * universities which offer access to the Internet,
- * other public information resources,
- * small and large businesses which provide their employees with access to=
-
- the Internet.
-
- In addition, since the bill covers all "electronic communications service"
- providers (see =A72(b)(1(B)), S. 892 also threatens criminal liability for:
-
- * video dialtone networks operated by local telephone companies, and
- * full service networks operated by cable television companies.
-
- Included as well would be any commercial or noncommercial provider of
- content which operates its own computer to distribute that content. As a
- result, all of the individuals and institutions which publish through the
- World Wide Web and operate their own computers attached to the Internet
- would face liability under this bill. To the extent that a content
- provider -- whether an individual or a large publishing company -- operates
- a computer which makes information available to others, that publisher
- would be subject to the provisions of S. 892.
-
- B. Broad scienter requirements in S. 892 would force the segration of =
- the
- Internet into a children's network and a separate adult network
-
- The scienter requirements in the proposed statute appear to have been
- designed in order to limit the scope of the statute. However, as drafted,
- the statute is subject to broad, sweeping interpretation when applied by
- criminal courts. These overly broad scienter requirements would force all
- who provide access to the Internet or other online services to create, in
- effect, separate networks for children and for adults. Such a stark
- separation would likely be the only way to for online service providers and
- system operators to avoid liability under S. 892.
-
- The new proposed =A7(b)(2) of 18 U.S.C. =A71464 would criminalize the "know=
- ing"
- transmission of indecent material to minors by any electronic communication
- service provider. According to one interpretation, the application of this
- knowledge requirement could apply to any provider who knows that a specific
- individual is a minor, and then transmits indecent material to that
- individual. Or, another interpretation could hold that service providers
- know that minors are on their service and that there is indecent material
- on the Internet. Thus, service providers -- including schools, libraries
- and private businesses -- would be criminally liable for merely providing
- minors with access to the Internet. Nothing in the statute or relevant
- case law suggests that courts applying this law would be compelled to adopt
- the former, more narrow, interpretation. Rather, it is perfectly plausible
- to read the proposed =A7(b)(2) as a punishment for any service provider or
- system operator who makes indecent material publicly available to an
- audience that may include minors.
-
- The threat of a broad interpretation of this new statute would compel all
- who provide access to the Internet to restrict all public discussion areas
- and public information sources from subscribers, unless they prove that
- they are over the age of eighteen. Under this statute, a service provider
- could not even provide Internet access to a minor with the approval of the
- child's parent. Since every online service provider would have to
- similarly restrict access to minors, this proposed statute would create two
- separate Internets, one for children and one for adults. Access by a child
- to the adult network would create criminal liability for the service
- provider.
-
- II. The vagueness of the "Protection of Children from Computer Pornogra=
- phy
- Act of 1995" will create a chilling effect on all forms of speech o=
- n
- the Internet and great confusion among schools, libraries, business=
- es,
- and online service providers who offer access to the Internet.
-
- A. Application of "willful" standard is unclear in the bill as drafted=
- and
- will lead to confusion among service providers and users
-
- The 'willful' standard also creates the possibility for significant
- confusion, given the widely divergent readings of the 'willful'
- requirement. In some instances, 'willful' is read as a so-called "tax
- standard," implying that to be convicted one must manifest a voluntary and
- intentional act which is violation of a known legal duty. Cheek v. United
- States, 111 S.Ct 604 (1991). However, courts have also found that
- willfulness means nothing more than a person acted knowingly and
- deliberately. United States v. Peltz, 433 F.2d 48, 54-055 (2d Cir.1970),
- cert. denied, 401 U.S. 955 (1971). The drafters of the Model Penal Code
- define willful as merely knowing action, and do not require specific
- intent to violate a known legal duty. Recent Supreme Court jurisprudence
- in the area of money laundering, on the other hand, has required that the
- defendant's actions demonstrate knowledge that his or her conduct is, in
- fact, a violation of the law. United States v. Ratzlaf, 114 S.Ct 655
- (1994).
-
- A broad reading of "willful," requiring primarily purposive action leading
- to a minor's access to indecency, but not knowledge of the fact that such
- actions constituted violations of the law, would subject many service
- providers to liability under =A7 1464. A more narrow reading of this
- requirement, could diminish the overreaching impact of the statute,
- however, such an interpretation is by no means guaranteed. While Ratzlaf
- may offer some support in this regard, the Court also noted that "
- 'Willful,' ... is a 'word of many meanings,' and 'its construction' [is]
- often ... influenced by its content.' " Id. at 659 (citations omitted).
- The context was supplied, in part, by the statute in question, which had
- previously construed "willful" as knowing violation of a known legal duty.
- Id. No such context is available in 18 U.S.C. =A7 1464 to aid a court in
- intepretation.
-
- Confusion as to providers legal duty will create a tremendous chilling
- effect on all online communications. In order to minimize their risk,
- service providers will be forced to adopt rules governing their users
- behavior that are likely to be highly restrictive.
-
-
- B. Heavy-handed content regulation will squander the democratic potent=
- ial
- of interactive media
-
- As the popularity and accessibility of the Internet and commercial online
- services grows, and as the medium becomes easier to use, the political uses
- of the net have flourished. Political discourse is facilitated by a
- variety of different communications techniques possible online, including
- newsgroups, mailing list discussion groups, chat sessions, and a host of
- electronic publishing capabilities. Any regulation creating criminal
- penalties for communication of indecent material would have a substantial
- chilling effect on all who use interactive media. Such a chilling effect
- would severely inhibit the growth of the Internet as a political forum.
-
- Political groups left, right, and center are using the Internet to
- communicate, to organize, and to advocate their own views. Advocacy
- organizations have found World Wide Web services are critical to political
- education activities, and an increasing number of grass roots and community
- groups are coming to rely on the Internet to keep in touch with members and
- constituents. In fact, even some Senators offices are using the World Wide
- Web to communicate with and solicit feedback from constituents. As a
- nation we should be encouraging political discourse in this new medium,
- because of its potential to raise the level of political discussion beyond
- the sound bite and to involve more citizens in the political process. One
- aspect of encouraging political discourse in interactive media is to assure
- all users that their First Amendment and privacy rights will be respected
- fully.
-
- Indeed, the Internet and other online services are fast becoming a new
- public forum for political discourse for American citizens. In order to
- preserve the freedom and openness of this new political arena, it is
- critical to avoid creating a chilling effect on individual expression.
-
- III. The "Protection of Children from Computer Pornography Act of 1995" =
- is
- unconstitutional under the First Amendment for failure to adopt the
- least restrictive means
-
-
- The proposed statute extends indecency restrictions enacted to apply to the
- broadcast radio and television media to new interactive communications
- media such as the Internet, commercial online services, and electronic
- bulletin board systems. Though indecency restrictions have been applied to
- broadcasting for some time, reflexive extension of the same restrictions to
- new interactive communications media is simply unconstitutional. The
- Supreme Court has long held that "each medium of expression presents
- special First Amendment problems." In light of the substantial control
- that users and parents have over content that enters their homes via
- interactive media, government restrictions on indecency as proposed by the
- Grassley bill are unconstitutional.
-
- A. Censorship of indecent, but not obscene, communications for the pur=
- pose
- of protecting minors must employ the least restrictive means availa=
- ble
- to accomplish their goal
-
- Indecent communications are protected by the First Amendment, unlike
- obscenity which is altogether unprotected. Sable Communications of
- California v. FCC, 492 US 115; 109 S.Ct. 2829; 106 L.Ed. 2d 93 (1989).
- Indecent communications, which do not rise to the level of obscenity, can
- only be limited in order to serve a compelling state purpose and must be
- done using the least restrictive means possible. Id. at 125. The Sable
- court found that the protection of minors from access to indecent material
- is a compelling state purpose, but that "it is not enough that the
- Government's ends are compelling; the means must be carefully tailored to
- achieve those ends." Id.
-
- As a threshold matter, the Sable court found that the constitutional basis
- for upholding indecency regulations in broadcast media articulated in
- Pacifica Foundation v. FCC, 438 US 726, 98 S.Ct. 3026, 57 L.Ed. 2d 1073
- (1978), were inapplicable in any other media besides over-the-air
- broadcasting. 492 U.S. at 127. Pacifica accepted that the FCC had
- authority to enforce content regulation based on the dual finding that 1)
- radio was a "uniquely pervasive medium" that intruded (dirty words and
- all) into peoples homes, and 2) the only way to protect children from
- exposure to objectionable content was to keep it off the air altogether. =
-
- Sable rejects this finding of "pervasiveness" as "emphatically narrow" and
- irrelevant to other media such as telephone audiotext services. 492 U.S. at
- 127
-
- Thus, the Sable "least restrictive means" standard became the test by which
- all regulations on access to constitutionally protected indecent material
- were judged. Nearly ten years of litigation along with adjustment of the
- statute and regulation were required before the current statute was found
- constitutional under this standard. See Dial Information Services v.
- Thornburg, 938 F.2d 1535 (2d Cir., 1991)(finding FCC regulations
- implementing =A7 223(b) constitutional). During the course of the dispute
- over the application of =A7 223 to audiotext services, courts considered an=
- d
- rejected a number of means by which carriers were required to shield minors
- from access to indecent information. First, time channeling rules,
- requiring that services only be accessible during hours when children were
- asleep, were found to violate the First Amendment because they had the
- effect of denying access to adults as well as children. Carlin
- Communications v. FCC, 749 F.2d 113, 121 (2d Cir. 1984) (Carlin I). Next,
- the courts rejected a requirement that carriers provide access to indecent
- services only once customers entered access codes or passwords, which were
- to be issued after verification that the customer was over 18. Carlin
- Communications v. FCC, 787 F.2d 846 (2d Cir. 1986)(Carlin II).
-
- The finding of the Dial court, approving the constitutionality of =A7 223 a=
- nd
- associated regulations depended on the legislative determination that the
- telephone company blocking of service pending age verification or use of a
- credit card are the only means to enable parents to restrict their children
- from access to indecent audiotext services.
-
- B. Background on dial-a-porn rules: lack of user control leads to inde=
- cency
- restrictions
-
- As was the case for broadcast indecency restrictions considered in
- Pacifica, the dial-a-porn restrictions were only found constitutional
- because of the uniquely intrusive and uncontrollable nature of the
- audiotext services. A key legislative motivation for imposing these rules
- during the 1980s was that indecent information available through audiotext
- services in the telephone system were openly available to children in such
- a way that it was difficult for parents to control access by their
- children. The views of Congressman Bliley recounts the prevailing view of
- the need for the legislation: "It constitutes an attractive nuisance in
- every home in America where children are present. There is no completely
- effective way to prevent children from being exposed to "indecent" or
- "obscene" dial-a-porn so long as it is lawfully and commercially marketed.
- . . ." Bliley continues:
-
- "Telephones are precisely like radio and television because of their easy
- accessibility to children and the virtual impossibility for parents to
- monitor their use . . . . [D]ial-a-porn is presently in the home whether
- the homeowner wants it or not. Today one cannot have telephone service in
- the privacy of one's family environment without being required to [have]
- dial-a-porn with it. Families with children must give up telephone service
- to be "left alone" from exposure of their children to this intruder."
-
- The current statute and Federal Communications Commission regulations
- promulgated thereunder were found constitutional only after nearly ten
- years of litigation and efforts by Congress and the Commission to bring the
- statute within constitutionally acceptable bounds. Indecency restrictions
- applied to interactive media would require a wholesale review of the
- constitutionality as applied to new media such as online services and the
- Internet. Interactive media operates in such a different manner that the
- constitutional issues must be considered afresh given the new factual
- backdrop.
-
- C. Reliance on government censorship to restrict access to indecency
- fails
- to take into account the fact that interactive media offers parents=
- a
- much greater degree of control then broadcast services or 900 numbe=
- r
- services.
-
- Indecency restrictions in interactive media would presumably be motivated
- by the same goal of protecting minors as the existing statute. However,
- the means adopted for achieving the goal are impermissible under the First
- Amendment because they are not the least restrictive means of accomplishing
- the legitimate government purpose. Interactive media is materially
- different than analog telephone and audiotext technology in that it offers
- users the ability to exercise control over precisely what information one
- accesses. Given the dramatic difference between telephone technology and
- interactive services such as the Internet and other interactive media, we
- believe that blocking by the carrier as demanded by =A7 223 would not meet
- the "least restrictive means" test.
-
- Just as the Sable court found broadcast indecency regulations inapplicable
- to the telephone system because of differences in the medium, regulations
- designed for audiotext services in the telephone system are
- constitutionally inapplicable to new interactive media. Indeed, indecency
- restrictions on material transport by US Mail have also been struck down by
- the Supreme Court precisely because "the receipt of mail is far less
- intrusive and uncontrollable" than broadcast information that was the
- subject of the Pacifica case.
-
- Technologies already exist that enable users to access certain information
- based on a variety of characteristics, or, to exclude certain types of
- information from access. With such filtering technology, users, instead
- of the government or network operators, can exercise control over the
- information content that they receive in an interactive network
- environment. User control could be exercised in two ways. First, one
- could screen out all messages or programs based on information in the
- header. If a parent wanted to prevent a child from seeing a particular
- movie or from participating in a particular online discussion group, then
- the computer or other information appliance used by the child could be set
- by the parent to screen out the objectionable content. Such features can
- often be protected with passwords which would be assigned, for example, by
- the responsible adults in the house. Second, the same systems can be used
- to enable blocking of content based on third-party rating systems.
-
- Given the flexibility of interactive technology, we need not rely on just
- one rating system. In fact, a single rating system or a single set of
- filters would merely replace a single government censor with a single
- private censor, with no real gain for the free flow of information.
- Properly implemented, interactive media can accommodate multiple filtering
- systems, giving users and parents the opportunity to select and block
- information based on a true diversity of criteria. The national Parent
- Teachers Association or different religious organizations could set up
- rating systems which would be available on the network to those who desired
- them. Rather than relying on the judgment of the government, or of the
- service provider, viewers can limit access to content based on the judgment
- of a group whose values they share.
-
- Interactive media can enable individuals and parents to prevent themselves
- or their children from using their PCs or TVs to access certain kinds of
- content. With such control mechanisms within the practical reach of
- parents, the governmental purpose generally cited for indecency regulations
- -- the protection of children -- could be accomplished without government
- content restrictions. In particular, the reasoning of Pacifica (intrusion
- of the indecent message into homes) and Sable (inability of parents to
- exercise control) would no longer justify most content regulation.
-
- ------------------------------
-
- Date: Sat, 5 Aug 1995 03:06:49 -0400
- From: "Shabbir J. Safdar" <shabbir@PANIX.COM>
- Subject: File 3--VTW BillWatch #12
-
- ============================================================================
- VTW BillWatch: A weekly newsletter tracking US Federal legislation
- affecting civil liberties. BillWatch is published every
- Friday afternoon as long as Congress is in session.
-
- Issue #12, Date: Sat Aug 5 03:01:07 EDT 1995
-
- Please widely redistribute this document with this banner intact
- Redistribute no more than two weeks after above date
- Reproduce this alert only in relevant forums
-
- Distributed by the Voters Telecommunications Watch (vtw@vtw.org)
-
- *** Know of someone in NY/NJ with a fax machine but without net ***
- *** access that's interested in VTW's issues? Tell them to ***
- *** call and get on our weekly fax distribution list at ***
- *** (718) 596-2851. ***
-
- To get on the distribution list for BillWatch, send mail to
- listproc@vtw.org with "subscribe vtw-announce Firstname Lastname"
- in the subject line.
-
- Email vtw@vtw.org with "send billwatch" in the subject line
- to receive the latest version of BillWatch
-
- For permission to reproduce VTW alerts in your own publication
- contact vtw@vtw.org
- ____________________________________________________________________________
- CONTENTS
- What happened in the last 48 hours?
- Rumor Central (RC)
- Internet Freedom and Family Empowerment Act (HR 1978, S n.a.)
- (passed in the House, nothing in Senate)
- 1995 Communications Decency Act (HR 1004, S 314)
- (passed Senate, a last-minute version passed in the House)
- 1995 Protection of Children from Computer Pornography Act
- (HR n.a., S 892, Senate hearing scheduled for July 24th)
- Anti-Electronic Racketeering Act of 1995
- (HR n.a., S 974, not currently moving in the Senate)
-
- ____________________________________________________________________________
- WHAT HAPPENED IN THE LAST 48 HOURS?
-
- On Monday we released an alert asking the net to call their
- Representatives about supporting parental control as the best method of
- monitoring children's access to material on the Internet. You
- responded in spades. We're still digging out of the email, and Steven
- Cherry (VTW - stc@vtw.org) has been covering most of the mail reply
- tasks.
-
- Fast forward to Friday (8/4) when the House voted on the
- Telecommunications Reform bill. The Cox/Wyden Internet Freedom and
- Family Empowerment Act (HR1978) was brought up as a proposed amendment
- to the Telecomm Reform bill. HR1978 advocates a "parental control"
- approach to the issue of children accessing the Internet. It was
- passed 420-4.
-
- On the same day we saw another amendment proposed that would restrict
- constitutionally-protected expression online. It also was passed, and
- now goes onto conference with the House-endorsed HR1978 and the
- Senate-endorsed net-censorship bill (the Exon/Coats Communications
- Decency Act). What is most disturbing about these new net-censorship
- amendments is that they were intentionally obscured from any careful
- examination.
-
- HR1978 had been available and well-discussed for weeks before this vote
- was proposed. In addition, a free demonstration of the "parental
- control" software discussed in HR1978 was done in mid-July for
- Congress by members of the Interactive Working Group. As is obvious,
- every effort was made by sponsors Cox and Wyden to ensure that
- supporting votes were well-educated votes on this issue.
-
- On the other hand, the sponsors of the new net-censorship amendment
- brought it out at the last-minute. Neither civil liberties groups or
- even undecided legislators had enough time to examine it, much less
- poll their constituents about their feelings on it. Furthermore the
- summary of the legislation did NOT EVEN MENTION the fact that it would
- create new restrictions on speech.
-
- When Steven Cherry (VTW) phoned his Representative's office on Friday
- to express his displeasure with the new net censorship amendment, a
- staffer blindly insisted that it wouldn't be voted on, because it
- wasn't in the summary. It is clear that this Representative isn't the
- only one who unknowingly cast a vote in favor of censorship today. VTW
- finds these tactics reprehensible but predictable.
-
- Starting in September, the House/Senate conference committee will have
- to decide what parts of the passed legislation are resolved into the
- final bill. VTW is optimistic about our odds in this process.
-
- But what really happened in the *larger* context of net censorship?
-
- Tremendous gains were made today. 420 Reps went on record saying
- they had thought about the issue and supported a method of monitoring
- children's acces to the net without endangering free speech. Many of
- them did so because you called them and told them that's what you wanted.
-
- In going through the letters you sent to vtw@vtw.org, we saw several
- cases like this:
-
- Caller #1: I called Rep. Snodgrass about parental control being
- a better approach to children on the net (such as HR1978),
- and opposed net censorship. This was the first they've
- heard of it.
- Callers #2-5: I called Rep. Snodgrass about HR1978 and parental
- control and Snodgrass currently has no position.
- Caller #6: I called Rep. Snodgrass, and a staffer told me Snodgrass
- will vote for HR1978!
-
- YOU HAD AN EFFECT on this process. Just one month ago we had lost this
- same battle in the Senate (84-16). The best the pro-censorship forces
- were able to do this time was to sneak in something less than the
- Communications Decency Act during the last second of the process,
- hoping that by hiding their legislation they could accomplish their
- goals. Although it would have been nice to have won this round
- conveniently and neatly, we have to take our victories as they come to
- us. In this case, with the help of Reps Cox and Wyden, we were able to
- tell our legislators that they could do something about the issue of
- "cyberporn" while preserving the First Amendment.
-
- Every one of you that called, wrote, faxed, or drove to DC to speak to
- your rep should be very proud of yourself. You have made an impact and
- affected the way that politicians think about this issue. You've
- also created a record for them about how they've voted on this issue.
- Democracy does behave as designed sometimes, and we hope your
- enthusiasm about this motivates you to vote in the next election.
-
- VTW will keep you informed about the progress of the conference committee
- where possible throughout September.
-
- ____________________________________________________________________________
- RUMOR CENTRAL (RC)
-
- [Big news this week on the net censorship issue, see the
- other sections for details. -Shabbir]
-
- Quote of the week
-
- "I'm real green at internet. I have no idea where this is going, but
- I wanted to say thanks, because I had a chance to participate
- in this vote on restricting Internet. I called my Rep. Nadler
- and told him how I felt and was glad to be told that he felt
- the same way and voted against the Exon/Coats CDA."
-
- -Submitted by a new net user turned beginning activist
-
-
- A big VTW kudos to Tim Mattox (tmattox@ecn.purdue.edu) who let us
- know of a problem in BillWatch last week. We had some problems
- with the mailer daemon that sent back the hearings file.
-
- Send your interesting rumors (anonymously or not) to vtw@vtw.org.
- All mail headers will be destroyed.
-
- ____________________________________________________________________________
- Internet Freedom and Family Empowerment Act (HR 1978, S n.a.)
-
- Description:
- HR 1978 is an attempt to recognize the unique medium that is
- online systems and avoid legislating censorship. It would:
- -prohibit the FCC from regulating constitutionally-protected
- online speech
- -absolve sysops and services from liability if they take
- good faith measures to screen their content or provide
- parental-screening software
-
- See directions below for obtaining analyses from various
- organizations.
-
- House sponsors: Cox (R-CA), Wyden (D-OR)
-
- House status:
- HR 1978 was passed today (8/4/95) by the House in a vote (420-4).
- It will continue to be refined during the conference process.
-
- House actions anticipated:
- Representatives Cox and Wyden will track their bill through the
- House/Senate conference committee.
-
- Where to get more info:
- Email: vtw@vtw.org (with "send hr1978" in the subject line)
- Gopher: gopher -p 1/vtw/exon gopher.panix.com
- WWW: http://www.panix.com/vtw/exon
-
- ____________________________________________________________________________
- 1995 COMMUNICATIONS DECENCY ACT (CDA) (Passed Senate, HR 1004)
-
- Description:
- The CDA would criminalize electronic speech currently protected
- in print by the First Amendment.
-
- House CDA sponsors: Johnson (D-SD)
-
- House status:
- Although HR1004 will probably never leave committee,
- legislation that would censor the net in a similar manner was
- introduced into the Telecomm bill at the last minute. It will
- now go into conference for examination by the House/Senate
- conference committee.
-
- Senate status:
- The Senate affirmed the Communications Decency Act (84-16)
- as amended to the Telecommunications Reform bill (S 652).
-
- Where to get more info:
- WWW: http://www.panix.com/vtw/exon
- http://www.eff.org/
- http://www.cdt.org/
- http://epic.org/free_speech
- Gopher: gopher -p 1/vtw/exon gopher.panix.com
- gopher gopher.eff.org
- Email: vtw@vtw.org (with "send cdafaq" in the subject line)
- cda-status@cdt.org
- cda-info@cdt.org
-
- ____________________________________________________________________________
- 1995 Protection of Children from Computer Pornography Act (S 892)
-
- Description:
- Would make Internet Service Providers liable for shielding
- people under 18 from all indecent content on the Internet.
-
- Senate sponsors: Dole (R-KS), Coats (R-IN), Grassley (R-IA), McConnell (R-KY),
- Shelby (R-AL), Nickles (R-OK), Hatch (R-UT)
-
- Senate status:
- A hearing was held Monday July 24th. No action on the bill
- has happened yet as a result of that hearing.
-
- Senate citizen action required:
- Request bill and analysis below and familiarize yourself with it.
-
- House of Representatives status: No House version is known about, although
- similar language was attached at the last minute to the Telecomm
- Reform bill.
-
- Where to get more info:
- Email: vtw@vtw.org (with "send s892" in the subject line)
- WWW: URL:http://www.panix.com/vtw/exon
- Gopher: URL:gopher://gopher.panix.com:70/11/vtw/exon
-
- ____________________________________________________________________________
- Anti-Electronic Racketeering Act of 1995 (HR n.a., S 974)
-
- Description:
- S 974 has many effects (not good) on law enforcement's use of
- intercepted communications. It would also make it unlawful for
- any person to publicly disseminate encoding or encrypting
- software including software *currently allowed* to be exported
- unless it contained a "universal decoding device". This
- more than likely means that Clipper-style key escrow systems
- could be disseminated, but not strong, private cryptography.
-
- Senate sponsors: Grassley (R-IA)
-
- Senate status: Currently not active and probably won't move before the
- August recess.
-
- Senate citizen action required:
- Request bill below and familiarize yourself with it. VTW is
- tracking this bill, and will alert you when there is movement.
- There is no Congressional action to take right now; as other
- bills (such as the Communications Decency Act) pose a greater,
- more immediate threat.
-
- House of Representatives status: No House version is currently enrolled.
-
- Where to get more info:
- Email: vtw@vtw.org (with "send s974" in the subject line)
- Gopher: URL:gopher://gopher.panix.com:70/11/vtw/
-
- ------------------------------
-
- From: Dave++ Ljung <dxl@HPESDXL.FC.HP.COM>
- Subject: File 4--Re: Intellectual property
- Date: Mon, 31 Jul 95 10:43:13 MDT
-
- Reply to: : Intellectual Property (CuD 7.60, 7.51)
- |
- |Keith Graham in CuD #7.60 makes some thoughtful points in response to my
- |article "Against intellectual property" (CuD #7.51). None of them, though,
- |undercuts my original arguments.
- |
- |There is a strong tendency among those defending intellectual property
- |(IP) to look only at its benefits and to ignore the benefits of not
- |having IP. For example, in the case of movies it's easy to point to
- |the big-budget movies that might not be made without IP. But without
- |IP, there would be vastly greater opportunities for small producers,
- |with a great flourishing of film production for niche audiences and
- |different cultures around the world. These need not be low quality, as
- |anyone who has attended a film festival should realise.
- |
- |Without the monopoly protection of IP, less money would flow to
- |certain big producers, to be sure. But this would mean that more money
- |would be available elsewhere, including for jobs for those who modify
- |existing intellectual products.
- |
- |My article did not always distinguish between ideas and information
- |products, but the distinction is not as great as it may at first
- |appear. Certainly in the case of writing, ideas are not just altered
- |but also in a real sense produced in the process of expressing them.
- |In any case, my point applies in both cases. It doesn't make a lot of
- |sense to have ownership of things that can be cheaply and easily
- |copied.
- |
- |Does it really require an IP incentive to "clean up" a computer
- |program? I suggest contacting the Free Software Foundation
- |(gnu@prep.ai.mit.edu) to find out about its GNU Project. (It uses
- |copyright basically to get around the constraints of copyright, a
- |process that would be unnecessary without IP.) There's a vast amount
- |of high-quality free software available. Some say that it's greater in
- |quantity and quality than commercial software. I know of no impartial
- |examination. The point is that the existence of such free software
- |undermines the argument for IP.
-
-
-
- |Dave Ljung (#7.60) presumes that because my ideas about IP don't seem
- |to fit in a box called capitalism then they must fit in a box called
- |socialism.
-
- Sorry, but that doesn't explain what I was thinking. Perhaps I should
- clarify my terms. When I spoke of Capitalism and Socialism I should have
- realized that they were heavily loaded phrases. I wasn't making any
- links to any governments that exist or may have existed at some point.
- I was simply referring to the economic concepts - Capitalism being
- market/profit based and Socialism being an egalitarian economic system,
- i.e., spreading the wealth.
-
- It seems to me that removing IP will 'spread the wealth.' You even
- refer to this in your discussion with Keith Graham, claiming:
-
- "...less money would flow to certain big producers, to be sure.
- But this would mean that more money would be available elsewhere,
- including for jobs for those who modify existing intellectual products"
-
- (As a side note, I wonder why you keep ignoring the point that the most
- money would flow to the people who directly copy existing intellectual
- products instead of modifying them)
-
- You also point out that there would be great opportunities for smaller
- producers. In a Capitalist system those opportunities are already there
- if the producers are actually creating marketable products. I don't see
- how IP is holding them back, I've never heard an art house film producer
- complain about how they can't make any films because of Jurassic Park.
- In that sense, then, these opportunities you speak of suggest that they
- would be creating films for niche audiences that they otherwise could
- not afford to create. If that is the case, then it is apparent that they
- are producing something that is worth less (monetarily) than general society
- is willing to pay for it. When that occurs, the extra money has to come
- from somewhere, and I don't see where else it would come if it wasn't for
- socialism.
-
- Another problem that you seem to ignore is how you would deal with direct
- copying. How would any movie get created if someone else could just copy
- it and show it? The only solution I see for this is Socialism (government
- support of the original director). If you have some other economic system
- in mind, let me know.
-
- |There are many other areas where most people would oppose having free
- |markets, such as family members, human organs, university degrees, and
-
- There is a difference between life and software (for most people, that is ;).
- Besides, your analogy doesn't hold up, because none of these can just be
- copied and passed on. (Except maybe degrees, but degrees aren't under a
- free market simply because a bought degree would be worthless to a perspective
- employer).
-
- |But there are also many who favour varieties of libertarian socialism, in
- |which people organise themselves locally to provide goods and services
- |collectively, but there is no government.
-
- Libertarian Socialism either assumes something about human nature or else
- is an oxymoron. Using IP as an example, if you remove IP and also don't
- use government Socialism to protect the information providers, than people
- will copy and reproduce. Please tell us, what is your solution for this?
-
- < personal mode >
- I myself am a Libertarian, but I find some of the concepts in your paper
- to be offensive to my rights. I agree that there are some problems with
- IP, but I think the removal is far worse.
- < end personal mode :) >
-
- Regardless - I didn't want this to get into an economic discussion. I'm
- not upholding Capitalism over Socialism. It just seems (from reading your
- arguments so far) that removal of IP would be tending towards Socialism
- (whether it be USSR Socialism or Libertarian Socialism), which is something
- you don't support directly in your paper.
-
- ------------------------------
-
- Date: Sun, 19 Apr 1995 22:51:01 CDT
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 5--Cu Digest Header Info (unchanged since 19 Apr, 1995)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CUDIGEST
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: Bits against the Empire BBS: +39-464-435189
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu:80/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #7.65
- ************************************
-
-